عوامل التصفيةإلغاء تطبيق الكل
نتائج خدمات استشارية
يتم الآن عرض من النتائج في خدمات استشارية
Prepárate para Microsoft Copilot con ENCAMINA: Assesment 3 semanasENCAMINA S.L.Obtén un assessment integral: análisis de información, optimización de arquitectura y seguridad, más plan de comunicación y Road Map personalizado
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
1 out of 60
Threat Protection Engagement FY25The Partner MastersLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Microsoft 365 Value Discovery - Workshop - 1 DayDynTek Inc.OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT
OF MICROSOFT 365 IN YOUR ENVIRONMENT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
3 out of 60
Microsoft 365 Security AssessmentSii Sp. z o.o.We assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Microsoft Defender for Endpoint DeploymentCitrin Cooperman Advisors, LLCFortify your business with Microsoft Defender for Endpoint that seamlessly integrates into Microsoft 365, safeguarding all devices and strengthening your Zero Trust framework.
+2
Applicable to:
Cloud Security
Threat Protection
5 out of 60
Cyderes Managed Security Services for Microsoft SentinelCyderesCyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
6 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLCIf you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
7 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLCAdvanced endpoint security and threat protection: detect, investigate, and respond to attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Copilot For Microsoft 365 Readiness AssessmentTHREATSCAPE LIMITEDThreatscape’s Copilot for Microsoft 365 Readiness Assessment (CRA) service can help you understand, and begin to address, the risks of Copilot for Microsoft 365 adoption.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 60
Infosys Microsoft 365 Security and Compliance: 8 Weeks AssessmentInfosys LimitedInfosys Microsoft 365 security expert team offers a full spectrum security service for microsoft 365 services facilitated digital workplace.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Workplace Analytics
10 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo SoftwareCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.A high-level forensics evaluation designed to identify current and past threat activity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Microsoft 365 CMMC: 4-Wk WorkshopKMicro Tech, Inc.Provides expert guidance to help organizations in the Defense Industrial Base achieve CMMC compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
13 out of 60
Security Assessment for Copilot Readiness: 3 Day WorkshopNetwovenNetwoven's security assessment for Copilot workshop will train you to better discover, secure, and govern your corporate data for usage with Copilot for Microsoft 365
+2
Applicable to:
Cloud Security
Knowledge & Insights
14 out of 60
Copilot Readiness AssessmentAscent Global, Inc.Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Microsoft Defender for Office 365: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Office 365
+2
Applicable to:
Cloud Security
Threat Protection
16 out of 60
Microsoft 365 E5 CMMC L1 3 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 1 using Microsoft 365 security Suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Virtual CISO (vCISO) Managed ServicesNetrix GlobalOur virtual CISO offering provides organizations a senior level security executive for ongoing security program management and governance.
+1
Applicable to:
Cloud Security
18 out of 60
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLCCatapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 60
Mentoring ServiceMobile MentorOur mentoring service helps customers leverage Microsoft 365 to improve endpoint security & user experience. We help accelerate the learning curve & reduce risk by deploying Microsoft 365 optimally.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
20 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLCBreach and Attack Simulations — We Attack to Defend You
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
21 out of 60
Microsoft 365 Migration 12 Hour Proof-of-ConceptNew Charter Technologies, Inc.Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
22 out of 60
Data Security: 2-Weeks WorkshopConterraIdentify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
23 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
24 out of 60
GoDaddy to Direct Microsoft 365 Migration 2 Hrs Proof of Concepttrue org cloudRemove GoDaddy and other third-party entities from your tenant, reclaiming internal control over your systems.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
25 out of 60
Microsoft 365 Copilot - Technical ReadinessCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Technical Readiness - your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
26 out of 60
Copilot for Microsoft 365: Security AcceleratorKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Accelerator: Tailored insights and guided deployments.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
27 out of 60
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
28 out of 60
Managed Security for Compliance: 1 yr Mgd ServiceInsightDiscover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
+2
Applicable to:
Cloud Security
Compliance Advisory Services
29 out of 60
Defender for Endpoint Managed Servicee2e-assure LtdMicrosoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 60
