FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Todos los resultados
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITEDOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
+3
Applicable to:
Identity & Access ManagementInsider RiskThreat Protection
1 out of 60
Microsoft 365 Copilot Discover and Envision SessionInsightDiscover the Power of AI with Copilot
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
2 out of 60
Endpoint Management and Windows Deployment: 2-days ImplementationCC Bilgi TeknolojileriMicrosoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises.
+2
Applicable to:
Device Deployment & ManagementIdentity & Access Management
3 out of 60
Copilot Assessment ProgramGeneration-e Productivity Solutions Pty LtdPreparation for Copilot - Identify your readiness for Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
4 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPOThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
5 out of 60
Unified Endpoint Management: 8-Wk AssessmentZetta Pty LtdZetta’s Assessment and Optimisation engagement will assess the way you currently manage your corporate devices and advise you on how to modernise your endpoint management.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
6 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies LtdMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
7 out of 60
Cloud Safeguard - 12 Month ImplementationRapid CircleOur Cloud Safeguard managed security service enables customers to focus on core business and innovation while we keep your Microsoft 365 platforms safe & secure.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
8 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbHStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
Data#3 Windows 365 Launchpad: 3-Week Pilot ImplementationData#3 LimitedThe Windows 365 Launchpad provides you with a Pilot deployment of Windows 365 into your production environment
+2
Applicable to:
Device Deployment & ManagementIdentity & Access Management
10 out of 60
Identity and Access Management: 4-Wk AssessmentZetta Pty LtdZetta’s Assessment and Optimisation engagement will assess your current identity posture and advise you how to manage and secure your users and access to all your apps.
+2
Applicable to:
Cloud SecurityIdentity & Access Management
11 out of 60
Mitigate Compliance and Privacy Risks - 3 Day WorkshopProtivitiMicrosoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
12 out of 60
Windows Intune: 1-Wk Accelerated ImplementionITC Secure LtdAccelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
13 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POCITC Secure LtdExperience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
14 out of 60
ASD Essential 8 Assessment and Roadmap: 10-day AssessmentQUORUM SYSTEMS PTY LTDQuorum’s Essential 8 Assessment & Roadmap guides you to prioritise valuable remediations within a strategic roadmap, enabling quick wins, & developing strategies to tackle more complex use-cases.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
15 out of 60
Cyber Blueprint: DiscoveryWaterstons LimitedCyber Maturity Assessment with Risk and Gap Analysis
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
16 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLCEstablish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
17 out of 60
Avanade Microsoft 365 Copilot Information Management 4 wk Imp. FY24Avanade, Inc.Avanade Microsoft 365 Copilot Information Management Accelerator ensures your data meets high standards of security, privacy and compliance so you can confidently unlock Copilot's full potential.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
18 out of 60
Microsoft 365 Copilot Readiness AssessmentInsentra Pty LtdThrough consultative advisory workshops, the assessment provides a roadmap to help you identify key persona's and use cases where Copilot will have the biggest impact
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
19 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInsider Risk
20 out of 60
Essential Eight Maturity AssessmentChamonix IT ConsultingThe culmination of this assessment is the establishment of a robust security foundation to equip you with a solid base upon which you can build and enhance your cybersecurity posture.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
21 out of 60
Copilot Adoption ProgramGeneration-e Productivity Solutions Pty LtdAdoption for Copilot - Deployment for Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
22 out of 60
Microsoft 365 Copilot Readiness AssessmentTelstra LimitedThis offer uses workshops, tooling, and interviews to perform a technical readiness assessment for Microsoft 365 Copilot and provides a clear technical action plan for Copilot technical enablement.
+3
Applicable to:
Adoption & Change ManagementCompliance Advisory ServicesIdentity & Access Management
23 out of 60
Copilot for Security: Assessment 10-DaysQUORUM SYSTEMS PTY LTDMicrosoft Copilot for Security Readiness Assessment (including PoC) – the first generative AI product to help security and IT teams protect at the speed and scale of AI.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
24 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFTEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
25 out of 60
Entra ID Identity and Application Governance Solutions by AVASOFTAVASOFTOur solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
26 out of 60
Zero Trust Identity and Access Management: 8-16 Weeks Consulting + ImplementationAttosolIn today’s dynamic digital landscape, traditional security models fall short. Embrace Zero Trust with Microsoft and transform your security strategy to protect against evolving threats.
+2
Applicable to:
Compliance Advisory ServicesIdentity & Access Management
27 out of 60
Automate Identity Lifecycle Management: 8-16 Weeks Consulting + ImplementationAttosolIntegrate HRMS with Microsoft Entra ID for an automated, efficient and secure Identity Lifecycle Management.
