Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Todos los resultados
Microsoft 365 Migration: 3 Weeks Migration from Google Workspace / GsuiteRisksoft
Migrate your emails, contacts. calendars and documents from Google Workspace to Microsoft 365
1 out of 60
cyber security threat analysis workshopU-BTech Solutions
the workshop is design to discover threats and risks
2 out of 60
Exchange Migration to Microsoft 365: 6-Week ImplementationAll Covered, a division of Konica Minolta
All Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
3 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.
With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
4 out of 60
Enable Windows 365 Cloud PCCofomo
With the right endpoint modernization strategy and tools, employees get a secure experience on every mobile device, tablet, or laptop they’re using, all while eliminating major management headaches.
5 out of 60
HPT Nextgen Windows Experience_02 days workshopHPT Vietnam Corporation
NextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
6 out of 60
HPT_Microsoft Secure Score Assessment - 4 weekHPT Vietnam Corporation
Secure Score helps customers quickly figure out what actions they can take to improve your score. They can check their action queue and find the change they can make that most improves their security
7 out of 60
HPT_Microsoft Cyber Security Assessment_2 weekHPT Vietnam Corporation
Strengthen your firm's defenses with our all-in-one cybersecurity platform
8 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshopHPT Vietnam Corporation
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
9 out of 60
HPT Secure Identities and Access_03 days workshopHPT Vietnam Corporation
With identity attacks on the rise, this workshop will show you how to stop tomorrow’s data breaches by securing identities today.
10 out of 60
NTT Americas - Microsoft Device ManagementNTT Limited
Deployment of Microsoft Unified Endpoint Management Services. Assessment of your resources and business objectives to develop a fresh approach to your security strategy.
11 out of 60
1ID Platform for EDUTelelink Business Services EAD
1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
12 out of 60
Microsoft 365 GCC High Mig from Google (25 Users)Daymark Solutions
White-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Google G Suite
13 out of 60
Microsoft 365 GCC High Mig from Exchange: 6 Week ImplementationDaymark Solutions
White-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Microsoft Exchange On-Premises
14 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
15 out of 60
Avanade Entra Verified ID Consulting Services FY23Avanade, Inc.
Microsoft Entra Verified ID is a Decentralized Identity implementation that streamlines any identity related process, simplifies it, reduce costs and increases convenience.
16 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.
This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
17 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLC
Breach and Attack Simulations — We Attack to Defend You
18 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayon
Evaluate and strengthen the current security posture of your environments in Microsoft365 and Microsoft Azure
19 out of 60
Microsoft 365 Tenant to Tenant Migration: 6 Week ImplementationAll Covered, a division of Konica Minolta
Let All Covered help you assess, plan and skillfully implement your Microsoft 365 Tenant to Tenant migration.
20 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era Technology
M&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
21 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POCITC Secure Ltd
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
22 out of 60
Protect and Govern Healthcare Data Workshop - 3 Day WorkshopProtiviti
Microsoft-Funded Workshop to discuss and understand the hidden privacy and regulatory risks of healthcare data and how to mitigate with actionable next steps
23 out of 60
Data Protection Program & Strategy Design - 12 Wk ImplementationProtiviti
End-to-End Data Protection to Identify, Classify, Protect and Optimize Your Data in Microsoft 365
24 out of 60
Invoke Data Risk AssessmentInvoke
This assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
25 out of 60
Protiviti's Security Platform Rationalization Tool - 6 Week AssessmentProtiviti
Understand your current security solutions compared to those included in Microsoft’s E5 enterprise licensing to identify potential security gaps, tool redundancy, and cost reduction.
26 out of 60
Microsoft Purview Records Management Assessment & Strategy - 9 wk AssessmentProtiviti
Protiviti assists organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
27 out of 60
Teams Hosted Direct Routing: 2-week ImplementationQuisitive
Quisitive Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
28 out of 60
AgileAscend: Identity for Mergers and Acquisitions: 8-Wk AssessmentAgile IT
Agile IT helps organizations with multiple identity services and one or more existing Microsoft 365/Azure Active Directory tenants in use. This is often found in organizations during M&A
29 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
30 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security Ltd
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
31 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile IT
Agile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
32 out of 60
Quadra Entra Permissions ManagementQuadrasystems.net (India) P Ltd
Understand how permissions creep can impact the attack surface risk in your cloud infrastructure Understand how to manage user and identity risk
33 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
34 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş.
