FilterAlle löschen
Beratungsdienste Ergebnisse
Es werden  Ergebnisse in beratungsdienste angezeigt.
MDM Migration Plan: 1-week AssessmentMobile MentorMDM Migration is an assessment and planning service that guides your move to Intune.
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
1 out of 60
AVASecure 360 - Microsoft 365 Security & Governance Solutions by AVASOFTAVASOFTAware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
2 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Insider Risk
Insider Risk
3 out of 60
SCCM to Intune Migration Plan: 2-week AssessmentMobile MentorOur migration plan gives you a roadmap, a timeline, and best practices to migrate from SCCM / ConfigMan to Intune.
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
4 out of 60
Secure Data Management with Microsoft PurviewAVASOFTConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
5 out of 60
Sensitive data risk assessmentAVASOFTConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
6 out of 60
atQor Microsoft 365 Security Assessment: 3-Wk AssessmentatQorGet expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
7 out of 60
Email Security Threat AssessmentAVASOFTConfident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
8 out of 60
Microsoft Entra Domain Services WiFi AuthenticationAlfa Connections Pte LtdEnable secure Wi-Fi and legacy app authentication using Microsoft Entra Domain Services with LDAP support—ideal for organizations migrating from on-premises AD to Azure.
+2
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
9 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY25CGI Inc.Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management
10 out of 60
Identity Governance Proof Of Concept with Microsoft Entra ID Governance in 4 WeeksArmis, Sistemas de Informação, LdaLeverage Microsoft Entra ID Governance to ensure seamless and secure access to Microsoft 365 resources
+1
Applicable to: Identity & Access Management
Identity & Access Management
11 out of 60
Endpoint Management and Windows Deployment: 2-days ImplementationCC Bilgi TeknolojileriMicrosoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises.
+2
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management
12 out of 60
Microsoft 365 Security Health Check: 3 day AssessmentISCG SP Z O OMicrosoft 365 is a multi-layer solution with the right security policies you can block over 99.9 percent of account compromise attacks!
+3
Applicable to: Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
13 out of 60
Data Protection and Governance with Microsoft PurviewAVASOFTConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
14 out of 60
Implementation on Microsoft IntuneITX360 (Pvt) Ltd.Enhance security and efficiency with Microsoft Intune Implementation. Manage and secure devices across Windows, Android, iOS, and macOS with a seamless cloud-based solution.
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
15 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFTEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
16 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
17 out of 60
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFTAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
18 out of 60
4migrate: ISP to Microsoft 3654Sight HoldingsSeamless Microsoft 365 migration with expert guidance, minimal disruption, and full support.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Meetings for Microsoft Teams
Meetings for Microsoft Teams
19 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPOThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
20 out of 60
Secure & Manage Devices using the Microsoft Intune Suite with AVASOFTAVASOFTSeamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
+3
Applicable to: Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management Threat Protection
Threat Protection
21 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
22 out of 60
Device Management Migration - On-Premises to Cloud by AVASOFTAVASOFTSeamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
23 out of 60
Active Directory Services: Implementation, Upgrade, and MigrationITX360 (Pvt) Ltd.Boost productivity and security with expert Active Directory services. Integrate seamlessly with Microsoft 365 through our implementation, upgrade, and migration solutions
+1
Applicable to: Identity & Access Management
Identity & Access Management
24 out of 60
Modern Device Management ImplementationDXCImprove the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
25 out of 60
Microsoft 365 Managed ServiceRackspace TechnologyOn-demand access to a team of email and productivity application experts that work with you to drive outcomes and continuously evolve your environment.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Teamwork Deployment
Teamwork Deployment
26 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFTManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
27 out of 60
Introducing Microsoft Entra: 2 Hour WorkshopSlalom ConsultingLearn about how Microsoft Entra will help your business step into tomorrow with modern identity and access solutions by introducing you to modern access security across a broad range of products.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
28 out of 60
Seguridad Corporativa: Evaluación 4 semanasCIBERIT SRL.Con esta Solución usted podrá gestionar la seguridad en toda su empresa
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
