FiltresTout effacer
Services de conseil résultats
Affichage des résultats dans services de conseil.
Tous les résultats
Enterprise Mobility - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Enterprise Mobility policies, procedures and technology against best practices.
+2
Applicable to:
Cloud SecurityMobile Device Management
1 out of 43
Threat Protection - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Threat Protection policies, procedures and technology against best practices.
+2
Applicable to:
Cloud SecurityThreat Protection
2 out of 43
Enterprise Identity and Governance -1 Day BriefingAvalerisAvaleris developed a Capability Maturity Model to help organizations quickly assess the current state of Identity Management and Governance policies, procedures and technology against best practice.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
3 out of 43
Information Protection - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Information Protection policies, procedures and technology against best practices.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
4 out of 43
Sauvegarde Microsoft 365 : 2Wk - implementationProjetlysEnsemble de service permettant de mettre en place facilement une solution de backup Veeam pour Microsoft 365 ?
+2
Applicable to:
Cloud SecurityInformation Protection & Governance
5 out of 43
Adoptez Microsoft Edge : 2-Wk ImplementationProjetlysNotre approche pour la mise en place et l'adoption de Microsoft Edge.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
6 out of 43
Security Maturity Assessment: 4 WksLixar ITLet BDO help you design your roadmap to increase your security score with cost-effective security tools with our 4 week Security Maturity Assessment
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
7 out of 43
BDO eDiscovery: 4 Wk AssessmentLixar ITCentralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
8 out of 43
Insider Risk Management Assessment: 4 WksLixar ITBDO's Insider Risk Management Assessment can help you identify insider data risks and establish a plan to reduce data leakage using Microsoft 365 to ensure compliance and security.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
9 out of 43
Endpoint Management: 5-Days WorkshopVNEXT GroupLearn how to manage users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
10 out of 43
Discover Sensitive Data Workshop: 4-Wk WorkshopProArch Technologies, Inc.ProArch’s Discover Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
11 out of 43
Microsoft 365 Implementation for Financial ServiceNew Charter Technologies, Inc.Paid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
12 out of 43
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
13 out of 43
Microsoft 365 HIPAA/HITECH 20 Hour ImplementationNew Charter Technologies, Inc.Implementation of Microsoft 365 to include compliance policies and templates for health care.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
14 out of 43
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementMobile Device Management
15 out of 43
Modern Frontline Work Acceleration 2 days WorkshopLiveRoute FZ-LLCLiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityFrontline Workers
16 out of 43
Microsoft 365 Licence Health Check: 1-Day AssessmentITC Secure LtdA 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
17 out of 43
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
18 out of 43
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLCCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
19 out of 43
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
20 out of 43
Windows 11 Assessment: 1-WKSteeves Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
21 out of 43
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLCSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
22 out of 43
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
23 out of 43
Digital Workplace Essentials - Managed ServiceSoftwareOneOur kitbag of essential tools to get the best from your Microsoft 365 services investment
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceWorkplace Analytics
24 out of 43
microsoft365_security_identity_protection_1 Day_Workshop_CanadaCDWIdentity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to
manage your access quickly and accurately
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
25 out of 43
Microsoft 365 Security Device Protection 1 Day Workshop - CanadaCDWAs more and more users become mobile and are using a wider variety of devices, applications and documents need to keep up.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
26 out of 43
Microsoft365_security_information_protection_1Day_Workshop_CanadaCDWInformation is one of your most valuable assets and can easily be shared, even outside the organization.
+2
Applicable to:
Cloud SecurityThreat Protection
27 out of 43
Infosys Microsoft 365 Security and Compliance: 8 Weeks AssessmentInfosys LimitedInfosys Microsoft 365 security expert team offers a full spectrum security service for microsoft 365 services facilitated digital workplace.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesWorkplace Analytics
28 out of 43
Licensing Microsoft 365: 1-day AssessmentInformatika a.d.We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityCompliance Advisory Services
29 out of 43
Microsoft Defender for Endpoint SMC Deployment: 4-Week ImplementationBlueVoyantOur services are designed to maximize your investment with Microsoft with hands-on onboarding & baseline configuration services.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
30 out of 43
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud SecurityThreat Protection
31 out of 43
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud SecurityThreat Protection
32 out of 43
Microsoft 365 Defender SMC Deployment: 4-Week ImplementationBlueVoyantLet BlueVoyant take your security and compliance posture to the next level by deploying and optimizing Microsoft 365 Defender.
+2
Applicable to:
Cloud SecurityThreat Protection
33 out of 43
Cybersecurity Assessment - 3 WeeksArmis, Sistemas de Informação, LdaMicrosoft Security Assessment: detect security problems and take targeted action
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
34 out of 43
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POCatQorOur Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
35 out of 43
Microsoft Cloud App Security: 2 Week ImplementationArmis, Sistemas de Informação, LdaKeep your employees productive and secure on their favorite apps and devices with Cloud App Security. Bring the security of your on-premises systems to your cloud applications.
+1
Applicable to:
Cloud Security
36 out of 43
Windows 365 Pilot: 5 Days Proof of ConceptDelphi ConsultingDelphi Consulting will help you get started with Windows 365 Cloud-PC with its Pilot offering with the program running over 5 days.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementMobile Device Management
37 out of 43
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdgeEndpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
38 out of 43
Microsoft Defender for Endpoint: 2-Wks Proof of ConceptLotus Beta Analytics Nigeria LtdExperience Threat identification, Triage and Automatic Remediation
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
39 out of 43
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementTeamwork Deployment
40 out of 43
Data Protection Impact Assessment: 8 WkLighthouse GlobalEmpowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
41 out of 43
System Center Endpoint Manager 40 hour Quick Start Proof of Concept with Co-Management with Endpoint Manager in Office 365York Telecom CorpSystem Center Endpoint Manager 40-Hour Quick Start Proof-of-Concept. Design, deploy and learn SCEM in 40-hour proof-of-concept with Co-Management with Endpoint Manager Office 365
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementMobile Device Management
42 out of 43
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
43 out of 43