FiltersClear all
Consulting services results
Showing results in consulting services.
Cyber Security Services 9 days AssessmentAlfa Connections Pte LtdHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 30
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 30
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 30
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 30
Microsoft 365 Manage Service–12 mth ImplementationAlfa Connections Pte LtdAlfa Connections providing Microsoft 365 Managed service is designed to enhance your workforce experience by supporting your organization on planning, enablement, implementation, and adoption.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
5 out of 30
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 30
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
7 out of 30
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
8 out of 30
Quadra BluForge Managed XDRQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 30
Managed Security Service_5weeks implementationHPT Vietnam CorporationHPT Managed Security Monitoring Service (MSMS) provides a unified programmability model that you can use to access the tremendous amount of data in O365, Windows 10 and EMS
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
10 out of 30
Microsoft Security | Information Protection and Governance: 1- Month ImplementationAdvanced Wireless Network Company LimitedAIS offer 4 week-professional service of Microsoft Information Protection and Governance to help customer protect their data and information from cyber threats efficiently.
+2
Applicable to:
Cloud Security
Information Protection & Governance
11 out of 30
Microsoft Purview Information Protection and Data Loss Prevention: 4-Week ImplementationMISO DigitalWe offer an implementation of Microsoft Information Protection (MIP) to help you discover, classify, and protect sensitive information.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
12 out of 30
Elevate Your Security with Microsoft Defender for Business: 3-day ImplementationMISO DigitalWe help you implement a comprehensive security solution using Microsoft Defender for Business to secure your business and respond to sophisticated threats up to 100 users.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
13 out of 30
KPMG Microsoft 365 Copilot: 3-Wk Readiness AssessmentKPMG SERVICES PTE. LTD.Assessment of data protection and identity & access processes and controls to ensure security measures are in place for a secured adoption Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
14 out of 30
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 30
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
16 out of 30
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
17 out of 30
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
18 out of 30
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
19 out of 30
Microsoft 365 Security Assessment - 4 DaysMatrix3D Infocom Private Ltd.This Assessment is a comprehensive evaluation of your Microsoft 365 environment, designed to identify misconfigurations, security gaps, compliance risks, and underutilized Microsoft security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
20 out of 30
Microsoft Sentinel SOC Managed Service by H OneH One (Private) LimitedAs a Microsoft-certified partner with deep Sentinel expertise, our Managed SOC gives you round-the-clock monitoring, rapid threat response, and complete visibility across your cloud environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 30
Beyondsoft Segurança Ambiente CloudBeyondsoftOferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 30
HCLTech Frontline Worker Digital Experience – Assessment & Implementation support for Empowering Frontline WorkersHCL America Inc_HCLTHCLTech’s solution streamlines frontline communication, digital workflows, and secure device management, powered by HCLTech, Microsoft, and Zebra for a modern, sustainable frontline workplace.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
23 out of 30
Cloud Security_02weeks implementationHPT Vietnam CorporationEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Service
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
24 out of 30
PDPA Ready: Cybersecurity 6-week ImplementationMISO DigitalGet your organization ready for the privacy law with our PDPA Ready Implementation. This solution will bring the readiness of Thai Personal Data Protection Act (PDPA) on cybersecurity.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
25 out of 30
Secure Remote Work: Security 4-week ImplementationMISO DigitalThe solution accelerate the adoption of cybersecurity framework based on Microsoft 365. We provide an implementation plan for both organizational measures and technical measures suit the Thai PDPA.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
26 out of 30
NTT Cybersecurity Advisory 1-wk WorkshopNTT LimitedCybersecurity Advisory Baseline is an asset-based consulting engagement that uses workshops and interviews to assess cybersecurity maturity across all areas of your people, processes and technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 30
Secure Remote Work: 1-Wk ImplementationAdvanced Wireless Network Company LimitedWe support your organization to help your employees securely work from anywhere productively with seamless experience, powered by Microsoft 365 Security services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 30
Microsoft Defender for Office 365: 4-Wk ImplementationAdvanced Wireless Network Company LimitedAIS professional service utilizes the features of Microsoft Defender for Office 365 to get your business safe on cloud.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
29 out of 30
Windows 365 Cloud PC - 3-Day Workshop Proof of ValueSoftwareONE Thailand Co., Ltd.Deep dive into Microsoft cloud solutions for end-user computing and proof of value to your organization and your employees for to a secure and productive desktop experience from virtually anywhere
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
30 out of 30