FiltresTout effacer
Services de conseil résultats
Affichage des résultats dans services de conseil.
Security Best Practices AssessmentTechNet UC LLCOur assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
1 out of 60
Armor Defender XDR Foundational AssessmentArmorTailored consulting engagement designed to evaluate your current security environment and establish a baseline for implementing Microsoft Defender XDR.
+2
Applicable to:
Identity & Access Management
Threat Protection
2 out of 60
THInc.Ops Managed ServiceTECH HEADS INCPremium managed IT service solution that provides a higher quality of service supporting your staff and stronger protection against cyberattacks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 60
THInc Secure Managed Security Service for MicrosoftTECH HEADS INCComprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
4 out of 60
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLCSkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
DSPM for AI - Free 2-Hour AssessmentNetwoven Inc.To help enterprises identify blind spots in Microsoft 365's AI data security, assess DSPM maturity, and establish a governance-first approach to safely accelerate AI innovation with Microsoft Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 60
SkyTerra's Cloud Security AssessmentSkyTerra Technologies LLCStrengthen Microsoft cloud security with a structured assessment, an actionable roadmap, and enablement your team can run with
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 60
Unified Identity & Secure Edge Modernization with Entra SuiteBDOModernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Frontier Firm Transformation - Free 2 Hour AI Security Risk AssessmentNetwoven Inc.To help businesses securely adopt AI within Microsoft 365, enabling confident use of Copilots and other AI solutions while protecting sensitive data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
9 out of 60
Redapt Threat Protection EngagementRedapt, Inc. Proactive Cybersecurity for Resilient Enterprises
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 60
Threat Protection Envisioning Engagement SentinelSentinel Technologies Inc.Organizations today are managing a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Get help achieving your broader security objectives.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 60
NuHarbor's Quick Start for PurviewNuharbor Security Inc.Activate Purview quickly with expert guidance to improve visibility, reduce risk, and support compliance.
+2
Applicable to:
Information Protection & Governance
Threat Protection
12 out of 60
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 60
NuHarbor’s Defender Health CheckNuharbor Security Inc.Uncover gaps and optimize Microsoft Defender for stronger threat protection.
+1
Applicable to:
Threat Protection
14 out of 60
Microsoft Exchange Best Practices RemediationTechNet UC LLCSecure and optimize your Microsoft Exchange Online environment with expert remediation, ensuring compliance, reliability, and protection against email threats.
+2
Applicable to:
Information Protection & Governance
Threat Protection
15 out of 60
Zero Trust Deployment and Optimization ServiceSoftchoiceDeploy zero trust with confidence, optimize it to deliver lasting outcomes.
+2
Applicable to:
Cloud Security
Threat Protection
16 out of 60
Microsoft 365 E5 Shield Deployment: 8 Week Imp.KAMIND IT, IncKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack
+2
Applicable to:
Cloud Security
Threat Protection
17 out of 60
Copilot and AI Readiness AssessmentCloudServusRun an AI Readiness Assessment to pinpoint gaps using Copilot adoption; align next steps to Copilot & Agents at Work.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
18 out of 60
Privileged Identity Management Configuration - AppSourceTechNet UC LLCConfigure Microsoft Entra PIM to enforce least privilege, enable just-in-time access, and reduce risk with real-time auditing, approval workflows, and Conditional Access integration.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
19 out of 60
Microsoft 365 Best Practices RemediationTechNet UC LLCSecure, optimize, and align your Microsoft 365 environment with Microsoft’s latest standards—improving collaboration, compliance, and protection across Exchange, Teams, SharePoint, and OneDrive.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
20 out of 60
Microsoft Purview QuickStart: ImplementationKraft KennedyKraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
21 out of 60
Veeam Backup for Microsoft 365 HealthcheckSentinel Technologies Inc.This tailored assessment consolidates system configuration details into a concise, easy-to-digest format that highlights system health, performance, and opportunities for improvement.
+1
Applicable to:
Threat Protection
22 out of 60
Microsoft 365 Security Best PracticesTechNet UC LLCSecure your Microsoft 365 environment by aligning with Microsoft’s latest security standards—enhancing threat protection, data governance, and compliance across Exchange, Teams, and SharePoint.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Microsoft 365 Health & Security DiagnosticPSM PartnersAchieve stronger security, reduce costs, and simplify management with a targeted assessment built on best practices to maximize your Microsoft 365 investment.
