ФилтриИзчистване на всички
Консултантски услуги резултата
Показват се резултати след консултантски услуги.
Всички резултати
Microsoft 365 Copilot Technical Readiness Workshop: 4 Week WorkshopVitalystThe Microsoft 365 Copilot Technical Readiness Workshop will help you understand best practices for discovering, classifying and securing your data in preparation for Microsoft 365 Copilot.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Knowledge & Insights
1 out of 60
Endpoint Management Service: 3-hours WorkshopPEAKUPEnterprise Mobility Workshop showcase value of secure remote work capabilties including device management, security and compliance standards.
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Mobile Device Management
2 out of 60
Managed Services Microsoft 365: 52-WK ImplementationGlobal Computing and TelecomsGlobal Computing and Telecoms is a Microsoft Partner which will assist your organization to optimize your productivity, security, and compliance in the cloud using best practices and expertise.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 60
Baseline Microsoft 365 complete security HardneningAVA SOFTWARE INCAware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 60
Step forward with Sii support and Copilot for Microsoft 365 featuresSii Sp. z o.o.A comprehensive solution for your business needs with trusted Microsoft Partner. Together, let's revolutionize your daily processes with the power of Copilot and expert IT support and best practises.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Information Protection & Governance
5 out of 60
Email Security Threat AssessmentAVA SOFTWARE INCConfident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 60
HPT Mitigate Compliance and Privacy Risk_1-Day WorkshopHPT Vietnam CorporationUnderstand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
7 out of 60
IN - Crayon's SharePoint Assessment ServiceCrayonCrayon's SharePoint Assessment enhances architecture, performance, security, usability, and migration readiness, delivering expert insights for optimization.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Knowledge & Insights
Sensitive Data Protection with Microsoft PurviewAVA SOFTWARE INCSensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
9 out of 60
Microsoft 365 Email Threat Protection AssessmentAVA SOFTWARE INCMicrosoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
10 out of 60
Microsoft 365 Security and Compliance AssessmentAVA SOFTWARE INCMicrosoft 365 Security and Compliance Assessment evaluates your current security posture, identifies vulnerabilities, and offers tailored solutions to enhance your data security and compliance.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
11 out of 60
Integrating Microsoft Sentinel with Carbon Black EDRAVA SOFTWARE INCImprove endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
12 out of 60
Quorum Cyber Data Security Assessment using Microsoft PurviewQuorum CyberAchieve a clear understanding of the storage, access and protection of one of your organisation’s most valuable assets.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
13 out of 60
Microsoft Data Compliance Consulting Services - 2 Weeks AssessmentArmis, Sistemas de Informação, LdaThe Microsoft 365 Compliance assessment helps organizations implement a compliance strategy that accelerates and streamlines data security and governance while reducing risk.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
14 out of 60
Microsoft Cloud application security Assessment - 2 weeksAVA SOFTWARE INCUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
15 out of 60
Healthcare Ind., Modern Workplace: 2-Days WorkshopCloudicaThis workshop will cover how Microsoft 365 technologies can be used to meet Healthcare company objectives such as increased efficiency and productivity, increased employee collaboration, and others.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
16 out of 60
Finance Ind., Modern Workplace: 2-Days WorkshopCloudicaThis workshop will cover how Microsoft 365 technologies can be used to meet Finance company objectives such as increased efficiency and productivity, increased employee collaboration, and others.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
17 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und AusarbeitungAppSphere AGVom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
18 out of 60
Energy Ind., Modern Workplace: 2-Days WorkshopCloudicaThis workshop will cover how Microsoft 365 technologies can be used to meet Energy company objectives such as increased efficiency and productivity, increased employee collaboration, and others.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
19 out of 60
Enhanced Data Privacy with Microsoft PurviewAVA SOFTWARE INCConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
20 out of 60
Microsoft Sentinel - Log Management and threat detectionAVA SOFTWARE INCBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 60
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
22 out of 60
Microsoft Purview Info Protection & Gov: 12 Weeks ImplementationWipro LtdDiscover your sensitive data in a hybrid environment to identify potential risks and implement adequate controls to safe guard your data leveraging Microsoft Purview Unified data governance.
+1
Applicable to:
Information Protection & Governance
23 out of 60
Microsoft 365 Defender for Endpoint Vulnerability AssessmentAVA SOFTWARE INCEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
24 out of 60
Manage Corporate Data on Devices with IntuneAVA SOFTWARE INCCan you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
25 out of 60
Sensitive data risk assessmentAVA SOFTWARE INCConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
26 out of 60
Microsoft Cloud Apps Security Solutions for Custom AppsAVA SOFTWARE INCKnow your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
27 out of 60
Copilot and Modern Data: 6-8 Wk Proof of ConceptCENTRALITY LTDThis offering address the technical readiness requirements of Copilot. It can cover a range of activities from Migrations, Data Storage Design, Backup etc. through to Data Security and Purview.
