FiltresTout effacer
Professional Services résultats
Affichage des résultats dans professional services.
Fusion5 Microsoft Cyber Security Assessment (CSAT)Fusion5 LimitedStrengthen your cybersecurity posture with a comprehensive security assessment
+3
Applicable to:
Identity & Access Management
Knowledge & Insights
Threat Protection
1 out of 46
Microsoft Purview Data Loss Prevention: 4-Wk Implementation ServiceUNIFY Solutions Pty. Ltd.UNIFY Solutions will implement Microsoft Purview Data Loss Prevention (DLP) to protect your organisation's sensitive information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 46
impelSecure Modern SecOps Engagement: Free 4-week workshopimpeltec Pty LtdGain visibility into threats to your Microsoft 365 and Azure clouds and on-premises environments across email, identity, endpoints, and third-party data
+2
Applicable to:
Cloud Security
Threat Protection
3 out of 46
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLCEstablish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 46
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
5 out of 46
Windows Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure LtdAccelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
6 out of 46
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
7 out of 46
Threat Protection Assessment & Zero Trust ArchitectureBDOSet future-proof security goals & build a roadmap to strengthen your Microsoft 365 posture with Modern SecOps on a unified platform, leveraging Zero Trust architecture and threat protection assessment
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
8 out of 46
Essential 8 Gap Analysis : AssessmentEighty20 Solutions Pty LtdOur Essential Eight gap analysis approach provides assurance on effective organisational alignment
with the eight essential controls to achieve a higher level of maturity.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
9 out of 46
"Threat Protection: 3 Day Workshop"Insentra Pty LtdOur Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 46
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 46
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
12 out of 46
Microsoft 365 Secure Score: 2 Week AssessmentInsightAlign your security priorities with best practice management and protection of your devices, apps and users.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 46
Cloud Safeguard - 12 Month ImplementationRapid CircleOur Cloud Safeguard managed security service enables customers to focus on core business and innovation while we keep your Microsoft 365 platforms safe & secure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 46
Unified Endpoint Management: 8-Wk AssessmentZetta Pty LtdZetta’s Assessment and Optimisation engagement will assess the way you currently manage your corporate devices and advise you on how to modernise your endpoint management.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
15 out of 46
Security - Defender for EndpointLinktech AustraliaA cloud centric approach that symbiotically targets architectural building blocks to alleviate issues and enhance the overall Defender for Endpoint experience for Endpoints being managed remotely
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
16 out of 46
Zero Trust: 3-Day AssessmentQUORUM SYSTEMS PTY LTDThe assessment has been designed and scoped to focus on Microsoft 365 or Azure security elements as these relate to inform a robust zero trust strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 46
ASD Essential 8 Assessment and Roadmap: 10-day AssessmentQUORUM SYSTEMS PTY LTDQuorum’s Essential 8 Assessment & Roadmap guides you to prioritise valuable remediations within a strategic roadmap, enabling quick wins, & developing strategies to tackle more complex use-cases.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
18 out of 46
Cyber Blueprint: DiscoveryWaterstons LimitedCyber Maturity Assessment with Risk and Gap Analysis
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
19 out of 46
Microsoft 365 Copilot Readiness AssessmentDEFEND LimitedThe Microsoft 365 Copilot Readiness Assessment is purpose-built to help your organisation securely embrace the new wave of Generative AI with Microsoft 365 Copilot
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
20 out of 46
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense GlobalLearn how to put next-generation Microsoft Security tools to work for you
+1
Applicable to:
Threat Protection
21 out of 46
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense GlobalUnderstand your readiness for common security threats.
+1
Applicable to:
Threat Protection
22 out of 46
Copilot for Security: Assessment 10-DaysQUORUM SYSTEMS PTY LTDMicrosoft Copilot for Security Readiness Assessment (including PoC) – the first generative AI product to help security and IT teams protect at the speed and scale of AI.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 46
Microsoft Copilot for Security Readiness AssessmentDEFEND LimitedAssess your organisations' readiness for the power of Copilot for Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 46
Secure Score AssessmentCanon Business Services ANZEnhance your understanding of your current security posture and exposure. Discover actionable measures to protect against new and emerging threats with our Secure Score Assessment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 46
Threat Protection EngagementFUJITSUIdentify and mitigate threats. Strengthen security, prioritize vulnerabilities, and improve your position.
