FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Todos los resultados
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvokeProvide cross-domain threat protection and simplify breach prevention
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
1 out of 60
Data Security EngagementadaQuestThe Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
2 out of 60
Microsoft Copilot for Microsoft 365 Tenant Readiness: 3-Month Assess & ConfigureFinchloomCopilot Readiness is a comprehensive two-part process that involves assessment and implementation & training to prepare your organization to harness the power of AI with Copilot in Microsoft 365.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
3 out of 60
Microsoft 365 Copilot Workshop: 2daysInsightTake the first steps toward helping your organization unleash creativity, unlock productivity, and level up skills with Insight’s Microsoft 365 Copilot Workshop.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
4 out of 60
Microsoft 365 Security AssessmentCDWCDW’s Microsoft 365 Security Assessments allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
5 out of 60
Microsoft Cybersecurity AssessmentThe Partner MastersDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
6 out of 60
Threat Protection EngagementadaQuestLearn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
7 out of 60
Microsoft 365 Security: 3 Week Exec WorkshopValorem LLCA strategic deep dive for security decision-makers to better understand, prioritize, and mitigate real-time threats in your environment.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
8 out of 60
Microsoft Purview Roadmap Deployment - 6 Week AssessmentProtivitiThis engagement will provide clients with an understanding of Microsoft Purview capabilities and establish a strategic roadmap for deploying and using Purview to enhance their Data Protection Program.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
9 out of 60
Microsoft Funded Workshop for Copilot for Microsoft 365 Adoption Acceleration: 2-Wk ImplementationProServeITIf your company is eligible, we can deliver a Microsoft funded adoption accelerator engagement for Copilot for Microsoft 365 to you free of charge ($10,000 USD value).
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
10 out of 60
Guardian 365 Managed Security Services (Microsoft MXDR Verified)Forsyte IT SolutionsGuardian 365 is the always-on security managed service offering end-to-end protection, monitoring, detection, and remediation of attacks on your infrastructure, data, users, and endpoints 24x7.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
11 out of 60
Start your GenAI journey with NTT DATA: Boost Copilot for Microsoft 365 adoption with our Adoption AcceleratorNTT DATA Inc.Discover the Power of NTT DATA's Copilot for Microsoft 365 Implementation and Adoption Services, Engineered to Unlock the Full Potential of Generative AI Technology for Your Business
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementMobile Device Management
12 out of 60
Copilot Value DiscoveryadaQuestThe Copilot Value Discovery is a three-phase process that helps customers grasp the benefits of AI reinvention, pinpoint key functional scenarios, create a business case, and develop a strategic plan.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
13 out of 60
Intune Managed ServiceMobile MentorYour endpoint ecosystem is constantly evolving and needs proactive management, so we designed the Intune Managed Service to help customers unlock the full potential of Intune.
+2
Applicable to:
Cloud SecurityIdentity & Access Management
14 out of 60
Microsoft 365 Copilot Foundations ProgramHSO From envisioning and assessment to deployment, embrace the power of Microsoft 365 Copilot - your Copilot for work!
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementTeamwork Deployment
15 out of 60
Microsoft 365 Copilot Implementation ServiceSoftchoiceHelping customers to be prepared to properly deploy and adopt Microsoft 365 Copilot.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceTeamwork Deployment
16 out of 60
Threat Protection Engagement: 3-Day AssessmentPSM PartnersDo more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
17 out of 60
CGI - Managed Services for Microsoft 365 FY25CGI Inc.Leave the end-to-end Microsoft 365 support services to CGI so that your IT support team can focus on value-added tasks.
+2
Applicable to:
Adoption & Change ManagementIdentity & Access Management
18 out of 60
Copilot for Microsoft 365: 4 weeks Proof of ConceptReliance Infosystems Inc.We are thrilled to present our Copilot Seed Investment Offer, crafted to help organizations validate and achieve their AI objectives using Microsoft 365.
