ФильтрыОчистить все
Результаты: Professional Services
Отображение результатов в professional services.
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
1 out of 54
Implementation of Microsoft Security CopilotAlfa Connections Pte LtdTo assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 54
Teams & SharePoint Security HardeningAVASOFTTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
AVAProtect 360 - Device Protection and Management Solutions by AVASOFTAVASOFTLeverage Microsoft Intune for tailored security measures, advanced threat detection, and real-time monitoring to safeguard sensitive data, mitigate risks, and ensure compliance.
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
4 out of 54
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
5 out of 54
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 54
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFTIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
7 out of 54
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 54
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 54
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 54
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 54
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFTBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 54
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLPEvaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
13 out of 54
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
+2
Applicable to:
Cloud Security
Threat Protection
14 out of 54
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 54
Security Copilot Value AcceleratorAvanade, Inc.Designed to help organizations modernize their security operations and administration by leveraging Gen AI.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
16 out of 54
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
17 out of 54
Microsoft Security Solutions - 4 Week AssessmentProtivitiMicrosoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
18 out of 54
Security Architecture Design and Implementation Service上海诺未网络科技有限公司NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 54
Cyber Security Services 9 days AssessmentAlfa Connections Pte LtdHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 54
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
21 out of 54
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 54
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 54
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITEDOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
24 out of 54
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom ConsultingThis FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 54
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
26 out of 54
Microsoft Intune: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur expert team will help you deploy and configure Microsoft Intune, ensuring seamless integration and optimal performance for your organization's needs
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
27 out of 54
Quadra BluForge Managed XDRQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
28 out of 54
Intune Implementation ServiceTHREATSCAPE SECURITY SOLUTIONS LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Intune in alignment with Zero Trust principles, security best practice, and business productivity goals.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
29 out of 54
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
30 out of 54
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
31 out of 54
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 54
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
33 out of 54
スマートスタート for Microsoft 365 E5 Security:1ヵ月間での 実装Japan Business Systems, Inc.Microsoft 365 を利用するために必要な ”ID”、”デバイス”、”アプリケーション” を、各種サイバー攻撃から守るセキュリティ製品の実装・運用を短期間で実現する構築サービスです。
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
34 out of 54
マイクロソフト EDRマネージドサービスPSC Inc.Defender及びDefender for Endpointの運用、監視、調査をサービス化しました。構築から運用までワンストップで提供します。
+2
Applicable to:
Adoption & Change Management
Threat Protection
35 out of 54
SCCloud 365:3ヶ月の実装SOFTCREATE CORP.「安心安全の最新セキュリティ」と「生産性を劇的に高めるコミュニケーション」をAll in Oneで実現するサービスです。
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
36 out of 54
リスクアセスメントサービス:3ヶ月 評価Japan Business Systems, Inc.セキュリティリスクを網羅的にチェックし、サイバー攻撃や内部不正などにより攻撃されるリスクポイントを洗い出します。
洗い出されたリスクを解決するために、最新のセキュリティ事情を踏まえながらお客さまのシステム環境を考慮した最適なMicrosoftソリューション等の実行対策案を提示します。
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 54
Managed SOAR:最短12か月の実装NTTコミュニケーションズ(株)Microsoft 365のセキュリティ機能を活用したNTTCommnicationsのセキュリティ対策・運用サービスに関連する共同販売機会を獲得する。
お客様のセキュリティ運用に関する双方の販売機会にて共同提案を実施する。
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
38 out of 54
Microsoft Defender for Endpoint導入支援JBサービス株式会社Microsoft Defender for Endpoint導入支援サービスは、セキュリティの向上とエンドポイントデバイスの保護を強化の実現を支援致します。
+1
Applicable to:
Threat Protection
39 out of 54
マネージドバックアップ for Microsoft 365:2週間の実装Japan Business Systems, Inc.大切な業務データを手軽に保管!Microsoft 365 テナント内に保存したデータのバックアップ、リストア設定や日常のバックアップ運用、問い合わせサポートを行います。
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
40 out of 54