+2
Applicable to:
Adoption & Change Management
Information Protection & Governance
28 out of 60
Microsoft 365 Copilot: 2 day - WorkshopFirst Technology (Pty) LtdFirst Technology's Microsoft 365 Copilot Workshop will validate your organization’s readiness for Copilot and plan deployment.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Information Protection & Governance
29 out of 60
Security and compliance assessment with Microsoft PurviewAVA SOFTWARE INCFortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
30 out of 60
Manufacturing Ind., Modern Workplace: 1-day AssessmentCloudicaThe Modern Workplace Assessment dedicate for Energy Industry assists customers in simplifying cloud adoption and mitigating risk.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
31 out of 60
Energy Ind., Modern Workplace: 1-Day AssessmentCloudicaThe Modern Workplace Assessment dedicate for Energy Industry assists customers in simplifying cloud adoption and mitigating risk.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
32 out of 60
Finance Ind., Modern Workplace: 1-day AssessmentCloudicaThe Modern Workplace Assessment dedicate for Finance Industry assists customers in simplifying cloud adoption and mitigating risk.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
33 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process AdoptionVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
34 out of 60
Healthcare Ind., Modern Workplace: 1-day AssessmentCloudicaThe Modern Workplace Assessment dedicate for Healthcare Industry assists customers in simplifying cloud adoption and mitigating risk.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
35 out of 60
Quorum Cyber - Data Loss Prevention Managed Service using Microsoft PurviewQuorum CyberQuorum Cyber's Data Loss Prevention Managed Service leveraging the power of Microsoft Purview
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
36 out of 60
Application Monitoring Solution with Microsoft SentinelAVA SOFTWARE INCEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 60
Information Governance 4 week AssessmentPwCEmpowering companies and their users through the power of Microsoft 365
+1
Applicable to:
Information Protection & Governance
38 out of 60
Protect and Manage data in personal devices using IntuneAVA SOFTWARE INCLeverage Microsoft Intune for tailored security measures, advanced threat detection, and real-time monitoring to safeguard sensitive data, mitigate risks, and ensure compliance.
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
39 out of 60
Microsoft Cloud Apps Security for Microsoft 365 AppsAVA SOFTWARE INCEnhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
40 out of 60
Seguridad Corporativa: Evaluación 4 semanasConsultora CognosIT LimitadaCon esta Solución usted podrá gestionar la seguridad en toda su empresa
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
41 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareOneImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
42 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVA SOFTWARE INCConfident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
43 out of 60
Threat Detection with Microsoft cloud app securityAVA SOFTWARE INCIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
44 out of 60
Infosys Workplace Transformation Service OfferingInfosys LimitedTo realize faster return on investment with O365, Infosys workplace transformation offering helps enterprise to build cohesive solutions, with a well defined maturity framework for O365 adoption
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Information Protection & Governance
45 out of 60
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro LtdWipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
46 out of 60
Infosys EMS solution : 1 Month ImplementationInfosys LimitedEMS + Security solution helps organizations to build a secure Modern Workplace by protecting the corporate data and simplifying workforce mobility.
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Mobile Device Management
47 out of 60
SMART Workplace: 8-Day Information Architecture DesignSpanish Point TechnologiesDesign your organisations Information Architecture to improve communication and collaboration between employees, creating a sustainable workforce with high levels of talent retention.
+3
Applicable to:
Information Protection & Governance
Knowledge & Insights
Teamwork Deployment
48 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
49 out of 60
Information Protection with Microsoft Cloud App SecurityAVA SOFTWARE INCBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
50 out of 60
Information Protection with Microsoft PurviewAVA SOFTWARE INCOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
51 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVA SOFTWARE INCEnhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
52 out of 60
Teams & SharePoint Security ImplementationAVA SOFTWARE INCConfident in your Teams and SharePoint security? Our solutions offer tailored protocols, threat detection, and monitoring to secure data, mitigate risks, and ensure compliance.
+3
Applicable to:
Information Protection & Governance
Teams Custom Solutions
Workplace Analytics
Infosys Intelligent Security SolutionInfosys LimitedInfosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
54 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
55 out of 60
EM+S Consulting Services: 4-Weeks ImplementationArmis, Sistemas de Informação, LdaWe will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
56 out of 60
True Managed Security Service- 3 day Workshoptrue org cloudYou have a vision. We can help you secure it...
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
57 out of 60
Modern Workplace: 2-Hours BriefingCloudicaFree service designed to help you and your team learn about the latest trends, tools, and strategies for creating a modern workplace.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
58 out of 60
Microsoft 365 - Threat Protection: 2-week workshopForteventoWorkshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
59 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLCGet introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
60 out of 60