FiltrosBorrar todo
Servizos de consultoría resultados
Mostrando resultados de servizos de consultoría.
Zero Trust Security AssessmentConcurrency, Inc.Assess and advance your Zero Trust security posture—and accelerate or expand your Microsoft 365 security strategy with expert-led guidance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Managed XDR Shield: 4-Week ImplementationLong View SystemsAddress all your proactive security needs, engage the Managed XDR Shield plan to monitor, alert, and respond to threats effectively.
+2
Applicable to:
Cloud Security
Threat Protection
2 out of 60
Microsoft Security: 4-Week ImplementationApex Digital SolutionsEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeITCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Ransomware Protection: 1 Day-WorkshopConvergeOneLearn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Lightstream Threat Protection Assessment and Deployment RoadmapLightstreamLeveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
+2
Applicable to:
Cloud Security
Threat Protection
6 out of 60
Management Services: 10-Week AssessmentCatapult Systems, LLCCatapult Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
7 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvokeThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
8 out of 60
Olive + Goose Data Security WorkshopOlive + GooseEnhance Your Organization’s Security with a Comprehensive Data Security Workshop
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
9 out of 60
Security für den Einsatz von Microsoft 365 CopilotnovaCapta GmbHEine sichere Basis schaffen und technische Hindernisse aus dem Weg räumen für den Einsatz von Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 60
Microsoft Sentinel Proof of Concept: 4 WeeksNetrix GlobalUnderstand how prepared is your Microsoft infrastructure when adversaries attack
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 60
Microsoft Copilot for Security: 2-Day WorkshopPlanet TechnologiesThis 2-day workshop covers the essential aspects you need to effectively and efficiently leverage Microsoft Copilot for Security for your organization's security operations and needs.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
12 out of 60
Microsoft 365 Security WorkshopOlive + GooseImprove your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 60
C1st End-user Device Security Zero TrustC1st Technologies LLCC1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5Collective InsightsUpgrade to Microsoft 365 E5 for Advanced Productivity and Security
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
16 out of 60
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
17 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLCGet a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Microsoft 365 Tenant-to-Tenant MigrationOlive + GooseThis offering provides assessment, migration, and post-migration support for transitioning Microsoft 365 workloads and endpoint management from a source Microsoft 365 tenant to a target tenant.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
19 out of 60
Content Security and Data Loss Prevention: 3-Day WorkshopFSI StrategiesFSi Strategies will demonstrate how an organization can protect it's most important asset, at the source. Ensuring that documents are protected no matter where they live.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
20 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Microsoft Endpoint Manager BaselineSHI International CorpExplore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
22 out of 60
Copilot for Security Readiness AssessmentBulletproof Solutions Inc.Get a Copilot for Security Readiness + a Security Health Check on your Microsoft 365 environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Managed Support for Microsoft Defender and Endpoint Detection and Response (EDR) ServiceOlive + GooseA fully managed Microsoft Defender + EDR service designed to protect your organization from today’s most persistent cyber threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 60
Copilot for Security Accelerator: 2-week ImplementationabraNeway’s Microsoft Copilot for Security Accelerator empowers security teams with enhanced protection and streamlined operations through eight key steps.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 60
Security Outcomes SprintAscent Global, Inc.Understand the Business Value of Your Cybersecurity Investments
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
27 out of 60
Cybersecurity AssessmentCDI LLCThe Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
28 out of 60
Microsoft 365 Managed SupportIvision, Inc.iVision offers 24/7 advanced support for Microsoft 365, enhancing IT with agile, integrated cloud solutions.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
29 out of 60
Microsoft 365 Copilot Readiness Assessment & AdoptionHeartland Business Systems, LLCMicrosoft 365 Copilot enhances business intelligence, processes, and data analysis. A Readiness Assessment prepares for AI integration with a customized plan, tailored recommendations & training.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Teamwork Deployment
30 out of 60
Get AI Ready: 5-Day AssessmentPSM PartnersAI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
31 out of 60
MDR Shield: 4-Wk ImplementationLong View Systems“MDR Shield” is Long View’s cyber security managed detection and response service.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
32 out of 60
iT1's Security AssessmentIt1 Source LLCImprove your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 60
User Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
34 out of 60
Modern Management for EndpointsIvision, Inc.Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
35 out of 60
Defender PilotLevacloud LLCThe Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
+2
Applicable to:
Cloud Security
Threat Protection
36 out of 60
Data Security and Governance: 2 Hour Free BriefingNetwovenNetwoven Data Security and Governance free strategy workshop will help you get started on the path to discover, protect, and govern your sensitive corporate data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
37 out of 60
MDR WorkshopGrant Thornton LLPMaximize Your Security Posture with Grant Thornton's MDR Program Assessment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Securing Identities WorkshopSynergy Technical, LLCThe foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
40 out of 60
Microsoft Defender for Cloud Apps: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Cloud Apps
+2
Applicable to:
Cloud Security
Threat Protection
41 out of 60
"Threat Protection: 3 Day Workshop"Insentra Pty LtdOur Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
42 out of 60
Modern Managed Services: 2-tägiges AssessmentnovaCapta GmbHIhre Optionen für Managed Services rund um Endpunkte, Microsoft Azure, Microsoft 365 und Security am Modern Workplace entdecken
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
43 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Threat Protection Engagement: 3-Day AssessmentPSM PartnersDo more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Threat Protection Envisioning WorkshopTECH HEADS INCLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
XENSHIELD365 - Managed Detection and Response (MDR)Xencia Technology Solutions Pvt Ltd24x7 Managed Security Operations SoC through shared team of Security experts Defender XDR
+2
Applicable to:
Cloud Security
Threat Protection
47 out of 60
Microsoft 365: 3 Week Solution AssessmentFirst National Technology Solutions, Inc.Partner with FNTS to conduct a 3 week workplace modernization solution assessment to build a TOC analysis & evaluate current purchasing structure to make recommendations for adoption of Microsoft 365.
+3
Applicable to:
Cloud Security
Meetings for Microsoft Teams
Teamwork Deployment
48 out of 60
Endpoint Security Advanced Quick Start 14-wk ImplementationEdgile, Inc.Pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
49 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day WorkshopeGroup Enabling Technologies, LLCWith Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
50 out of 60
C1st Office 365 Tenant Migration AssessmentC1st Technologies LLCEnsure a smooth Office 365 tenant-to-tenant migration for businesses. We provide comprehensive consulting services to facilitate seamless transitions during mergers, acquisitions, and other scenarios.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
51 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
52 out of 60
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Management Services: 3-month AssessmentQuisitiveQuisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
54 out of 60
Windows 365 Deployment : 12 month ImplementationPatriot Consulting Technology Group LLCPatriot will design, configure, test and deploy Microsoft Windows 365 for your environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
55 out of 60
Virteva Microsoft 365 Defender Ready DeployVirteva LLCGet immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
56 out of 60
Darktrace Managed Network SensorSentinel Technologies Inc.Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
+2
Applicable to:
Cloud Security
Threat Protection
57 out of 60
Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
58 out of 60
MicroAge ManageWise Microsoft 365 Assessment & ServicesMicroAgeComprehensive assessment of our clients Microsoft 365 tenant providing an Executive summary detailed report to reduce vulnerabilities improving Secure Score with 40 hours of Engineer time
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
59 out of 60
Remote Access to On-Prem Apps: 3 Wk ImplementationInvokeSurface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
+2
Applicable to:
Cloud Security
Identity & Access Management
60 out of 60