FiltersClear all
Professional Services results
Showing results in professional services.
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 36
Microsoft 365 Copilot AssessmentSuri Services SCAsegura tu ruta de adopción con Suri Services y Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
2 out of 36
Discover Sensitive Data: Implementación en 4 -Horas (2 sesiones de 2 horas)NebulanDescubra los riesgos de data oscura y aprenda cómo afrontarlos en dos sesiones de dos horas
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
3 out of 36
Dedalus Compliance Management Implementation - 4 weeksDedalusThis four weeks solution guide enterprises to expand their data governance and compliance management through Microsoft Purview Compliance Solutions implementation.
+2
Applicable to:
Cloud Security
Compliance Advisory Services
4 out of 36
Workshop Mitigate Compliance & Privacy Risks: 2 sesiones de 2 horasNebulanDescubra como User Risk Check descubre riesgos que podrían ser perjudiciales para su organización en dos sesiones de dos horas
+3
Applicable to:
Cloud Security
Insider Risk
Knowledge & Insights
5 out of 36
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 36
MXDR services 4 weeks ImplWhite Hat Consultores S.A. de C.V.Servicios administrados de seguridad para detección y respuesta a incidentes basados en plataforma MXDR
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 36
Cybersecurity Risk Assessment 2 WeeksWhite Hat Consultores S.A. de C.V.Evaluación de ciberseguridad para la detección de riesgos y construcción de un programa de mejora
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 36
Defend Against Threats with SIEM Plus XDR Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVThe goal of the workshop is to show how Microsoft's security solutions can help organizations protect themselves from cyberthreats
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 36
Protect & Govern Sensitive Data Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVIt is an intensive workshop that teaches you how to protect and govern your organization's sensitive data with Microsoft solutions.
+2
Applicable to:
Cloud Security
Information Protection & Governance
10 out of 36
Secure Multicloud Environment Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVThe workshop aims to present best practices and tools for designing, implementing and managing a secure multi-cloud environment, leveraging the capabilities of Microsoft Azure, Microsoft 365, etc.
+2
Applicable to:
Cloud Security
Threat Protection
11 out of 36
Secure Identities & Access Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVThe objective of the workshop is to help customers find and mitigate identity risks and protect your organization with a seamless identity solution.
+2
Applicable to:
Cloud Security
Identity & Access Management
12 out of 36
Identity Governance Lifecycle: 4 Weeks of AssessmentSoluciones Tecnológicas Overcast S.A.P.I. de CVThe objective of the assessment is to identify areas for improvement and potential risks in the identity environment, based on the maturity level of the organization's identity governance model.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
13 out of 36
Copilot WorkshopSuri Services SCMicrosoft Copilot 365: Potencia tu organización con el poder de la Colaboración Inteligente.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
14 out of 36
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
15 out of 36
Cybersecurity AssessmentSuri Services SCSuri Services ofrece la mejor opción en ciberseguridad, con enfoque personalizado, experiencia técnica y herramientas avanzadas para proteger su organización de manera integral.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
16 out of 36
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
17 out of 36
Dedalus Implementation and Adoption of Copilot for Microsoft 365DedalusDedalus provides a Microsoft 365 Copilot implementation and adoption solution for your business.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
18 out of 36
Transformación Segura y Optimizada con Copilot for Microsoft 365DATCO ChileGarantizamos una implementación segura y eficaz de Copilot for Microsoft 365, integrando medidas de seguridad en cada etapa del proceso para mejorar la productividad en tu organización.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
19 out of 36
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
20 out of 36
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
21 out of 36
Habilitación segura y optimizada de Microsoft 365 con DATCODATCO SAConfiguración, Soporte, Capacitación e Implementación de seguridad en Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 36
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLPOffice 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
23 out of 36
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
24 out of 36
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
25 out of 36
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 36
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 36
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
28 out of 36
Microsoft Security ImplementationTC1 LabsImplement Microsoft Security capabilities to strengthen identity, endpoints, cloud, and threat protection with Zero Trust best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 36
Microsoft Security Copilot & Agents ImplementationTC1 LabsEnable Microsoft Security Copilot and implement one operational security agent or workflow to support AI-assisted investigations and response
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 36
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
31 out of 36
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
32 out of 36
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 36
Security & Compliance: 4-Week implementationPrisma Soluciones Tecnologicas SRLSecurity & Compliance for Microsoft 365 is designed to help organizations meet the needs of managing secure content and being compliant in the use of data with legal, regulatory and technical standard
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
34 out of 36
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLCCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 36
Serviços de Segurança: Implementação 1WeekFUNCTION 1 TECNOLOGIA CORPORATIVA LTDA - MEEm tempos de tantos tipos de Cyber-ataques no mercado, garantir a proteção das informações que entram e saem da empresa é fundamental. Com essa implementação, será possível garantir a segurança dos e-
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
36 out of 36