FiltersClear all
Professional Services results
Showing results in professional services.
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
1 out of 34
KS Entra: Implementación de 4 semanas - Gestión inteligente de Identidad y AccesoKnowledge System Consulting México (KsConsulting México)Le apoyamos en implementar un entorno seguro e inteligente para la gestión de servicios de Identidad y Acceso por medio de la familia de productos Microsoft Entra.
+2
Applicable to:
Identity & Access Management
Threat Protection
2 out of 34
Defender for Identity & End Point 1 Mes ImplWhite Hat Consultores S.A. de C.V.Solución especializada a empresas que buscan proteger la identidad OnPremise y cortar la cadena de muerte a nivel de equipo de usuario final ofreciendo valor a la seguridad del cliente.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
3 out of 34
Defender for End-Point: 1 Month ImplementationWhite Hat Consultores S.A. de C.V.Implementación inicial de Defender for End-Point para clientes busquen un EDR que satisfaga sus necesidades de protección, una implementación piloto en los equipos del cliente.
+1
Applicable to:
Threat Protection
4 out of 34
TS As a Services (TSaaS): 5-day ImplementationE-Level Cloud Services S.A. de C.V.Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
5 out of 34
Managed Service Defender for Office AdministradoAxtel, S.A.B de C.V.Servicio basado en la nube que protege el correo Electrónico de Office 365
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
6 out of 34
Security 365 | Implementación a 12 mesesUnified Knowledge and Associates SAPI de CVOferta Integral en ciberseguridad para el uso de la nube, gestión de información y trabajo híbrido
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
7 out of 34
Microsoft Defender XDR AcceleratorThe Tech MavericksWe empower your security team to detect and respond to cyberthreats with expanded visibility, incident-level investigation tools, and built-in automation
+1
Applicable to:
Threat Protection
8 out of 34
Microsoft Zero Trust Security ImplementationTC1 LabsImplement Microsoft Security capabilities to strengthen identity, endpoints, cloud, and threat protection with Zero Trust best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 34
Microsoft Security Copilot & Agents ImplementationTC1 LabsEnable Microsoft Security Copilot and implement one operational security agent or workflow to support AI-assisted investigations and response
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 34
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
11 out of 34
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 34
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
13 out of 34
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
14 out of 34
Intune Implementation ServiceTHREATSCAPE SECURITY SOLUTIONS LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Intune in alignment with Zero Trust principles, security best practice, and business productivity goals.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
15 out of 34
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
16 out of 34
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 34
Proteccion de correo electronicoWolk LAB SCPROTECCIÓN DE CORREO ELECTRÓNICO Y HERRAMIENTAS DE COLABORACIÓN
+1
Applicable to:
Threat Protection
18 out of 34
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
19 out of 34
S4B_XDR_Recuperacion_Automatica_RecursosS4BSILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 34
S4B Email Attack Simulation TrainingS4BAttack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
21 out of 34
Threat Investigation and Analysis Service with Microsoft Defender XDRS4BSILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
+2
Applicable to:
Cloud Security
Threat Protection
22 out of 34
Server Endpoint Protection Implementation Service using Microsoft Defender for EndpointS4BProvides comprehensive protection for physical and virtual servers with Microsoft Defender for Server, combined with continuous security monitoring to detect, investigate, and respond to threats.
+2
Applicable to:
Cloud Security
Threat Protection
23 out of 34
Advanced Hybrid Identity Security with Microsoft IdentityS4BHybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 34
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDRS4BProtección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 34
Implementation of security for Endpoint with Microsoft EDRS4BAdvanced defense for on-premises devices with Microsoft Defender for Endpoint, automated detection and response.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 34
Entrenamiento de Phishing con Microsoft Office 365S4BOfrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
27 out of 34
On-premise enviroment Identity Protection service with Microsoft IdentityS4BOn-Premises Identity Protection service detects and mitigates threats in Active Directory using Microsoft Defender for Identity.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
28 out of 34
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4BSeguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
+2
Applicable to:
Cloud Security
Threat Protection
29 out of 34
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4BInvestiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
30 out of 34
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4BProtects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
+2
Applicable to:
Cloud Security
Threat Protection
31 out of 34
Servicio de Implementación de Protección de Identidades Locales con Microsoft Defender for IdentityS4BRefuerza Active Directory local con Microsoft Defender for Identity, detectando ataques, credenciales comprometidas y movimientos laterales en controladores de dominio.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
32 out of 34
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4BDefensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
33 out of 34
Enterprise Automated Endpoint Recovery with Microsoft Defender XDRS4BSILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
34 out of 34