FiltriCancella tutto
Servizi di consulenza risultati
Visualizzazione di  risultati in servizi di consulenza.
Sovereign Cloud-Go China上海南洋万邦软件技术有限公司将原部署在全球版 Microsoft 365 的数据迁移至由世纪互联运营的中国版 Microsoft 365(21Vianet)环境中,以满足监管要求。To comply with regulatory requirements, data originally hosted in the global version of Microsoft 365 is being migrated to t
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
1 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen SystemsThe Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Insider Risk
Insider Risk
2 out of 60
Data Security EngagementadaQuestThe Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
3 out of 60
Identity Health CheckMobile MentorMobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
4 out of 60
Copilot Value DiscoveryadaQuestThe Copilot Value Discovery is a three-phase process that helps customers grasp the benefits of AI reinvention, pinpoint key functional scenarios, create a business case, and develop a strategic plan.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
5 out of 60
Microsoft 365 Email Threat Protection AssessmentAVASOFTMicrosoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
+3
Applicable to: Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
6 out of 60
Threat Protection EngagementadaQuestLearn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
7 out of 60
Copilot Readiness Assessment for Microsoft 365Mint Management TechnologiesMint Group is thrilled to bring you a consulting service designed to supercharge your Microsoft 365 experience and get you Microsoft 365 Copilot ready.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Knowledge & Insights
Knowledge & Insights
8 out of 60
Pently Microsoft 365 - AssessmentPently GmbHStructured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
9 out of 60
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
10 out of 60
Microsoft 365 Copilot Risk Assessment: 1-Week Strategic WorkshopAtmoseraUncover data risks and prepare for secure Copilot adoption with a Microsoft 365 risk assessment.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
11 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş."Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
12 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
13 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementationCloudshift3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
14 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
15 out of 60
Microsoft Purview Migration Accelerator: 1-Day Envisioning WorkshopMAQ SoftwareOur workshop assesses your data landscape, identifies challenges, provides tailored recommendations, and a phased migration strategy to Microsoft Purview in just one day.
+3
Applicable to: Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
16 out of 60
Microsoft Intune DeploymentSecure Future Bilgi Tek. ve Hiz. Tic A.S.The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
+3
Applicable to: Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management Threat Protection
Threat Protection
17 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
18 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
19 out of 60
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance. 
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
20 out of 60
Microsoft Defender for Endpoint - Vulnerability Assessment by AVASOFTAVASOFTEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
21 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalystAlithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
22 out of 60
Phishing, Malware & Spam protection- 2 weeks ImplementationAVASOFTPhishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
23 out of 60
Unified Access & Protection with Microsoft Entra Global Secure AccessMobile MentorStep confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
24 out of 60
Security and Operations with Expert Microsoft 365 SupportAVASOFTMaximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Workplace Analytics
Workplace Analytics
25 out of 60
Infra & Network Monitoring with Microsoft SentinelAVASOFTBoost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
+3
Applicable to: Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
26 out of 60
Microsoft Cloud App Security (MCAS) Solutions for Native Apps by AVASOFTAVASOFTEnhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
27 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
28 out of 60
Windows 365 Standardized PilotMobile MentorThe Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management
29 out of 60
MDS - Threat Protection EngagementMaureen Data SystemsA 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
30 out of 60
Manage Corporate Data on Devices with IntuneAVASOFTCan you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
31 out of 60
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFTUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
32 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFTBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
33 out of 60
Entra ID Governance and Guest AccessMobile MentorEmpower your business with Mobile Mentor’s Microsoft Entra ID Governance and Guest Access service, built on Microsoft’s cutting-edge Entra Identity Governance platform.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
34 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFTIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
35 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
36 out of 60
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVIdentify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
+2
Applicable to: Identity & Access Management
Identity & Access Management Insider Risk
Insider Risk
37 out of 60
Journey to Microsoft 365 Copilot: 4-hours WorkshopPROJECT INFORMATICA SRLMicrosoft 365 Copilot workshop bring to you the opportunity to create awareness about holistic to Microsoft 365 Copilot
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
38 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFTConfident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
39 out of 60
Hybrid Infrastructure Overview WorkshopAwara IT Kazakhstan LLPRapid hybrid‑cloud design workshop — learn best practices, pitfalls, and licensing tips for Microsoft on‑prem + Azure/Microsoft 365.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management
40 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
41 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
42 out of 60
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFTIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
43 out of 60
ADFS to Entra ID Migration ServiceMobile MentorMobile Mentor’s ADFS to Entra ID Migration Service offers a secure, cloud-first Single Sign-On experience that eliminates outdated infrastructure and unlocks the full potential of Microsoft Entra ID.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
44 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance. 
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
45 out of 60
SmartStart for IntuneMobile MentorThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management
46 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFTEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support. 
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
47 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
48 out of 60
Microsoft Cloud App Security (MCAS) for Custom Apps by AVASOFTAVASOFTKnow your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
49 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
50 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
51 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight HoldingsStrengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
52 out of 60
Teams & SharePoint Security HardeningAVASOFTTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to: Identity & Access Management
Identity & Access Management Teams Custom Solutions
Teams Custom Solutions Threat Protection
Threat Protection
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
54 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
55 out of 60
OneShieldSecure Nextgen SystemsThe Oneshield is a security solution as designed to support the client by delivering value
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
56 out of 60
Copilot for Microsoft 365 Full Security and Adoption Enablement Solution "ONESEC.AI"Secure Nextgen SystemsIt is your ally in artificial intelligence to enhance productivity, innovation and efficiency in organizations.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
57 out of 60
Microsoft 365 Copilot: Security Pre-SettingsSoluciones Tecnológicas Overcast S.A.P.I. de CVCopilot was designed to optimize productivity and creativity within the suite of applications, from automating repetitive tasks to real-time collaboration.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Insider Risk
Insider Risk
58 out of 60
Microsoft 365 Defender for Endpoints Deployment: 2 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVProtect your organization's devices against advanced threats such as malware, ransomware, phishing and zero-day attacks.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
59 out of 60
Microsoft Entra Deployment: 3 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVProtect all identities and secure access to any resource with a family of multi-cloud identity and network access solutions.
+3
Applicable to: Identity & Access Management
Identity & Access Management Insider Risk
Insider Risk Threat Protection
Threat Protection
60 out of 60