+2
Applicable to:
Cloud Security
Threat Protection
24 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
27 out of 60
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
28 out of 60
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
29 out of 60
Accelerate your Microsoft 365 Copilot adoptionColumbus GlobalThe Microsoft 365 Copilot Jumpstart Program is designed for business and IT leaders who want to move beyond experimentation and unlock real productivity gains from AI.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Threat Protection
30 out of 60
Proteccion de correo electronicoWolk LAB SCPROTECCIÓN DE CORREO ELECTRÓNICO Y HERRAMIENTAS DE COLABORACIÓN
+1
Applicable to:
Threat Protection
31 out of 60
Threat Protection Envisioning Workshop: Stop Advanced Threats Across Microsoft 365evoila GmbH🛡️ Discover real threats targeting your organization. 2-week Threat Protection workshop with threat analysis, Defender XDR guidance, remediation recommendations
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
32 out of 60
Inspira Microsoft Threat Protection Envisioning WorkshopInspira Enterprise Inc.Learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
34 out of 60
CBTS Microsoft 365 Managed ServiceCBTS Technology Solutions LLCPartner with CBTS for ongoing management and support of Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
35 out of 60
Cybersecurity Incident Response Retainer with Microsoft DefenderCBTS Technology Solutions LLCPartner with CBTS to ensure assistance when you need it most during a significant security event.
+2
Applicable to:
Cloud Security
Threat Protection
36 out of 60
Data Security WorkshopEmergent SoftwareSecurity workshop leveraging Microsoft's security products such as Purview to uncover data risks across Microsoft 365, assess exposure, and deliver actionable recommendations for IT leaders.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 60
Threat Protection Envisioning WorkshopCitrin Cooperman Advisors, LLCUncover real security threats in your environment and build a roadmap for stronger protection leveraging Microsoft Defender’s unified security incident platform powered by AI.
+1
Applicable to:
Threat Protection
38 out of 60
S4B_XDR_Recuperacion_Automatica_RecursosS4BSILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
+2
Applicable to:
Cloud Security
Threat Protection
39 out of 60
Microsoft 365 Security Assessment and License RationalizationRavanty Tech Consulting, Inc.Provide assessment and strategic guidance to strengthen security across Microsoft 365 environment and optimize Microsoft 365 licensing.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
40 out of 60
S4B Email Attack Simulation TrainingS4BAttack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
41 out of 60
Threat Investigation and Analysis Service with Microsoft Defender XDRS4BSILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
+2
Applicable to:
Cloud Security
Threat Protection
42 out of 60
Server Endpoint Protection Implementation Service using Microsoft Defender for EndpointS4BProvides comprehensive protection for physical and virtual servers with Microsoft Defender for Server, combined with continuous security monitoring to detect, investigate, and respond to threats.
+2
Applicable to:
Cloud Security
Threat Protection
43 out of 60
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDRS4BProtección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
+2
Applicable to:
Cloud Security
Threat Protection
44 out of 60
Advanced Hybrid Identity Security with Microsoft IdentityS4BHybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Implementation of security for Endpoint with Microsoft EDRS4BAdvanced defense for on-premises devices with Microsoft Defender for Endpoint, automated detection and response.
+2
Applicable to:
Cloud Security
Threat Protection
46 out of 60
Entrenamiento de Phishing con Microsoft Office 365S4BOfrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
47 out of 60
On-premise enviroment Identity Protection service with Microsoft IdentityS4BOn-Premises Identity Protection service detects and mitigates threats in Active Directory using Microsoft Defender for Identity.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
48 out of 60
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4BSeguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
+2
Applicable to:
Cloud Security
Threat Protection
49 out of 60
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4BInvestiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
50 out of 60
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4BProtects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
+2
Applicable to:
Cloud Security
Threat Protection
51 out of 60
Servicio de Implementación de Protección de Identidades Locales con Microsoft Defender for IdentityS4BRefuerza Active Directory local con Microsoft Defender for Identity, detectando ataques, credenciales comprometidas y movimientos laterales en controladores de dominio.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
52 out of 60
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4BDefensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
53 out of 60
Enterprise Automated Endpoint Recovery with Microsoft Defender XDRS4BSILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
54 out of 60
Implementation on Defender for Office 365Mobile MentorOur Defender for Office 365 service provides end-to-end protection against email-based threats
+1
Applicable to:
Threat Protection
55 out of 60
Zero Trust Identity Security Implementation with EntraID by ReplyReplyReply’s security approach with Microsoft Entra ID helps organizations reduce identity-driven risk, support compliance requirements, and accelerate secure adoption of Microsoft cloud services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Zones Microsoft Threat Protection WorkshopZones Inc.Detect real threats, assess vulnerabilities, and get a tailored Microsoft security roadmap, delivered by Zones’ certified cybersecurity experts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
The Threat Protection Envisioning WorkshopRackspace TechnologyA collaborative workshop that identifies real threats, prioritizes risk, and delivers a clear Microsoft-aligned security roadmap to focus investments and reduce cyber risk confidently enterprise-wide.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
58 out of 60
GSuite to Microsoft 365 Migrations: ImplementationF9 INFOTECHWe will analyze and create a full project plan to align with Microsoft Best Practices around MFA, Document Management, Security and use of Copilot. 10% off Copilot for 1st year with this offer.
Take
+3
Applicable to:
Adoption & Change Management
Meetings for Microsoft Teams
Threat Protection
59 out of 60
Microsoft Sentinel SOC Managed Service by H OneH One (Private) LimitedAs a Microsoft-certified partner with deep Sentinel expertise, our Managed SOC gives you round-the-clock monitoring, rapid threat response, and complete visibility across your cloud environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60