Consulting services results
Showing results in consulting services.
cyber security threat analysis workshopU-BTech Solutions
the workshop is design to discover threats and risks
1 out of 60
Exchange Migration to Microsoft 365: 6-Week ImplementationAll Covered, a division of Konica Minolta
All Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
2 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.
With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
3 out of 60
Enable Windows 365 Cloud PCCofomo
With the right endpoint modernization strategy and tools, employees get a secure experience on every mobile device, tablet, or laptop they’re using, all while eliminating major management headaches.
4 out of 60
HPT Nextgen Windows Experience_02 days workshopHPT Vietnam Corporation
NextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
5 out of 60
HPT_Microsoft Secure Score Assessment - 4 weekHPT Vietnam Corporation
Secure Score helps customers quickly figure out what actions they can take to improve your score. They can check their action queue and find the change they can make that most improves their security
6 out of 60
HPT_Microsoft Cyber Security Assessment_2 weekHPT Vietnam Corporation
Strengthen your firm's defenses with our all-in-one cybersecurity platform
7 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshopHPT Vietnam Corporation
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
8 out of 60
HPT Secure Identities and Access_03 days workshopHPT Vietnam Corporation
With identity attacks on the rise, this workshop will show you how to stop tomorrow’s data breaches by securing identities today.
9 out of 60
NTT Americas - Microsoft Device ManagementNTT Limited
Deployment of Microsoft Unified Endpoint Management Services. Assessment of your resources and business objectives to develop a fresh approach to your security strategy.
10 out of 60
1ID Platform for EDUTelelink Business Services EAD
1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
11 out of 60
Microsoft 365 GCC High Mig from Google (25 Users)Daymark Solutions
White-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Google G Suite
12 out of 60
Microsoft 365 GCC High Mig from Exchange: 6 Week ImplementationDaymark Solutions
White-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Microsoft Exchange On-Premises
13 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
14 out of 60
Avanade Entra Verified ID Consulting Services FY23Avanade, Inc.
Microsoft Entra Verified ID is a Decentralized Identity implementation that streamlines any identity related process, simplifies it, reduce costs and increases convenience.
15 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.
This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
16 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLC
Breach and Attack Simulations — We Attack to Defend You
17 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayon
Evaluate and strengthen the current security posture of your environments in Microsoft365 and Microsoft Azure
18 out of 60
Microsoft 365 Tenant to Tenant Migration: 6 Week ImplementationAll Covered, a division of Konica Minolta
Let All Covered help you assess, plan and skillfully implement your Microsoft 365 Tenant to Tenant migration.
19 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era Technology
M&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
20 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POCITC Secure Ltd
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
21 out of 60
Protect and Govern Healthcare Data Workshop - 3 Day WorkshopProtiviti
Microsoft-Funded Workshop to discuss and understand the hidden privacy and regulatory risks of healthcare data and how to mitigate with actionable next steps
22 out of 60
Data Protection Program & Strategy Design - 12 Wk ImplementationProtiviti
End-to-End Data Protection to Identify, Classify, Protect and Optimize Your Data in Microsoft 365
23 out of 60
Invoke Data Risk AssessmentInvoke
This assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
24 out of 60
Protiviti's Security Platform Rationalization Tool - 6 Week AssessmentProtiviti
Understand your current security solutions compared to those included in Microsoft’s E5 enterprise licensing to identify potential security gaps, tool redundancy, and cost reduction.
25 out of 60
Microsoft Purview Records Management Assessment & Strategy - 9 wk AssessmentProtiviti
Protiviti assists organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
26 out of 60
Teams Hosted Direct Routing: 2-week ImplementationQuisitive
Quisitive Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
27 out of 60
AgileAscend: Identity for Mergers and Acquisitions: 8-Wk AssessmentAgile IT
Agile IT helps organizations with multiple identity services and one or more existing Microsoft 365/Azure Active Directory tenants in use. This is often found in organizations during M&A
28 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A. Ş.
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
29 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security Ltd
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
30 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile IT
Agile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
31 out of 60
Quadra Entra Permissions ManagementQuadrasystems.net (India) P Ltd
Understand how permissions creep can impact the attack surface risk in your cloud infrastructure Understand how to manage user and identity risk
32 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
33 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş.
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
34 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed Canary
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
35 out of 60
Secure Identities and Access Management AssessmentInvoke
To provide enterprise customers with a detailed identity assessment report, a high-level migration plan, and demonstrations of Microsoft Entra Azure AD and Microsoft Entra Identity Governance features
36 out of 60
Modern EndPoint Management - Jumpstart: 1-Wk Proof of ConceptLogicalis, Inc.
Intune Jumpstart will help showcase the value of Microsoft Intune, to show you how to more effectively manage endpoints within Intune. Proof of Concept deployment included!
37 out of 60
Red Canary Cloud Security AssessmentRed Canary
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
38 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
39 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPO
This workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
40 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLC
If you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
41 out of 60
Red Canary MSSP FastTrack for SecurityRed Canary
Leverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
42 out of 60
IBM Digital Workforce OfferingIBM Consulting - EA
IBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
43 out of 60
Identity and Access Management Quick StartSoftchoice
Prioritizing security services to combat identity breaches by prioritizing security services, and protecting against mismanaged privileges, and access-related data breaches.
44 out of 60
Endpoint Management with Security WorkshopMigrate LLC
Let us show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
45 out of 60
Intune Foundation JumpstartSentinel Technologies Inc.
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM).
46 out of 60
Windows 365 Deployment : 12 month ImplementationPatriot Consulting Technology Group LLC
Patriot will design, configure, test and deploy Microsoft Windows 365 for your environment.
47 out of 60
MFA JumpstartSentinel Technologies Inc.
Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan.
48 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.
Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
49 out of 60
Office 365: Setup, Demo Train: 3-Hr ImplementationTrue.org Cloud
Gain a competitive edge and be more productive with a higher growth in your business with the help of True.org Cloud’s Microsoft 365 Business implementation.
50 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLC
The Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
51 out of 60
Intune for Windows: 6-week ImplementationMobile Mentor
Intune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
52 out of 60
MDM Health Check (Mobile OS Only): 2-week AssessmentMobile Mentor
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
53 out of 60
BYOD 365: 6-week ImplementationMobile Mentor
The BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
54 out of 60
Microsoft Security: 3-Day WorkshopApex Digital Solutions
Develop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
55 out of 60
Advania: Intune Get Started: 2 d training and PoCAdvania AB
Understand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
56 out of 60
Microsoft 365 Identity & Security: 2 wk assessmentPSM Partners
Customized identity and security assessment focused on the Microsoft 365 platform
57 out of 60
G Suite to M365 Migration: 1-Day Proof of conceptTrue.org Cloud
Proof of concept for migration from G Suite to Microsoft 365
58 out of 60
Microsoft Security: 4-Week ImplementationApex Digital Solutions
Establish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
59 out of 60
Microsoft 365 E5 CMMC L1 3 Week ImplementationKAMIND IT, Inc
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 1 using Microsoft 365 security Suite and Azure Sentinel SIEM.
60 out of 60