FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando  resultados en servicios de consultoría
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLCRavenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
1 out of 32
CMMC Compliance with Microsoft 365: 4 wk impl.InsightInsight’s CMMC services program helps clients understand DoD requirements, develop a strategy to achieve compliance in hybrid and cloud models, and execute to implementation and ongoing operations.
+1
Applicable to: Cloud Security
Cloud Security
2 out of 32
Big Green IT Security Assessment: 3-WeekBig Green IT - DevSecure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
3 out of 32
Managed Security for Compliance: 1 yr Mgd ServiceInsightDiscover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
+2
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services
4 out of 32
Microsoft 365 License Optimization:1-hr AssessmentFrontier Technology, LLCReview current state of Microsoft Cloud Services plans and subscriptions.  Optimize to a "Cloud first" business model that is potentially more cost effective.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
5 out of 32
Office 365 Security: 1-Day AssessmentNetrix GlobalSecurity assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
+1
Applicable to: Cloud Security
Cloud Security
6 out of 32
Secure Workspace: 1 Day WorkshopWatserv Inc.A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Teamwork Deployment
Teamwork Deployment
7 out of 32
Microsoft 365 Security: 1-Day BriefingNetrix GlobalA tailored planning engagement targeted at ensuring your Microsoft cloud solutions are aligned with your needs.
+1
Applicable to: Cloud Security
Cloud Security
8 out of 32
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender
for enterprises, resulting in improved detection rates, threat coverage, and
organizational security posture.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
9 out of 32
Mail Airlift: Exchange Online ImplementationSynergy Technical, LLCOur Mail Airlift engagement will get you up and running with Microsoft Exchange online in the fastest, most secure manner.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
10 out of 32
Document Airlift-OneDrive ImplementationSynergy Technical, LLCOur Document Airlift will enable and configure your organization’s environment to use OneDrive for Business services in your Office 365 tenant.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
11 out of 32
Windows 365 Quick Start: 4-Day Proof of ConceptSynergy Technical, LLCThe Windows 365 Quick Start engagement is designed to give you everything you need to deploy Windows 365.  Included are a solution overview, planning services, as well as a proof of concept engagement
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Frontline Workers
Frontline Workers
12 out of 32
Microsoft 365 Defender Threat Check: 4-wk assessInterlink Cloud Advisors, Inc.Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
13 out of 32
Office 365 Protection: Design & Pilot 1-Wk POCManaged SolutionProtect Your Employees from External Email Threats with Defender for Office 365 Protection
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
14 out of 32
24x7 Microsoft 365 Security MDR: 4-Wk AssessmentApex Digital SolutionsAchieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Threat Protection
Threat Protection
15 out of 32
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Insider Risk
Insider Risk
16 out of 32
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer SolutionsSirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
17 out of 32
ECF Data Threat Protection: 3-Day WorkshopECF Data LLCThe Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
18 out of 32
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to: Cloud Security
Cloud Security Insider Risk
Insider Risk Threat Protection
Threat Protection
19 out of 32
Security Assessment: 2 Week AssessmentTallanTallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
20 out of 32
Threat Protection and Cloud Security: 3 Day WorkshopNetwovenImprove your security posture with a Microsoft Threat Protection Assessment Workshop
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
21 out of 32
Windows 365 QuickStart : 4 Day PoC + Surface GoSynergy Technical, LLCThe Windows 365 Quick Start engagement is designed to show you how Windows 365 + SurfaceGo keeps you productive.  Included are a Surface Go, planning services, as well as a proof of concept.engagement
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Frontline Workers
Frontline Workers
22 out of 32
CMMC Compliance: 4 week WorkshopSirius Computer SolutionsThe U.S. Department of Defense (DoD) is implementing the Cybersecurity Maturity Model Certification (CMMC) to verify the cybersecurity of its supply chain, our Workshop will help you ensure compliance
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Information Protection & Governance
Information Protection & Governance
23 out of 32
Digital Workplace Foundations: 4-wk AssessmentCatapult Systems, LLCCatapult’s Digital Workplace Foundations helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tools.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Teamwork Deployment
Teamwork Deployment
24 out of 32
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
25 out of 32
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week ImplementationQuisitiveQuisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
26 out of 32
SMB Cloud Evaluation Program: 2-Wk AssessmentMaureen Data SystemsIdentifying ways to modernize & optimize IT assets, mitigate security risks, and reduce cost & complexity.  See how the cloud can help, estimated costs, and what to do next. 
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management
27 out of 32
Microsoft Information Protection Administrator: 3 Days WorkshopNETCOM LEARNINGMicrosoft Information Protection Administrator course focuses on data governance and information protection within your organization.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
28 out of 32
Modern IT: 2 Hour AssessmentModern ITIdentify areas for business process optimization through Modern IT
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management
29 out of 32
Zero Trust Launchpad: 3-Wk AssessmentAscent Global, Inc.Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
30 out of 32
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLCOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
31 out of 32
Microsoft 365 Migration for Mergers and Divestitures: 8 Wk ImplementationeGroup Enabling TechnologieseGroup Enabling Technologies, LLC. will move your companies Microsoft 365 email, files, and other workloads to another Microsoft 365 environment.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Mobile Device Management
Mobile Device Management
32 out of 32