ตัวกรองล้างทั้งหมด
ผลลัพธ์ Professional Services รายการ
กำลังแสดงผลลัพธ์ รายการใน professional services
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 42
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 42
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
3 out of 42
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 42
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to:
Cloud Security
5 out of 42
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
6 out of 42
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
7 out of 42
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 42
Microsoft 365 Security Design and Deployment: 1 Hour BriefingCloud EssentialsAn initial briefing to understand business requirements in advance of a design workshop and deployment of advanced Microsoft 365 cloud security features
+1
Applicable to:
Cloud Security
9 out of 42
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
10 out of 42
First Technology - Darktrace POVFirst Technology (Pty) LtdReduce risk and harden security in Microsoft 365 with the Darktrace Cyber AI Loop - Proof of Value (POV)
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
11 out of 42
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 42
Cyber_Protection_Pack_for_Microsoft_365Global Micro SolutionsSecurity baselines and best practices for Microsoft 365 customers
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
13 out of 42
Gijima Microsoft 365 Zero Trust FrameworkGijimaThe Gijima implementation of Microsoft 365 E5 follows the cutting-edge principles of zero trust security.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
14 out of 42
NEC Africa - Microsoft Security Solution ImplementationNEC XON Systems Do you have a Microsoft Security Ecosystem but are unsure how to effectively utilize it for your cyber resilience journey? NEC Africa Systems provides full security solution implementation services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 42
Copilot for Security 5-Day enablementNetsuritThis short enablement engagement will assess the state of your security environment, identify opportunities to enhance your solution by adding Copilot for Security.
+2
Applicable to:
Cloud Security
Threat Protection
16 out of 42
DotCom SECaaS SolutionsDotcom Software ProjectsComprehensive Solutions for Enhanced Protection by Dotcom Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
17 out of 42
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
18 out of 42
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
19 out of 42
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITEDProfessional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 42
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
21 out of 42
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
22 out of 42
Netsurit Security Optimization Service (NSOS) - Managed Service - 12 MonthsNetsuritThe Netsurit Security Optimization Service is designed to enhance and maintain the security posture of its customers' Microsoft environments.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 42
Advanced Microsoft Entra Verified ID - Implementation - 3 WeeksNetsuritNetsurit’s Secure your Identity solution enables automated user lifecycle management across HR systems both on-premises and in the cloud.
+2
Applicable to:
Cloud Security
Identity & Access Management
24 out of 42
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 42
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
26 out of 42
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
27 out of 42
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 42
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
29 out of 42
Liquid C2 SECaaS Bundles for SMBsLiquid Telecommunications South Africa (PTY) LTDTrusted Cyber Defense for Growing Businesses. Powered by Microsoft Business Premium + Defender & Purview Suites Add-ons
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 42
Liquid C2 Secure360 MDR & MXDRLiquid Telecommunications South Africa (PTY) LTDProactive Threat Detection and Rapid Response—Simplified. Powered by Microsoft Sentinel & Defender
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
31 out of 42
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 42
Cloudmania Security Posture AssessmentsLiquid Telecommunications South Africa (PTY) LTDGain complete visibility and eliminate cloud security blind spots with Cloudmania’s Microsoft Security Posture Assessment
+2
Applicable to:
Cloud Security
Threat Protection
33 out of 42
Frontier Firm LiveSulava OyFrontier Firm Live is Sulava MEA’s flagship subscription service designed to help organisations transition into AI-native enterprises.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
34 out of 42
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
35 out of 42
SOC as a Service_1 day ImplementationTarsus On Demand (Pty) LtdSOC is a managed service that leverages a bespoke Threat Monitoring Platform. This platform detects malicious and suspicious activity across 3 critical attack vectors: Endpoint, Network & Cloud.
+2
Applicable to:
Cloud Security
Threat Protection
36 out of 42
Compliance Manager Training: 1/2 day WorkshopCloud EssentialsCompliance Manager Training - a 1/2 day training session about Microsoft 365 Compliance Manager facilitated by an experienced member of our team
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
37 out of 42
Manage and Investigate Risk: 2 weeks WorkshopCloud EssentialsA risk check followed by advisory workshop to build a sustainable strategy around insider risk within Microsoft 365 and further accelerate your compliance journey.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
38 out of 42
Discover Sensitive Data: 2 weeks WorkshopCloud EssentialsDiscover Sensitive Data Workshop - an automated data risk check to uncover dark data risks with analysis and recommendations
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
39 out of 42
Microsoft 365 Security Assessment and Roadmap: 1 Day WorkshopCloud EssentialsAccelerating your Zero Trust strategy through a readiness assessment, workshop and roadmap
+1
Applicable to:
Cloud Security
40 out of 42
Microsoft 365 Security Assessment: 6-day AssessmentPerformantaPerformanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 42
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
42 out of 42