FiltersClear all
Consulting services results
Showing results in consulting services.
Implementation on Defender for Office 365Mobile MentorOur Defender for Office 365 service provides end-to-end protection against email-based threats
+1
Applicable to:
Threat Protection
1 out of 18
Beyondsoft Segurança Ambiente CloudBeyondsoftOferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 18
Netox MXDR / SOC 24/7Netox OyFinnish-built 24/7 MXDR & SOC for Microsoft environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 18
Microsoft Defender XDR and Zero Trust Security Implementation: 4-8 Weeks EngagementCelebal Technologies Private LimitedUnify endpoint, identity, email, and cloud security to improve visibility, automate SOC response, and enable Zero Trust enforcement.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 18
Unified SOC with Microsoft Defender XDR and Sentinel (SIEM & SOAR): 4-8 Weeks EngagementCelebal Technologies Private LimitedModernize security operations using Microsoft Sentinel and Defender XDR to centralize threat monitoring, automate response, strengthen hybrid and multi cloud protection, and improve SOC outcomes fast.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 18
Microsoft Entra Identity & Access Management Implementation: 4-8 Weeks EngagementCelebal Technologies Private LimitedStrengthen hybrid identity security with Microsoft Entra ID, Conditional Access, MFA, Identity Governance, and PIM to establish adaptive access control and a Zero Trust IAM foundation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 18
Modern Identity and Access Management – Microsoft Entra IDNebulanServicio de implementación de Microsoft Entra ID para fortalecer la gestión de identidades y accesos, mejorar la seguridad y optimizar el inicio de sesión.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 18
Passwordless & Biometric AuthenticationNebulanServicio de implementación de autenticación sin contraseña y biométrica para eliminar contraseñas tradicionales, reducir riesgos de phishing y mejorar la experiencia de acceso.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 18
Enterprise-grade Endpoint Protection – Defender BusinessNebulanServicio de implementación de Microsoft Defender for Business para proteger endpoints contra malware, ransomware y vulnerabilidades mediante una configuración centralizada y segura.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
9 out of 18
Advanced Protection for Email and Collaboration – Defender for Office 365NebulanServicio de implementación de Microsoft Defender for Office 365 para proteger correo electrónico y colaboración frente a phishing y malware.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 18
EVA - Enterprise Vulnerability Assessment for Microsoft 365NebulanServicio de evaluación en Microsoft 365 que identifica riesgos de seguridad, brechas de configuración y oportunidades de optimización en identidad, aplicaciones, información y licenciamiento.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
11 out of 18
Defender for Identity ImplementationNebulanServicio profesional de implementación de Microsoft Defender for Identity para detectar y proteger Active Directory frente a amenazas avanzadas mediante análisis de comportamiento y autenticación.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 18
Backup Implementation for Microsoft 365NebulanServicio profesional de implementación de Microsoft 365 Backup para proteger correo, archivos y datos colaborativos, asegurando continuidad operativa y cumplimiento normativo.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 18
Microsoft Entra Internet Access: ImplementationNebulanServicio de implementación de Microsoft Entra Internet Access para proteger la navegación a Internet y el acceso a aplicaciones SaaS mediante control por identidad y filtrado web.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 18
Microsoft 365 Managed Service: ImplementationMobile MentorThe Microsoft 365 Managed Service delivers ongoing management of Microsoft 365 to address licensing underuse, manual provisioning, and security gaps.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
15 out of 18
SOLVEX - Zero Trust Security Assessment & Adoption RoadmapSolvex DominicanaGet a comprehensive, automated assessment of your Microsoft 365 Zero Trust posture across Identity, Devices, Data, and Network pillars with a prioritized remediation roadmap.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
16 out of 18
OPTI Intelligent SOC 24x7 – AI-Driven Security OperationsOPTIAI-driven SOC 24x7 powered by Microsoft Sentinel & Defender XDR, delivering automated detection, response, and threat hunting with integrated Copilot for Security.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
17 out of 18
RICOH Managed Cybersecurity ServicesAvantage Managed Solutions B.V.We correlate signals at scale, combine analyst expertise with automation, and contain threats fast so your business can move with confidence.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 18