FiltersClear all
Consulting services results
Showing results in consulting services.
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
1 out of 15
Defend, Protect, Secure with Microsoft Defender XDRComtrade System IntegrationTake the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
+2
Applicable to:
Cloud Security
Threat Protection
2 out of 15
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITEDConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
3 out of 15
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
4 out of 15
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, LdaThe engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
5 out of 15
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 15
Microsoft 365 - Threat Protection: 2-week workshopForteventoWorkshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
7 out of 15
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data LtdWhether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 15
Microsoft Sentinel Security Consulting ServiceComtrade System IntegrationMicrosoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 15
Bulletproof Managed AI Ready (MXDR) Security EliteBulletproof Solutions Inc.AI-Ready Managed Security (MXDR) Service That Goes Beyond Traditional MDR/SOC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 15
Microsoft Funded Workshop for Threat Protection envisioning WorkshopVM GLOBAL SOLUTIONS(PTY)LTDMicrosoft Funded Workshop for Threat Protection envisioning Workshop for Microsoft 365 will upskill your team, provide knowledge Microsoft Security
+1
Applicable to:
Threat Protection
11 out of 15
Security Configuration Maintenance 2-Wks ImpInsight Technology SolutionsA monthly Security Configuration Maintenance Service. This service will help to secure end-user devices more effectively based on Insight and Microsoft Security best practices.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
12 out of 15
Innofactor Security AssessmentInnofactor FinlandGain additional visibility to your security posture - Innofactor security assessment is a one-day technical review conducted by our experienced cybersecurity team member.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
13 out of 15
Secure Collaboration 5 Wks implementationInnofactor NorwayEnterprises with significant number of employees and digital estates need best practice collaboration and security. Innofactor Secure Collaboration delivers that as code.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
14 out of 15
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
15 out of 15