Avanade Microsoft Security Service Edge Quick StartAvanade, Inc.Microsoft’s new Security Service Edge (SSE) capability empowers organizations on their Zero Trust journey though unique in the market integration with Microsoft Entra.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Copilot for Microsoft 365 DeploymentSMART business LLCCopilot for Microsoft 365 is an AI-powered productivity tool that integrates with Microsoft 365 Apps and the Microsoft Graph to enhance user creativity, productivity, and skills.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
32 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day WorkshopeGroup Enabling Technologies, LLCWith Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 60
Cybersecurity Assessment: 3-Wk WorkshopExelegentThe Cybersecurity Assessment is designed to evaluate your cybersecurity posture and reduce risks exposure by using advanced Microsoft 365 Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
34 out of 60
Defend Against Threats with SIEM Plus XDRNetrix GlobalAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Spyglass Managed Security Services: 2-week ImplementationQuisitiveSpyglass is a security and compliance program for cloud and on-premises organizations that aligns security and compliance with current requirements of best-in-class technology and expert deployment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
36 out of 60
Big Green IT Security Assessment: 3-WeekBig Green IT - DevSecure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 60
Microsoft 365 Copilot Value DiscoveryCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Value Discovery Workshop – your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
38 out of 60
Threat Protection Engagement: 3-Day AssessmentPSM PartnersDo more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Your Smart Workplace AssessmentRackspace TechnologyYour Smart Workplace Assessment helps organizations develop secure, cost-effective, and productivity-enhancing strategies for modern work environments.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
40 out of 60
Data Protection and Compliance Quick StartSoftchoiceThe Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
41 out of 60
AvePoint Backup: 4 Weeks Proof Of ConceptSentinel Technologies Inc.Sentinel Technologies is proud to offer AvePoint’s Cloud Backup, a powerful cloud-to-cloud backup solution for Microsoft 365 and Azure.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 60
KMicro MXDR for SMBKMicro Tech, Inc.KMicro MXDR for SMB helps businesses reduce operational complexity and strengthen cybersecurity defenses by managing their Microsoft Defender XDR environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 60
C1st Implementation of Microsoft Defender for Office 365C1st Technologies LLCEnhance email security for businesses by implementing Defender for Office 365 with Exchange Online Protection (EOP). Our goal is to protect organizational email from spam, phishing, and sophisticated
+2
Applicable to:
Cloud Security
Threat Protection
44 out of 60
SecureBlu MDR Service for Microsoft 365 DefenderNew Era TechnologySecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
45 out of 60
Copilot Advanced Services: 1 Day 3 WorkshopsNess IsraelUnlock the full potential of Microsoft Copilot with our tailored AI services, enhancing security, development and productivity across Microsoft 365 applications through flexible, expert-led sessions.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Workplace Analytics
46 out of 60
Rapid Remediation of Microsoft Secure ScoreCyberOneBoost your Microsoft Secure Score, reduce risk and increase cyber resilience with expert-led rapid remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
47 out of 60
Microsoft Information Protection Administrator: 3 Days WorkshopNETCOM LEARNINGMicrosoft Information Protection Administrator course focuses on data governance and information protection within your organization.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
48 out of 60
Intune Health Check (All OS): 2-week AssessmentMobile MentorOur certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
49 out of 60
SmartStart for IntuneMobile MentorThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
50 out of 60
4Sight's Microsoft Data Security Engagement4Sight HoldingsIdentify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
51 out of 60
eDiscovery, Data Lifecycle & Records ManagementITC Secure LtdManage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
52 out of 60
Windows 11 Assessment: 1-WKSteeves Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
53 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
54 out of 60
Microsoft 365 Threat Check Assessment: 3-Wk AssessmentInvokeThe Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Defend Against Threats with SIEM Plus XDR WorkshopThe Partner MastersThe Defend Against Threats with SIEM Plus XDR Workshop will help you achieve broader security objectives—and identify current and real threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
56 out of 60
Adopción de Copilot chat Enterprise - Bing Chat Enterprise: 3-WkENCAMINA S.L.Adopta Copilot Chat Enterptise para multiplicar la productividad de tus empleados protegiendo los datos en tu empresa
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
57 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
58 out of 60
Ransomware Protection: 1 Day-WorkshopConvergeOneLearn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Data Security and Governance: 3 Day WorkshopNetwovenNetwoven Data Security and Governance workshop will get you started on the path to discover, protect, and govern your sensitive corporate data
+2
Applicable to:
Cloud Security
Information Protection & Governance
60 out of 60