FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Compliance Manager: 8 Week ImplementationRazor Technology, LLCComprehensive orientation, deployment, training, support, administration, updates, documentation and testing services to get started quickly and expand with Compliance Manager and Compliance Score
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
1 out of 60
Secure Productive Workplace: Implement 4-WkNetsuritNetsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
2 out of 60
Microsoft 365 Tenant to Tenant Migration: 6 Week ImplementationAll Covered, a division of Konica MinoltaLet All Covered help you assess, plan and skillfully implement your Microsoft 365 Tenant to Tenant migration.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
3 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week ProgramWindows Management Experts, Inc.Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
4 out of 60
Data Security and Compliance Assessment for Microsoft 365abraGet more out of compliance using your orgnaizations data and behaviors to drive policy. Ensuring you maintain productivity while ensuring your business is safe and secure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 60
Microsoft Value Calculator: One Hour AssessmentPatriot Consulting Technology Group LLCThe Cost Takeout Opportunity shows the potential cost reductions from consolidating third party solutions with Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Remote Access to On-Prem Apps: 3 Wk ImplementationInvokeSurface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
+2
Applicable to:
Cloud Security
Identity & Access Management
7 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Teams Hosted Direct Routing: 2-wk ImplementationCatapult Systems, LLCCatapult Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
9 out of 60
Cybersecurity Assessment Engagement - 4 weeksGrant Thornton LLPEnhance Your Cloud Security Posture with Grant Thornton’s Cybersecurity Assessment
+2
Applicable to:
Cloud Security
Identity & Access Management
10 out of 60
Threat Landscape AssessmentProServeITGet critical cybersecurity insights with a global visualization of login attempts, dark web scan, & expert recommendations. We help secure your Microsoft 365 environment to protect your business.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
11 out of 60
On-Prem Exchange to Office 365 Migration: 4-Wk MigrationExodus Integrity Services, Inc.Simplify your email migration process to Office 365 with ease and efficiency.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
12 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk EngagementCloudScale InternationalThis assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
13 out of 60
Exchange Migration to Microsoft 365: 6-Week ImplementationAll Covered, a division of Konica MinoltaAll Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
14 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk ImplementationNeway TechnologiesStreamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
15 out of 60
Entra ID AssessmentTechNet UC LLCAssess your Entra ID tenant for security, governance, and compliance. Receive expert insights and actionable recommendations to strengthen identity posture and align with Microsoft best practices.
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
16 out of 60
Nasstar's Managed Services for Microsoft 365, Teams, Intune & Entra ID (FY25)NasstarNasstar’s Managed Services optimises & secures Microsoft 365, Teams, Intune and Entra ID, enhancing productivity, collaboration & security. Benefit from cost certainty & strategic consulting with
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
17 out of 60
Implementation of Microsoft Entra ID GovernanceSpyglass MTG, LLCFor any business interested in securing internal and external Identities with Entra ID
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
18 out of 60
Threat Protection Envisioning WorkshopTECH HEADS INCLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Microsoft Threat Protection EngagementRavanty Tech Consulting, Inc.Threat Protection Engagement helps you assess your security landscape, address most pressing security goals and challenges, and provide an immersive experience around Microsoft security capabilities.
+2
Applicable to:
Identity & Access Management
Threat Protection
20 out of 60
Microsoft Security: 3-Day WorkshopApex Digital SolutionsDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Compliance Workshop Data Risk Management: 4 WeeksDiverge ITYou will be guided by our Microsoft 365 experts who are trusted by Pro Sports teams, Hollywood studios, and businesses across America to help protect and govern data to achieve complete compliance.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
22 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional ServiceIT Partner LLCStrengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
23 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP TechnologiesThe SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
UNITE: Exploring E5 Security Workshop_INFINITY TECHNOLOGY SOLUTIONSUNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
25 out of 60
CMMC Data Enclave Dplymt: 4-Wk ImplementationC3 Integrated SolutionsDeploy Microsoft 365 to meet CMMC Requirements
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
26 out of 60
Microsoft 365 Azure AD 3-wk Implementation RoadmapCyclotron Inc.Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
27 out of 60
Microsoft Copilot for Security: 6-Wk EnablementCyclotron Inc.Copilot for Security empowers security teams investigations and operations, harnessing real-time data across digital security estates to improve response time, intelligence, and investigation quality.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
28 out of 60
Office 365: Setup, Demo Train: 3-Hr Implementationtrue org cloudGain a competitive edge and be more productive with a higher growth in your business with the help of True.org Cloud’s Microsoft 365 Business implementation.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
29 out of 60
Microsoft Entra - Global Secure Access | Pilot DeploymentITC Secure LtdMicrosoft Entra Global Secure Access pilot deployment for improved security posture, streamlined access management & regulatory compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
30 out of 60
Modern EndPoint Management - Jumpstart: 1-Wk Proof of ConceptLogicalis, Inc.Intune Jumpstart will help showcase the value of Microsoft Intune, to show you how to more effectively manage endpoints within Intune. Proof of Concept deployment included!
