FiltrosLimpar tudo
Professional Services resultados
A mostrar resultados em professional services.
AVAProtect 360 - Device Protection and Management Solutions by AVASOFTAVASOFTLeverage Microsoft Intune for tailored security measures, advanced threat detection, and real-time monitoring to safeguard sensitive data, mitigate risks, and ensure compliance.
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
1 out of 55
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 55
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
3 out of 55
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 55
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFTIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 55
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 55
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 55
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
8 out of 55
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 55
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFTBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 55
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLPEvaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
11 out of 55
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 55
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 55
MDS Managed MXDR EngagementMaureen Data SystemsDesigned to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 55
Microsoft 365 Defender for Cloud Apps Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVProvides integral protection for SaaS applications, helping you monitor and protect application data in the cloud.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 55
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
16 out of 55
Cybersecurity Risk Assessment 2 WeeksWhite Hat Consultores S.A. de C.V.Evaluación de ciberseguridad para la detección de riesgos y construcción de un programa de mejora
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 55
Microsoft 365 Defender Attack Simulation: 4 Weeks DeploymentSoluciones Tecnológicas Overcast S.A.P.I. de CVMicrosoft 365 attack simulation training works to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
18 out of 55
Security Architecture Design and Implementation Service上海诺未网络科技有限公司NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 55
Microsoft 365 Defender for Endpoints Deployment: 2 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVProtect your organization's devices against advanced threats such as malware, ransomware, phishing and zero-day attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 55
Microsoft Entra Deployment: 3 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVProtect all identities and secure access to any resource with a family of multi-cloud identity and network access solutions.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
21 out of 55
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 55
Cybersecurity AssessmentSuri Services SCSuri Services ofrece la mejor opción en ciberseguridad, con enfoque personalizado, experiencia técnica y herramientas avanzadas para proteger su organización de manera integral.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
23 out of 55
Secure Multicloud Environment Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVThe workshop aims to present best practices and tools for designing, implementing and managing a secure multi-cloud environment, leveraging the capabilities of Microsoft Azure, Microsoft 365, etc.
+2
Applicable to:
Cloud Security
Threat Protection
24 out of 55
Defend Against Threats with SIEM Plus XDR Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVThe goal of the workshop is to show how Microsoft's security solutions can help organizations protect themselves from cyberthreats
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 55
MXDR services 4 weeks ImplWhite Hat Consultores S.A. de C.V.Servicios administrados de seguridad para detección y respuesta a incidentes basados en plataforma MXDR
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 55
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 55
MDS - Cybersecurity AssessmentMaureen Data SystemsThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 55
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLCSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 55
MDS - Zero Trust Assessment & AdvisoryMaureen Data SystemsAssess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 55
Pentest-4wks AssessmentadaQuestGain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
31 out of 55
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLCCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 55
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
33 out of 55
Secure Remote Work: 8-weeks ImplementationTC1 LabsSeguridad y Gestión Moderna de Dispositivos
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 55
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
35 out of 55
Quadra BluForge Managed XDRQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
36 out of 55
S4B_Engagement_ThreatProtectionS4BSpecialized threat and vulnerability assessment across the Microsoft environment, utilizing EDR, XDR, and SIEM technologies to strengthen the enterprise security posture.
+1
Applicable to:
Threat Protection
37 out of 55
KS Entra: Implementación de 4 semanas - Gestión inteligente de Identidad y AccesoKnowledge System Consulting México (KsConsulting México)Le apoyamos en implementar un entorno seguro e inteligente para la gestión de servicios de Identidad y Acceso por medio de la familia de productos Microsoft Entra.
+2
Applicable to:
Identity & Access Management
Threat Protection
38 out of 55
Intune Implementation ServiceTHREATSCAPE SECURITY SOLUTIONS LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Intune in alignment with Zero Trust principles, security best practice, and business productivity goals.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
39 out of 55
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
40 out of 55
S4B_Engagement_ThreatProtection_ESS4BEvaluación especializada de amenazas y vulnerabilidades en todo el entorno Microsoft, utilizando tecnologías EDR, XDR y SIEM para fortalecer la postura de seguridad empresarial.
+1
Applicable to:
Threat Protection
41 out of 55
Cloud Target Jornada do Cliente Modern WorkCloud TargetModern Work + IA da Cloud Target acelera a transformação digital, aumenta produtividade, fortalece segurança e garante retorno do investimento em tecnologia Microsoft
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
42 out of 55
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
43 out of 55
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
44 out of 55
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
45 out of 55
Gestion del Endpoint: Servicio GestionadoRAN INGENIERÍA DE SISTEMAS SRLEl servicio está diseñado para gestionar la seguridad de las plataformas endpoint de las organizaciones en la protección de los datos y dispositivos tanto corporativos como personales.
+2
Applicable to:
Information Protection & Governance
Threat Protection
46 out of 55
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+1
Applicable to:
Threat Protection
47 out of 55
Microsoft Zero Trust Security ImplementationTC1 LabsImplement Microsoft Security capabilities to strengthen identity, endpoints, cloud, and threat protection with Zero Trust best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 55
Microsoft Security Copilot & Agents ImplementationTC1 LabsEnable Microsoft Security Copilot and implement one operational security agent or workflow to support AI-assisted investigations and response
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 55
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
50 out of 55
S4B_XDR_Recuperacion_Automatica_RecursosS4BSILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
+2
Applicable to:
Cloud Security
Threat Protection
51 out of 55
S4B Email Attack Simulation TrainingS4BAttack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
52 out of 55
Serviços de Segurança: Implementação 1WeekFUNCTION 1 TECNOLOGIA CORPORATIVA LTDA - MEEm tempos de tantos tipos de Cyber-ataques no mercado, garantir a proteção das informações que entram e saem da empresa é fundamental. Com essa implementação, será possível garantir a segurança dos e-
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
53 out of 55
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4BInvestiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
54 out of 55
Servicio de Implementación de Protección de Identidades Locales con Microsoft Defender for IdentityS4BRefuerza Active Directory local con Microsoft Defender for Identity, detectando ataques, credenciales comprometidas y movimientos laterales en controladores de dominio.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
55 out of 55