IragazkiakGarbitu guztiak
Aholkularitza-zerbitzuak emaitza
emaitza erakusten dira hemen: aholkularitza-zerbitzuak.
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure LtdApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
1 out of 60
Defender PilotLevacloud LLCThe Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
+2
Applicable to:
Cloud Security
Threat Protection
2 out of 60
Office 365 Tenant - Initial Setup: 7-Days Professional ServiceIT Partner LLCThe goal is to efficiently and effectively set up your organization's Office 365 tenant, enabling seamless access to a suite of productivity tools and collaboration services.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
3 out of 60
Fortis Assessment Microsoft Online SecuritySentinel Technologies Inc.Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Identity WorkshopSentinel Technologies Inc.Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Microsoft 365 Secure Score AssessmentDaymark SolutionsImprove your environment’s security posture using Microsoft Secure Score.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
6 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Centric Threat Protection EngagementCentric Consulting, LLCLearn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
8 out of 60
Microsoft Defender for End Points JumpstartSentinel Technologies Inc.Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 60
Zero Trust Assessment: 3-Week WorkshopAccountabilITOur Microsoft Zero Trust Assessment: 3-Week Workshop is designed to evaluate an organization's security posture and provide guidance on implementing a Zero Trust security model.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 60
Cybersecurity AssessmentCDI LLCThe Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
11 out of 60
Threat Protection EngagementNeway TechnologiesEnhance your organization's security stance with a Neway Threat Protection Engagement.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
13 out of 60
Microsoft Cybersecurity AssessmentAkins ITDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Dynapt Advisory Services for Microsoft 365 Copilot 3 Week WorkshopDynapt IncUnleash the potential of AI to transform your business operations with Microsoft 365 Copilot.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
15 out of 60
Copilot for Microsoft 365 Data Security QuickStartSoftchoiceSetting the foundation for data security and governance in preparation for Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
16 out of 60
Modernize Identities with Entra ID PremiumDaymark SolutionsStrengthen User Security with Advanced Identity Management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCShadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
18 out of 60
Data Security implementation for generative AI: 8-Wk ImpConterraHelp your organization to govern, monitor, and secure the use of generative AI tools like Copilot, ChatGPT, or custom GPT applications
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
19 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoiceThe Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Sentinel Readiness WorkshopSentinel Technologies Inc.Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
21 out of 60
Digital Workplace Program: 4-week AssessmentQuisitiveThe Digital Workplace Foundations Assessment helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tool
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
22 out of 60
Microsoft 365 Tenant Security AssessmentDaymark SolutionsStrengthen the Security of Your Microsoft 365 Environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
23 out of 60
AI Security Readiness: 4 week AssessmentQuisitiveQuisitive's AI Security Readiness Assessment provides organizations with an in-depth understanding of how best to adopt Copilot and Generative AI without putting their organization at risk.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
24 out of 60
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling TechnologiesCyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
25 out of 60
Threat Protection EngagementISA Cybersecurity Inc.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
27 out of 60
Hybrid Office 365 Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLCHybrid migration integrates on-premises Exchange with Microsoft 365, facilitating migration or serving as a permanent state for both organizations.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
28 out of 60
Data Security and Compliance Services - 4 Week AssessmentProtivitiEnd-to-End Data Security to Identify, Classify, Protect and Optimize Your Data in Microsoft 365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
29 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
+2
Applicable to:
Cloud Security
Identity & Access Management
30 out of 60
Microsoft Secure Score - increase to 200: 3-Days Professional ServiceIT Partner LLCThe goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
31 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLCEnhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Windows Virtual Desktop Implementation: 5-Days Professional ServiceIT Partner LLCProvide a streamlined solution using Windows Virtual Desktop (WVD) on Microsoft Azure, offering efficient remote workstations, cost-effective licensing, and Windows 365 in a terminal server format.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
33 out of 60
MXDR ConsultationCBTS Technology Solutions LLCCBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServusGain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
35 out of 60
Security Audit and Recommendations: 3-Days Consulting ServiceIT Partner LLCGoal: help organizations review their security settings, configurations, and policies to identify any potential vulnerabilities and ensure that the tenant is properly secured against external threats.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
36 out of 60
Implementation of Microsoft Defender for EndpointCDWCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Managed Services ProviderSkyTerra Technologies LLCSkyTerra delivers seamless integration with your existing Microsoft ecosystem, from Azure infrastructure to Microsoft 365 productivity suites.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
38 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLCThe goal of the service is to securely remove your previous Exchange Server, ensuring it doesn't disrupt your operations and enabling a smooth transition to Exchange Online.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
39 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLCMulti-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Strategic Advisory Services: 1-Wk BriefingeGroup Enabling TechnologieseGroup Enabling Technologies, LLC. Strategic Advisory Services will help your organization down the path of digital transformation.
