FilterHapus semua
Layanan konsultan hasil
Menampilkan hasil dalam layanan konsultan
Semua hasil
Microsoft 365 Copilot Workshop: 2daysInsightTake the first steps toward helping your organization unleash creativity, unlock productivity, and level up skills with Insight’s Microsoft 365 Copilot Workshop.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
1 out of 60
Intune Managed ServiceMobile MentorYour endpoint ecosystem is constantly evolving and needs proactive management, so we designed the Intune Managed Service to help customers unlock the full potential of Intune.
+2
Applicable to:
Cloud SecurityIdentity & Access Management
2 out of 60
Avanade Entra Verified ID Consulting ServicesAvanade, Inc.Microsoft Entra Verified ID is a Decentralized Identity implementation that streamlines any identity related process, simplifies it, reduce costs and increases convenience.
+1
Applicable to:
Identity & Access Management
3 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
4 out of 60
Microsoft 365 Copilot: Adoption and Change Management (ACM)NOVENTIQMicrosoft 365 Copilot Adoption and Change Management service by Noventiq helps organizations accelerate Microsoft 365 Copilot Success through AI Adoption Excellence
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
5 out of 60
Microsoft 365 Copilot Foundations ProgramHSO From envisioning and assessment to deployment, embrace the power of Microsoft 365 Copilot - your Copilot for work!
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementTeamwork Deployment
6 out of 60
Red Canary MSSP FastTrack for SecurityRed CanaryLeverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
7 out of 60
Microsoft 365 Copilot Readiness: 2-4 Week AssessmentInsightPrepare your business to realise the productivity promise of Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
8 out of 60
Start your GenAI journey with NTT DATA: Boost Copilot for Microsoft 365 adoption with our Adoption AcceleratorNTT DATA Inc.Discover the Power of NTT DATA's Copilot for Microsoft 365 Implementation and Adoption Services, Engineered to Unlock the Full Potential of Generative AI Technology for Your Business
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementMobile Device Management
9 out of 60
Microsoft 365 Security: 3,5 Tage Tenant AssessmentAppSphere AGSicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementKnowledge & Insights
10 out of 60
Okta to Microsoft Entra ID MigrationPerformantaPerformanta's Okta to Microsoft Entra ID Application Migration service will give you a controlled, seamless and secure transition to Azure AD.
+1
Applicable to:
Identity & Access Management
11 out of 60
Email Security Threat AssessmentAVA SOFTWARE INCConfident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
12 out of 60
Logicalis Digital Workplace (DWP) - 2 weeks ImplementationLOGICALIS ASIALogicalis Managed Services provides full service monitoring and management of digital workplace that empowering employee in using digital technologies to collaborate freely and improved performance
+3
Applicable to:
Calling for Microsoft TeamsIdentity & Access ManagementMeetings for Microsoft Teams
13 out of 60
Capgemini Modern Workspace PortfolioCapgemini GroupCapgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementIdentity & Access Management
14 out of 60
Phishing, Malware & Spam protection- 2 weeks ImplementationAVA SOFTWARE INCPhishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
15 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
16 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 WksWipro LtdWipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
+2
Applicable to:
Identity & Access ManagementThreat Protection
17 out of 60
Co-pilot Technical ReadinessPHOENIX SOFTWARE LTDHelp your organisation ensure that they are technically ready for Co-pilot
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementKnowledge & Insights
18 out of 60
Shadow IT discovery with Microsoft cloud app securityAVA SOFTWARE INCKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
19 out of 60
Teams & SharePoint Security HardeningAVA SOFTWARE INCTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to:
Identity & Access ManagementTeams Custom SolutionsThreat Protection
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
21 out of 60
Microsoft 365 Email Threat Protection AssessmentAVA SOFTWARE INCMicrosoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
22 out of 60
Data Protection and Governance with Microsoft PurviewAVA SOFTWARE INCConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
23 out of 60
Enhanced Data Privacy with Microsoft PurviewAVA SOFTWARE INCConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
24 out of 60
Microsoft 365 Copilot Readiness: 2 week AssessmentTOKIOTAWe help our clients to integrate Microsoft 365 Copilot in their organization in the most secure and efficent way
+3
Applicable to:
Adoption & Change ManagementCompliance Advisory ServicesIdentity & Access Management
25 out of 60
Journey to Microsoft 365 Copilot: 4-hours WorkshopPROJECT INFORMATICA SRLMicrosoft 365 Copilot workshop bring to you the opportunity to create awareness about holistic to Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
26 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro LtdWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
