SzűrőkAz összes törlése
Tanácsadási szolgáltatások eredmény
találat látható innen: tanácsadási szolgáltatások.
Az összes találat
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
1 out of 60
Onesec Digital IdentitySecure Nextgen SystemsHaving a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
+2
Applicable to:
Identity & Access ManagementThreat Protection
2 out of 60
Workshop for Microsoft 365 Threat ProtectionCDWThe Workshop for Microsoft 365 Threat Protection provides the following objectives to ensure thorough enablement of crucial Microsoft products for a more secure environment.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
3 out of 60
Office 365 Managment: 1 Day AssessmentEze Castle IntegrationECI will review your Office 365 Tennant Configuration and suggest on-going managment needs
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
4 out of 60
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week ImplementationQuisitiveQuisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
5 out of 60
Device Monitoring with Microsoft Defender for EndpointAVA SOFTWARE INCManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
6 out of 60
Microsoft Cloud application security Assessment - 2 weeksAVA SOFTWARE INCUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
7 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwovenNetwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
8 out of 60
Device Security Management with Microsoft IntuneAVA SOFTWARE INCSeamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
+3
Applicable to:
Identity & Access ManagementMobile Device ManagementThreat Protection
9 out of 60
Microsoft Cloud Apps Security for Microsoft 365 AppsAVA SOFTWARE INCEnhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
10 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLCThis service moves key server tasks to a new one for upgrades or system changes.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
11 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.A high-level forensics evaluation designed to identify current and past threat activity.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
12 out of 60
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInsider Risk
13 out of 60
Difenda - Information Protection and Governance - 4-week ImplementationDifendaUse Microsoft Purview to Implement an Information (Data) Protection and Governance solution to improve Security.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
14 out of 60
Ransomware Protection: 1 Day-WorkshopConvergeOneLearn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
15 out of 60
ITI Copilot Assessment: 4-5 Wk AssessmentITI Inc.Are you fully ready for Microsoft's Copilot? Our assessment will assure you are ready for Copilot and highlight areas where action will be needed prior to doing so.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
16 out of 60
eDiscovery Workshop: 4 hours WorkshopPlanet TechnologiesA half-day Workshop that provides an overview and deep understanding of Microsoft 365 eDiscovery Standard and Premium products.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
17 out of 60
Discover Sensitive Data: 3-Wk AssessmentKiZAN TechnologiesIdentify and assess the security posture, location, and movement patterns of sensitive data in your organization to better understand required solutions.
+2
Applicable to:
Identity & Access ManagementInformation Protection & Governance
18 out of 60
Wc-PC- Wragby Cloud PCWragby Business Solutions & Technologies LimitedThe Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
19 out of 60
Modern EndPoint Management - Jumpstart: 1-Wk Proof of ConceptLogicalis, Inc.Intune Jumpstart will help showcase the value of Microsoft Intune, to show you how to more effectively manage endpoints within Intune. Proof of Concept deployment included!
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
20 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu TarsasagSafeguard your entire organization with Managed Security Services on Microsoft Defender
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
21 out of 60
G Suite to M365 Migration: 1-Day Proof of concepttrue org cloudProof of concept for migration from G Suite to Microsoft 365
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementMeetings for Microsoft Teams
22 out of 60
Microsoft Windows Autopilot Services: 5-Day Proof of ConcepteGroup Enabling TechnologiesReduce IT complexity and eliminate time-consuming corporate re-imaging by shipping and deploying straight to users with Microsoft Windows Autopilot.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
23 out of 60
Microsoft 365 FastTrack: 1-Day BriefingeGroup Enabling Technologies, LLCMicrosoft's FastTrack benefit provides guidance to help you to deploy Microsoft 365 Cloud Solutions at no additional cost.
+3
Applicable to:
Identity & Access ManagementMeetings for Microsoft TeamsMobile Device Management
24 out of 60
Microsoft 365 Licence Health Check: 1-Day AssessmentITC Secure LtdA 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
25 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
26 out of 60
Microsoft Entra Verified ID and Credivera: 3-day Planning WorkshopOxford Computer Group LLCThis Planning Workshop is designed to help you get started with a verifiable credentials solution using Credivera and Microsoft Entra Verified ID.
+1
Applicable to:
Identity & Access Management
27 out of 60
Microsoft Intune Endpoint Manager Discovery: 1-Mo AssessmentProServeITEnable organization-wide management & security for your endpoints (mobile devices, workstations, etc.) with a Microsoft Intune Endpoint Manager Discovery.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
28 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
29 out of 60
Microsoft 365: 2-Week ImplementationTechnologentExpert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
30 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLCBreach and Attack Simulations — We Attack to Defend You
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
31 out of 60
Zero Trust Protect and Govern Sensitive DataKiZAN TechnologiesLock down your data and take back control. Our Zero Trust Protect and Govern program empowers you to secure your sensitive information, simplify compliance, and gain peace of mind.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
32 out of 60
Identity & Access Management : 6 Wk ImplementationHappiest Minds Technologies LimitedEnd to end Microsoft IAM Analysis & License Utilization, Plan- Deploy- Implement & Roll Out Microsoft IAM Suite, followed by ongoing managed services.
