FiltresTout effacer
Services de conseil résultats
Affichage des résultats  dans services de conseil.
Device Mgm and Protection - 12 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Mobile Device Management
Mobile Device Management
1 out of 60
Windows 11 Assessment: 1-WKSteeves Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
2 out of 60
Threat Protection EngagementadaQuestLearn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
3 out of 60
Avanade Security Business Value 4-Wk AssessmentAvanade, Inc.Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Insider Risk
Insider Risk
4 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
5 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen SystemsThe OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
+3
Applicable to: Cloud Security
Cloud Security Insider Risk
Insider Risk Threat Protection
Threat Protection
6 out of 60
Implementation of Microsoft Security CopilotAlfa Connections Pte LtdTo assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
7 out of 60
4Sight's Microsoft Data Security Engagement4Sight HoldingsIdentify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Insider Risk
Insider Risk
8 out of 60
Infosys Microsoft 365 Security and Compliance: 8 Weeks AssessmentInfosys LimitedInfosys Microsoft 365 security expert team offers a full spectrum security service for microsoft 365 services facilitated digital workplace.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Workplace Analytics
Workplace Analytics
9 out of 60
Nanyang Bandang security operation services上海南洋万邦软件技术有限公司Security operation services with Microsoft Denfender component and Sentinel
+1
Applicable to: Cloud Security
Cloud Security
10 out of 60
Pently Microsoft 365 - AssessmentPently GmbHStructured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
11 out of 60
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
12 out of 60
Defender for Office365Suri Services SCSuri Services y Office 365: La alianza impenetrable en ciberseguridad.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
13 out of 60
Microsoft 365 Copilot Risk Assessment: 1-Week Strategic WorkshopAtmoseraUncover data risks and prepare for secure Copilot adoption with a Microsoft 365 risk assessment.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
14 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş."Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
15 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji  Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
16 out of 60
Copilot for Microsoft 365: Taller De Seguridad Y Datos De 1 DíaAwara ITDesbloquea el máximo potencial de Copilot for Microsoft 365 mientras refuerzas la seguridad y protección de tus datos con un taller intensivo de un día dirigido por los expertos de Awara IT.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
17 out of 60
Data Security as a Service | Assure 365CyberOneFully Managed Data Security, governance and compliance with 24x7 monitoring—Powered by Microsoft Purview.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
18 out of 60
Endpoint as a Service | Assure 365CyberOneFully Managed Endpoint Security with 24x7 monitoring, compliance and Zero Trust enforcement—powered by Microsoft Intune.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Mobile Device Management
Mobile Device Management
19 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
20 out of 60
Data Security: 2-Weeks WorkshopConterraIdentify data security risks in your organizational data
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Insider Risk
Insider Risk
21 out of 60
Threat Protection WorkshopMobile MentorDuring this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Threat Protection
Threat Protection
22 out of 60
Microsoft 365 Security Review: AssessmentCyberOneIdentify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
+3
Applicable to: Cloud Security
Cloud Security Knowledge & Insights
Knowledge & Insights Threat Protection
Threat Protection
23 out of 60
Microsoft 365 Copilot AssessmentSuri Services SCAsegura tu ruta de adopción con Suri Services y Microsoft 365 Copilot
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
24 out of 60
XDR as a Service | Assure 365CyberOneFully Managed XDR with 24x7 detection, response and threat protection—Powered by Microsoft Defender XDR.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
25 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-WeeksmyCloudDoorAssess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Information Protection & Governance
Information Protection & Governance
26 out of 60
CCPA CPRA: 6 - Wk AssessmentHappiest Minds Technologies LimitedEnable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Threat Protection
Threat Protection
27 out of 60
Trip to Microsoft 365 Copilot ImplementationSuri Services SCOfrecemos un servicio de capacitación y preparación estratégica para la adopción de Microsoft 365 Copilot, enfocado en acelerar la productividad y transformar los procesos clave
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
28 out of 60
Mentoring ServiceMobile MentorOur mentoring service helps customers leverage Microsoft 365 to improve endpoint security & user experience. We help accelerate the learning curve & reduce risk by deploying Microsoft 365 optimally.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management
29 out of 60
TGS Windows 11TEKsystems Global Services LLC.TEKsystems partners with you to navigate the transition to Windows 11
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management
30 out of 60
Rapid Remediation of Microsoft Secure ScoreCyberOneBoost your Microsoft Secure Score, reduce risk and increase cyber resilience with expert-led rapid remediation.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
31 out of 60
Overwatch Microsoft 365 Security: 12 Month ImplementationTHREATSCAPE LIMITEDOverwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
32 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
33 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
34 out of 60
Citrix Endpoint Management to Microsoft Intune Migration PlanMobile MentorMobile Mentor’s Citrix Endpoint Management to Microsoft Intune services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management
35 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Mobile Device Management
Mobile Device Management
36 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process AdoptionVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
37 out of 60
Microsoft 365 Security Health Check Assessment 3-WkBulletproof Solutions Inc.Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
38 out of 60
AI Governance Workshop: 4-Hour WorkshopVitalystBe introduced to Microsoft's AI Services, Azure Open AI and Copilot, and better understand the governance principles and practices tailored to them, like transparency, fairness, privacy, and security.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
39 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo SoftwareCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
40 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
+3
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection Workplace Analytics
Workplace Analytics
41 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalystAlithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
42 out of 60
Unified Access & Protection with Microsoft Entra Global Secure AccessMobile MentorStep confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
43 out of 60
Security and Operations with Expert Microsoft 365 SupportAVASOFTMaximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Workplace Analytics
Workplace Analytics
44 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
45 out of 60
Licensing Microsoft 365: 1-day AssessmentInformatika a.d.We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services
46 out of 60
Microsoft 365 Copilot Value DiscoveryCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Value Discovery Workshop – your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
47 out of 60
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFTBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
48 out of 60
Microsoft Data Compliance Consulting Services - 2 Weeks AssessmentArmis, Sistemas de Informação, LdaThe Microsoft 365 Compliance assessment helps organizations implement a compliance strategy that accelerates and streamlines data security and governance while reducing risk.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Information Protection & Governance
Information Protection & Governance
49 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVASOFTEnhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
50 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFTEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
51 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo SoftwareThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
52 out of 60
4security: Backup as a Service for Microsoft 3654Sight HoldingsProtect your data with 4Security's Microsoft 365 Backup as a Service. Seamless integration, automated backups, and reliable data recovery for businesses of all sizes.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
53 out of 60
Windows 365 Standardized PilotMobile MentorThe Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management
54 out of 60
Microsoft 365 Copilot - Technical ReadinessCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Technical Readiness - your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
55 out of 60
MDS - Threat Protection EngagementMaureen Data SystemsA 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
56 out of 60
Entra ID Governance and Guest AccessMobile MentorEmpower your business with Mobile Mentor’s Microsoft Entra ID Governance and Guest Access service, built on Microsoft’s cutting-edge Entra Identity Governance platform.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
57 out of 60
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Threat Protection
Threat Protection
58 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
59 out of 60
Microsoft 365 Copilot - AdvisoryCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Readiness Workshop – your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
60 out of 60