FiltresTout effacer
Professional Services résultats
Affichage des résultats dans professional services.
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFTUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 60
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/SWe can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
2 out of 60
Security Operations Center with Microsoft SentinelAVASOFTMonitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 60
Microsoft Defender for Endpoint - Vulnerability Assessment by AVASOFTAVASOFTEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFTBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/SConscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Teams & SharePoint Security HardeningAVASOFTTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
AVAProtect 360 - Device Protection and Management Solutions by AVASOFTAVASOFTLeverage Microsoft Intune for tailored security measures, advanced threat detection, and real-time monitoring to safeguard sensitive data, mitigate risks, and ensure compliance.
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
13 out of 60
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
14 out of 60
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
15 out of 60
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFTIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
16 out of 60
Rapid Remediation of Microsoft Secure ScoreCyberOneBoost your Microsoft Secure Score, reduce risk and increase cyber resilience with expert-led rapid remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 60
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
18 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
19 out of 60
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFTBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 60
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLPEvaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
23 out of 60
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
+2
Applicable to:
Cloud Security
Threat Protection
24 out of 60
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Security Copilot Value AcceleratorAvanade, Inc.Designed to help organizations modernize their security operations and administration by leveraging Gen AI.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
26 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
27 out of 60
Threat Protection: 2-Month ImplementationOfficeline SAThreat protection with Microsoft Defender products. We deliver a solution that improves and streamlines threat protection for every organization.
+2
Applicable to:
Cloud Security
Threat Protection
28 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
29 out of 60
Security Architecture Design and Implementation Service上海诺未网络科技有限公司NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbHStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance IncYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
32 out of 60
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
33 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 60
Security Configuration Maintenance 2-Wks ImpInsight Technology SolutionsA monthly Security Configuration Maintenance Service. This service will help to secure end-user devices more effectively based on Insight and Microsoft Security best practices.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
35 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense GlobalStop threats with a cloud-native SIEM adapted to your new business needs.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
36 out of 60
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITEDOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
38 out of 60
Microsoft Defender XDR managed by InetumInetum BelgiumGet insights into the threats for your IT environment and turn these insights into action
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
39 out of 60
Microsoft 365 Security Envisioning - 1day workshopOfficeline SALearn how to improve your organization’s security posture with Office Line’s Microsoft 365 Security 1-day Workshop.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
40 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Insight Security Mini Audit: 1 Day WorkshopInsight Technology SolutionsInsight will work with you to evaluate your Microsoft 365 environment to make sure that it is in line with industry security best practices.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
42 out of 60
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
43 out of 60
Microsoft Intune: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur expert team will help you deploy and configure Microsoft Intune, ensuring seamless integration and optimal performance for your organization's needs
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
44 out of 60
Quadra BluForge Managed XDRQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
45 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Cloud Identity Foundation Workshop (5-day)DexMachGet knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
+2
Applicable to:
Identity & Access Management
Threat Protection
47 out of 60
Intune Implementation ServiceTHREATSCAPE SECURITY SOLUTIONS LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Intune in alignment with Zero Trust principles, security best practice, and business productivity goals.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
48 out of 60
Threat Protection 3 Day WorkshopInsight Technology SolutionsInsight's Threat Protection Workshop identifies real-time threats in an organisation’s environment and helps define clear next steps to mitigate risks with Microsoft 365
+1
Applicable to:
Threat Protection
49 out of 60
Insight Discover Sensitive Data 5 Day WorkshopInsight Technology SolutionsInsight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
+2
Applicable to:
Information Protection & Governance
Threat Protection
50 out of 60
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
51 out of 60
Microsoft 365 Security and Compliance ActivationNVISOOur engineering support covers every phase from planning to full implementation, of the different security and compliance solutions included in Microsoft licenses
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
52 out of 60
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
53 out of 60
Secure & Compliant Modern Workplace: 2 weeks ImpInsight Technology SolutionsBased on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
54 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
55 out of 60
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
56 out of 60
Innofactor Security AssessmentInnofactor FinlandGain additional visibility to your security posture - Innofactor security assessment is a one-day technical review conducted by our experienced cybersecurity team member.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
57 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
58 out of 60
Managed Services: M(x)DR for Microsoft 365 DefenderCegeka NVIntroducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
+2
Applicable to:
Identity & Access Management
Threat Protection
59 out of 60
Microsoft 365 Security: 1-Wk AssessmentInnofactor NorwayInnofactor’s Microsoft 365 Security assessment secures organizations business operation by providing insights and recommendations to help minimizing security risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
60 out of 60