FiltersClear all
Consulting services results
Showing results in consulting services.
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFTUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 58
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 58
Microsoft Cloud App Security (MCAS) Solutions for Native Apps by AVASOFTAVASOFTEnhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
3 out of 58
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
4 out of 58
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFTBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 58
Threat Protection WorkshopMobile MentorDuring this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
6 out of 58
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
7 out of 58
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 58
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
9 out of 58
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
10 out of 58
Microsoft Intune: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur expert team will help you deploy and configure Microsoft Intune, ensuring seamless integration and optimal performance for your organization's needs
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
11 out of 58
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLPEvaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
12 out of 58
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
13 out of 58
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 58
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
15 out of 58
GDPR Assessment: 6-Week AssessmentHappiest Minds Technologies LimitedEnable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
16 out of 58
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
17 out of 58
Manage Corporate Data on Devices with IntuneAVASOFTCan you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
18 out of 58
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 58
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 58
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
21 out of 58
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITEDOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
22 out of 58
Copilot - 2 Days Adoption WorkshopINSOMEA COMPUTER SOLUTIONS TUNISIE SARLINSOMEA will help users in adopting copilot within companies from different sectors and sizes
+2
Applicable to:
Frontline Workers
Threat Protection
23 out of 58
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+1
Applicable to:
Threat Protection
24 out of 58
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 58
Defender for IoT Operational Technology: 8-Week POCITC Secure LtdITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
26 out of 58
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance IncYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
27 out of 58
HCLTech Business Email Protection: 10-Days ImplementationHCL America Inc_HCLTHCLTech Business Email Protection (BEP) Powered By Microsoft EOP and MDO, Enable real time Business Email Protection alerting and automated remediation for email service hosted on Microsoft platform
+1
Applicable to:
Threat Protection
28 out of 58
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
29 out of 58
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 58
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense GlobalLearn how to put next-generation Microsoft Security tools to work for you
+1
Applicable to:
Threat Protection
31 out of 58
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 58
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense GlobalUnderstand your readiness for common security threats.
+1
Applicable to:
Threat Protection
33 out of 58
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom ConsultingThis FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 58
Microsoft Purview Data Loss Prevention: 4-Wk Implementation ServiceUNIFY Solutions Pty. Ltd.UNIFY Solutions will implement Microsoft Purview Data Loss Prevention (DLP) to protect your organisation's sensitive information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 58
impelSecure Threat Protection Engagement: Free 4-week workshopimpeltec Pty LtdDiscover threats and vulnerabilities to your Microsoft cloud and on-premises environments
+2
Applicable to:
Cloud Security
Threat Protection
36 out of 58
impelSecure Modern SecOps Engagement: Free 4-week workshopimpeltec Pty LtdGain visibility into threats to your Microsoft 365 and Azure clouds and on-premises environments across email, identity, endpoints, and third-party data
+2
Applicable to:
Cloud Security
Threat Protection
37 out of 58
Essential 8 Gap Analysis : AssessmentEighty20 Solutions Pty LtdOur Essential Eight gap analysis approach provides assurance on effective organisational alignment
with the eight essential controls to achieve a higher level of maturity.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
38 out of 58
Cyber Blueprint: DiscoveryWaterstons LimitedCyber Maturity Assessment with Risk and Gap Analysis
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
39 out of 58
Microsoft 365 Copilot Readiness AssessmentDEFEND LimitedThe Microsoft 365 Copilot Readiness Assessment is purpose-built to help your organisation securely embrace the new wave of Generative AI with Microsoft 365 Copilot
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
40 out of 58
Fusion5 Microsoft Cyber Security Assessment (CSAT)Fusion5 LimitedStrengthen your cybersecurity posture with a comprehensive security assessment
+3
Applicable to:
Identity & Access Management
Knowledge & Insights
Threat Protection
41 out of 58
Security Assessment - 5-Day AssessmentQUORUM SYSTEMS PTY LTDThe outcome of this assessment is a documented security assessment work plan with steps, tools and procedures used to conduct the assessment.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
42 out of 58
Cloud Safeguard - 12 Month ImplementationRapid CircleOur Cloud Safeguard managed security service enables customers to focus on core business and innovation while we keep your Microsoft 365 platforms safe & secure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 58
Microsoft Copilot for Security Readiness AssessmentDEFEND LimitedAssess your organisations' readiness for the power of Copilot for Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 58
Cloud Security Assessment: 2 Week AssessmentByte Information Technology Pty LtdIdentify real threats to your cloud environment and develop plans and next steps for your security journey.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 58
IdentityCARE 3-Wk ImplementationSecureCom LtdSecuring organizations Exchange Online and Multifactor Identity services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 58
"Threat Protection: 3 Day Workshop"Insentra Pty LtdOur Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
47 out of 58
Threat Protection EngagementFUJITSUIdentify and mitigate threats. Strengthen security, prioritize vulnerabilities, and improve your position.
+1
Applicable to:
Threat Protection
48 out of 58
Secure Remote Work: 4-Hours WorkshopProfessional Advantage Pty LtdEnable your people to work from anywhere, securely with Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 58
Microsoft 365 Secure Score: 2 Week AssessmentInsightAlign your security priorities with best practice management and protection of your devices, apps and users.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
50 out of 58
Conditional Access & MFA 5d Proof of ConceptGeneration-e Productivity Solutions Pty LtdConditional Access and Multi Factor Authentication deployed without negatively impacting users. We setup the environment then deploy 5 devices plus train you how to do the rest.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 58
Spark MDR for Microsoft Defender for Endpoint ImplementationSpark New ZealandMicrosoft Defender for Endpoint security design, implementation and 24x7 management offering from Spark New Zealand
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 58
Zero Trust: 3-Day AssessmentQUORUM SYSTEMS PTY LTDThe assessment has been designed and scoped to focus on Microsoft 365 or Azure security elements as these relate to inform a robust zero trust strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 58
ASD Essential 8 Assessment and Roadmap: 10-day AssessmentQUORUM SYSTEMS PTY LTDQuorum’s Essential 8 Assessment & Roadmap guides you to prioritise valuable remediations within a strategic roadmap, enabling quick wins, & developing strategies to tackle more complex use-cases.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
54 out of 58
Implementation of Microsoft Intune and Microsoft Defender by Fusion5Fusion5 LimitedFast-track endpoint security with Microsoft Intune and Defender to protect against cyber threats, unauthorised access, and compliance risks
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Threat Protection
55 out of 58
Managed Microsoft security services by DatacomDatacomDatacom’s managed cyber defence operation centre (CDOC) services provide 24/7 managed security through a centralised CDOC.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 58
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
57 out of 58
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
58 out of 58