FiltresTout effacer
Services de conseil résultats
Affichage des résultats dans services de conseil.
Tous les résultats
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM Systems• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 48
Seguridad Corporativa: Evaluación 4 semanasCIBERIT SRL.Con esta Solución usted podrá gestionar la seguridad en toda su empresa
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
2 out of 48
Mailbox Guardian - Security: 2 Week ImplementationProServeITCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 48
Managed Services - Microsoft 365ConvergeOneFully utilize your Microsoft 365 Solution with all the Identity, Security, and Collaboration portions available to you
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
4 out of 48
Collab Now: 4-Wk ImplementationLong View SystemsCollab Now (Microsoft 365) supports worker productivity by delivering and managing a unified and integrated collaboration platform
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
5 out of 48
Rapid Zero Trust Deployment : 8-WK ImplementationMaureen Data SystemsThe purpose and objectives of this engagement are to develop a Zero Trust Implementation Strategy
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
6 out of 48
Secure Remote Work: 3 Days Intro and Plan WorkshopLiveRoute FZ-LLCEngagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
7 out of 48
Microsoft 365 Managed ServicesNetrix GlobalNetrix’s 24x7x365 managed services for Microsoft 365 combines a reactive service desk with proactive strategic planning to ensure your team is productive and secure.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
8 out of 48
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
9 out of 48
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
10 out of 48
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
11 out of 48
Avanade Hybrid Windows Endpoint Solutions FY24Avanade, Inc.Avanade has developed the next generation of endpoint solutions for the modern workforce, with integrated physical, virtual and hybrid solutions
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
12 out of 48
Security Maturity Assessment: 4 WksLixar ITLet BDO help you design your roadmap to increase your security score with cost-effective security tools with our 4 week Security Maturity Assessment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
13 out of 48
Accenture Modern Workplace ServicesAccentureAccenture Modern Workplace Services
+3
Applicable to:
Frontline Workers
Identity & Access Management
Meetings for Microsoft Teams
14 out of 48
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 48
Endpoint Modernization Quickstart ServiceDell Technologies ServicesDell Quick Start service helps customers configure their environment and prepare it for Modern Device Management and Modern Provisioning.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
16 out of 48
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
17 out of 48
Microsoft 365 Security Review: 3-Wk AssessmentProArch Technologies, Inc.Identifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
18 out of 48
Microsoft 365 Security Hardening; 4-Wk ServiceProArch Technologies, Inc.The Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
19 out of 48
Endpoint Management: 5-Days WorkshopVNEXT GroupLearn how to manage users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
20 out of 48
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
21 out of 48
Identity & Access Management : 6 Wk ImplementationHappiest Minds Technologies LimitedEnd to end Microsoft IAM Analysis & License Utilization, Plan- Deploy- Implement & Roll Out Microsoft IAM Suite, followed by ongoing managed services.
+1
Applicable to:
Identity & Access Management
22 out of 48
Securing Identities: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Securing Identities is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+1
Applicable to:
Identity & Access Management
23 out of 48
Microsoft 365 Licence Health Check: 1-Day AssessmentITC Secure LtdA 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 48
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 48
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLCCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 48
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
27 out of 48
Windows 11 Assessment: 1-WKSteeves Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
28 out of 48
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLCSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 48
Intune for macOS: 8-Week ImplementationMobile MentorManage your macOS devices from Microsoft Intune with zero-touch provisioning, OS and app updates, and more.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
30 out of 48
Intune for iOS, iPadOS 4-Week ImplementationMobile MentorManage corporate and personal iOS and iPadOS devices with Microsoft Intune. Get zero-touch, OS and app updates, and more.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
31 out of 48
Intune for Android: 4-Week ImplementationMobile MentorAndroid devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
32 out of 48
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden MaĂźnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
33 out of 48
microsoft365_security_identity_protection_1 Day_Workshop_CanadaCDWIdentity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to
manage your access quickly and accurately
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 48
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 48
Endpoint Ecosystem Technical Support: 12-month Support ImplementationMobile MentorProvide support and advice to IT administrators on Microsoft Endpoint Manager
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
36 out of 48
Neway Security proposition: 3-WK implementationNeWay Technologies LtdThe Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
37 out of 48
Microsoft 365 Security Health Check: 3 day AssessmentISCG SP Z O OMicrosoft 365 is a multi-layer solution with the right security policies you can block over 99.9 percent of account compromise attacks!
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
38 out of 48
Sogeti SmartWorkspace: 4 Week ImplementationCapgemini GroupSogeti provides a one-stop shop set of offerings around the SharePoint solutions. Our offer comprises consultancy, discovery of the existing landscape, Solution Architecture, SharePoint migration etc.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
39 out of 48
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POCatQorOur Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
40 out of 48
Microsoft Defender for Endpoint: 2-Wks Proof of ConceptLotus Beta AnalyticsExperience Threat identification, Triage and Automatic Remediation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 48
Windows 365 Cloud PC 10-Days PoCSonata Information Technology LimitedPaid Assessment and PoC to deploy and use Windows 365 Cloud PC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
42 out of 48
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
43 out of 48
Microsoft 365 E3 12-Months ImplementationOffice DepotConnected Workplace for All Users with Microsoft 365 E3 Bundle
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
44 out of 48
Assessment - Workplace Modernization & Optimization - 1-MonthZones, LLCAnalysis of current environment to highlight opportunities​ to reduce duplicative cost and modernize your workplace
+3
Applicable to:
Calling for Microsoft Teams
Compliance Advisory Services
Identity & Access Management
45 out of 48
Endpoint Management and Windows Deployment: 2-days ImplementationCC Bilgi TeknolojileriMicrosoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises.
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
46 out of 48
Information Discovery Week: 1-Week AssesmentCipher (Prosegur Ciberseguridad SL)One of the big problems that all organizations encounter is the classification of information and its discovery. From Cipher we offer a service, which performs this function for a short period.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
47 out of 48
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
48 out of 48