+3
Applicable to:
Adoption & Change ManagementCompliance Advisory ServicesIdentity & Access Management
19 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
20 out of 60
Microsoft Yammer Tenant-to-Tenant Migration: 1-Wk Professional ServiceIT Partner LLCFacilitate a smooth transition of your Yammer network and its associated data from one Microsoft 365 tenant to another.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
21 out of 60
Co-pilot Technical ReadinessPHOENIX SOFTWARE LTDHelp your organisation ensure that they are technically ready for Co-pilot
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementKnowledge & Insights
22 out of 60
Microsoft Purview: 5-Day Fundamentals WorkshopeGroup Enabling TechnologiesQuickly reduce risk and enable compliance controls with an eGroup Enabling Technologies, LLC Microsoft Purview Fundamentals Workshop.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
23 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
24 out of 60
Accenture Modern Workplace ServicesAccentureAccenture Modern Workplace Services
+3
Applicable to:
Frontline WorkersIdentity & Access ManagementMeetings for Microsoft Teams
25 out of 60
Microsoft 365 Security Hardening; 4-Wk ServiceProArch Technologies, Inc.The Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
26 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile ITAgile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
27 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONSUNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
28 out of 60
Mergers and Acquisitions PlaybookIvision, Inc.ivision leverages an approach and methodology designed to help clients successfully plan and design for a M/A&D migrations to achieve successful mergers, consolidation or a separation outcome.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementIdentity & Access Management
29 out of 60
Introducing Microsoft Purview: 2 Hour WorkshopSlalom ConsultingLearn about how Microsoft Purview brings together comprehensive solutions from their compliance & data governance portfolios and Slalom's approach that provides security in harmony with your business.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
30 out of 60
Cloud Security Operations CenterReplyVerified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
31 out of 60
Microsoft Entra – IAM Review and AssessmentCollective InsightsStreamline your Microsoft 365 identity management and enhance your security with insights from our Microsoft Entra IAM Review and Assessment
+1
Applicable to:
Identity & Access Management
32 out of 60
Okta Migration to Azure AD: 3-Week AssessmentInvokeThe Okta Migration to Azure AD Assessment offering is designed to assess & plan your migration efforts to your existing investments in Azure AD.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
33 out of 60
Microsoft Endpoint Manager: 8-Hours WorkshopOnex GroupLearn how to secure Windows 11 environments with Microsoft Endpoint Manager
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
34 out of 60
IBM Digital Workforce OfferingIBM Consulting - EAIBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementPower Platform for Teams
35 out of 60
Microsoft Funded Workshop for Copilot for Microsoft 365: 2-Wk AssessmentProServeITIf your company is eligible, we can deliver a Microsoft funded readiness assessment for Copilot for Microsoft 365 to you free of charge ($5,000 USD value).
+2
Applicable to:
Compliance Advisory ServicesIdentity & Access Management
36 out of 60
Endpoint Management Solutions: 4-Wk ImplementationSignal Alliance Technology HoldingDiscover how Signal Alliance Consulting enables users in your organization to be productive, on any device, without compromising IT security by leveraging Microsoft Endpoint Management.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
37 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP TechnologiesThe SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
38 out of 60
Avanade Entra Verified ID Consulting ServicesAvanade, Inc.Microsoft Entra Verified ID is a Decentralized Identity implementation that streamlines any identity related process, simplifies it, reduce costs and increases convenience.
+1
Applicable to:
Identity & Access Management
39 out of 60
Microsoft 365 Mergers and Acquisitions (M&A): 4-Week ImplementationSpyglass MTG, LLCSpyglass’s Microsoft 365 Mergers and Acquisitions (M&A) Implementation is a 4-week/ $50k engagement that focuses on quickly being able to move data to its desired destination.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementTeamwork Deployment
40 out of 60
Windows 365 Jumpstart: 3 Week ImplementationSteeves We'll discuss the value of Windows 365 and its key functionalities, followed by a workshop to expose key areas and document decisions that drive implementation to ensure a successful adoption.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementIdentity & Access Management
41 out of 60
Windows 365 Assessment - 1 dayCC Bilgi TeknolojileriHybrid Windows for a hybrid world
Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
42 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLCLeverage your Microsoft investment to create a strong Zero Trust security environment.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
43 out of 60
SharePoint Premium Readiness Assessment & Roadmap - 5 Week AssessmentProtivitiEvaluate and ensure your readiness for implementing SharePoint Premium, considering technical, business case, data lifecycle, and administration perspectives.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementKnowledge & Insights
Microsoft 365 consultancyOnex GroupGet Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementTeamwork Deployment
45 out of 60
Microsoft Intune: 4-Wk Implementation ServicesTechNet UC LLCMicrosoft Intune Design and Deployment Services
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
46 out of 60
Teams & SharePoint Security HardeningAVASOFTTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to:
Identity & Access ManagementTeams Custom SolutionsThreat Protection
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
48 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
49 out of 60
Copilot for Microsoft 365 Data and Security Readiness: 4-Week AssessmentSpyglass MTG, LLCOur Copilot for Microsoft 365 Data and Security Readiness Assessment is a scoped engagement that is designed to accelerate the ability to integrate and consume Copilot across your enterprise.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
50 out of 60
Capgemini Modern Workspace PortfolioCapgemini GroupCapgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementIdentity & Access Management
51 out of 60
Office 365 GCC High Migration +Tenant Imp 4WkSummit 7 Systems, IncCompanies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
52 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY25CGI Inc.Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
53 out of 60
Email Security Threat AssessmentAVASOFTConfident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
54 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
55 out of 60
Threat Protection: 3-Wk WorkshopExelegentThe Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
56 out of 60
Defend Against Threats with SIEM Plus XDR: 2-W WorkshopExelegentThe Defend Against Threats with SIEM Plus XDR (with Attack Simulation) workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
57 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk ImplementationNeway TechnologiesStreamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
58 out of 60
Microsoft 365 Copilot: 2-Wk Readiness AssessmentInvokeInvoke's Microsoft 365 Copilot Readiness Assessment is a service that helps customers prepare for using Copilot 365, a solution that leverages data to enhance creativity, productivity, and skills.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
59 out of 60
Microsoft 365 Security Review: 3-Wk AssessmentProArch Technologies, Inc.Identifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
60 out of 60