FiltrosBorrar todo
Professional Services resultados
Mostrando resultados en professional services
Zero Trust WorkshopSoftcatThe Microsoft Zero Trust Workshop helps organisations evaluate their current security posture and define a practical roadmap for adopting Zero Trust principles.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
1 out of 60
Microsoft 365 Security Essentials Implementation ServiceSoftcatA service to kick-start the security position of your Microsoft 365 environment. We ensure it is configured to best practice set by Microsoft, Softcat and the Centre for Internet Security (CIS)
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
2 out of 60
Skysecure Realize Zero Trust BlueprintSkysecure Technologies Pvt. Ltd.Accelerate Microsoft Zero Trust adoption with Skysecure’s AI-driven framework that unifies identity, data, device, and threat protection across Microsoft 365 and Microsoft Azure.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
3 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
4 out of 60
Microsoft 365 Copilot Security Readiness AssessmentCWSISecure Microsoft 365 Copilot Adoption - making Copilot adoption safe, scalable and trusted
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 60
Threat Protection Immersion BriefingJUMPSEC LIMITEDMicrosoft funded-Briefings. Make fast, low risk progress on Microsoft security.
+2
Applicable to:
Cloud Security
Threat Protection
6 out of 60
Accelerate your Microsoft 365 Copilot adoptionColumbus GlobalThe Microsoft 365 Copilot Jumpstart Program is designed for business and IT leaders who want to move beyond experimentation and unlock real productivity gains from AI.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Threat Protection
7 out of 60
Threat Protection Envisioning Workshop: Stop Advanced Threats Across Microsoft 365evoila GmbH🛡️ Discover real threats targeting your organization. 2-week Threat Protection workshop with threat analysis, Defender XDR guidance, remediation recommendations
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
8 out of 60
Data Security Envisioning Workshop: Identify Risks in Your Organizational Dataevoila GmbH🔍 Uncover data security risks in Microsoft 365. 2-week automated Data Security Check with findings, Purview roadmap, and hands-on recommendations. Expert analysis. No guesswork.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
9 out of 60
Threat Protection Envisioning WorkshopSoftwerx Ltd.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
11 out of 60
S4B_XDR_Recuperacion_Automatica_RecursosS4BSILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 60
S4B Email Attack Simulation TrainingS4BAttack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 60
Threat Investigation and Analysis Service with Microsoft Defender XDRS4BSILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
+2
Applicable to:
Cloud Security
Threat Protection
14 out of 60
Server Endpoint Protection Implementation Service using Microsoft Defender for EndpointS4BProvides comprehensive protection for physical and virtual servers with Microsoft Defender for Server, combined with continuous security monitoring to detect, investigate, and respond to threats.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 60
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDRS4BProtección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
+2
Applicable to:
Cloud Security
Threat Protection
16 out of 60
Advanced Hybrid Identity Security with Microsoft IdentityS4BHybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Implementation of security for Endpoint with Microsoft EDRS4BAdvanced defense for on-premises devices with Microsoft Defender for Endpoint, automated detection and response.
+2
Applicable to:
Cloud Security
Threat Protection
18 out of 60
Entrenamiento de Phishing con Microsoft Office 365S4BOfrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
19 out of 60
On-premise enviroment Identity Protection service with Microsoft IdentityS4BOn-Premises Identity Protection service detects and mitigates threats in Active Directory using Microsoft Defender for Identity.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
20 out of 60
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4BSeguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
+2
Applicable to:
Cloud Security
Threat Protection
21 out of 60
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4BInvestiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
22 out of 60
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4BProtects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
+2
Applicable to:
Cloud Security
Threat Protection
23 out of 60
Servicio de Implementación de Protección de Identidades Locales con Microsoft Defender for IdentityS4BRefuerza Active Directory local con Microsoft Defender for Identity, detectando ataques, credenciales comprometidas y movimientos laterales en controladores de dominio.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
24 out of 60
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4BDefensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
25 out of 60
Enterprise Automated Endpoint Recovery with Microsoft Defender XDRS4BSILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
26 out of 60
Microsoft 365 Security: 2-Day ImplementationCloud DirectA quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Microsoft 365 Security: 9-Day ImplementationCloud DirectAn engagement that will setup Microsoft 365 with enterprise-level security & compliance policies to provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security: 6-Day ImplementationCloud DirectA quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Microsoft 365 Security assessment - 3 day848 GroupMicrosoft 365 Security assessment to benchmark Office 365 implementation against CIS and Microsoft Security best practice, and deliver a road map for resolving security risks
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 60
Enablement Support Implementation (Unit Based)PowerONPlatforms LimitedPowerON Enablement Support provides a unit/hour based support agreement for customers seeking increased ROI and expert support on their Microsoft 365 workloads (Unit/Hour Based, Annual Agreement)
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
31 out of 60
Endpoint Management - 3-Day enablement WorkshopBT BusinessThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
32 out of 60
Zero Trust Security Assessment: 10-Day AssessmentChorusOur zero trust security assessment reviews your security posture to give you a clear roadmap to adopt Microsoft 365 security solutions to remove vulnerabilities and improve your posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Security Threat Check: 5-Day Assessment & WorkshopChorusOur security assessment identifies active and potential security threats and gives you a clear breakdown of which Microsoft 365 security products can be used to remediate active threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Mobile Threat Defence 3 Week AssessmentBT BusinessMTD risk assessment using Microsoft 365 and Zimperium zIPS
