FiltersClear all
Consulting services results
Showing results in consulting services.
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
1 out of 45
Microsoft Security Solutions - 4 Week AssessmentProtivitiMicrosoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 45
SYSTEX Data Security and Compliance Solution精诚(中国)企业管理有限公司通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
3 out of 45
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 45
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
5 out of 45
SEIDOR Modern Workplace with Microsoft 365 1-Month ImplementationSEIDOR SAWe promote and respond to the current needs of companies in terms of mobility, security, productivity, communication and collaboration through the evolution of their workstations
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
6 out of 45
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 45
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) LtdReadiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 45
Modern SecOps Engagement (Security Operations)PerformantaGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft SecOps Engagement
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 45
Manage and Investigate Risk: 2 weeks WorkshopCloud EssentialsA risk check followed by advisory workshop to build a sustainable strategy around insider risk within Microsoft 365 and further accelerate your compliance journey.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
10 out of 45
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
11 out of 45
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
12 out of 45
Compliance Manager Training: 1/2 day WorkshopCloud EssentialsCompliance Manager Training - a 1/2 day training session about Microsoft 365 Compliance Manager facilitated by an experienced member of our team
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
13 out of 45
Discover Sensitive Data: 2 weeks WorkshopCloud EssentialsDiscover Sensitive Data Workshop - an automated data risk check to uncover dark data risks with analysis and recommendations
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
14 out of 45
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLCCMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
15 out of 45
NEC Africa - Microsoft Security Solution ImplementationNEC XON Systems Do you have a Microsoft Security Ecosystem but are unsure how to effectively utilize it for your cyber resilience journey? NEC Africa Systems provides full security solution implementation services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 45
Microsoft 365 Security Design and Deployment: 1 Hour BriefingCloud EssentialsAn initial briefing to understand business requirements in advance of a design workshop and deployment of advanced Microsoft 365 cloud security features
+1
Applicable to:
Cloud Security
17 out of 45
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
18 out of 45
Microsoft 365 Security Assessment and Roadmap: 1 Day WorkshopCloud EssentialsAccelerating your Zero Trust strategy through a readiness assessment, workshop and roadmap
+1
Applicable to:
Cloud Security
19 out of 45
First Technology - Darktrace POVFirst Technology (Pty) LtdReduce risk and harden security in Microsoft 365 with the Darktrace Cyber AI Loop - Proof of Value (POV)
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
20 out of 45
Quadra BluForge Managed XDRQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
21 out of 45
Gijima Microsoft 365 Zero Trust FrameworkGijimaThe Gijima implementation of Microsoft 365 E5 follows the cutting-edge principles of zero trust security.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
22 out of 45
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITEDProfessional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 45
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 45
Cyber_Protection_Pack_for_Microsoft_365Global Micro SolutionsSecurity baselines and best practices for Microsoft 365 customers
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
25 out of 45
Copilot for Security 5-Day enablementNetsuritThis short enablement engagement will assess the state of your security environment, identify opportunities to enhance your solution by adding Copilot for Security.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 45
DotCom SECaaS SolutionsDotcom Software ProjectsComprehensive Solutions for Enhanced Protection by Dotcom Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
27 out of 45
Netsurit Security Optimization Service (NSOS) - Managed Service - 12 MonthsNetsuritThe Netsurit Security Optimization Service is designed to enhance and maintain the security posture of its customers' Microsoft environments.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 45
Advanced Microsoft Entra Verified ID - Implementation - 3 WeeksNetsuritNetsurit’s Secure your Identity solution enables automated user lifecycle management across HR systems both on-premises and in the cloud.
+2
Applicable to:
Cloud Security
Identity & Access Management
29 out of 45
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 45
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
31 out of 45
Liquid C2 SECaaS Bundles for SMBsLiquid Telecommunications South Africa (PTY) LTDTrusted Cyber Defense for Growing Businesses. Powered by Microsoft Business Premium + Defender & Purview Suites Add-ons
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 45
Liquid C2 Secure360 MDR & MXDRLiquid Telecommunications South Africa (PTY) LTDProactive Threat Detection and Rapid Response—Simplified. Powered by Microsoft Sentinel & Defender
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 45
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
34 out of 45
Cloudmania Security Posture AssessmentsLiquid Telecommunications South Africa (PTY) LTDGain complete visibility and eliminate cloud security blind spots with Cloudmania’s Microsoft Security Posture Assessment
+2
Applicable to:
Cloud Security
Threat Protection
35 out of 45
Frontier Firm LiveSulava OyFrontier Firm Live is Sulava MEA’s flagship subscription service designed to help organisations transition into AI-native enterprises.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
36 out of 45
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
37 out of 45
Liquid C2 Secure360 SOCMonAlertLiquid Telecommunications South Africa (PTY) LTDStay Ahead of Threats with Real-Time SOC Alerts. Powered by Microsoft Sentinel
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
38 out of 45
Microsoft 365 Security Envisioning workshopFirst Technology (Pty) LtdWe help you uncover hidden data risks, assess insider activity, and establish a governance roadmap using Microsoft Purview’s automated discovery capabilities.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
39 out of 45
Microsoft 365 Security Assessment - 4 DaysMatrix3D Infocom Private Ltd.This Assessment is a comprehensive evaluation of your Microsoft 365 environment, designed to identify misconfigurations, security gaps, compliance risks, and underutilized Microsoft security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
40 out of 45
Microsoft Sentinel SOC Managed Service by H OneH One (Private) LimitedAs a Microsoft-certified partner with deep Sentinel expertise, our Managed SOC gives you round-the-clock monitoring, rapid threat response, and complete visibility across your cloud environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 45
Beyondsoft Segurança Ambiente CloudBeyondsoftOferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 45
HCLTech Frontline Worker Digital Experience – Assessment & Implementation support for Empowering Frontline WorkersHCL America Inc_HCLTHCLTech’s solution streamlines frontline communication, digital workflows, and secure device management, powered by HCLTech, Microsoft, and Zebra for a modern, sustainable frontline workplace.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
43 out of 45
SOC as a Service_1 day ImplementationTarsus On Demand (Pty) LtdSOC is a managed service that leverages a bespoke Threat Monitoring Platform. This platform detects malicious and suspicious activity across 3 critical attack vectors: Endpoint, Network & Cloud.
+2
Applicable to:
Cloud Security
Threat Protection
44 out of 45
Microsoft 365 Security Assessment: 6-day AssessmentPerformantaPerformanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 45