FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Microsoft 365 Copilot: 2-Wk Readiness AssessmentInvokeInvoke's Microsoft 365 Copilot Readiness Assessment is a service that helps customers prepare for using Copilot 365, a solution that leverages data to enhance creativity, productivity, and skills.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
1 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReplyValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
2 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLCMulti-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Apply Information Rights Management protection to email: 5-Day Professional ServiceIT Partner LLCEnsure that only authorized individuals can access and use the information. This can be especially useful for sensitive or confidential information that needs to be protected from unauthorized access
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
4 out of 60
Microsoft 365 Security WorkshopCollective InsightsEquip your organization with insights, strategies, and tools to fortify defenses, mitigate threats, and enhance overall security readiness across your digital estate.
+2
Applicable to:
Identity & Access Management
Threat Protection
5 out of 60
Microsoft 365 Security: 30-Days ServiceIT Partner LLCEstablish a foundational, secure environment for clients by configuring their Microsoft 365 tenant with core security features.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
6 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLCEstablish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Windows Virtual Desktop Implementation: 5-Days Professional ServiceIT Partner LLCProvide a streamlined solution using Windows Virtual Desktop (WVD) on Microsoft Azure, offering efficient remote workstations, cost-effective licensing, and Windows 365 in a terminal server format.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
8 out of 60
Zero Trust Security 10-Hour AssessmentJourneyTEAMJourneyTeam’s Zero Trust Security Assessment is designed to provide a clear, actionable strategy for strengthening your organization’s Microsoft 365 security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
9 out of 60
Microsoft Sentinel - Monitor file access and permission changes in SharePoint Implementation: 5-Days Professional ServiceIT Partner LLCImplement Microsoft Sentinel for monitoring file access and permission changes in SharePoint, ensuring prompt detection and notification of unauthorized or unwanted activities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Office 365 to Office 365 Migration: 4-Wk ImplementationExodus Integrity Services, Inc.Simplify the complexities of merging, consolidating, or transitioning your Office 365 environments with our specialized Office 365 Migration Service.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
11 out of 60
Hybrid Office 365 Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLCHybrid migration integrates on-premises Exchange with Microsoft 365, facilitating migration or serving as a permanent state for both organizations.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
12 out of 60
Cutover Exchange Online Migration from a Third-Party Hosted Exchange Server: 7-Days Professional ServiceIT Partner LLCA flexible and quick way to migrate all emails, contacts, tasks, and other data from a third-party hosted and managed Exchange Server to Microsoft 365 Exchange Online.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
13 out of 60
User Home Folder Migration to One Drive for Business: 7-Days Professional ServiceIT Partner LLCWe will migrate files and documents stored in a user drive or folder on a file server(s) to user’s folder on OneDrive for Business.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
14 out of 60
Cutover Exchange Online Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLCMailbox migration from an Exchange Server hosted and managed by you to Exchange Online. All mailboxes will be migrated at once.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
15 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLCEnhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Cutover Exchange Online migration from any IMAP email system: 7-Days Professional serviceIT Partner LLCMigrate users, email data, and email folders from any IMAP system to Microsoft 365 / Exchange Online.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
17 out of 60
Cutover Google Workspace to Office 365 migration (IMAP migration). Just email and email folders: 7-Days Professional ServiceIT Partner LLCMigration of email data and email folders from G Suite (Google Apps) to Microsoft 365 / Exchange Online.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
18 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Fortis Assessment Microsoft Online SecuritySentinel Technologies Inc.Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.A high-level forensics evaluation designed to identify current and past threat activity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Healthcare Innovations Strategic Alignment WorkshopSentinel Technologies Inc.At the start of 2020, the charge of the Healthcare Technology Executive focused on key areas for improvement & alignment with their business along with providing a secure environment that allowed for
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Knowledge & Insights
22 out of 60
Identity WorkshopSentinel Technologies Inc.Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.According to multiple studies, breaches and ransomware have more than doubled in the past year.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
JourneyTEAM Security Solutions for Higher EducationJourneyTEAMUnlock the future of secure access in Higher Education environments using Microsoft 365.
