FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Managed Endpoint AssessmentFSI StrategiesThis four-week engagement will determine the level of effort required for a migration to a fully modern desktop using Microsoft 365 services.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
1 out of 60
Copilot for Microsoft 365: La Evaluación De Preparación De Datos Y SeguridadAwara ITAwara IT puede apoyar tu negocio con Copilot for Microsoft 365, aprovechando un equipo de más de 200 profesionales dedicados con más de 16 años de experiencia en la optimización de entornos de Microso
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
2 out of 60
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFTIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
3 out of 60
Microsoft 365 Governance: 4 weeks trackNoest4-week Microsoft 365 Governance Workshop: Optimize Microsoft 365 with expert-led sessions on security, compliance, and collaboration.
+2
Applicable to:
Adoption & Change Management
Information Protection & Governance
4 out of 60
Data Security and Compliance Assessment for Microsoft 365Neway TechnologiesGet more out of compliance using your orgnaizations data and behaviors to drive policy. Ensuring you maintain productivity while ensuring your business is safe and secure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 60
Microsoft Cloud App Security (MCAS) Solutions for Native Apps by AVASOFTAVASOFTEnhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 60
Data Security and Governance: 2 Hour Free BriefingNetwovenNetwoven Data Security and Governance free strategy workshop will help you get started on the path to discover, protect, and govern your sensitive corporate data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
7 out of 60
Microsoft 365 Assessments Deployment: 2-Week Imp.iCorps Technologies, InciCorps Microsoft 365 Readiness Assessment allows our experts to analyze your current services and platforms and map them to the Microsoft 365 stack of services.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Knowledge & Insights
8 out of 60
Microsoft Endpoint Management: 5-Day Proof of ConcepteGroup Enabling Technologies, LLCeGroup Enabling Technologies, LLC. Microsoft Endpoint Management Proof of Concept will allow you to modernize your endpoint management as part of an overall device management strategy.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
9 out of 60
Microsoft Security Assessment: 3-Wk AssessmenteGroup Enabling Technologies, LLCAnalyze your cross platform security posture, with evaluated vulnerabilities and risks identified with a Microsoft Security Assessment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
10 out of 60
Discover Sensitive Data: 3-Wk AssessmentKiZAN TechnologiesIdentify and assess the security posture, location, and movement patterns of sensitive data in your organization to better understand required solutions.
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
11 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFTEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
12 out of 60
Defender for Endpoint Managed Servicee2e-assure LtdMicrosoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 60
User Home Folder Migration to One Drive for Business: 7-Days Professional ServiceIT Partner LLCWe will migrate files and documents stored in a user drive or folder on a file server(s) to user’s folder on OneDrive for Business.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
14 out of 60
Discover Sensitive Data Workshop: 4-Wk WorkshopProArch Technologies, Inc.ProArch’s Discover Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
15 out of 60
Copilot for Microsoft 365 QuickstartIvision, Inc.ivision’s Copilot for Microsoft 365 QuickStart evaluates and captures technical requirements for readiness and baseline security strategies for leveraging AI responsibly.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Knowledge & Insights
16 out of 60
Copilot for Microsoft 365 Extensibility: 3 Day WorkshopQuadrasystems.net (India) P LtdQuadra's workshop is designed to help organizations enhance and customize their use of Copilot for Microsoft 365 by leveraging the extensibility features of Copilot.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Knowledge & Insights
17 out of 60
Infosys EMS solution : 1 Month ImplementationInfosys LimitedEMS + Security solution helps organizations to build a secure Modern Workplace by protecting the corporate data and simplifying workforce mobility.
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Mobile Device Management
18 out of 60
Exchange Security AssessmentJourneyTEAMTake proactive steps to fortify your email security today with this Exchange Security Assessment.
+1
Applicable to:
Information Protection & Governance
19 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-WeeksmyCloudDoorAssess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
20 out of 60
Copilot and Modern Data: 6-8 Wk Proof of ConceptCENTRALITY LTDThis offering address the technical readiness requirements of Copilot. It can cover a range of activities from Migrations, Data Storage Design, Backup etc. through to Data Security and Purview.