29 out of 60
1ID Platform for EDUTelelink Business Services EAD1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Meetings for Microsoft Teams
Meetings for Microsoft Teams
30 out of 60
OENG - Next Generation Endpoints-1 Month Proof of ConceptSecure Nextgen SystemsLearn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
31 out of 60
Modern Workplace - Cloud Endpoint ManagementArxusOur Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
32 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
33 out of 60
OAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen SystemsLearn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
+3
Applicable to: Identity & Access Management
Identity & Access Management Insider Risk
Insider Risk Threat Protection
Threat Protection
34 out of 60
Onesec Digital IdentitySecure Nextgen SystemsHaving a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
+2
Applicable to: Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
35 out of 60
Microsoft 365 Security: 2-Week ImplementationTelelink Business Services EADCreate and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
+2
Applicable to: Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
36 out of 60
Neway Security proposition: 3-WK implementationNeWay Technologies LtdThe Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
37 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies LtdMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
38 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
39 out of 60
Data Protection Impact Assessment: 8 WkLighthouse GlobalEmpowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
40 out of 60
Microsoft 365 Copilot Workshop: 2daysInsightTake the first steps toward helping your organization unleash creativity, unlock productivity, and level up skills with Insight’s Microsoft 365 Copilot Workshop.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
41 out of 60
Sovereign Cloud-Go China上海南洋万邦 软件技术有限公司将原部署在全球版 Microsoft 365 的数据迁移至由世纪互联运营的中国版 Microsoft 365(21Vianet)环境中,以满足监管要求。To comply with regulatory requirements, data originally hosted in the global version of Microsoft 365 is being migrated to t
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
42 out of 60
Avanade Microsoft Security Service Edge Quick StartAvanade, Inc.Microsoft’s new Security Service Edge (SSE) capability empowers organizations on their Zero Trust journey though unique in the market integration with Microsoft Entra.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
43 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.Bulletproof Managed Security Elite is a Microsoft-native MXDR service that transforms Microsoft Sentinel and Defender XDR into a 24×7 cyber defense fabric.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
44 out of 60
NEST ArenaNoibitTwo-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
45 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen SystemsThe Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Insider Risk
Insider Risk
46 out of 60
Data Security EngagementadaQuestThe Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
47 out of 60
Start your GenAI journey with NTT DATA: Boost Copilot for Microsoft 365 adoption with our Adoption AcceleratorNTT DATA Inc.Discover the Power of NTT DATA's Copilot for Microsoft 365 Implementation and Adoption Services, Engineered to Unlock the Full Potential of Generative AI Technology for Your Business
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
48 out of 60
Identity Health CheckMobile MentorMobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
49 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
50 out of 60
Copilot Value DiscoveryadaQuestThe Copilot Value Discovery is a three-phase process that helps customers grasp the benefits of AI reinvention, pinpoint key functional scenarios, create a business case, and develop a strategic plan.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
51 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
52 out of 60
Windows 11 Assessment: 1-WKSteeves Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
53 out of 60
Threat Protection EngagementadaQuestLearn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
54 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
55 out of 60
Avanade Microsoft 365 Copilot Information Management 4 wk Imp. FY24Avanade, Inc.Avanade Microsoft 365 Copilot Information Management Accelerator ensures your data meets high standards of security, privacy and compliance so you can confidently unlock Copilot's full potential.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
56 out of 60
Copilot Readiness Assessment for Microsoft 365Mint Management TechnologiesMint Group is thrilled to bring you a consulting service designed to supercharge your Microsoft 365 experience and get you Microsoft 365 Copilot ready.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Knowledge & Insights
Knowledge & Insights
57 out of 60
Pently Microsoft 365 - AssessmentPently GmbHStructured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
58 out of 60
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
59 out of 60
Avanade Hybrid Windows Endpoint Solutions FY24Avanade, Inc.Avanade has developed the next generation of endpoint solutions for the modern workforce, with integrated physical, virtual and hybrid solutions
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
60 out of 60