FiltersClear all
Consulting services results
Showing results in consulting services.
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
1 out of 9
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
2 out of 9
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
3 out of 9
Microsoft 365 Copilot Readiness assessment - 5 days - assessmentInetum BelgiumDuring this assessment, we will check whether your environment is technically ready for Microsoft 365 Copilot. We will focus on infrastructure, licenses, and your data.
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Threat Protection
4 out of 9
RICOH Managed Cybersecurity ServicesORBID NVWe correlate signals at scale, combine analyst expertise with automation, and contain threats fast so your business can move with confidence.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 9
Implementation on Defender for Office 365Mobile MentorOur Defender for Office 365 service provides end-to-end protection against email-based threats
+1
Applicable to:
Threat Protection
6 out of 9
Microsoft Sentinel SOC Managed Service by H OneH One (Private) LimitedAs a Microsoft-certified partner with deep Sentinel expertise, our Managed SOC gives you round-the-clock monitoring, rapid threat response, and complete visibility across your cloud environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 9
Beyondsoft Segurança Ambiente CloudBeyondsoftOferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 9
Remote Secure Work 1 Day WorkshopInsight Technology SolutionsDevelop a clear understanding of the cloud security solution available from Microsoft Azure and 365 by defining your business requirements and aligning the solution to your objectives.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Threat Protection
9 out of 9