FilterHapus semua
Layanan konsultan hasil
Menampilkan hasil dalam layanan konsultan
Semua hasil
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer SolutionsSirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
1 out of 60
discover-sensitive-data-workshopECF Data LLCECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
2 out of 60
ECF Data Threat Protection: 3-Day WorkshopECF Data LLCThe Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
3 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
5 out of 60
Azure Sentinel: 3 Day WorkshopModality SystemsThis workshop will give you a bird's eye view across your enterprise with SIEM, for a truly modern world and workplace
+1
Applicable to:
Cloud Security
6 out of 60
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
7 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
8 out of 60
Security Assessment: 2 Week AssessmentTallanTallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Microsoft 365 Security Assessment - 4wk AssessmentProtivitiEffective Analysis of CIS & NIST Benchmarking, Active Directory to Azure and Microsoft 365 Configurations
+1
Applicable to:
Cloud Security
10 out of 60
Azure Sentinel: 8H WorkshopadaQuestModernize your security operations with Azure Sentinel.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 60
Discover Sensitive Data: 2 Week WorkshopNetwovenNetwoven Discover Sensitive Data workshop will train you to better discover, protect, and govern your corporate data
+2
Applicable to:
Cloud Security
Information Protection & Governance
12 out of 60
Defender for Office 365: 3-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
13 out of 60
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLCCatapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 60
Change Management 6-Months ImplementationSupremo Sp. z o.o.Bądź pewny, że zaangażowanie użytkowników i przyjęcie nowych rozwiązań przyczyni się do sukcesu wdrożenia, sukcesu całej organizacji.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
15 out of 60
Secure Identities and Access: 8H WorkshopadaQuestAn executive deep dive into foundational identity strategy, tailored to your customers’ organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Enhance IT Security: 1-2-Wk ImplementationFMT ConsultantsFMT offers a smart security solution that protects your business, your employees, and your clients while providing a reliable, scalable, and durable approach to keeping your business up and running.
+2
Applicable to:
Cloud Security
Identity & Access Management
17 out of 60
Avanade Defend Against Threats with SIEM Plus XDR FY23Avanade, Inc.Cybercrime is an ongoing and escalating challenge for organizations around the globe. We help clients modernize their security and defend against these threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Windows 365 QuickStart : 4 Day PoC + Surface GoSynergy Technical, LLCThe Windows 365 Quick Start engagement is designed to show you how Windows 365 + SurfaceGo keeps you productive. Included are a Surface Go, planning services, as well as a proof of concept.engagement
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
19 out of 60
Transition to the Cloud: 2 Day WorkshopModality SystemsEvaluate, envision and enable relevant scenarios so you can work productively and securely with Microsoft 365 in the cloud. You will leave with a deployment plan, timeline and next actions.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
20 out of 60
Manage and Investigate Risk: 2 Day WorkshopModality SystemsIn this one-day Microsoft workshop, you'll understand how to assess your environment against the data protection baseline, and learn how to address and mitigate compliance risks
+1
Applicable to:
Cloud Security
21 out of 60
Hybrid Cloud Security: 3 Day WorkshopModality SystemsOur workshop delivers a customised threat & vulnerability analysis of your hybrid and multi-cloud environment, and will teach you how to build a more robust cloud security system.
+2
Applicable to:
Cloud Security
Information Protection & Governance
22 out of 60
Discover Sensitive Data: 2 Day WorkshopModality SystemsIn this two-day Microsoft workshop, you'll understand the hidden risks of dark data, assess your own environment against the data protection baseline, and learn how to address and mitigate risk
+1
Applicable to:
Cloud Security
23 out of 60
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
24 out of 60
Threat Protection: 2-Week WorkshopForsyte IT SolutionsLearn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Office 365 Teamwork Security - Managed ServiceCognizantTeamwork Security provides a comprehensive security management service for Office 365 platforms
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareONEImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareONE
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
27 out of 60
AvePoint Policies & Insights: 10-Days AssesmentsIT-Dev sp. z o. o.Assesment's outcomes:
• Enable centralized reporting on Microsoft 365 security.
• Discover potential risks and exposed content.
• Enforce policies and automatically remediate security breaches!
