FiltresTout effacer
Services de conseil résultats
Affichage des résultats dans services de conseil.
Tous les résultats
System Center Endpoint Manager 40 hour Quick Start Proof of Concept with Co-Management with Endpoint Manager in Office 365York Telecom CorpSystem Center Endpoint Manager 40-Hour Quick Start Proof-of-Concept. Design, deploy and learn SCEM in 40-hour proof-of-concept with Co-Management with Endpoint Manager Office 365
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementMobile Device Management
1 out of 60
Cyderes Microsoft Security Adoption AdvisoryCyderesThe Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
2 out of 60
AI Governance Workshop: 4-Hour WorkshopVitalystBe introduced to Microsoft's AI Services, Azure Open AI and Copilot, and better understand the governance principles and practices tailored to them, like transparency, fairness, privacy, and security.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
3 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
4 out of 60
Copilot Planning WorkshopAhead, IncThis Copilot workshop will prepare your organization to utilize Copilot by identifying key scenarios and gaps in current Microsoft 365 configurations to improve ROI of initial Copilot deployments.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
5 out of 60
Zero Trust ImplementationJourneyTEAMUnlock the potential of your Microsoft 365 cybersecurity with JourneyTEAM's comprehensive Zero Trust Implementation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
6 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
7 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY25CGI Inc.Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
8 out of 60
Copilot for Microsoft 365 Adoption Accelerator Program - 18 WeeksTrace3This program's primary objective is to help accelerate client adoption of Copilot for Microsoft 365 and setup the client for continued maturity with their usage of Copilot for Microsoft 365.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceTeamwork Deployment
9 out of 60
SecureBlu MDR Service for Microsoft 365 DefenderNew Era TechnologySecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
10 out of 60
Copilot for Microsoft 365: 1-Day Data and Security WorkshopAwara ITUnlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
11 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
12 out of 60
Microsoft 365 Copilot - Extensibility SolutionsCrayonEnhance your Microsoft 365 Copilot experience and boost your productivity through customizations tailored to your organization's specific needs.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
13 out of 60
JAMF to Intune MigrationMobile MentorMobile Mentor’s JAMF to Intune migration planning services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration to Intune.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityDevice Deployment & Management
14 out of 60
Microsoft 365 Security: 3,5 Tage Tenant AssessmentAppSphere AGSicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementKnowledge & Insights
15 out of 60
Microsoft 365 Copilot - Technical ReadinessCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Technical Readiness - your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
16 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
17 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayonEvaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
18 out of 60
Microsoft Intune ServiceSii Sp. z o.o.Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementInsider Risk
19 out of 60
Zones Intune Device Endpoint Management ImplementationZones, LLCElevate your mobile device and application management with Intune—a robust solution offering advanced security features like conditional access, multi-factor authentication, and data encryption.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityMobile Device Management
20 out of 60
Enterprise Mobility + Security Quickstart for NonprofitSoftwareOneSecure, compliant, and adaptable productivity for mission-driven work
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementMobile Device Management
21 out of 60
Microsoft 365 Copilot Accelerator: 12Wk ImplementationBDO CanadaLeveraging BDO’s Microsoft 365 Copilot Framework, we'll quickly help you assess your readiness and then accelerate your deployment of Microsoft 365 Copilot in just 12 weeks.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityKnowledge & Insights
22 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
23 out of 60
Cyderes Managed Security Services for Microsoft SentinelCyderesCyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
24 out of 60
Managed Extended Detection & Response (MXDR) for Workplace: 2 Hr WorkshopNetwovenLearn how to put next generation Microsoft security tools to work for you.
+2
Applicable to:
Cloud SecurityThreat Protection
25 out of 60
AvePoint Policies & Insights: 10-Days AssesmentsIT-Dev sp. z o.o.Assesment's outcomes:
• Enable centralized reporting on Microsoft 365 security.
• Discover potential risks and exposed content.
• Enforce policies and automatically remediate security breaches!
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
26 out of 60
Endpoint Management: 3-Day WorkshopApex Digital SolutionsBegin the steps to manage and protect your devices, your apps, and your users
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementMobile Device Management
27 out of 60
CMMC Compliance with Microsoft 365: 4 wk impl.InsightInsight’s CMMC services program helps clients understand DoD requirements, develop a strategy to achieve compliance in hybrid and cloud models, and execute to implementation and ongoing operations.