+1
Applicable to:
Identity & Access Management
33 out of 60
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso CorporationHelping customers KickStart features in Microsoft 365 E3 Subscription
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementWorkplace Analytics
34 out of 60
Microsoft 365 Information Protection 1-day WorkshopGrant Thornton LLPReview your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
35 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLCOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
36 out of 60
Window 365 Cloud PC: 3-Day Proof-of-ConceptCTGlobal A/SAssess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
37 out of 60
Modern Workplace AssessmentHTGThis assessment supports businesses in their cloud journey to quickly develop or migrate into a modern cloud-based organisation by implementing a Software as a Service Strategy with Microsoft 365.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
38 out of 60
1-Day Security & Identity WorkshopConvergeOneTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
39 out of 60
NTT Americas - Microsoft Device ManagementNTT LimitedDeployment of Microsoft Unified Endpoint Management Services. Assessment of your resources and business objectives to develop a fresh approach to your security strategy.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
40 out of 60
Microsoft Endpoint Management: 5-Day Proof of ConcepteGroup Enabling Technologies, LLCeGroup Enabling Technologies, LLC. Microsoft Endpoint Management Proof of Concept will allow you to modernize your endpoint management as part of an overall device management strategy.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceMobile Device Management
41 out of 60
Endpoint Management and Windows Deployment Services: 4-Wk ImplementationData Market Bilgi Hizmetleri A.SEndpoint Management and Windows Deployment Services Consultancy is a professional consultancy service for modernization of device and application management infrastructure .
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
42 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
43 out of 60
OENG - Next Generation Endpoints-1 Month Proof of ConceptSecure Nextgen SystemsLearn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
44 out of 60
Modern Endpoint Management Airlift: 2 Week POCSynergy Technical, LLCOur Modern EndPoint Management Airfift will provide a deep dive into Microsoft's endpoint security solutions, as well as a proof of concept tailored to your specific concerns.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
45 out of 60
Microsoft 365 Copilot Deployment and Readiness ServicesInsightInsight can guide you on your Microsoft 365 Copilot journey with help of more than 1,500 dedicated Modern Work professionals who have been working to optimize Microsoft environments for 20 years.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
46 out of 60
Tailored Managed Services for Microsoft 365 AdministrationFinchloomStandardized management of your Microsoft 365 Tenant. Free up internal resources from regular administration tasks, firefighting issues, and escalating to Microsoft Support.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
47 out of 60
BCN Intranet LiteBCN Group Ltd.We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
48 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
49 out of 60
Modern Endpoint Management: 2-Hr AssessmentAscent Global, Inc.There’s a reason Microsoft chose us as their Modern Endpoint Management Partner of the Year for 2023. We believe you can reduce your threat risk by modernizing your Endpoint Management Strategy.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
50 out of 60
Defender for Endpoint: 5-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
51 out of 60
Microsoft 365 Azure AD 3-wk Implementation RoadmapCyclotron Inc.Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
+3
Applicable to:
Identity & Access ManagementMobile Device ManagementThreat Protection
52 out of 60
Windows 365 Jumpstart: 3 Week ImplementationSteeves We'll discuss the value of Windows 365 and its key functionalities, followed by a workshop to expose key areas and document decisions that drive implementation to ensure a successful adoption.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementIdentity & Access Management
53 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLCLeverage your Microsoft investment to create a strong Zero Trust security environment.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
54 out of 60
OAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen SystemsLearn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
+3
Applicable to:
Identity & Access ManagementInsider RiskThreat Protection
55 out of 60
Windows 365: 5-week Proof of ConceptInterlink Cloud Advisors, Inc.Enhance productivity through flexibility by enabling your team to create secure Cloud PCs and allowing BYOD without increasing risk to your environment
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceMobile Device Management
56 out of 60
Defender for Endpoint Professional Security Services | Customized Deployment in as Little as 6-WeeksDifendaMaximize your Microsoft Security investment with our Defender for Endpoint Design & Implementation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
57 out of 60
Offer Name: Microsoft 365 CrashCourse - 1 week WorkshopVirteva LLCEmpower organizations to gain a deeper understanding of Microsoft 365 and its vast array of services, features, and capabilities through Virteva's Microsoft 365 CrashCourse Workshop.
+3
Applicable to:
Identity & Access ManagementKnowledge & InsightsMobile Device Management
58 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLCGet a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
59 out of 60
Secure Remote Workplace: 1-Wk WorkshopFSI Strategies5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
60 out of 60