FiltersClear all
Consulting services results
Showing results in consulting services.
Securing Identities WorkshopSynergy Technical, LLCThe foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
1 out of 15
Microsoft 365 Migration: 10-Wk ImplementationabraSuccessfully migrate your Microsoft 365 environment to a managed services model.
+2
Applicable to:
Cloud Security
Power Platform for Teams
2 out of 15
Secure Data Management with Microsoft PurviewAVASOFTConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 15
CSE Security Baseline 3 days implementationComputer Solutions East3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 15
iT1's Security AssessmentIt1 Source LLCImprove your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 15
TS As a Services (TSaaS): 5-day ImplementationE-Level Cloud Services S.A. de C.V.Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
6 out of 15
KK_Exchange_Migration Consulting ServicesKraft KennedyMoving to Exchange Online significantly extends the use of Microsoft 365 by modernizing communication infrastructure, enhancing security, and unlocking integrated productivity features.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
7 out of 15
Microsoft 365 Security Assessment up to 6 weeksACTSACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
8 out of 15
MDR WorkshopGrant Thornton LLPMaximize Your Security Posture with Grant Thornton's MDR Program Assessment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 15
Microsoft 365 OnDemand - 2 Week ImplementationProtivitiMicrosoft 365 On Demand Support - providing you with dedicated experts to support and maintain your Microsoft 365 environment
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
10 out of 15
Microsoft 365 License Optimization:1-hr AssessmentFrontier Technology, LLCReview current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
11 out of 15
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
12 out of 15
Microsoft 365 Secure Productivity WorkshopABTechnologiesEnable your team to work securely and productively using Microsoft 365 best practices.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
13 out of 15
Microsoft 365 Backup Readiness AssessmentABTechnologiesEvaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
14 out of 15
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SASConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 15