ΦίλτραΑπαλοιφή όλων
Συμβο υλευτικές υπηρεσίες αποτελέσματα
Εμφάνιση αποτελεσμάτων στο συμβουλευτικές υπηρεσίες.
Όλα τα αποτελέσματα
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwovenNetwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
1 out of 60
On-Prem Exchange to Office 365 Migration: 4-Wk MigrationExodus Integrity Services, Inc.Simplify your email migration process to Office 365 with ease and efficiency.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
2 out of 60
Microsoft Defender for Cloud Apps JumpstartSentinel Technologies Inc.Microsoft Defender for Cloud Apps address security gaps in an organization's environment.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
3 out of 60
Security and compliance assessment with Microsoft PurviewAVA SOFTWARE INCFortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
4 out of 60
Microsoft Copilot for Security: 6-Wk EnablementCyclotron Inc.Copilot for Security empowers security teams investigations and operations, harnessing real-time data across digital security estates to improve response time, intelligence, and investigation quality.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
5 out of 60
Sensitive Data Protection with Microsoft PurviewAVA SOFTWARE INCSensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
6 out of 60
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
7 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und AusarbeitungAppSphere AGVom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
8 out of 60
Application Monitoring Solution with Microsoft SentinelAVA SOFTWARE INCEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
9 out of 60
Managed Information Protection & GovernanceInfolockInfolock addresses the challenges of understaffed organizations by providing skilled and specialized professionals to optimize and administer their data protection program
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
10 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
11 out of 60
Microsoft Cloud Application for 3rd Party AppsAVA SOFTWARE INCSecure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
12 out of 60
Manage Corporate Data on Devices with IntuneAVA SOFTWARE INCCan you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
13 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
14 out of 60
Synergy Advisor Architecture Design Sessions (ADS) for Microsoft Copilot for SecuritySynergy Advisors LLCA Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceThreat Protection
15 out of 60
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLCWe understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
16 out of 60
Avanade Modern Sec OpsAvanade, Inc.To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
17 out of 60
Copilot Data ProtectionCloud LifeCopilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
18 out of 60
Microsoft 365 Email Threat Protection AssessmentAVA SOFTWARE INCMicrosoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
19 out of 60
Microsoft Purview Records Management Assessment & Strategy for Government - 9 Week AssessmentProtivitiProtiviti assists government departments and agencies with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
20 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-WeeksmyCloudDoorAssess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
21 out of 60
Epiq Data SecurityEpiq GlobalComprehensive safeguarding of sensitive data, enabling organizations to proactively identify and mitigate risks while protecting data and maintaining compliance with regulations.
+2
Applicable to:
Information Protection & GovernanceInsider Risk
22 out of 60
Copilot for Microsoft 365 Ideation: 3-Hour AI Advisory WorkshopRSM Product Sales LLCExperience the power of the Microsoft AI framework and identify value added AI solutions for your organization.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceKnowledge & Insights
23 out of 60
Implementación Microsoft Purview con Suri ServicesSuri Services SCCon Suri Services y Microsoft Purview, estarás un paso adelante en la revolución de datos, desbloqueando el potencial de tu información.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
24 out of 60
Spyglass Microsoft Intune: 4-Week ImplementationSpyglass MTG, LLCThe Spyglass Intune Implementation offer focuses on providing a fully functional and deployed instance of Intune that leverages all its capabilities.
+3
Applicable to:
Device Deployment & ManagementInformation Protection & GovernanceMobile Device Management
25 out of 60
Manage and Investigate Risk: 3W - WorkshopExelegentThis workshop will help to identify risky users and find a strategy for protecting data in an automated and privacy-oriented way.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
26 out of 60
Protiviti's Security Platform Rationalization Tool - 6 Week AssessmentProtivitiUnderstand your current security solutions compared to those included in Microsoft’s E5 enterprise licensing to identify potential security gaps, tool redundancy, and cost reduction.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
27 out of 60
Zero Trust Workplace Implementation ServicesSoftchoiceSolution for organizations wanting to improve their overall security posture by implementing key security features for protecting user identity, devices, and data.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementInformation Protection & Governance
28 out of 60
Cybersecurity Assessment: 3-Wk WorkshopExelegentThe Cybersecurity Assessment is designed to evaluate your cybersecurity posture and reduce risks exposure by using advanced Microsoft 365 Security products
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
29 out of 60
Microsoft 365 Security Health Check: 3 day AssessmentISCG SP Z O OMicrosoft 365 is a multi-layer solution with the right security policies you can block over 99.9 percent of account compromise attacks!
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
30 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReplyValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
31 out of 60
Microsoft Defender for Endpoint Professional Services: 1-Wk ImplementationOptiv Security Inc.Provide comprehensive, powerful protection at your organization's endpoints from Optiv utilizing the Microsoft Defender for Endpoint solution.
+3
Applicable to:
Information Protection & GovernanceKnowledge & InsightsThreat Protection
32 out of 60
Intranet in a Box Basic Package: 2-Hours ImplementationJourneyTEAMGet your intranet and your organization to its optimal efficiency using SharePoint online within Microsoft 365
+3
Applicable to:
Information Protection & GovernanceKnowledge & InsightsTeamwork Deployment
33 out of 60
Modern Workplace Advisory Services: BriefingCapgemini GroupModern Workplace Advisory Services – Unlocking value through workplace transformation
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceTeamwork Deployment
34 out of 60
Modern IntranetPlanet TechnologiesModern intranet engagement is designed to deploy a new modern intranet on SharePoint Online and published utilizing Viva Connections.