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Information Protection & Governance
41 out of 60
Cutover Google Workspace to Office 365 migration (IMAP migration). Just email and email folders: 7-Days Professional ServiceIT Partner LLCMigration of email data and email folders from G Suite (Google Apps) to Microsoft 365 / Exchange Online.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
42 out of 60
Defender for Office 365: 5-Day AssessmenteGroup Enabling TechnologiesMicrosoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
43 out of 60
Office 365 Migration 3-Month ImplementationRKON TECHNOLOGIESLeverage RKON's consulting expertise for a smooth and seamless migration to Microsoft's Office 365 suite of products including SharePoint, OneDrive, and Teams
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
44 out of 60
C1st Implementation of Microsoft Defender for Office 365C1st Technologies LLCEnhance email security for businesses by implementing Defender for Office 365 with Exchange Online Protection (EOP). Our goal is to protect organizational email from spam, phishing, and sophisticated
+2
Applicable to:
Cloud Security
Threat Protection
45 out of 60
Microsoft 365: 2-Week ImplementationTechnologentExpert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
46 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional ServiceIT Partner LLCService used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
47 out of 60
Copilot Planning WorkshopAhead, IncThis Copilot workshop will prepare your organization to utilize Copilot by identifying key scenarios and gaps in current Microsoft 365 configurations to improve ROI of initial Copilot deployments.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
48 out of 60
Threat Protection Envisioning WorkshopTECH HEADS INCLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Cutover Exchange Online migration from any IMAP email system: 7-Days Professional serviceIT Partner LLCMigrate users, email data, and email folders from any IMAP system to Microsoft 365 / Exchange Online.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
50 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTDMicrosoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
+2
Applicable to:
Cloud Security
Threat Protection
51 out of 60
Advanced Threat Analytics: 7-Day InstallationIT Partner LLCAdvanced Threat Analytics (ATA) is a complex system that allows you to protect your IT infrastructure from a variety of information threats and cyberattacks.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
52 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
54 out of 60
Enable Data Leak Prevention: 5-Day Configure and Enable DLP PoliciesIT Partner LLCProtect your organization from data leaks, block the transfer of confidential information, use our tool for monitoring your daily work of employees to find security weaknesses before the incident.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
55 out of 60
Microsoft Cybersecurity: 1 Month AssessmentBig Cloud ConsultantsOur expert team will work with you to assess your current security posture and develop recommendations for appropriate improvements.
+2
Applicable to:
Cloud Security
Threat Protection
56 out of 60
Microsoft 365: 2-Week AssessmentApex Digital SolutionsEstablish a clear roadmap and change management plan for your journey to a modern workplace.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
57 out of 60
Endpoint Security Foundations 50 users: 1-YrRed River Technology LLCEndpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
+2
Applicable to:
Cloud Security
Threat Protection
58 out of 60
Managed Extended Detection & Response (MXDR) for Workplace: 2 Hr WorkshopNetwovenLearn how to put next generation Microsoft security tools to work for you.
+2
Applicable to:
Cloud Security
Threat Protection
59 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLCThis service moves key server tasks to a new one for upgrades or system changes.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
60 out of 60