FiltersClear all
Consulting services results
Showing results in consulting services.
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 50
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFTUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
2 out of 50
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 50
Microsoft Cloud App Security (MCAS) Solutions for Native Apps by AVASOFTAVASOFTEnhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 50
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFTBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 50
Threat Protection WorkshopMobile MentorDuring this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
6 out of 50
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
7 out of 50
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 50
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
9 out of 50
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
10 out of 50
Microsoft Intune: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur expert team will help you deploy and configure Microsoft Intune, ensuring seamless integration and optimal performance for your organization's needs
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
11 out of 50
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLPEvaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
12 out of 50
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
13 out of 50
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 50
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
15 out of 50
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
16 out of 50
Manage Corporate Data on Devices with IntuneAVASOFTCan you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
17 out of 50
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 50
Implementation of Microsoft Security CopilotAlfa Connections Pte LtdTo assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 50
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 50
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
21 out of 50
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITEDOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
22 out of 50
Copilot - 2 Days Adoption WorkshopINSOMEA COMPUTER SOLUTIONS TUNISIE SARLINSOMEA will help users in adopting copilot within companies from different sectors and sizes
+2
Applicable to:
Frontline Workers
Threat Protection
23 out of 50
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+1
Applicable to:
Threat Protection
24 out of 50
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 50
Security Copilot Value AcceleratorAvanade, Inc.Designed to help organizations modernize their security operations and administration by leveraging Gen AI.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
26 out of 50
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
27 out of 50
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 50
Cyber Security Services 9 days AssessmentAlfa Connections Pte LtdHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 50
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 50
Microsoft Copilot for Security Readiness Assessment: 4-Week AssessmentTech One GlobalOur Microsoft Copilot for Security Readiness Assessment encompasses a thorough evaluation of your existing security infrastructure, policies, and procedures.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
31 out of 50
Risk Analysis and Cybersecurity Assessment: 4-Week AssessmentTech One GlobalOur Risk Analysis & Cybersecurity Evaluation offer for SMBs is a forward-thinking approach that ensures not just protection but resilience and readiness in the face of cybersecurity challenges.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
32 out of 50
Threat Protection Engagement: 4-Week WorkshopTech One GlobalThis 4-week engagement deep dives into the next-gen Microsoft Security tools, provides a thorough analysis of your security posture, and offers actionable steps to enhance your threat protection.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
33 out of 50
Modern SecOps Engagement: 4-Week WorkshopTech One GlobalThe Modern SecOps Engagement is a comprehensive 4-week assessment designed to provide a bird’s eye view across your enterprise using Microsoft Sentinel and the Unified SecOps Platform.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
34 out of 50
Microsoft Copilot for Security Rapid Onboarding Program: 4-Week ImplementationTech One GlobalWith our deep expertise in Microsoft, including the newly launched Microsoft Copilot for Security, we are uniquely positioned to guide your organization through a seamless onboarding process.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
35 out of 50
Cloud Security_02weeks implementationHPT Vietnam CorporationEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Service
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
36 out of 50
Microsoft Copilot for Security Adoption & Change Management: 4-Week WorkshopTech One GlobalLeveraging our deep expertise in Microsoft technologies, we offer unparalleled support to integrate Microsoft Copilot for Security into your organizational framework seamlessly.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
37 out of 50
Microsoft 365 management: 1-Week ImplementationShellsoft Technology CorporationMicrosoft 365 Consulting, Implementation and Managed Services that ensures smooth transition to the cloud
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
38 out of 50
Managed Email Security (MES): 12-Month Managed ServicesNEXUS TECHNOLOGIES, INC.Protect endpoints with Managed Services delivering 24x7 Security Monitoring, Analysis, and Response
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 50
Managed Endpoint Detection and Response: 12-Month Managed ServicesNEXUS TECHNOLOGIES, INC.Protect endpoints with Managed Services delivering 24x7 Security Monitoring, Analysis, and Response
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 50
Modern Work-Device as a ServicePHIL-DATA BUSINESS SYSTEMS INC (SI)A comprehensive solution focused on end user productivity, and management ease for IT. Hardware, Microsoft 365 and Services in one offering for SMB and Enterprise customers.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
41 out of 50
Microsoft Security Threat Protection: 4-Week WorkshopTech One GlobalCollaborate with certified professionals at Tech One Global Philippines to enable your organization to fully harness the technology behind Microsoft Defender, Entra, and Sentinel.
+2
Applicable to:
Identity & Access Management
Threat Protection
42 out of 50
Threat Protection Attack Simulation: 2-Week Workshop for FinanceTech One GlobalPartner with experts from Tech One Global Philippines to leverage the technology underlying Microsoft Defender, Entra, and Sentinel, tailored for the Financial Industry.
+2
Applicable to:
Identity & Access Management
Threat Protection
43 out of 50
Threat Protection Attack Simulation: 2-Week Workshop for HealthcareTech One GlobalPartner with experts from Tech One Global Philippines to leverage the technology underlying Microsoft Defender, Entra, and Sentinel, tailored for the Healthcare Industry.
+2
Applicable to:
Identity & Access Management
Threat Protection
44 out of 50
Threat Protection Attack Simulation: 2-Week Workshop for GovernmentTech One GlobalPartner with experts from Tech One Global Philippines to leverage the technology underlying Microsoft Defender, Entra, and Sentinel, tailored for the Government sector.
+2
Applicable to:
Identity & Access Management
Threat Protection
45 out of 50
XDR and Threat Protection Acceleration Program: 4-Week ProgramTech One GlobalThis engagement that will help you discover and mitigate threats and vulnerabilities to your email, identity, endpoints, and data using Microsoft Defender XDR and selected Microsoft Security products.
+3
Applicable to:
Identity & Access Management
Teamwork Deployment
Threat Protection
46 out of 50
Modern Workplace Digital Workforce: 2-Day WorkshopTech One GlobalThe Modern Workplace Digital Workforce is a comprehensive 2-day workshop that expands the value of Microsoft 365 to those who are in their journey towards a secure hybrid work environment.
+3
Applicable to:
Insider Risk
Teamwork Deployment
Threat Protection
47 out of 50
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
48 out of 50
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
49 out of 50
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
50 out of 50