27 out of 60
Avanade Microsoft 365 Copilot Information Management 4 wk Imp. FY24Avanade, Inc.Avanade Microsoft 365 Copilot Information Management Accelerator ensures your data meets high standards of security, privacy and compliance so you can confidently unlock Copilot's full potential.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
28 out of 60
Atos || Pilot program for Windows 365Atos International SASAtos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
29 out of 60
Microsoft Sentinel - Log Management and threat detectionAVA SOFTWARE INCIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
30 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
31 out of 60
Copilot Readiness Assessment for Microsoft 365Mint Management TechnologiesMint Group is thrilled to bring you a consulting service designed to supercharge your Microsoft 365 experience and get you Microsoft 365 Copilot ready.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementKnowledge & Insights
32 out of 60
Atos || Microsoft Windows 365 PilotAtos International SASAtos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
33 out of 60
Integrating Microsoft Sentinel with External EDR ServiceAVA SOFTWARE INCEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
34 out of 60
Secure Identities and Access: 3 W - WorkshopExelegentHelp customers find and mitigate identity risks and safeguard their organization with a seamless identity solution.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
35 out of 60
ADFS to Microsoft Entra ID Migration: 4-Wk ImplementationPerformantaUndertake a seamless ADFS to Microsoft Entra ID app migration, improving security, offering up new features, and getting your organisation back on track.
+1
Applicable to:
Identity & Access Management
36 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalystAlithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
37 out of 60
SmartStart for IntuneMobile MentorThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
38 out of 60
Modern Workplace - Cloud Endpoint ManagementArxusOur Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
39 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
40 out of 60
Defend Against Threats with SIEM Plus XDR: 2-W WorkshopExelegentThe Defend Against Threats with SIEM Plus XDR (with Attack Simulation) workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
41 out of 60
Microsoft 365 complete security HardneningAVA SOFTWARE INCAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
42 out of 60
Microsoft 365 Copilot Discover and Envision SessionInsightDiscover the Power of AI with Copilot
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
43 out of 60
Microsoft Intune DeploymentSecure Future Bilgi Tek. ve Hiz. Tic A.S.The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
+3
Applicable to:
Identity & Access ManagementMobile Device ManagementThreat Protection
44 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementationCloudshift3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
45 out of 60
Sensitive data risk assessmentAVA SOFTWARE INCConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
46 out of 60
Red Canary Cloud Security AssessmentRed CanaryAssess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
47 out of 60
Microsoft Copilot for Security Readiness Assessment: 4-Week AssessmentTech One GlobalOur Microsoft Copilot for Security Readiness Assessment encompasses a thorough evaluation of your existing security infrastructure, policies, and procedures.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
48 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud SecurityIdentity & Access Management
49 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed CanaryGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
50 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense GlobalStop threats with a cloud-native SIEM adapted to your new business needs.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementThreat Protection
51 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInsider Risk
52 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
53 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayonEvaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
54 out of 60
Sensitive Data Protection with Microsoft PurviewAVA SOFTWARE INCSensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
55 out of 60
Device Domain Migration from On-Premises to CloudAVA SOFTWARE INCSeamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
56 out of 60
Microsoft Cloud application security Assessment - 2 weeksAVA SOFTWARE INCUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
57 out of 60
KPMG Microsoft 365 Copilot: 3-Wk Readiness AssessmentKPMG SERVICES PTE. LTD.Assessment of data protection and identity & access processes and controls to ensure security measures are in place for a secured adoption Microsoft 365 Copilot
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
58 out of 60
Microsoft 365 Defender for Endpoint Vulnerability AssessmentAVA SOFTWARE INCEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
59 out of 60
Microsoft Cloud Application for 3rd Party AppsAVA SOFTWARE INCSecure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
60 out of 60