FiltresTout effacer
Services de conseil résultats
Affichage des résultats dans services de conseil.
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdgeEndpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
2 out of 60
Avanade Security Risk AssessmentAvanade, Inc.Avanade's 5-day Risk Assessment offers security leaders a comprehensive view of risk posture across their enterprise and proactive ways to protect their organizations from growing cyber threats.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
3 out of 60
Threat Protection EngagementadaQuestLearn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Avanade Security Business Value 4-Wk AssessmentAvanade, Inc.Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
5 out of 60
Windows 11 Assessment: 1-WKSteeves Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
6 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen SystemsThe OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
7 out of 60
Implementation of Microsoft Security CopilotAlfa Connections Pte LtdTo assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 60
4Sight's Microsoft Data Security Engagement4Sight HoldingsIdentify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
9 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
10 out of 60
Nanyang Bandang security operation services上海南洋万邦软件技术有限公司Security operation services with Microsoft Denfender component and Sentinel
+1
Applicable to:
Cloud Security
11 out of 60
Pently Microsoft 365 - AssessmentPently GmbHStructured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
12 out of 60
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Defender for Office365Suri Services SCSuri Services y Office 365: La alianza impenetrable en ciberseguridad.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 60
Microsoft 365 Copilot Risk Assessment: 1-Week Strategic WorkshopAtmoseraUncover data risks and prepare for secure Copilot adoption with a Microsoft 365 risk assessment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
15 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş."Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Data Security as a Service | Assure 365CyberOneFully Managed Data Security, governance and compliance with 24x7 monitoring—Powered by Microsoft Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
18 out of 60
Endpoint as a Service | Assure 365CyberOneFully Managed Endpoint Security with 24x7 monitoring, compliance and Zero Trust enforcement—powered by Microsoft Intune.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
19 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
20 out of 60
Data Security: 2-Weeks WorkshopConterraIdentify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
21 out of 60
Threat Protection WorkshopMobile MentorDuring this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
22 out of 60
Microsoft 365 Security Review: AssessmentCyberOneIdentify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
23 out of 60
Microsoft 365 Copilot AssessmentSuri Services SCAsegura tu ruta de adopción con Suri Services y Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
24 out of 60
Microsoft 365 Copilot Onboarding WorkshopSMART business LLCJoin our interactive workshop to learn about the capabilities of Microsoft Copilot for Microsoft 365!
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
25 out of 60
XDR as a Service | Assure 365CyberOneFully Managed XDR with 24x7 detection, response and threat protection—Powered by Microsoft Defender XDR.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
27 out of 60
CCPA CPRA: 6 - Wk AssessmentHappiest Minds Technologies LimitedEnable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
28 out of 60
Trip to Microsoft 365 Copilot ImplementationSuri Services SCOfrecemos un servicio de capacitación y preparación estratégica para la adopción de Microsoft 365 Copilot, enfocado en acelerar la productividad y transformar los procesos clave
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
29 out of 60
Mentoring ServiceMobile MentorOur mentoring service helps customers leverage Microsoft 365 to improve endpoint security & user experience. We help accelerate the learning curve & reduce risk by deploying Microsoft 365 optimally.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
30 out of 60
TGS Windows 11TEKsystems Global Services LLC.TEKsystems partners with you to navigate the transition to Windows 11
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
31 out of 60
Rapid Remediation of Microsoft Secure ScoreCyberOneBoost your Microsoft Secure Score, reduce risk and increase cyber resilience with expert-led rapid remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 60
Overwatch Microsoft 365 Security: 12 Month ImplementationTHREATSCAPE LIMITEDOverwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
34 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
35 out of 60
Citrix Endpoint Management to Microsoft Intune Migration PlanMobile MentorMobile Mentor’s Citrix Endpoint Management to Microsoft Intune services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
36 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process AdoptionVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
37 out of 60
Microsoft 365 Security Health Check Assessment 3-WkBulletproof Solutions Inc.Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
AI Governance Workshop: 4-Hour WorkshopVitalystBe introduced to Microsoft's AI Services, Azure Open AI and Copilot, and better understand the governance principles and practices tailored to them, like transparency, fairness, privacy, and security.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
39 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo SoftwareCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
41 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalystAlithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
42 out of 60
Unified Access & Protection with Microsoft Entra Global Secure AccessMobile MentorStep confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
43 out of 60
Security and Operations with Expert Microsoft 365 SupportAVASOFTMaximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
44 out of 60
Microsoft 365 Copilot Value DiscoveryCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Value Discovery Workshop – your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
45 out of 60
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFTBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
46 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVASOFTEnhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
47 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFTEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
48 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo SoftwareThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
4security: Backup as a Service for Microsoft 3654Sight HoldingsProtect your data with 4Security's Microsoft 365 Backup as a Service. Seamless integration, automated backups, and reliable data recovery for businesses of all sizes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
50 out of 60
Windows 365 Standardized PilotMobile MentorThe Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
51 out of 60
Copilot for Microsoft 365: 1-Day Data and Security WorkshopAwara IT Kazakhstan LLPUnlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
52 out of 60
MDS - Threat Protection EngagementMaureen Data SystemsA 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Microsoft Data Compliance Consulting Services - 2 Weeks AssessmentArmis, Sistemas de Informação, LdaThe Microsoft 365 Compliance assessment helps organizations implement a compliance strategy that accelerates and streamlines data security and governance while reducing risk.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
54 out of 60
Entra ID Governance and Guest AccessMobile MentorEmpower your business with Mobile Mentor’s Microsoft Entra ID Governance and Guest Access service, built on Microsoft’s cutting-edge Entra Identity Governance platform.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
55 out of 60
Licensing Microsoft 365: 1-day AssessmentInformatika a.d.We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
56 out of 60
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
57 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
58 out of 60
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
59 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
60 out of 60