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
35 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed Canary
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
36 out of 60
Secure Identities and Access Management AssessmentInvoke
To provide enterprise customers with a detailed identity assessment report, a high-level migration plan, and demonstrations of Microsoft Entra Azure AD and Microsoft Entra Identity Governance features
37 out of 60
Modern EndPoint Management - Jumpstart: 1-Wk Proof of ConceptLogicalis, Inc.
Intune Jumpstart will help showcase the value of Microsoft Intune, to show you how to more effectively manage endpoints within Intune. Proof of Concept deployment included!
38 out of 60
Red Canary Cloud Security AssessmentRed Canary
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
39 out of 60
Office 365: Setup, Demo Train: 3-Hr ImplementationTrue.org Cloud
Gain a competitive edge and be more productive with a higher growth in your business with the help of True.org Cloud’s Microsoft 365 Business implementation.
40 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLC
The Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
41 out of 60
Intune for Windows: 6-week ImplementationMobile Mentor
Intune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
42 out of 60
MDM Health Check (Mobile OS Only): 2-week AssessmentMobile Mentor
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
43 out of 60
BYOD 365: 6-week ImplementationMobile Mentor
The BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
44 out of 60
Microsoft Security: 3-Day WorkshopApex Digital Solutions
Develop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
45 out of 60
Advania: Intune Get Started: 2 d training and PoCAdvania AB
Understand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
46 out of 60
Microsoft 365 Identity & Security: 2 wk assessmentPSM Partners
Customized identity and security assessment focused on the Microsoft 365 platform
47 out of 60
G Suite to M365 Migration: 1-Day Proof of conceptTrue.org Cloud
Proof of concept for migration from G Suite to Microsoft 365
48 out of 60
Microsoft Security: 4-Week ImplementationApex Digital Solutions
Establish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
49 out of 60
Microsoft 365 E5 CMMC L1 3 Week ImplementationKAMIND IT, Inc
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 1 using Microsoft 365 security Suite and Azure Sentinel SIEM.
50 out of 60
Intune & Autopilot - 2 Week - Proof of ConceptArraya Solutions
Arraya can help jumpstart customer initiatives, no matter where they stand, regarding device management and deployment using Microsoft Intune and Autopilot.
51 out of 60
Microsoft Intune: 4-Wk Implementation ServicesTechNet UC LLC
Microsoft Intune Design and Deployment Services
52 out of 60
Bitscape M365 Security Assessment: 3-Wk AssessmentBitscape
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
53 out of 60
Microsoft Intune Implementation 10 DaysEnabling Technologies Corporation
Secure your Mobile Devices with Microsoft Intune designed with Enabling's Security experts.
54 out of 60
Microsoft 365: 2-Week AssessmentPractical Solutions, Inc
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
55 out of 60
Insider Risk Management Proof of Concept -5 DaysEnabling Technologies Corporation
Insider risk management is a compliance solution in Microsoft 365 that helps minimize internal risks by enabling the detection of malicious and inadvertent activities in your organization.
56 out of 60
Modern Workplace Security 10-Wk ImplementationWipro Ltd
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
57 out of 60
Microsoft 365 Security: 3 Day AssessmentNetwoven
Protect against evolving cybersecurity threats and implement a modern workplace using built-in solutions from Microsoft.
58 out of 60
Securing Identities Workshop - 3 DaysEnabling Technologies Corporation
Sit down with the Security experts at Enabling Technologies to set up your security authentication and access policies for a secure and also productive workplace.
59 out of 60
Microsoft 365 Threat Check Assessment: 3-Wk AssessmentInvoke
The Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
60 out of 60