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
31 out of 60
Threat Protection EngagementISA Cybersecurity Inc.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Microsoft 365 License Optimization:1-hr AssessmentFrontier Technology, LLCReview current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
33 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwovenNetwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
34 out of 60
Microsoft 365 Copilot Readiness Assessment & DeploymentCentric Consulting, LLCA facilitated workshop to build a Roadmap to guide your organization in implementing Copilot
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
35 out of 60
Teams Hosted Direct Routing: 2-week ImplementationQuisitiveQuisitive Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
36 out of 60
Advanced Identity and Access Management with KiZANKiZAN TechnologiesSafeguard your organization from devastating breaches with Microsoft 365 identity solutions.
+1
Applicable to:
Identity & Access Management
37 out of 60
Defend Against Threats with SIEM Plus XDRNetrix GlobalAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft Intune QuickstartEmergent SoftwareDeploy Microsoft Intune via Microsoft 365 with Emergent's Quickstart for enhanced device management and security compliance.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
39 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.A high-level forensics evaluation designed to identify current and past threat activity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View SystemsSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Microsoft 365 Copilot: 2-Wk Readiness AssessmentInvokeInvoke's Microsoft 365 Copilot Readiness Assessment is a service that helps customers prepare for using Copilot 365, a solution that leverages data to enhance creativity, productivity, and skills.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
42 out of 60
Secure Identities and Access: 4-Week Engagement & WorkshopCompuNet4-week engagement and workshop that helps customers design and plan out their optimal identity model to ensure they have a roadmap to enhanced security using Microsoft 365 and Azure Active Directory
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
43 out of 60
Managed Services ProviderSkyTerra Technologies LLCSkyTerra delivers seamless integration with your existing Microsoft ecosystem, from Azure infrastructure to Microsoft 365 productivity suites.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
44 out of 60
Modern SecOps Envisioning WorkshopSentinel Technologies Inc.As IT becomes more strategic, the importance of security grows daily. Security information and event management (SIEM) solutions built for yesterday’s environments struggle to keep pace.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
45 out of 60
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLCRavenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
46 out of 60
Microsoft Cybersecurity AssessmentAkins ITDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Cutover Exchange Online Migration from a Third-Party Hosted Exchange Server: 7-Days Professional ServiceIT Partner LLCA flexible and quick way to migrate all emails, contacts, tasks, and other data from a third-party hosted and managed Exchange Server to Microsoft 365 Exchange Online.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
48 out of 60
Modernize Identities with Entra ID PremiumDaymark SolutionsStrengthen User Security with Advanced Identity Management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Microsoft Sentinel Workshop and PilotCDWThe Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Financial Services 1 Day Compliance AssessmentXantrionA compliant modern workplace environment for financial service firms managed by experts.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
51 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCShadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
52 out of 60
ITI Copilot Assessment: 4-5 Wk AssessmentITI Inc.Are you fully ready for Microsoft's Copilot? Our assessment will assure you are ready for Copilot and highlight areas where action will be needed prior to doing so.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
53 out of 60
1-Day Security & Identity WorkshopConvergeOneTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
eDiscovery Workshop: 4 hours WorkshopPlanet TechnologiesA half-day Workshop that provides an overview and deep understanding of Microsoft 365 eDiscovery Standard and Premium products.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
55 out of 60
Modern Endpoint Management Airlift: 2 Week POCSynergy Technical, LLCOur Modern EndPoint Management Airfift will provide a deep dive into Microsoft's endpoint security solutions, as well as a proof of concept tailored to your specific concerns.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
56 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServusGain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
58 out of 60
Identity WorkshopSentinel Technologies Inc.Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Office 365 to Office 365 Migration: 4-Wk ImplementationExodus Integrity Services, Inc.Simplify the complexities of merging, consolidating, or transitioning your Office 365 environments with our specialized Office 365 Migration Service.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
60 out of 60