+2
Applicable to:
Adoption & Change Management
Information Protection & Governance
21 out of 60
Microsoft Defender for Endpoint Professional Services: 1-Wk ImplementationOptiv Security Inc.Provide comprehensive, powerful protection at your organization's endpoints from Optiv utilizing the Microsoft Defender for Endpoint solution.
+3
Applicable to:
Information Protection & Governance
Knowledge & Insights
Threat Protection
22 out of 60
Windows 365: 5-week Proof of ConceptInterlink Cloud Advisors, Inc.Enhance productivity through flexibility by enabling your team to create secure Cloud PCs and allowing BYOD without increasing risk to your environment
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
23 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day WorkshopeGroup Enabling Technologies, LLCWith Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
24 out of 60
DSGVO & Modern Workplace: 1-Tag WorkshopLM IT Services AGDieser Workshop befasst sich mit der Anwendung der DSGVO (GDPR) am modernen Arbeitsplatz.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Knowledge & Insights
25 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeksPlain ConceptsThe objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
+2
Applicable to:
Cloud Security
Information Protection & Governance
26 out of 60
Intelligent Intranet and Files: 2-Wk AssessmentFSI StrategiesAssess current environment to develop a roadmap for an organization's digital transformation to a platform, to securely view and collaborate on content, while effectively connecting and communicating.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Knowledge & Insights
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix GlobalA 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
28 out of 60
Health Check for Industrial Process Machinery: 18 Hours AssessmentJourneyTEAMUnderstand the gaps in your Microsoft 365 Tenant Health Check for Industrial Process Machinery so that you can prioritize and make plans to increase your security posture.
+1
Applicable to:
Information Protection & Governance
29 out of 60
Health Check for Pharmaceuticals and Supplements: 18 Hours AssessmentJourneyTEAMUnderstand the gaps in your Microsoft 365 Tenant Health Check for Pharmaceuticals and Supplements so that you can prioritize and make plans to increase your security posture.
+1
Applicable to:
Information Protection & Governance
30 out of 60
Protect and Govern your Data in Microsoft 365 1 day workshopCloudWay ASWith data growing exponentially over time, it’s more important than ever for organisations to implement the right tools and processes to ensure data protection and governance
+2
Applicable to:
Cloud Security
Information Protection & Governance
31 out of 60
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
32 out of 60
Microsoft Sentinel Proof of Concept: 4 WeeksNetrix GlobalUnderstand how prepared is your Microsoft infrastructure when adversaries attack
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 60
Data Protection Program & Strategy Design - 12 Week ImplementationProtivitiEnd-to-End Data Protection to Identify, Classify, Protect and Optimize Your Data in Microsoft 365
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
34 out of 60
Protiviti's Security Platform Rationalization Tool - 6 Week AssessmentProtivitiUnderstand your current security solutions compared to those included in Microsoft’s E5 enterprise licensing to identify potential security gaps, tool redundancy, and cost reduction.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
35 out of 60
Microsoft Purview Records Management Assessment & Strategy - 9 Week AssessmentProtivitiProtiviti assists organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
36 out of 60
Management Services: 3-month AssessmentQuisitiveQuisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
37 out of 60
Purview Microsoft Information Protection (MIP) Getting Started WorkshopPatriot Consulting Technology Group LLCThis workshop focuses on Microsoft Information Protection (MIP) and provides attendees with the knowledge and tools necessary to understand and protect sensitive data within their organization. Partic
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
38 out of 60
Exchange Online Migration: 6-Week DeploymentCyclotron Inc.Exchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
+2
Applicable to:
Cloud Security
Information Protection & Governance
39 out of 60
Slalom's Microsoft Syntex offer: 2-Hr WorkshopSlalom ConsultingDetermine the types of content your organization uses and how you would want to search and refine that content in the future during our Discovery Workshop.