+1
Applicable to:
Identity & Access Management
28 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, IncTrustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+1
Applicable to:
Identity & Access Management
29 out of 60
Satalyst (Part of CBS) Microsoft 365 Secure Score AssessmentSatalyst Pty LtdEnhance your understanding of your current security posture and exposure. Discover actionable measures to protect against new and emerging threats with our Microsoft 365 Secure Score Assessment.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
30 out of 60
Intune for Windows: 12-week ImplementationMobile MentorIntune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
31 out of 60
MDM Health Check (Mobile OS Only): 2-week AssessmentMobile MentorOur certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
32 out of 60
BYOD 365: 6-week ImplementationMobile MentorThe BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
33 out of 60
Advania: Intune Get Started: 2 d training and PoCAdvania ABUnderstand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
34 out of 60
G Suite to M365 Migration: 1-Day Proof of concepttrue org cloudProof of concept for migration from G Suite to Microsoft 365
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementMeetings for Microsoft Teams
35 out of 60
Microsoft 365 - Threat Protection: 2-week workshopForteventoWorkshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
36 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk AssessmentatQorGet expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
37 out of 60
Microsoft Intune: 4-Wk Implementation ServicesTechNet UC LLCMicrosoft Intune Design and Deployment Services
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
38 out of 60
Microsoft 365: 2-Week AssessmentPractical Solutions, IncEstablish a clear roadmap and change management plan for your journey to a modern workplace.
Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
+3
Applicable to:
Adoption & Change ManagementCompliance Advisory ServicesIdentity & Access Management
39 out of 60
Modern Workplace Security 10-Wk ImplementationWipro LtdWipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
40 out of 60
Limitless Security 4 week ImplementationJasco Consulting Pty LtdLimitless Security targets securing identities, protecting Office 365, managing Devices and security information that enables continuous security improvement.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
41 out of 60
MDM Migration Plan: 1-week AssessmentMobile MentorMDM Migration is an assessment and planning service that guides your move to Intune.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementInformation Protection & Governance
42 out of 60
Azure AD Implentation in 8 weeksArmis, Sistemas de Informação, LdaPorovide a design and build capability that enables organisations to secure, control and simplify employee access to company data and sensitive resources resources from wherever they are.
+1
Applicable to:
Identity & Access Management
43 out of 60
Modern Management: 4 week ImplementationMobile MentorModern Management is a Microsoft 365 focused managed service that reduces cost, improves security and delights employees!
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementInformation Protection & Governance
44 out of 60
Cloud Security Assessment: 2 Week AssessmentByte Information Technology Pty LtdIdentify real threats to your cloud environment and develop plans and next steps for your security journey.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
45 out of 60
Change Management: 4-week ImplementationMobile MentorChange Management is a proven methodology to deploy technology changes to large groups of diverse Microsoft 365 users.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
46 out of 60
Security Controls Review - 2wk AssessmentThe Missing Link Network Integration Pty LtdWe can help you achieve a more mature, secure IT environment with our comprehensive Security Controls Review powered by Microsoft Security and Compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
47 out of 60
IdentityCARE 3-Wk ImplementationSecureCom LtdSecuring organizations Exchange Online and Multifactor Identity services.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
48 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
49 out of 60
Data#3 Surface Bundles - 1-week ImplementationData#3 LimitedCombining a Surface device, accessories and Microsoft 365 licensing into one predictable monthly cost, Surface Bundles relieve you team from the burden of ownership, maintenance and device upkeep.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementIdentity & Access Management
50 out of 60
Modern Device Management ImplementationDXCImprove the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
51 out of 60
Secure Remote Work: 4-Hours WorkshopProfessional Advantage Pty LtdEnable your people to work from anywhere, securely with Microsoft 365.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
52 out of 60
Seguridad Corporativa: Evaluación 4 semanasCIBERIT SRL.Con esta Solución usted podrá gestionar la seguridad en toda su empresa
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
53 out of 60
Security Assessment - 5-Day AssessmentQUORUM SYSTEMS PTY LTDThe outcome of this assessment is a documented security assessment work plan with steps, tools and procedures used to conduct the assessment.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
54 out of 60
Managed Modern Workplace Half Day WorkshopExperteqHalf day FREE Adoption and Implementation Workshop designed to maximise your benefits. Covers from Authentication, Teams Integration, One Drive, SharePoint, Security, Training and Adoptions metrics.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernancePower Platform for Teams
55 out of 60
Conditional Access & MFA 5d Proof of ConceptGeneration-e Productivity Solutions Pty LtdConditional Access and Multi Factor Authentication deployed without negatively impacting users. We setup the environment then deploy 5 devices plus train you how to do the rest.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
56 out of 60
Autopilot & End Point Manager - 1wk implementationGeneration-e Productivity Solutions Pty LtdWindows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
57 out of 60
Microsoft Viva: 1 week - AssessmentGeneration-e Productivity Solutions Pty LtdGain data-driven visibility into how work patterns affect wellbeing, productivity, and business performance.
+3
Applicable to:
Identity & Access ManagementTeamwork DeploymentWorkplace Analytics
58 out of 60
Secure Remote Work: 3 Days Intro and Plan WorkshopLiveRoute FZ-LLCEngagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
59 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
60 out of 60