ФилтриИзчистване на всички
Консултантски услуги резултата
Показват се резултати след консултантски услуги.
Всички резултати
Endpoint Management WorkshopAvalerisThis Cloud Accelerator Workshop will demonstrate how Microsoft Endpoint Manager can help your organization protect endpoint devices, secure user identities, and increase user productivity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
1 out of 60
Compliance Workshop: Data Risk ManagementAvalerisA structured approach to discover risks related to organizational data and mapping these risks to solutions that will help manage and protect data and mitigate the associated risks
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
2 out of 60
Secure Work from Anywhere WorkshopAvalerisTeamwork & collaboration are needed to build resilience for your people, teams, & organization. Empower people to be productive & secure as they adapt to new ways of working with Microsoft365
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
3 out of 60
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLCRavenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
4 out of 60
EM+S Consulting Services: 4-Weeks ImplementationArmis, Sistemas de Informação, LdaWe will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
5 out of 60
Microsoft 365 Security Assessment up to 6 weeksACTSACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
6 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
QC Education- Threat Protection - 2 Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #14 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
9 out of 60
QC Education- Identity Management- 2Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #4 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
10 out of 60
Quebec Education - DLP - 2 Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #5 and #6 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
11 out of 60
Mobile Device Management - 2 Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #1, #2 and #3 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
12 out of 60
QC Education Security Directives -1 Day BriefingAvalerisThis one day GAP Analysis will help you assess your current state of compliance for Quebec Ministry of Education Security Directives and provide high-level recommendations to address any shortcomings.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
13 out of 60
Microsoft Security Workshop: 3-dayOxford Computer Group LLCThis 3-day workshop shows you how to put Microsoft’s security capabilities to work. Learn how secure your organization is now and how to mitigate and protect against threats in the future.
+2
Applicable to:
Cloud Security
Threat Protection
14 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days ImplementationHCL Technologies Limited.HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 60
Office 365 Security: 1-Day AssessmentNetrix GlobalSecurity assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
+1
Applicable to:
Cloud Security
16 out of 60
Defend Against Threats with SIEM Plus XDRNetrix GlobalAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Endpoint Management WorkshopYork Telecom Corp3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
18 out of 60
Hybrid Return to Work Enablement: 4 Wk-AssessmentInsight Canada IncThis offer helps enable your hybrid return to work strategy and ensure your organization is ready for this transition.
+3
Applicable to:
Cloud Security
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
19 out of 60
Secure Workspace: 1 Day WorkshopWatserv Inc.A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
20 out of 60
Microsoft 365 Security: 1-Day BriefingNetrix GlobalA tailored planning engagement targeted at ensuring your Microsoft cloud solutions are aligned with your needs.
+1
Applicable to:
Cloud Security
21 out of 60
Virtual CISO (vCISO) Managed ServicesNetrix GlobalOur virtual CISO offering provides organizations a senior level security executive for ongoing security program management and governance.
+1
Applicable to:
Cloud Security
22 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 60
Enterprise Mobility - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Enterprise Mobility policies, procedures and technology against best practices.
+2
Applicable to:
Cloud Security
Mobile Device Management
24 out of 60
Threat Protection - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Threat Protection policies, procedures and technology against best practices.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 60
Enterprise Identity and Governance -1 Day BriefingAvalerisAvaleris developed a Capability Maturity Model to help organizations quickly assess the current state of Identity Management and Governance policies, procedures and technology against best practice.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
26 out of 60
Information Protection - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Information Protection policies, procedures and technology against best practices.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLCIntroducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM Systems• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeITCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Secure Live Workspace - 8 Weeks AssessmentLTIMindtree LimitedOur Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
+3
Applicable to:
Cloud Security
Power Platform for Teams
Teams Custom Solutions
31 out of 60
Sauvegarde Microsoft 365 : 2Wk - implementationProjetlysEnsemble de service permettant de mettre en place facilement une solution de backup Veeam pour Microsoft 365 ?
+2
Applicable to:
Cloud Security
Information Protection & Governance
32 out of 60
Microsoft Advisory Services ManagedSoftwareOneDrive Value and Cost Savings Throughout the Microsoft Cloud Investment Lifecycle
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
33 out of 60
Adoptez Microsoft Edge : 2-Wk ImplementationProjetlysNotre approche pour la mise en place et l'adoption de Microsoft Edge.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
34 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
35 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
36 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
37 out of 60
Microsoft 365 Security Assessment - 4wk AssessmentProtivitiEffective Analysis of CIS & NIST Benchmarking, Active Directory to Azure and Microsoft 365 Configurations
+1
Applicable to:
Cloud Security
38 out of 60
Security Maturity Assessment: 4 WksLixar ITLet BDO help you design your roadmap to increase your security score with cost-effective security tools with our 4 week Security Maturity Assessment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
39 out of 60
BDO eDiscovery: 4 Wk AssessmentLixar ITCentralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
40 out of 60
Insider Risk Management Assessment: 4 WksLixar ITBDO's Insider Risk Management Assessment can help you identify insider data risks and establish a plan to reduce data leakage using Microsoft 365 to ensure compliance and security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
41 out of 60
Defender for Office 365: 3-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
42 out of 60
Microsoft 365 Digital Workforce WorkshopVNEXT GroupLearn how to empower people to be more productive and secure as they adapt to new ways of working with Microsoft 365.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Teams Custom Solutions
43 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Office 365 Teamwork Security - Managed ServiceCognizantTeamwork Security provides a comprehensive security management service for Office 365 platforms
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
45 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareOneImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
46 out of 60
AvePoint Policies & Insights: 10-Days AssesmentsIT-Dev sp. z o.o.Assesment's outcomes:
• Enable centralized reporting on Microsoft 365 security.
• Discover potential risks and exposed content.
• Enforce policies and automatically remediate security breaches!
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
47 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
48 out of 60
User Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
49 out of 60
Endpoint Management: 5-Days WorkshopVNEXT GroupLearn how to manage users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
50 out of 60
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
51 out of 60
Discover Sensitive Data Workshop: 4-Wk WorkshopProArch Technologies, Inc.ProArch’s Discover Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
52 out of 60
Microsoft 365 Migration 12 Hour Proof-of-ConceptNew Charter Technologies, Inc.Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
53 out of 60
Microsoft 365 Implementation for Financial ServiceNew Charter Technologies, Inc.Paid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
54 out of 60
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
55 out of 60
Microsoft 365 HIPAA/HITECH 20 Hour ImplementationNew Charter Technologies, Inc.Implementation of Microsoft 365 to include compliance policies and templates for health care.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
56 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
57 out of 60
Modern Frontline Work Acceleration 2 days WorkshopLiveRoute FZ-LLCLiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
58 out of 60
Microsoft 365 Licence Health Check: 1-Day AssessmentITC Secure LtdA 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60