FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Active Directory Health CheckRavenswood Technology GroupAssess the configuration, security, and operational procedures of an Active Directory environment.
+1
Applicable to:
Identity & Access Management
1 out of 31
Google Drive To OneDrive Migration JumpstartSentinel Technologies Inc.Sentinel Technologies offers a structured and secure migration service for transitioning from Google Drive to Microsoft OneDrive. Our process minimizes disruptions while maintaining productivity.
+1
Applicable to:
Identity & Access Management
2 out of 31
Adoption and Consumption Services- 4 Weeks Implementation Drive ConsumptionNewWave Computing Private LimitedAssist Customers to achieve continuous business value through the use of your Microsoft Modern Workplace Cloud Solutions
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
3 out of 31
Microsoft 365 Identity & Security: 2-Wk AssessmentPSM PartnersCustomized identity and security assessment focused on the Microsoft 365 platform
+2
Applicable to:
Cloud Security
Identity & Access Management
4 out of 31
Zero Trust: Microsoft Security BriefingRavanty Tech Consulting, Inc.Learn and Embrace Modern Work Zero Trust Pillars across Identity, Devices, Apps, and Data
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 31
With Windows 365 Access data from anywhereSentinel Technologies Inc.With Windows 365, you can access a desktop computer from anywhere. It is available in Business and Enterprise SKUs and integrates easily with your current Microsoft 365 licensing.
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
6 out of 31
ITI Copilot Assessment: 4-5 Wk AssessmentITI Inc.Are you fully ready for Microsoft's Copilot? Our assessment will assure you are ready for Copilot and highlight areas where action will be needed prior to doing so.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
7 out of 31
Tenant to tenant In-Place Archive Migration: 7-Days Consulting ServiceIT Partner LLCService designed to transfer mailbox data from one Office 365 tenant's In-Place Archive to another, preserving metadata and folder structure.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Workplace Analytics
8 out of 31
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
9 out of 31
Automate Identity Lifecycle Management: 8-16 Weeks Consulting + ImplementationAttosolIntegrate HRMS with Microsoft Entra ID for an automated, efficient and secure Identity Lifecycle Management.
+1
Applicable to:
Identity & Access Management
10 out of 31
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski SecurityKudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
11 out of 31
Implementation of Microsoft Defender for Office 365CDWThe Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 31
Apply Information Rights Management protection to email: 5-Day Professional ServiceIT Partner LLCEnsure that only authorized individuals can access and use the information. This can be especially useful for sensitive or confidential information that needs to be protected from unauthorized access
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
13 out of 31
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCThe primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
14 out of 31
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLCThis service moves key server tasks to a new one for upgrades or system changes.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
15 out of 31
Healthcare & Education Cybersecurity AssessmentPSM PartnersThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
16 out of 31
Security Assessment: 2-Wk AssessmentAscent Global, Inc.Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 31
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SASConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 31
Multi-Factor Authentication - Initial Setup: 3-Professional serviceIT Partner LLCThe goal of the service is to make Microsoft 365 accounts safer by adding an extra layer of security, so only authorized users can access them.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
19 out of 31
Endpoint Management with Security WorkshopMigrate LLCLet us show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
20 out of 31
Healthcare Innovations Strategic Alignment WorkshopSentinel Technologies Inc.At the start of 2020, the charge of the Healthcare Technology Executive focused on key areas for improvement & alignment with their business along with providing a secure environment that allowed for
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Knowledge & Insights
21 out of 31
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.According to multiple studies, breaches and ransomware have more than doubled in the past year.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 31
Cloud Identity Foundation Workshop (5-day)DexMachGet knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
+2
Applicable to:
Identity & Access Management
Threat Protection
23 out of 31
Gmail to Exchange JumpstartSentinel Technologies Inc.Sentinel Technologies offers a comprehensive Exchange Online Setup & Migration Jumpstart to streamline your organization's transition from Google Workspace to Microsoft 365.
+1
Applicable to:
Identity & Access Management
24 out of 31
Security Assessment: 2 Week AssessmentTallanTallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 31
Microsoft 365 E3 12-Months ImplementationOffice DepotConnected Workplace for All Users with Microsoft 365 E3 Bundle
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
26 out of 31
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
27 out of 31
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLCThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 31
FortisX on Microsoft Defender: ProofofConcepSentinel Technologies Inc.Today's security landscape is complex, dynamic, and constantly evolving.
+1
Applicable to:
Identity & Access Management
29 out of 31
Deployment of Windows 365 Enterprise (Cloud PC): ImplementationDataVoxDataVox offer services to deploy Windows 365 for Enterprise (Cloud PC) in Azure and deploy applications
+3
Applicable to:
Device Deployment & Management
Frontline Workers
Identity & Access Management
30 out of 31
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLCSkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 31