SuodattimetTyhjennä kaikki
Konsultointipalvelut tulosta
Näytetään tulosta kohteessa konsultointipalvelut.
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLPEvaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
1 out of 39
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFTIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
2 out of 39
Manage Corporate Data on Devices with IntuneAVASOFTCan you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
3 out of 39
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 39
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
5 out of 39
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
6 out of 39
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 39
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 39
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
9 out of 39
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 39
Security Copilot Value AcceleratorAvanade, Inc.Designed to help organizations modernize their security operations and administration by leveraging Gen AI.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
11 out of 39
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 39
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+1
Applicable to:
Threat Protection
13 out of 39
Security Architecture Design and Implementation Service上海诺未网络科技有限公司NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 39
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 39
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 39
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 39
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 39
Quadra BluForge Managed XDRQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
19 out of 39
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
20 out of 39
Intune Implementation ServiceTHREATSCAPE SECURITY SOLUTIONS LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Intune in alignment with Zero Trust principles, security best practice, and business productivity goals.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
21 out of 39
Defend Against Threats (MDR 端點威脅防禦服務) : 5-Week ImplementationSystex Software & Service Corporation良好的資安防護為資安優化的根本! 本項MDR服務協助客戶快速導入Microsoft 365 EDR資安方案,同時提供資安問題維護協助
+2
Applicable to:
Cloud Security
Threat Protection
22 out of 39
Implementation of Microsoft Defender XDR Consulting宏碁雲架構服務股份有限公司Implementation of Microsoft Defender XDR,協助客戶導入與建置Microsoft Defender XDR之顧問服務 。包含雲端與地端相關微軟解決方中之關鍵軟體與流程建立,以及之後續可延伸為MDR威脅偵測與應變服務或Cloud SOC 7x24資安監控服務。協助企業掌握雲端環境的威脅風險,強化維運安全韌性,協助企業主動出擊端點各種異常活動並搜捕潛在威脅。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 39
Skysecure Realize Zero Trust BlueprintSkysecure Technologies Pvt. Ltd.Accelerate Microsoft Zero Trust adoption with Skysecure’s AI-driven framework that unifies identity, data, device, and threat protection across Microsoft 365 and Microsoft Azure.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
24 out of 39
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 39
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
26 out of 39
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
27 out of 39
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
28 out of 39
Business Premium 是企業安全的標配Weblink International Inc.此方案為中小企業建構五層資安防線 ,整合身分驗證、裝置管理與資料外洩防護 。透過 Defender 主動阻斷勒索軟體 ,在提升生產力的同時,全方位守護企業數位資產並確保法規合規 。
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
29 out of 39
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
30 out of 39
Implementation on Defender for Office 365Mobile MentorOur Defender for Office 365 service provides end-to-end protection against email-based threats
+1
Applicable to:
Threat Protection
31 out of 39
Microsoft Sentinel SOC Managed Service by H OneH One (Private) LimitedAs a Microsoft-certified partner with deep Sentinel expertise, our Managed SOC gives you round-the-clock monitoring, rapid threat response, and complete visibility across your cloud environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 39
Beyondsoft Segurança Ambiente CloudBeyondsoftOferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 39
Netox MDR / SOC 24/7Netox OyFinnish-built 24/7 MDR & SOC for Microsoft environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 39
Microsoft 365 ATP - plan and implement - 14 daysWeblink International Inc.展碁國際推出了Microsoft Defender for Microsoft 365 顧問服務,可保護組織防範由電子郵件訊息、連結(URL)及共同作業工具所造成的惡意威脅。在後疫情時代 Microsoft Teams大量使用的情況下仍能一併保護,歡迎您參與由 Microsoft 提供Microsoft 365 的原生防護、 領先業界的 Al 和自動化功能和全方位的方法防護服務。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 39
Cloud Security_02weeks implementationHPT Vietnam CorporationEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Service
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
36 out of 39
遠傳 Microsoft 365 郵件移轉服務: 4-Week Implementation遠傳電信股份有限公司協助企業導入Microsoft 365,其中包含 Exchange 雲端郵件服務,從多種現行主流雲端或第端郵件系統(Exchange server、Google Workspace、Domino Notes等等)資料移轉至 Microsoft 365,實現企業郵件上雲需求。
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Threat Protection
37 out of 39
自由系統事故處理服務: 7-Day Implementation自由系統股份有限公司This application is available only in Traditional Chinese.
協助客戶處理IT突發事件,協助企業排除機敏資料外洩、公司作業停擺及Microsoft 365使用問題造成的隱性成本。並根據事 件協助企業找到IT環境漏洞,提出優化解決方案,降低客戶再次出現IT服務中斷及駭客攻擊的事件。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 39
iTop MDR 5-Week Implementation登豐數位科技股份有限公司協助您的企業快速的偵測惡意活動、使用者行為及各項由端點發起的惡意活動,即時探索弱點和錯誤的設定,以進行補救。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 39