+1
Applicable to:
Cloud Security
28 out of 60
impelSecure Data Security Engagement: Free 4-week workshopimpeltec Pty LtdIdentify data risks and evaluate user behavior for risky activities
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
29 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
30 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen SystemsThe OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
31 out of 60
Prepárate para Microsoft Copilot con ENCAMINA: Assesment 3 semanasENCAMINA S.L.Obtén un assessment integral: análisis de información, optimización de arquitectura y seguridad, más plan de comunicación y Road Map personalizado
+3
Applicable to:
Adoption & Change ManagementCloud SecurityKnowledge & Insights
32 out of 60
UNITE: AI Aware Workshop_INFINITY TECHNOLOGY SOLUTIONSFor business leaders who seek to understand AI in a business context, UNITE: AI Aware_ is an expert-led workshop for all departments. Participants can learn about AI types, capabilities and benefits.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityKnowledge & Insights
33 out of 60
Microsoft 365 Secure Score AssessmentDaymark SolutionsImprove the security posture of your environment using Microsoft Secure Score.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
34 out of 60
KMicro's Sentinel360 MXDR with Microsoft Copilot for Security: 4-Wk POC/POVKMicro Tech, Inc.Enhance threat hunting & accelerated MXDR for Microsoft Sentinel with Copilot for Security integration
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
35 out of 60
Cyber Portfolio Rationalization: 3-Day WorkshopPwCSimplify your cybersecurity portfolio to reduce the cost and complexity of your Microsoft 365 and Microsoft Azure environment
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceKnowledge & Insights
36 out of 60
Microsoft Sentinel - Monitor file access and permission changes in SharePoint Implementation: 5-Days Professional ServiceIT Partner LLCImplement Microsoft Sentinel for monitoring file access and permission changes in SharePoint, ensuring prompt detection and notification of unauthorized or unwanted activities.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
IN - Microsoft 365 Barracuda Cloud to Cloud BackupCrayonSecure, easy-to-use SaaS backup for your Microsoft 365 data
+1
Applicable to:
Cloud Security
38 out of 60
Endpoint Management with Security WorkshopThe Partner MastersThe Endpoint Management with Security Workshop enables partners to lead customer conversations around modernizing their endpoint management and security capabilities by leveraging Microsoft 365.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementMobile Device Management
39 out of 60
Zones SOCaaS - MXDR with Threat ProtectionZones, LLCZones SOCaaS powered by Microsoft Sentinel and Defender offers advanced MDR and XDR capabilities, reinforcing your business’s safety.
+2
Applicable to:
Cloud SecurityThreat Protection
40 out of 60
Copilot Advanced Services: 1 Day 3 WorkshopsNess IsraelUnlock the full potential of Microsoft Copilot with our tailored AI services, enhancing security, development and productivity across Microsoft 365 applications through flexible, expert-led sessions.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityWorkplace Analytics
41 out of 60
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-WeeksInvokeInvoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
42 out of 60
Red Canary Cloud Security AssessmentRed CanaryAssess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
43 out of 60
Microsoft Defender for Endpoint - Device Monitoring Solutions by AVASOFTAVASOFTManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
44 out of 60
Copilot Business Value DiscoveryNetwovenReady to embrace AI? Join our Microsoft 365 Copilot Value Discovery Workshop and learn how to maximize its potential for your business
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
45 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
46 out of 60
Microsoft 365 consultancyOnex GroupGet Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementTeamwork Deployment
47 out of 60
Microsoft 365 Incident Response - 5 Week AssessmentProtivitiAssessing the advanced security capabilities of Microsoft 365
+2
Applicable to:
Cloud SecurityThreat Protection
48 out of 60
Difenda - Information Protection and Governance - 4-week ImplementationDifendaUse Microsoft Purview to Implement an Information (Data) Protection and Governance solution to improve Security.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
49 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
50 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
51 out of 60
User Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
52 out of 60
Microsoft 365 E5 Cyber Range 2 Week ImplementationKAMIND IT, IncKAMIND's cybersecurity immersive learning deployment utilizing Project Ares Cyber Range for Microsoft 365 Security Suites.
+2
Applicable to:
Cloud SecurityThreat Protection
53 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud SecurityThreat Protection
54 out of 60
Avanade Modern Workplace FY23Avanade, Inc.Modern Workplace Consulting Services
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
55 out of 60
Cloud App Security Data Access Control Services by AVASOFTAVASOFTAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
56 out of 60
Defender for Endpoint Professional Security Services | Customized Deployment in as Little as 6-WeeksDifendaMaximize your Microsoft Security investment with our Defender for Endpoint Design & Implementation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
57 out of 60
Microsoft 365 E5 CMMC L3 8 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
58 out of 60
CIS Top 20 Control Gap Analysis: 3-Day AssmtCompuNetBy leveraging CompuNet, armed with CIS top 20 controls and its team of experts, they can advise on what controls to leverage inside the Microsoft suite as well as when to leverage 3rd party solutions.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
59 out of 60
Cutover Google Workspace to Office 365 migration (IMAP migration). Just email and email folders: 7-Days Professional ServiceIT Partner LLCMigration of email data and email folders from G Suite (Google Apps) to Microsoft 365 / Exchange Online.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementTeamwork Deployment
60 out of 60