+1
Applicable to:
Threat Protection
26 out of 46
Implementation of Microsoft Intune and Microsoft Defender by Fusion5Fusion5 LimitedFast-track endpoint security with Microsoft Intune and Defender to protect against cyber threats, unauthorised access, and compliance risks
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Threat Protection
27 out of 46
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+1
Applicable to:
Threat Protection
28 out of 46
MCI Engagements - Cloud Securityimpeltec Pty LtdimpelSecure Cloud Security Engagement: Free 4-week workshop
+2
Applicable to:
Cloud Security
Threat Protection
29 out of 46
Managed Microsoft security services by DatacomDatacomDatacom’s managed cyber defence operation centre (CDOC) services provide 24/7 managed security through a centralised CDOC.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 46
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
31 out of 46
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
32 out of 46
Copilot Security Readiness Assessment WorkshopJasco Consulting Pty LtdThe Security Readiness Assessment for Copilot for Microsoft 365 ensures your environment is secure and ready for deployment. It identifies vulnerabilities, strengthens identity and data protection.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
33 out of 46
Security Assessment: 2Wk AssessmentSXIQ DIGITAL PTY LTDSecurity Assessment Service to rapidly help organisations understand their Azure, DC and M365 current state security posture against common industry standards NIST, CIS, Essential 8 and ISO27001.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 46
Cloud Security Assessment: 2 Week AssessmentByte Information Technology Pty LtdIdentify real threats to your cloud environment and develop plans and next steps for your security journey.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 46
Security Controls Review - 2wk AssessmentThe Missing Link Network Integration Pty LtdWe can help you achieve a more mature, secure IT environment with our comprehensive Security Controls Review powered by Microsoft Security and Compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 46
IdentityCARE 3-Wk ImplementationSecureCom LtdSecuring organizations Exchange Online and Multifactor Identity services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 46
Secure Remote Work: 4-Hours WorkshopProfessional Advantage Pty LtdEnable your people to work from anywhere, securely with Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 46
Security Assessment - 5-Day AssessmentQUORUM SYSTEMS PTY LTDThe outcome of this assessment is a documented security assessment work plan with steps, tools and procedures used to conduct the assessment.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
39 out of 46
Conditional Access & MFA 5d Proof of ConceptGeneration-e Productivity Solutions Pty LtdConditional Access and Multi Factor Authentication deployed without negatively impacting users. We setup the environment then deploy 5 devices plus train you how to do the rest.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 46
Data#3 Defend against threats: - 8-weeks ImplementationData#3 LimitedDefend against threats using Microsoft Defender, Azure Defender and Azure Sentinel provides you with an integrated
solution to protect your organisation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
41 out of 46
Data#3 Essential Eight Adoption Roadmap 2-Week AssessmentData#3 LimitedThe Essential Eight Assessment is a 2 weeks engagement. The audit will help you understand your current security maturity and defensive posture, in alignment with the ACSC Essential Eight.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 46
Microsoft 365 Security Assessment: 3-DaysResolution Technology Pty LtdThe Microsoft 365 Security Assessment provides a consultative and hands on review of your production environment including best practice recommendations to secure your business data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 46
iTop MDR 5-Week Implementation登豐數位科技股份有限公司協助您的企業快速的偵測惡意活動、使用者行為及各項由端點發起的惡意活動,即時探索弱點和錯誤的設定,以進行補救。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 46
Microsoft 365 Security Assessment: 6-day AssessmentPerformantaPerformanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 46
RFFR/ISO 27001 Risk & Compliance Assessment: 6-12 MonthseStorm AustraliaBecome Right Fit for Risk (RFFR) & ISO 27001 accredited, address compliance risks, and secure your endpoint devices/users in Microsoft 365 with eStorm’s RFFR & ISO 27001 Risk & Compliance Assessment
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
46 out of 46