+3
Applicable to:
Information Protection & Governance
Knowledge & Insights
Teamwork Deployment
40 out of 60
SharePoint Online Initial Planning and Setup: 7-Day Design, Plan, Environments Set upIT Partner LLCWe design, plan, and set up both environments and provide post-implementation support. We can also provide educational and training materials for your users to help with internal adoption.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Teamwork Deployment
Encrypted Email and Data Loss Prevention: 3-Day Initial SetupIT Partner LLCBy implementing encrypted email and data loss prevention (DLP) measures, we ensure that sensitive information remains safeguarded, minimizing the risk of data breaches and unauthorized access.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Information Protection & Governance
42 out of 60
Microsoft 365 Protect and Govern Sensitive Data Workshop: 2 DaysCDI LLCProtecting information—wherever it goes—is critical to ensuring trust and meeting compliance requirements. But first, you need to know what data you have, where it is and how its used.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Information Protection & Governance
43 out of 60
Advanced Threat Analytics: 7-Day InstallationIT Partner LLCAdvanced Threat Analytics (ATA) is a complex system that allows you to protect your IT infrastructure from a variety of information threats and cyberattacks.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
44 out of 60
Intune PilotLevacloud LLCThis Pilot aims to elevate your capabilities in managing and securing endpoints at the enterprise level with the power of Microsoft Intune and optional MECM Co-Management
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Mobile Device Management
45 out of 60
Security Audit and Recommendations: 3-Days Consulting ServiceIT Partner LLCGoal: help organizations review their security settings, configurations, and policies to identify any potential vulnerabilities and ensure that the tenant is properly secured against external threats.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
46 out of 60
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski SecurityKudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
47 out of 60
Securing Identities WorkshopSynergy Technical, LLCThe foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
48 out of 60
Abacode Data Governance and Protection of Sensitive Data Implementation Powered by Microsoft 365Abacode Inc.Assess data gaps and implement remediation actions to prevent sensitive data leaks leveraging Microsoft 365 stack.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
49 out of 60
Abacode Data Governance and Protection of Sensitive Data (DLP) in Government Powered by Microsoft 365Abacode Inc.Assess data gaps and implement remediation actions to prevent sensitive data leaks of Government entities leveraging Microsoft 365 Stack.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
50 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLCThe goal of the service is to securely remove your previous Exchange Server, ensuring it doesn't disrupt your operations and enabling a smooth transition to Exchange Online.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
51 out of 60
Ctelecoms Threat Protection EngagementConsolidated Telecoms (Ctelecoms)Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
52 out of 60
Defend Against Threats with SIEM Plus XDR WorkshopThe Partner MastersThe Defend Against Threats with SIEM Plus XDR Workshop will help you achieve broader security objectives—and identify current and real threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
53 out of 60
Additional Spam and Email Protection: 3-Days Professional ServiceIT Partner LLCAdditional protection for organizations experiencing problems with emails.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
54 out of 60
Data Governance with Microsoft PurviewCDWLet our skilled Microsoft engineers help you craft governance to discover, plan, protect and retain your Microsoft 365 data with technology like Microsoft Purview.
+1
Applicable to:
Information Protection & Governance
55 out of 60
Epiq Compliance Cloud Migration with Microsoft PurviewEpiq GlobalEpiq provides a seamless and compliant transition of valuable archive data off legacy technology, while mitigating risks and maintaining regulatory compliance harnessing Microsoft Purview.
+2
Applicable to:
Information Protection & Governance
Insider Risk
56 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReplyValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
57 out of 60
Epiq Mergers and Acquisitions Risk ReductionEpiq GlobalIdentify and exclude sensitive information from being migrated during mergers and acquisitions (M&A) data discovery and migration projects.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
58 out of 60
Epiq Data Privacy with Microsoft PrivaEpiq GlobalEffectively manage and safeguard sensitive personal information with Microsoft 365 and Microsoft Priva, ensuring compliance with privacy regulations and maintaining the trust of your stakeholders.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
59 out of 60
Epiq Flex IG Talent for Microsoft PurviewEpiq GlobalEpiq Flex IG Talent is here to provide it clients with flexible talent surrounding Microsoft Purview eDiscovery, Information Governance, Compliance and Archiving.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
60 out of 60