FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCSeamlessly transfer email data and mailboxes between Office 365 tenants during mergers or separations. Ensure continuity for users, minimize disruptions, and enables a smooth transition.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
1 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLCIf you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
2 out of 60
BCN Intranet LiteBCN Group Ltd.We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
3 out of 60
C1st End-user Device Security Zero TrustC1st Technologies LLCC1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Microsoft Security: 4-Week ImplementationApex Digital SolutionsEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Copilot for Security Readiness AssessmentBulletproof Solutions Inc.Get a Copilot for Security Readiness + a Security Health Check on your Microsoft 365 environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Zero Trust as a Service (ZTaaS)Aegis InnovatorsDigital transformation and adopting AI starts with building a secure foundation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
C1st Office 365 Tenant Migration AssessmentC1st Technologies LLCEnsure a smooth Office 365 tenant-to-tenant migration for businesses. We provide comprehensive consulting services to facilitate seamless transitions during mergers, acquisitions, and other scenarios.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
8 out of 60
CMMC Secure EnclavePlanet TechnologiesA secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
9 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Microsoft 365 Secure Productivity WorkshopABTechnologiesEnable your team to work securely and productively using Microsoft 365 best practices.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
11 out of 60
CMMC Assessment Ready SolutionPlanet TechnologiesBased off the Planet secure collaboration enclave, this provides customers with CMMC Assessment Ready artifacts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
12 out of 60
Zero Trust Security AssessmentConcurrency, Inc.Assess and advance your Zero Trust security posture—and accelerate or expand your Microsoft 365 security strategy with expert-led guidance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Microsoft 365 E5 Zero Trust Security AssessmentSHI International CorpExplore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 60
Data Security Engagement with Microsoft PurviewInviso CorporationOur Data Security engagement will look over your data estate and establish areas of Security Risk. We will show you the benefits to Microsoft Purview to help protect your environment from risks.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
15 out of 60
Content Security and Data Loss Prevention: 3-Day WorkshopFSI StrategiesFSi Strategies will demonstrate how an organization can protect it's most important asset, at the source. Ensuring that documents are protected no matter where they live.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
16 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLCAdvanced endpoint security and threat protection: detect, investigate, and respond to attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementationInterlink Cloud Advisors, Inc.Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Data Security & Threat Protection WorkshopITVTIdentify data security risks in your organizational data & discover vulnerabilities in your environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 60
Copilot for Microsoft 365 Adoption Accelerator Program - 18 WeeksTrace3This program's primary objective is to help accelerate client adoption of Copilot for Microsoft 365 and setup the client for continued maturity with their usage of Copilot for Microsoft 365.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
20 out of 60
Your Smart Workplace AssessmentRackspace TechnologyYour Smart Workplace Assessment helps organizations develop secure, cost-effective, and productivity-enhancing strategies for modern work environments.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
21 out of 60
Cloud Security Journey: 2 Hour Proof of Concept360 Visibility Inc.See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Security Modernization: 3 Day WorkshopNetwovenSafeguard your business with a three-step security modernization solution from Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
23 out of 60
Microsoft Copilot for Security: 2-Day WorkshopPlanet TechnologiesThis 2-day workshop covers the essential aspects you need to effectively and efficiently leverage Microsoft Copilot for Security for your organization's security operations and needs.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
24 out of 60
Cyber Security AssessmentAegis InnovatorsUnderstand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
impelSecure Data Security Engagement: Free 4-week workshopimpeltec Pty LtdIdentify data risks and evaluate user behavior for risky activities
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
26 out of 60
FastTrack for Microsoft 365Olive + GooseOur offer provides expert guidance as a FastTrack Ready Partner to help businesses deploy, secure, and optimize Microsoft 365 solutions seamlessly—ensuring a smooth transition with no extra cost.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
27 out of 60
cyber security threat analysis workshopU-BTech Solutionsthe workshop is design to discover threats and risks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Managed IT Services for DentalOlive + GooseComprehensive managed IT services for dental offices, ensuring security, compliance, and continuity.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
