FiltrosBorrar todo
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Protect and Govern your Data in Microsoft 365 1 day workshopCloudWay ASWith data growing exponentially over time, it’s more important than ever for organisations to implement the right tools and processes to ensure data protection and governance
+2
Applicable to:
Cloud Security
Information Protection & Governance
2 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Nanyang Bandang security operation services上海南洋万邦软件技术有限公司Security operation services with Microsoft Denfender component and Sentinel
+1
Applicable to:
Cloud Security
5 out of 60
GoDaddy to Direct Microsoft 365 Migration 2 Hrs Proof of Concepttrue org cloudRemove GoDaddy and other third-party entities from your tenant, reclaiming internal control over your systems.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
6 out of 60
Microsoft 365 Endpoint Manager Deployment Roadmap Assessment - 4 Week AssessmentProtivitiActionable plan and high-level view to move towards a successful Microsoft Endpoint Manager (MEM) deployment and migration
+1
Applicable to:
Cloud Security
7 out of 60
Onesec’s Secure Access to Microsoft 365 with ZscalerSecure Nextgen SystemsEnhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
8 out of 60
1-Day Security & Identity WorkshopConvergeOneTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Data Security and Governance: 3 Day WorkshopNetwovenNetwoven Data Security and Governance workshop will get you started on the path to discover, protect, and govern your sensitive corporate data
+2
Applicable to:
Cloud Security
Information Protection & Governance
11 out of 60
Multi-Factor Authentication - Initial Setup: 3-Professional serviceIT Partner LLCThe goal of the service is to make Microsoft 365 accounts safer by adding an extra layer of security, so only authorized users can access them.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
12 out of 60
Secure Your Productivity 3-Day WorkshopHitachi SolutionsOrganizations are challenged with integrating their remote workforce, and to how best increase collaboration, productivity, and security.
+2
Applicable to:
Cloud Security
Device Deployment & Management
13 out of 60
Identity and Access Management SolutionH One (Private) LimitedEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
14 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
15 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for EndpointCyderesCyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
16 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLCIntroducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 60
Security Foundations Email: Assessment and ImplementationProServeITProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
M365 Compliance Assessment: 4-Wk AssessmentKiZAN TechnologiesManage and Improve your organizations compliance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
19 out of 60
Darktrace Managed Network SensorSentinel Technologies Inc.Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 60
Microsoft 365 / Office 365 / Azure / Dynamics 365 Knowledge Transfer: 3-Hours Professional ServiceIT Partner LLCUnlock the true potential of your Microsoft 365 environment with our specialized "Knowledge Transfer" consulting service – a roadmap to maximize your organization's capabilities.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
21 out of 60
Zones Implementation of Microsoft DefenderZones, LLCEnhance cybersecurity with Zones' Microsoft Defender suite, offering expert implementation, comprehensive coverage, and continuous support.
+1
Applicable to:
Cloud Security
22 out of 60
Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
23 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und AusarbeitungAppSphere AGVom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
24 out of 60
Microsoft Cybersecurity AssessmentAkins ITDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Secure Data Management with Microsoft PurviewAVASOFTConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
MDS - Threat Protection EngagementMaureen Data SystemsA 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Microsoft 365 E5 NIST 800-171 -1 Week GAP AssessmtKAMIND IT, IncThis offer is for a NIST800-171 Gap Assessment for a single Host Unit, scoped to a single contract, single subnet using the Microsoft 365 E5 license
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
29 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLCThis service moves key server tasks to a new one for upgrades or system changes.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
30 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
31 out of 60
KMicro MXDR for SMBKMicro Tech, Inc.KMicro MXDR for SMB helps businesses reduce operational complexity and strengthen cybersecurity defenses by managing their Microsoft Defender XDR environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 60
Microsoft 365 Copilot: 1-Day AssessmentData Market Bilgi Hizmetleri A.SHow Microsoft 365 Copilot can transform your business and the overall concepts you must understand to better daily business life.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Power Platform for Teams
33 out of 60
Intune Health Check (All OS): 2-week AssessmentMobile MentorOur certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
34 out of 60
Avanade Modern Workplace FY23Avanade, Inc.Modern Workplace Consulting Services
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
35 out of 60
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFTBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
36 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk AssessmentErgoServicesErgo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
37 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
38 out of 60
Implementation of Microsoft Security CopilotAlfa Connections Pte LtdTo assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 60
Assessment and Roadmap: Microsoft Security (Azure, Microsoft 365, Active Directory, Entra ID) 6-Week EngagementKudelski SecurityThis assessment defines and recommends steps to achieve your desired security state using your existing security solutions and capabilities.
+2
Applicable to:
Cloud Security
Compliance Advisory Services
40 out of 60
Data Security Engagement with Microsoft PurviewInviso CorporationOur Data Security engagement will look over your data estate and establish areas of Security Risk. We will show you the benefits to Microsoft Purview to help protect your environment from risks.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
41 out of 60
Microsoft Sentinel Quick StartEdgile, Inc.Production pilot, which is expected to provide centralized log collection, detection of previously undetected threats, investigation with artificial intelligence, and Rapid Response to incidents.
+1
Applicable to:
Cloud Security
42 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
C1st End-user Device Security Zero TrustC1st Technologies LLCC1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Cybersecurity AssessmentCDI LLCThe Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
45 out of 60
C1st Implementation of Microsoft Defender for Office 365C1st Technologies LLCEnhance email security for businesses by implementing Defender for Office 365 with Exchange Online Protection (EOP). Our goal is to protect organizational email from spam, phishing, and sophisticated
+2
Applicable to:
Cloud Security
Threat Protection
46 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareOneImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
47 out of 60
Nonprofit Security Maturity Assessment - 4 weeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Microsoft 365 GCC High Rapid DeploymentDaymark SolutionsDeploy Microsoft 365 GCC High services in days, not weeks, while leveraging Daymark’s enhanced security baseline.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
49 out of 60
Deploy Microsoft Intune for Mobile Device ManagementDaymark SolutionsOptimize Mobile Device Management and Security with Microsoft Intune.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
50 out of 60
Hybrid Cloud Security Workshop - 1-DayZones, LLCIdentify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
+1
Applicable to:
Cloud Security
51 out of 60
Microsoft Security Workshop: 3-dayOxford Computer Group LLCThis 3-day workshop shows you how to put Microsoft’s security capabilities to work. Learn how secure your organization is now and how to mitigate and protect against threats in the future.
+2
Applicable to:
Cloud Security
Threat Protection
52 out of 60
Modern Endpoint Management: 2-Hr AssessmentAscent Global, Inc.There’s a reason Microsoft chose us as their Modern Endpoint Management Partner of the Year for 2023. We believe you can reduce your threat risk by modernizing your Endpoint Management Strategy.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
53 out of 60
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDSEgyptian Data Protection Law offer aims to give you a brief description of the following:
Data Privacy Basics
The Egyptian Data Protection Law main highlights
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
54 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Compliance Assessment - 6 weeksBDO Digital, LLCIdentify your compliance maturity and areas that need improvement
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
56 out of 60
Threat Protection WorkshopMobile MentorDuring this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
57 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk AssessmentApex Digital SolutionsAchieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
58 out of 60
Trip to Microsoft 365 Copilot ImplementationSuri Services SCOfrecemos un servicio de capacitación y preparación estratégica para la adopción de Microsoft 365 Copilot, enfocado en acelerar la productividad y transformar los procesos clave
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
59 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional ServiceIT Partner LLCService used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
60 out of 60