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
28 out of 60
Guardian 365 Managed Security ServicesForsyte IT SolutionsProtection is key to the security of your organization. Defend against threats with Guardian 365, your key to better managed security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
30 out of 60
Email and Threat Protection 4 Week ImplementationHTGHTG’s Advanced Email Threat Protection pack ensures your Microsoft products such as Outlook, SharePoint, OneDrive & Microsoft Teams are hardened to best practice standards.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
31 out of 60
Collaboration & Data Governance 4Wk ImplementationHTGHTG’s Collaboration & Data Governance pack can help companies achieve the right balance of user freedom while ensuring compliance with corporate policies.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
32 out of 60
Microsoft 365 Security: 3 Week Exec WorkshopValorem LLCA strategic deep dive for security decision-makers to better understand, prioritize, and mitigate real-time threats in your environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
33 out of 60
Threat Protection Workshop: 5-Days w/ ResultsOlive + Goose - PhilThe Microsoft 365 Threat Protection Workshop helps customers assess their security & address their most pressing security goals providing an immersive experience using Microsoft 365 security
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
34 out of 60
Digital Workplace Foundations: 4-wk AssessmentCatapult Systems, LLCCatapult’s Digital Workplace Foundations helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tools.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
35 out of 60
Microsoft 365 Migration 12 Hour Proof-of-ConceptNew Charter Technologies, Inc.Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
36 out of 60
Microsoft 365 Implementation for Financial ServiceNew Charter Technologies, Inc.Paid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
37 out of 60
Microsoft 365 HIPAA/HITECH 20 Hour ImplementationNew Charter Technologies, Inc.Implementation of Microsoft 365 to include compliance policies and templates for health care.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
38 out of 60
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 60
Microsoft 365 Digital Workforce: 8H WorkshopadaQuestLearn how to empower people to be more productive and secure as they adapt to new ways of working with Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
40 out of 60
Microsoft 365 Manage Service–12 mth ImplementationAlfa Connections Pte LtdAlfa Connections providing Microsoft 365 Managed service is designed to enhance your workforce experience by supporting your organization on planning, enablement, implementation, and adoption.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
41 out of 60
Secureshield - 12 months - Managed ServicePatriot Consulting Technology Group LLCHarden Office 365, deploy and manage Intune, and keep up to date of all Microsoft 365 and Intune updates and changes.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
42 out of 60
MD-100T00: Windows Client : 5 Days WorkshopNETCOM LEARNINGIn MD-100 course, students will also learn how to secure the Windows OS and protect the data on the device.
+2
Applicable to:
Cloud Security
Device Deployment & Management
43 out of 60
Protect & Govern Sensitive Data Workshop: 8H WorkshopadaQuestDiscover risks from dark data and learn how to address them with the Protect & Govern Sensitive Data Workshop
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
44 out of 60
Endpoint Management: 8H WorkshopadaQuestManage and protect your devices, your apps, and your users with the Endpoint Management Workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Secure Multi-Cloud Environments: 8H WorkshopadaQuestGet a customized threat & vulnerability analysis of your hybrid and multi-cloud environment and learn how to build a more robust cloud security system.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
46 out of 60
MD-101: Managing Modern Desktops: 5 Days WorkshopNETCOM LEARNINGMD-101T00: Managing Modern Desktops course comprise topics such as Deploying, Managing, Protecting Modern Desktops and Devices
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
47 out of 60
Microsoft 365 Identity & Services: 5 Days workshopNETCOM LEARNINGThe Microsoft 365 Identity and Services course cover three central elements of Microsoft 365 enterprise administration-Microsoft 365 tenant and service management, Microsoft 365 management.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Workplace Analytics
48 out of 60
Microsoft 365 Messaging: 5 Day WorkshopNETCOM LEARNINGThe Microsoft 365 Messaging course is designed for IT Professionals who deploy and manage the messaging infrastructure for Microsoft 365 in their organization
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
49 out of 60
Microsoft 365 Mobility & Security: 5 Days WorkshopNETCOM LEARNINGExamine all the common types of threat vectors and data breaches facing organizations today.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
50 out of 60
Modern Workplace Adoption Framework: 10-Wks ImplInveroReimagine how work should be done and get the most out of Microsoft 365. Invero's Modern Workplace foundation sets your organization up for success by optimizing return on your investment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
51 out of 60
Microsoft 365 Fundamentals: 1 Day WorkshopNETCOM LEARNINGIntroduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
+3
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
52 out of 60
AgileAscend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile ITA 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
53 out of 60
Nonprofit Security Maturity Assessment - 4 weeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Threat Protection: 5-Week WorkshopBlueVoyantAn executive deep dive into security strategy, tailored to your organization.
+2
Applicable to:
Cloud Security
Threat Protection
55 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Microsoft 365 Licence Health Check: 1-Day AssessmentITC Secure LtdA 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLCCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLCSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Microsoft 365 Inter-Tenant Migration: 2 days AssessmentPreeminent Solutions, Inc.Preeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
60 out of 60