30 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITEDProfessional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Darktrace Managed Network SensorSentinel Technologies Inc.Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
+2
Applicable to:
Cloud Security
Threat Protection
32 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeksPlain ConceptsThe objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
+2
Applicable to:
Cloud Security
Information Protection & Governance
33 out of 60
Microsoft 365/Azure Cloud Secure 5 Day AssessmentDynTek Inc.DynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLCGet a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Microsoft 365 Value Discovery - Workshop - 1 DayDynTek Inc.OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT
OF MICROSOFT 365 IN YOUR ENVIRONMENT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
36 out of 60
Microsoft 365 Tenant-to-Tenant MigrationOlive + GooseThis offering provides assessment, migration, and post-migration support for transitioning Microsoft 365 workloads and endpoint management from a source Microsoft 365 tenant to a target tenant.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
37 out of 60
CT - Microsoft 365 Copilot Readiness AssessmentCloud TargetAssessment in Microsoft 365 environment to enable Microsoft 365 Copilot deploy
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
38 out of 60
Microsoft Endpoint Manager BaselineSHI International CorpExplore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
39 out of 60
Microsoft 365 AssessmentTechNet UC LLCOur assessment provides a thorough analysis of your current Microsoft 365 environment, identifying areas for improvement and offering actionable recommendations to enhance performance and security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
40 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvokeThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
41 out of 60
Microsoft Security Deployment: 5-day WorkshopCampana & Schott GmbHUnderstand your Microsoft security posture and minimize risks with the right experts
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 60
Microsoft Defender for Cloud Apps: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Cloud Apps
+2
Applicable to:
Cloud Security
Threat Protection
43 out of 60
Microsoft Copilot for Security: 2 x 4h Workshopwater IT Security GmbHGet ready for Microsoft’s Copilot for Security and learn how generative AI can strengthen your organization’s IT. We cover everything you need to know – from the implementation to proper prompting.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Cyderes Microsoft 365 Incident ResponseCyderesCyderes Digital Forensics and Incident Response (DFIR) services encompass the full security motion and emphasize your ability to respond.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
45 out of 60
Lightstream Data Security AssessmentLightstreamLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
46 out of 60
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstreamLightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
+1
Applicable to:
Cloud Security
48 out of 60
Microsoft 365 Copilot Readiness Assessment - CRATechPlus TalentThrough this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
49 out of 60
Virtual Desktop - Health and Configuration 1 Week AssessmentCDI LLCCDI provides a review of a customer's Virtual Desktop environment and identify opportunities to improve the performance, stability, security and manageability.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
50 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for EndpointCyderesCyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
51 out of 60
Copilot for Security Readiness AssessmentInvokeInvoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Modern Endpoint Management: 2-Hr AssessmentAscent Global, Inc.There’s a reason Microsoft chose us as their Modern Endpoint Management Partner of the Year for 2023. We believe you can reduce your threat risk by modernizing your Endpoint Management Strategy.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
53 out of 60
Zero Trust Security 10-Hour AssessmentJourneyTEAMJourneyTeam’s Zero Trust Security Assessment is designed to provide a clear, actionable strategy for strengthening your organization’s Microsoft 365 security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
54 out of 60
Microsoft 365 Security WorkshopOlive + GooseImprove your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
55 out of 60
Cloud Protection for AIKiZAN TechnologiesProtect Cloud Environments leveraging Microsoft Secure Scores and other Microsoft Products to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigat
+1
Applicable to:
Cloud Security
56 out of 60
Microsoft 365 Copilot Readiness Assessment & AdoptionHeartland Business Systems, LLCMicrosoft 365 Copilot enhances business intelligence, processes, and data analysis. A Readiness Assessment prepares for AI integration with a customized plan, tailored recommendations & training.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Teamwork Deployment
57 out of 60
Copilot for Security Accelerator: 2-week ImplementationabraNeway’s Microsoft Copilot for Security Accelerator empowers security teams with enhanced protection and streamlined operations through eight key steps.
+2
Applicable to:
Cloud Security
Threat Protection
58 out of 60
Cyderes Managed Security Services for Microsoft SentinelCyderesCyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
59 out of 60
impelSecure Threat Protection Engagement: Free 4-week workshopimpeltec Pty LtdDiscover threats and vulnerabilities to your Microsoft cloud and on-premises environments
+2
Applicable to:
Cloud Security
Threat Protection
60 out of 60