FiltriNotīrīt visu
Konsultāciju pakalpojumi rezultāti
Tiek rādīti rezultāti šeit: konsultāciju pakalpojumi.
Identity Governance Lifecycle: 4 Weeks of AssessmentSoluciones Tecnológicas Overcast S.A.P.I. de CVThe objective of the assessment is to identify areas for improvement and potential risks in the identity environment, based on the maturity level of the organization's identity governance model.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
1 out of 45
MDS - Cybersecurity AssessmentMaureen Data SystemsThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 45
SEIDOR Modern Workplace with Microsoft 365 1-Month ImplementationSEIDOR SAWe promote and respond to the current needs of companies in terms of mobility, security, productivity, communication and collaboration through the evolution of their workstations
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
3 out of 45
Endpoint Management: 4 Wk of Workshop ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV4 weeks of workshop implementation to learn how to manage and protect your devices, applications and users
+1
Applicable to:
Cloud Security
4 out of 45
Secure Multicloud Environment Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVThe workshop aims to present best practices and tools for designing, implementing and managing a secure multi-cloud environment, leveraging the capabilities of Microsoft Azure, Microsoft 365, etc.
+2
Applicable to:
Cloud Security
Threat Protection
5 out of 45
Protect & Govern Sensitive Data Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVIt is an intensive workshop that teaches you how to protect and govern your organization's sensitive data with Microsoft solutions.
+2
Applicable to:
Cloud Security
Information Protection & Governance
6 out of 45
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 45
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
8 out of 45
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLCCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 45
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLCSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 45
Adoption, Deployment & Success of Microsoft 365 CopilotIT Quest SolutionsEmpower your team with Microsoft 365 Copilot—boost productivity, streamline workflows, and unlock AI-driven insights across Word, Excel, Teams & CopilotAgents
+2
Applicable to:
Adoption & Change Management
Cloud Security
11 out of 45
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
12 out of 45
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SASConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 45
NextGen Windows: 4 Wk of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV4 weeks implementation on how to leverage Microsoft cloud solutions in your organization.
+1
Applicable to:
Cloud Security
14 out of 45
Quadra BluForge Managed XDRQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 45
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
16 out of 45
Copilot WorkshopSuri Services SCMicrosoft Copilot 365: Potencia tu organización con el poder de la Colaboración Inteligente.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
17 out of 45
Compliance Managed ServicesForsyte IT SolutionsOrganizations everywhere are experiencing the benefits of Compliance Managed Services. Work with our Microsoft Gold Partner team to establish governance and manage user access and data security.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
18 out of 45
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 45
Microsoft Zero Trust Security ImplementationTC1 LabsImplement Microsoft Security capabilities to strengthen identity, endpoints, cloud, and threat protection with Zero Trust best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 45
Microsoft Security Copilot & Agents ImplementationTC1 LabsEnable Microsoft Security Copilot and implement one operational security agent or workflow to support AI-assisted investigations and response
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 45
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
22 out of 45
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
23 out of 45
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
24 out of 45
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
25 out of 45
S4B_XDR_Recuperacion_Automatica_RecursosS4BSILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 45
S4B Email Attack Simulation TrainingS4BAttack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
27 out of 45
Threat Investigation and Analysis Service with Microsoft Defender XDRS4BSILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
+2
Applicable to:
Cloud Security
Threat Protection
28 out of 45
Server Endpoint Protection Implementation Service using Microsoft Defender for EndpointS4BProvides comprehensive protection for physical and virtual servers with Microsoft Defender for Server, combined with continuous security monitoring to detect, investigate, and respond to threats.
+2
Applicable to:
Cloud Security
Threat Protection
29 out of 45
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDRS4BProtección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
+2
Applicable to:
Cloud Security
Threat Protection
30 out of 45
Credentials and access protection , unauthorized logins, and suspicious behavior with Microsoft IdentityS4BCloud Identity Protection detects and mitigates credential and access risks using Microsoft Entra ID Protection. It leverages analytics, adaptive MFA, and condicional access to enhance security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
31 out of 45
Protección Identidades en ambiente Híbrido con Microsoft IdentityS4BIntegra seguridad en nube y on-premise con Defender for Identity y Entra ID Protection, unificando detección, investigación y respuesta frente a amenazas.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
32 out of 45
Advanced Hybrid Identity Security with Microsoft IdentityS4BHybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 45
Implementation of security for Endpoint with Microsoft EDRS4BAdvanced defense for on-premises devices with Microsoft Defender for Endpoint, automated detection and response.
+2
Applicable to:
Cloud Security
Threat Protection
34 out of 45
Entrenamiento de Phishing con Microsoft Office 365S4BOfrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
35 out of 45
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4BSeguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
+2
Applicable to:
Cloud Security
Threat Protection
36 out of 45
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4BInvestiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
37 out of 45
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4BProtects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
+2
Applicable to:
Cloud Security
Threat Protection
38 out of 45
Seguridad avanzada de identidad en la nube con Microsoft IdentityS4BProtege credenciales y accesos en la nube con Microsoft Entra ID Protection, aplicando MFA adaptativo y acceso condicional para mitigar riesgos de identidad.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
39 out of 45
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4BDefensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
40 out of 45
Enterprise Automated Endpoint Recovery with Microsoft Defender XDRS4BSILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
41 out of 45
Microsoft Sentinel SOC Managed Service by H OneH One (Private) LimitedAs a Microsoft-certified partner with deep Sentinel expertise, our Managed SOC gives you round-the-clock monitoring, rapid threat response, and complete visibility across your cloud environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 45
Beyondsoft Segurança Ambiente CloudBeyondsoftOferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 45
Netox MDR / SOC 24/7Netox OyFinnish-built 24/7 MDR & SOC for Microsoft environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 45
HCLTech Frontline Worker Digital Experience – Assessment & Implementation support for Empowering Frontline WorkersHCL America Inc_HCLTHCLTech’s solution streamlines frontline communication, digital workflows, and secure device management, powered by HCLTech, Microsoft, and Zebra for a modern, sustainable frontline workplace.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
45 out of 45