+1
Applicable to:
Identity & Access Management
27 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwovenNetwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
28 out of 60
Microsoft Copilot for Security: 6-Wk EnablementCyclotron Inc.Copilot for Security empowers security teams investigations and operations, harnessing real-time data across digital security estates to improve response time, intelligence, and investigation quality.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
29 out of 60
eDiscovery Workshop: 4 hours WorkshopPlanet TechnologiesA half-day Workshop that provides an overview and deep understanding of Microsoft 365 eDiscovery Standard and Premium products.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
30 out of 60
Frontline Worker: 3-Wk Proof of ConcepteGroup Enabling TechnologiesReimagine the frontline worker experience with an eGroup Enabling Technologies, LLC. Frontline Worker Proof of Concept
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
31 out of 60
Passwordless Authentication: 2 Week ImplementationCDI LLCImplement passwordless authentication solutions for up to twenty pilot users
+1
Applicable to:
Identity & Access Management
32 out of 60
Secure Data on Personally-Owned Devices: 2 Week ImplementationCDI LLCDeploy Intune App Protection Policies to secure organization data on employee-owned devices
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
33 out of 60
Teams Collab Rapid DeployIvision, Inc.ivision’s Teams Collab Rapid Deploy service leverages a speed-to-market methodology designed to help clients successfully plan and deploy a Microsoft Teams collaboration environment.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
34 out of 60
Microsoft Cybersecurity AssessmentAkins ITDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Microsoft Sentinel Workshop and PilotCDWThe Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Windows 365 PilotCDWWith the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Data Security and Governance Assessment and RoadmapCentric Consulting, LLCProvide customers with a clear path forward in addressing data security needs
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
38 out of 60
MXDR ConsultationCBTS Technology Solutions LLCCBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Microsoft 365 Copilot & Sales Readiness AssessmentJourneyTEAMAccelerate your sales team's performance with JourneyTEAM's Copilot & Sales Readiness Assessment
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
40 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Threat Protection Engagement - 4 weeksGrant Thornton LLPImprove your Security Posture with Grant Thornton's Threat Protection Engagement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View SystemsSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
44 out of 60
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
45 out of 60
Tenant to tenant In-Place Archive Migration: 7-Days Consulting ServiceIT Partner LLCService designed to transfer mailbox data from one Office 365 tenant's In-Place Archive to another, preserving metadata and folder structure.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Workplace Analytics
46 out of 60
Implementation of Microsoft Defender for Cloud AppsCDWCDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Implementation of Microsoft Defender for Office 365CDWThe Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Workshop for Microsoft 365 Threat ProtectionCDWThe Workshop for Microsoft 365 Threat Protection provides the following objectives to ensure thorough enablement of crucial Microsoft products for a more secure environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Fixing vulnerabilities based on Defender with ASR Module: 3-Days Consulting ServiceIT Partner LLCThis service provides a comprehensive approach to identifying and fixing vulnerabilities in organization's devices, helping mitigate the risks of cyber-attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Active Directory Health CheckRavenswood Technology GroupAssess the configuration, security, and operational procedures of an Active Directory environment.
+1
Applicable to:
Identity & Access Management
51 out of 60
Entra ID Health CheckRavenswood Technology GroupAssess the configuration, security, and operational procedures of an Entra ID environment.
+1
Applicable to:
Identity & Access Management
52 out of 60
Healthcare & Education Cybersecurity AssessmentPSM PartnersThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
53 out of 60
Microsoft Intune QuickstartEmergent SoftwareDeploy Microsoft Intune via Microsoft 365 with Emergent's Quickstart for enhanced device management and security compliance.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
54 out of 60
Modernize Identities with Entra ID PremiumDaymark SolutionsStrengthen User Security with Advanced Identity Management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
With Windows 365 Access data from anywhereSentinel Technologies Inc.With Windows 365, you can access a desktop computer from anywhere. It is available in Business and Enterprise SKUs and integrates easily with your current Microsoft 365 licensing.
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
56 out of 60
Security Foundations Data: Assessment and ImplementationProServeITData security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
+2
Applicable to:
Identity & Access Management
Threat Protection
57 out of 60
Microsoft 365 Copilot and AI AssessmentRedapt, Inc. Elevate Your Business with Microsoft 365 Copilot Assessment
+1
Applicable to:
Identity & Access Management
58 out of 60
Security Foundations Email: Assessment and ImplementationProServeITProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Security Foundations IdentityProServeITFortify your online identity and access controls. Evaluate your risks and deploy modern security controls to mitigate against the most common identity-based vulnerabilities and attacks.
+2
Applicable to:
Identity & Access Management
Threat Protection
60 out of 60