FiltersClear all
Consulting services results
Showing results in consulting services.
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 29
Cloud Security_02weeks implementationHPT Vietnam CorporationEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Service
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
2 out of 29
Microsoft 365 management: 1-Week ImplementationShellsoft Technology CorporationMicrosoft 365 Consulting, Implementation and Managed Services that ensures smooth transition to the cloud
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
3 out of 29
Microsoft 365: 3-Wk ImplementationNEXUS TECHNOLOGIES, INC.Consultation and Implementation Services for Microsoft 365 by Nexus Microsoft-certified experts who combine years of experience with innovative Microsoft technology to bring enterprise-class solution.
+3
Applicable to:
Cloud Security
Frontline Workers
Information Protection & Governance
4 out of 29
Windows 365 Rapid Deployment 5 Day ImplementationTelstra LimitedTelstra's Windows 365 Rapid Deployment will help your organization understand how the scalability and security of the cloud and the familiarity of a PC can be combined into one seamless experience.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
5 out of 29
Microsoft 365 Governance: 1 month AssessmentCrayonCrayon Microsoft 365 Governance Assessment will assess your configuration and build recommendation report
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
6 out of 29
Modernize Endpoints (Microsoft Intune): 1 Day WorkshopCrayonThe Endpoint Management Workshop is a one-day engagement that will help you showcase the value of Microsoft Endpoint Manager and how to manage users’ devices and apps from anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
7 out of 29
Road to Microsoft 365: 1 month ImplementationCrayonCrayon Microsoft 365 migration services brings best practices and expertise to assure seamless migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
8 out of 29
Managed Email Security (MES): 12-Month Managed ServicesNEXUS TECHNOLOGIES, INC.Protect endpoints with Managed Services delivering 24x7 Security Monitoring, Analysis, and Response
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 29
Managed Endpoint Detection and Response: 12-Month Managed ServicesNEXUS TECHNOLOGIES, INC.Protect endpoints with Managed Services delivering 24x7 Security Monitoring, Analysis, and Response
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 29
NextGen Windows Workshop: 3-Wk WorkshopNEXUS TECHNOLOGIES, INC.The Next-Gen Endpoints Overview is an activity to introduce the customer to the available Microsoft cloud solutions for end-user computing which are the focus of this workshop.
+1
Applicable to:
Cloud Security
11 out of 29
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
12 out of 29
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 29
KPMG Microsoft 365 Copilot: 3-Wk Readiness AssessmentKPMG SERVICES PTE. LTD.Assessment of data protection and identity & access processes and controls to ensure security measures are in place for a secured adoption Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
14 out of 29
Microsoft Cybersecurity Assessment: 5-Wk AssessmentNEXUS TECHNOLOGIES, INC.Enhance Microsoft 365 cloud security with Microsoft Secure Score and identify server and endpoint vulnerabilities using Microsoft Defender Vulnerability Management.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
15 out of 29
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
16 out of 29
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
17 out of 29
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
18 out of 29
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
19 out of 29
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 29
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
21 out of 29
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
22 out of 29
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
23 out of 29
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
24 out of 29
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
25 out of 29
eAuthentiSync: Secure your Workloads powered by MicrosoftePLDT, Inc.The shift to hybrid work emphasizes the need to secure access anytime, anywhere, highlighting the importance of Identity and Access Management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
26 out of 29
Inspira Microsoft Threat Protection Envisioning WorkshopInspira Enterprise Inc.Learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 29
Inspira Microsoft Data Security Envisioning WorkshopInspira Enterprise Inc.Identify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
28 out of 29
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
29 out of 29