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
35 out of 60
Enterprise Mobility + Security - 2 week PoCPowerONPlatforms LimitedProof of Concept designed to provide customers the most flexible way to explore, review and adopt Microsoft Security solutions across the Microsoft Enterprise Mobility + Security suites over 2 weeks
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
Microsoft Cloud App Security (MCAS) WorkshopAdvaniaThis MCAS workshop guides an organisation through the high level design considerations applicate to Cloud Discovery, Connect App and session proxy policy capabilities and related integrations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 60
Microsoft 365 Security 1-Day AssessmentValtoA security assessment of the Microsoft 365 Environment checking all services within the platform and covering off additional tools available in your organisation to assist with the security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft 365 Security: 3 Day AssessmentDaisy Corporate Services Trading LimitedDaisy's Microsoft 365 Security Assessment is a three-day consultancy service delivering a current state assessment of your Microsoft 365 environment, security controls and security requirements.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 60
Microsoft 365 Security Audit: 3-Day AssessmentMarathon Managed ServicesMicrosoft 365 Security Health Check and Report. Analysis of Secure Score and adherence to the NCSC 14 security principles. Presentation of report to customer detailing Microsoft 365 security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Security Assessment for Microsoft 365: 5 DaysChess LtdProtect your data with Security Assessment of your Microsoft 365 subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
SOC as a Service_1 day ImplementationTarsus On Demand (Pty) LtdSOC is a managed service that leverages a bespoke Threat Monitoring Platform. This platform detects malicious and suspicious activity across 3 critical attack vectors: Endpoint, Network & Cloud.
+2
Applicable to:
Cloud Security
Threat Protection
42 out of 60
Managed Security Support: 5-days ImplementationChess LtdManaged security support using the latest technology from Microsoft and Chess Data Protect for Microsoft 365.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
43 out of 60
Security and Compliance AssessmentAgilisys LtdOur Security & Compliance assessment helps you understand the threats you might be facing, reduce the risk of your business being interrupted, and as a result allow you to gain speed and efficiency.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
44 out of 60
Microsoft 365 Modern Workplace: 4Wk ImplementationStripe OLT Consulting LtdMicrosoft 365 has been designed to help your organisation excel in a remote working world - Our team of gold certified Microsoft experts are here to support it's implementation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
45 out of 60
Modern Device Management Managed serviceSIX DEGREES TECHNOLOGY GROUP LTDSecure end-to-end device management service from a trusted Microsoft Expert MSP.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
46 out of 60
Cybersecurity Assessment Service: 2-Day AssessmentHTGThe Cyber Security Assessment Tool (CSAT) is a software product developed by security experts to quickly assess the status of an organisation’s security with recommended improvements based on fact.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Email and Threat Protection 4 Week ImplementationHTGHTG’s Advanced Email Threat Protection pack ensures your Microsoft products such as Outlook, SharePoint, OneDrive & Microsoft Teams are hardened to best practice standards.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
48 out of 60
Microsoft 365 Security Workshop: 3-day WorkshopPHOENIX SOFTWARE LTDEnable organisations to understand how Identity & Access Management, Threat Protection and Secure Management can help to secure their organisation in comparison to their existing Security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Information Protection Workshop: 3day WorkshopPHOENIX SOFTWARE LTDEnabling you to use the capabilities built into Microsoft 365 to mange and secure your organisation's digital information in the cloud with products such as Information Protection
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
50 out of 60
Zero Trust Identity: 5 day ImplementationCorporate Project SolutionsCPS' Security, Compliance, & Identity (SCI) team will work with you to identify how Microsoft 365 Zero Trust identity management can be implemented within your Security strategy.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
51 out of 60
Endpoint Management: 5 Day ImplementationCorporate Project SolutionsOur Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Device Management sits within your Security & Compliance strategy.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
52 out of 60
Compliance and Identity: 5 day ImplementationCorporate Project SolutionsOur Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where SCI sits within your Cyber Security strategy.
+2
Applicable to:
Identity & Access Management
Threat Protection
53 out of 60
Compliance Microsoft 365: 5 Day ImplementationCorporate Project SolutionsOur Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Information Protection & Governance sits within your Compliance strategy. They
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
54 out of 60
Microsoft 365 Risk Management 5 day ImplementationCorporate Project SolutionsOur Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Risk Management sits within your Compliance strategy.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
55 out of 60
Microsoft 365 Threat Protect: 5 Day ImplementationCorporate Project SolutionsOur Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Threat Protection sits within your Cyber Security strategy.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
56 out of 60
Security Accelerator: 5-Day WorkshopRicoh UK LimitedProvides insight and rates risk to existing security posture & delivers a roadmap to improvement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Microsoft 365 Licence Health Check: 1-Day AssessmentITC Secure LtdA 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
[Threat Management: 5-Days Assessment]Computacenter PlcCustomer security assessment in regards of Threat management: 5 day offer
+1
Applicable to:
Threat Protection
60 out of 60