FiltersClear all
Professional Services results
Showing results in professional services.
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo SoftwareCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure LtdApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
3 out of 60
Security Assessment - 4-Week AssessmentCoretek ServicesAnalysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Zero Trust Security AssessmentCitrin Cooperman Advisors, LLCOur Zero Trust Security Assessment will evaluate identity, email, data, and endpoint device controls, threat protection, management, and licensing to strengthen your organization's security posture.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP TechnologiesThe SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Advanced Email Security: 4-Day ImplementationFSI StrategiesLeverage Microsoft Defender for Office 365 to implement best in class email security
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
8 out of 60
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Business Services - GlobalOur workshop will help you designing and deploying Microsoft security technologies for your unique needs.
+1
Applicable to:
Threat Protection
9 out of 60
Managed Threat Detection [xdr] for Microsoft 365 DefenderOrange Business Services - GlobalImplementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
10 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies LtdMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense GlobalStop threats with a cloud-native SIEM adapted to your new business needs.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
12 out of 60
Sensitive data risk assessmentAVASOFTConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
13 out of 60
KMicro Rapid Incident Response & Readiness ServiceKMicro Tech, Inc.KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
14 out of 60
Microsoft Cloud App Security (MCAS) for Custom Apps by AVASOFTAVASOFTKnow your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
15 out of 60
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFTUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
16 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPOThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
17 out of 60
Lightstream Threat Protection Assessment and Deployment RoadmapLightstreamLeveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
+2
Applicable to:
Cloud Security
Threat Protection
18 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
19 out of 60
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 60
Microsoft 365 E5 Zero Trust Security AssessmentSHI International CorpExplore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 60
MDS - Cybersecurity AssessmentMaureen Data SystemsThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstreamLightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstreamLightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.A high-level forensics evaluation designed to identify current and past threat activity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Microsoft Platform Support ImplementationManaged SolutionMicrosoft Platform Support Services provides comprehensive support that optimizes performance, enhances security and drives adoption across your Microsoft ecosystem.
+3
Applicable to:
Device Deployment & Management
Threat Protection
Workplace Analytics
26 out of 60
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender
for enterprises, resulting in improved detection rates, threat coverage, and
organizational security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Pentest-4wks AssessmentadaQuestGain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
28 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLCEstablish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Identity WorkshopSentinel Technologies Inc.Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Security and compliance assessment with Microsoft PurviewAVASOFTFortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
31 out of 60
Microsoft Funded Workshop for Threat Protection envisioning WorkshopVM GLOBAL SOLUTIONS(PTY)LTDMicrosoft Funded Workshop for Threat Protection envisioning Workshop for Microsoft 365 will upskill your team, provide knowledge Microsoft Security
+1
Applicable to:
Threat Protection
32 out of 60
Windows Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure LtdAccelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
33 out of 60
Microsoft 365 Security WorkshopOlive + GooseImprove your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
34 out of 60
Multifactor Authentication: 4-Day ImplementationFSI StrategiesImplementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Threat Protection EngagementNeway TechnologiesEnhance your organization's security stance with a Neway Threat Protection Engagement.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
36 out of 60
KAMIND CMMC L1 DIYKAMIND IT, IncConsulting on how to utilize the Microsoft 365 Licenses on your path to CMMC L1 Compliance.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
37 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data SystemsAssess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft Security: 3-Day WorkshopApex Digital SolutionsDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.Our security services provide a holistic approach through advisory,implementation & managed services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLC2-week assessment of Microsoft 365 security posture and compliance gaps (HIPAA, GDPR, PCI-DSS, SOC2), with remediation roadmap and license alignment (Microsoft 365 E3/E5/Business Premium).
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
41 out of 60
Seguridad Corporativa: Evaluación 4 semanasCIBERIT SRL.Con esta Solución usted podrá gestionar la seguridad en toda su empresa
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
42 out of 60
TS As a Services (TSaaS): 5-day ImplementationE-Level Cloud Services S.A. de C.V.Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
43 out of 60
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
44 out of 60
Copilot Data ProtectionCloud LifeCopilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
45 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Microsoft 365 Fundamentals: 1 Day WorkshopNETCOM LEARNINGIntroduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
+3
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
47 out of 60
Defender for Office365Suri Services SCSuri Services y Office 365: La alianza impenetrable en ciberseguridad.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
48 out of 60
Cyderes Microsoft 365 Incident ResponseCyderesCyderes Digital Forensics and Incident Response (DFIR) services encompass the full security motion and emphasize your ability to respond.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
49 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional ServiceIT Partner LLCService used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
50 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo SoftwareThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVASOFTEnhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
52 out of 60
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
53 out of 60
Protect 365 App - 1 hour implementationCloud LifeThe Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
54 out of 60
C1st Implementation of Microsoft Defender for Office 365C1st Technologies LLCEnhance email security for businesses by implementing Defender for Office 365 with Exchange Online Protection (EOP). Our goal is to protect organizational email from spam, phishing, and sophisticated
+2
Applicable to:
Cloud Security
Threat Protection
55 out of 60
Lightstream Copilot for Microsoft 365 Readiness EngagementLightstreamLightstream Copilot Readiness Engagement helps clients to rapidly identify critical remediation steps needed in order to implement Copilot for Microsoft 365 successfully.
+1
Applicable to:
Threat Protection
56 out of 60
Microsoft Sentinel Workshop and PilotCDWThe Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
UNITE: Cyber Security Assessment_INFINITY TECHNOLOGY SOLUTIONSBoost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
58 out of 60
Microsoft Value Calculator: One Hour AssessmentPatriot Consulting Technology Group LLCThe Cost Takeout Opportunity shows the potential cost reductions from consolidating third party solutions with Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Managed Microsoft 365: 12-MO BriefingeGroup Enabling Technologies, LLCGet the expertise needed to successfully manage Microsoft 365 with eGroup Enabling Technologies, LLC. Managed Microsoft 365.
+3
Applicable to:
Calling for Microsoft Teams
Mobile Device Management
Threat Protection
60 out of 60