+2
Applicable to:
Adoption & Change ManagementInformation Protection & Governance
35 out of 60
Intranet in a Box Gold Package: 2-Hours ImplementationJourneyTEAMGet your intranet and your organization to its optimal efficiency using SharePoint online within Microsoft 365
+3
Applicable to:
Information Protection & GovernanceKnowledge & InsightsTeamwork Deployment
36 out of 60
Cerium AI Workshop: Microsoft Copilot Engagement SeriesCerium Networks, Inc.Kickstart your journey to AI with Cerium Networks! Join our 2-Day Copilot for Microsoft 365 workshop to get Copilot-Ready and discover the value, capabilities, and requirements to adopt Copilot.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceKnowledge & Insights
37 out of 60
Secure Multi-Cloud Environments: 3-day WorkshopECF Data LLCThe Secure Multi-Cloud Environments Workshop helps customers gain insights on active threats and vulnerabilities related to their hybrid and multi-cloud workloads within Microsoft 365.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
38 out of 60
Exchange Online Migration: 6-Week DeploymentCyclotron Inc.Exchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
+2
Applicable to:
Cloud SecurityInformation Protection & Governance
39 out of 60
BCN Intranet LiteBCN Group Ltd.We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
40 out of 60
Microsoft 365 Consulting Services: 12-Months ImplementationForsyte IT SolutionsOptimize your Microsoft 365 productivity, user experience, and security with the expertise of Forsyte I.T. Solutions consulting services when you need it most.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementInformation Protection & Governance
41 out of 60
Copilot for Microsoft 365 Full AdoptionRSM Product Sales LLCA three-phased approach to assess needs, define a Copilot for Microsoft 365 deployment strategy, and launch Copilot for Microsoft 365 with a focus on governance, responsible AI, and engagement.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceKnowledge & Insights
42 out of 60
Microsoft 365 E5 Zero Trust Security AssessmentSHI International CorpExplore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
43 out of 60
Data Security with Microsoft Purview-4h AssessmentReplyThe Microsoft Purview Assessment offers advanced data security, integrating discovery, classification, and governance with Microsoft’s suite to enhance compliance and protection.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
44 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
45 out of 60
Healthcare Ind., Modern Workplace: 2-Days WorkshopCloudicaThis workshop will cover how Microsoft 365 technologies can be used to meet Healthcare company objectives such as increased efficiency and productivity, increased employee collaboration, and others.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceWorkplace Analytics
46 out of 60
Protect and Govern Sensitive Data: 4-Week Engagement & WorkshopCompuNetFour week engagement that helps customers identify privacy and regulatory risks in Dark Data and understanding how to mitigate them with Microsoft 365.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
47 out of 60
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro LtdWipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
48 out of 60
Energy Ind., Modern Workplace: 2-Days WorkshopCloudicaThis workshop will cover how Microsoft 365 technologies can be used to meet Energy company objectives such as increased efficiency and productivity, increased employee collaboration, and others.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceWorkplace Analytics
49 out of 60
Protect and Manage data in personal devices using IntuneAVA SOFTWARE INCLeverage Microsoft Intune for tailored security measures, advanced threat detection, and real-time monitoring to safeguard sensitive data, mitigate risks, and ensure compliance.
+3
Applicable to:
Information Protection & GovernanceMobile Device ManagementThreat Protection
50 out of 60
Microsoft Sentinel - Log Management and threat detectionAVA SOFTWARE INCIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
51 out of 60
Infosys Intelligent Security SolutionInfosys LimitedInfosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
52 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process AdoptionVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
53 out of 60
Integrating Microsoft Sentinel with External EDR ServiceAVA SOFTWARE INCEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
54 out of 60
Finance Ind., Modern Workplace: 1-day AssessmentCloudicaThe Modern Workplace Assessment dedicate for Finance Industry assists customers in simplifying cloud adoption and mitigating risk.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceWorkplace Analytics
55 out of 60
Manufacturing Ind., Modern Workplace: 2-Days WorkshopCloudicaThis workshop will cover how Microsoft 365 technologies can be used to meet Manufacturing company objectives such as increased efficiency and productivity, increased employee collaboration, and others
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceWorkplace Analytics
56 out of 60
Infra & Network Monitoring with Microsoft SentinelAVA SOFTWARE INCBoost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
57 out of 60
Microsoft 365 Copilot End-User Enablement: 3 Days BriefingCENTRALITY LTDOur Microsoft 365 Copilot Enablement offer is designed to empower your organization with the knowledge and skills to leverage the full potential of Microsoft 365 Copilot.
+2
Applicable to:
Adoption & Change ManagementInformation Protection & Governance
58 out of 60
Energy Ind., Modern Workplace: 1-Day AssessmentCloudicaThe Modern Workplace Assessment dedicate for Energy Industry assists customers in simplifying cloud adoption and mitigating risk.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceWorkplace Analytics
59 out of 60
IN - Crayon's SharePoint Assessment ServiceCrayonCrayon's SharePoint Assessment enhances architecture, performance, security, usability, and migration readiness, delivering expert insights for optimization.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceKnowledge & Insights