FiltersClear all
Consulting services results
Showing results in consulting services.
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
1 out of 22
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 22
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
3 out of 22
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 22
Manage Corporate Data on Devices with IntuneAVASOFTCan you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 22
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 22
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 22
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
8 out of 22
Copilot - 2 Days Adoption WorkshopINSOMEA COMPUTER SOLUTIONS TUNISIE SARLINSOMEA will help users in adopting copilot within companies from different sectors and sizes
+2
Applicable to:
Frontline Workers
Threat Protection
9 out of 22
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+1
Applicable to:
Threat Protection
10 out of 22
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
+2
Applicable to:
Cloud Security
Threat Protection
11 out of 22
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 22
Threat Protection Engagement: 4-Week WorkshopTech One GlobalThis 4-week engagement deep dives into the next-gen Microsoft Security tools, provides a thorough analysis of your security posture, and offers actionable steps to enhance your threat protection.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
13 out of 22
Microsoft Copilot for Security Readiness Assessment: 4-Week AssessmentTech One GlobalOur Microsoft Copilot for Security Readiness Assessment encompasses a thorough evaluation of your existing security infrastructure, policies, and procedures.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
14 out of 22
Risk Analysis and Cybersecurity Assessment: 4-Week AssessmentTech One GlobalOur Risk Analysis & Cybersecurity Evaluation offer for SMBs is a forward-thinking approach that ensures not just protection but resilience and readiness in the face of cybersecurity challenges.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
15 out of 22
Modern SecOps Engagement: 4-Week WorkshopTech One GlobalThe Modern SecOps Engagement is a comprehensive 4-week assessment designed to provide a bird’s eye view across your enterprise using Microsoft Sentinel and the Unified SecOps Platform.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
16 out of 22
Microsoft Copilot for Security Rapid Onboarding Program: 4-Week ImplementationTech One GlobalWith our deep expertise in Microsoft, including the newly launched Microsoft Copilot for Security, we are uniquely positioned to guide your organization through a seamless onboarding process.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
17 out of 22
Microsoft Copilot for Security Adoption & Change Management: 4-Week WorkshopTech One GlobalLeveraging our deep expertise in Microsoft technologies, we offer unparalleled support to integrate Microsoft Copilot for Security into your organizational framework seamlessly.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
18 out of 22
Defend Against Threats : 2 hours briefingELEVATE Solutions LimitedDefend Against Threats Briefing: 2 Hours briefing to highlight specific security threats that customers face in their unique environment.
+1
Applicable to:
Threat Protection
19 out of 22
Skysecure Realize Zero Trust BlueprintSkysecure Technologies Pvt. Ltd.Accelerate Microsoft Zero Trust adoption with Skysecure’s AI-driven framework that unifies identity, data, device, and threat protection across Microsoft 365 and Microsoft Azure.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
20 out of 22
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 22
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
22 out of 22