FiltrelerTümünü temizle
Professional Services sonuç
içinde professional services sonuç gösteriliyor.
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
1 out of 43
MDS - Cybersecurity AssessmentMaureen Data SystemsThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 43
Microsoft 365 Defender for Endpoints Deployment: 2 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVProtect your organization's devices against advanced threats such as malware, ransomware, phishing and zero-day attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 43
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
4 out of 43
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
5 out of 43
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to:
Cloud Security
6 out of 43
Defend Against Threats with SIEM Plus XDR Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVThe goal of the workshop is to show how Microsoft's security solutions can help organizations protect themselves from cyberthreats
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 43
SEIDOR Modern Workplace with Microsoft 365 1-Month ImplementationSEIDOR SAWe promote and respond to the current needs of companies in terms of mobility, security, productivity, communication and collaboration through the evolution of their workstations
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
8 out of 43
Threat Protection: 2-Week WorkshopForsyte IT SolutionsLearn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 43
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
10 out of 43
Endpoint Management: 4 Wk of Workshop ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV4 weeks of workshop implementation to learn how to manage and protect your devices, applications and users
+1
Applicable to:
Cloud Security
11 out of 43
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 43
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
13 out of 43
Quadra BluForge Managed XDRQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
14 out of 43
Secure Multicloud Environment Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVThe workshop aims to present best practices and tools for designing, implementing and managing a secure multi-cloud environment, leveraging the capabilities of Microsoft Azure, Microsoft 365, etc.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 43
Mitigate Compliance & Privacy Risk Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVDesigned to help organizations identify and reduce compliance and privacy risks associated with the use of the cloud.
+2
Applicable to:
Cloud Security
Insider Risk
16 out of 43
MXDR services 4 weeks ImplWhite Hat Consultores S.A. de C.V.Servicios administrados de seguridad para detección y respuesta a incidentes basados en plataforma MXDR
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 43
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
18 out of 43
Protect & Govern Sensitive Data Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVIt is an intensive workshop that teaches you how to protect and govern your organization's sensitive data with Microsoft solutions.
+2
Applicable to:
Cloud Security
Information Protection & Governance
19 out of 43
Secure Identities & Access Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVThe objective of the workshop is to help customers find and mitigate identity risks and protect your organization with a seamless identity solution.
+2
Applicable to:
Cloud Security
Identity & Access Management
20 out of 43
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLCCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 43
Microsoft 365 Copilot AssessmentSuri Services SCAsegura tu ruta de adopción con Suri Services y Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
22 out of 43
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
23 out of 43
NextGen Windows: 4 Wk of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV4 weeks implementation on how to leverage Microsoft cloud solutions in your organization.
+1
Applicable to:
Cloud Security
24 out of 43
Liquid C2 Secure360 MDR & MXDRLiquid Telecommunications South Africa (PTY) LTDProactive Threat Detection and Rapid Response—Simplified. Powered by Microsoft Sentinel & Defender
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 43
Trip to Microsoft 365 Copilot ImplementationSuri Services SCOfrecemos un servicio de capacitación y preparación estratégica para la adopción de Microsoft 365 Copilot, enfocado en acelerar la productividad y transformar los procesos clave
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
26 out of 43
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
27 out of 43
Identity Governance Lifecycle: 4 Weeks of AssessmentSoluciones Tecnológicas Overcast S.A.P.I. de CVThe objective of the assessment is to identify areas for improvement and potential risks in the identity environment, based on the maturity level of the organization's identity governance model.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
28 out of 43
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
29 out of 43
Microsoft 365 Asesoría y Fortalecimiento de Seguridad: Evaluación de 4 semanasEvertec Group LLCAnálisis y optimización de seguridad de Microsoft 365 para asegurar que las aplicaciones y herramientas de colaboración estén configuradas con una fuerte protección en caso de actividades maliciosas.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 43
Asesoría de Ciberseguridad EVERTEC: 60 horasEvertec Group LLCEvaluación de madurez de la gestión y manejo de ciberseguridad a nivel de procesos, cultura y tecnología. Se entregan los puntos de mejora, plan de acción sugerido y estado de vulnerabilidades.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 43
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
32 out of 43
Microsoft Zero Trust Security ImplementationTC1 LabsImplement Microsoft Security capabilities to strengthen identity, endpoints, cloud, and threat protection with Zero Trust best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 43
Microsoft Security Copilot & Agents ImplementationTC1 LabsEnable Microsoft Security Copilot and implement one operational security agent or workflow to support AI-assisted investigations and response
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 43
Liquid C2 SECaaS Bundles for SMBsLiquid Telecommunications South Africa (PTY) LTDTrusted Cyber Defense for Growing Businesses. Powered by Microsoft Business Premium + Defender & Purview Suites Add-ons
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 43
Cloudmania Security Posture AssessmentsLiquid Telecommunications South Africa (PTY) LTDGain complete visibility and eliminate cloud security blind spots with Cloudmania’s Microsoft Security Posture Assessment
+2
Applicable to:
Cloud Security
Threat Protection
36 out of 43
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
37 out of 43
Liquid C2 Secure360 SOCMonAlertLiquid Telecommunications South Africa (PTY) LTDStay Ahead of Threats with Real-Time SOC Alerts. Powered by Microsoft Sentinel
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
38 out of 43
S4B_XDR_Recuperacion_Automatica_RecursosS4BSILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
+2
Applicable to:
Cloud Security
Threat Protection
39 out of 43
Secure Remote Work: 8-weeks ImplementationTC1 LabsSeguridad y Gestión Moderna de Dispositivos
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 43
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
41 out of 43
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 43
Compliance Managed ServicesForsyte IT SolutionsOrganizations everywhere are experiencing the benefits of Compliance Managed Services. Work with our Microsoft Gold Partner team to establish governance and manage user access and data security.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
43 out of 43