FiltersClear all
Consulting services results
Showing results in consulting services.
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
1 out of 24
GDPR Assessment: 6-Week AssessmentHappiest Minds Technologies LimitedEnable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
2 out of 24
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 24
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
4 out of 24
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
5 out of 24
Microsoft Security Solutions - 4 Week AssessmentProtivitiMicrosoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 24
Identity and Access Management SolutionH One (Private) LimitedEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
7 out of 24
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
8 out of 24
Ctelecoms Defend Against Threats with SIEM Plus XDR WorkshopConsolidated Telecoms (Ctelecoms)Defend Against Threats with SIEM Plus XDR Workshop Learn how to put next-generation Microsoft security tools to work for you.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
9 out of 24
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 24
Copilot for Microsoft 365: Data Governance WorkshopReplySecure and Enhance Your Microsoft 365 Experience with WM Reply's One-Day Copilot Data Governance Workshop
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
11 out of 24
Ctelecoms Mitigate Compliance and Privacy Risks WorkshopConsolidated Telecoms (Ctelecoms)The Mitigate Compliance & Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organization.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
12 out of 24
Ctelecoms Protect and Govern Sensitive Data WorkshopConsolidated Telecoms (Ctelecoms)The Protect & Govern Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 24
Ctelecoms Secure Identities and Access WorkshopConsolidated Telecoms (Ctelecoms)Secure Identities and Access Workshop helps you find and mitigate identity risks and safeguard their organizations with a seamless identity solution.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 24
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 24
SEIDOR Modern Workplace with Microsoft 365 1-Month ImplementationSEIDOR SAWe promote and respond to the current needs of companies in terms of mobility, security, productivity, communication and collaboration through the evolution of their workstations
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
16 out of 24
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 24
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 24
Windows 365 PoC: 3 wk deploymentSulava OyPlanning and building the Proof of Concept of Windows 365 cloud PC to customer
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
19 out of 24
Microsoft Copilot Solutions: 4 Weeks ImplementationQatar Datamation SystemsProvide Assessment and Implementation of Copilot for Microsoft 365 and Copilot for Security
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
20 out of 24
Microsoft 365 Solutions: 4 Weeks ImplementationQatar Datamation SystemsAssess and Implement Modern Workplace and Security Portfolio with Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
21 out of 24
CISA Microsoft security Assessment- 1 day AssessmentGLOBAL BRANDSThe CISA Microsoft 365 Security Assessment (C-MSA) is an advanced, automated tool designed to evaluate and enhance the security posture of Microsoft 365 environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 24
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 24
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
24 out of 24