FiltriCancella tutto
Servizi di consulenza risultati
Visualizzazione di risultati in servizi di consulenza.
Tutti i risultati
Modern Managed Endpoints: 4-Wk Proof of ConceptFSI StrategiesModernize your organization with end-to-end device management and monitoring, FSi Strategies will demonstrate modern device management and security using the latest in Microsoft 365 technology
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
1 out of 60
Zero Trust Foundation: 6-Wk ImplementationKiZAN TechnologiesAccelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
2 out of 60
Window 365 Cloud PC: 3-Day Proof-of-ConceptCTGlobal A/SAssess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
3 out of 60
Zero Trust Foundation: 6 Week ImplementationValorem LLCUsing Azure Active Directory and Microsoft 365 Security, our teams will custom design a zero trust foundation that advances your security posture, reduces risk and makes your environment more secure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 60
Modern Workplace AssessmentHTGThis assessment supports businesses in their cloud journey to quickly develop or migrate into a modern cloud-based organisation by implementing a Software as a Service Strategy with Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
5 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
6 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş."Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week ImplementationQuisitiveQuisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
8 out of 60
BYOD 365: 6-week ImplementationMobile MentorThe BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
9 out of 60
Protect and Govern Sensitive Data for Financial Services - 4 wk workshopProtivitiMicrosoft-Funded Workshop to discuss and understand the hidden privacy and regulatory risks of dark financial data and how to mitigate with actionable next steps
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
10 out of 60
Adoption and Consumption Services- 4 Weeks Implementation Drive ConsumptionNewWave Computing Private LimitedAssist Customers to achieve continuous business value through the use of your Microsoft Modern Workplace Cloud Solutions
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
11 out of 60
Security Assessment: 2-Wk AssessmentAscent Global, Inc.Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Information Protection with Microsoft Cloud App SecurityAVA SOFTWARE INCBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
13 out of 60
Avanade Hybrid Windows Endpoint Solutions FY24Avanade, Inc.Avanade has developed the next generation of endpoint solutions for the modern workforce, with integrated physical, virtual and hybrid solutions
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
14 out of 60
Microsoft 365: 2-Week ImplementationTechnologentExpert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
15 out of 60
Wc-PC- Wragby Cloud PCWragby Business Solutions & Technologies LimitedThe Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
16 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementationCloudshift3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
17 out of 60
Teams Hosted Direct Routing: 2-week ImplementationQuisitiveQuisitive Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
18 out of 60
Teams Hosted Direct Routing: 2-wk ImplementationCatapult Systems, LLCCatapult Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
19 out of 60
Nonprofit Security Maturity Assessment - 4 weeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
21 out of 60
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Microsoft Intune Endpoint Mgmt Level Up: 1-Mo ImplementationProServeITEnable organization-wide management & security for your endpoints (mobile devices, workstations, etc.) with a Microsoft Intune Endpoint Management implementation.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
23 out of 60
Change Management: 1-week ImplementationMobile MentorChange Management is a proven methodology to deploy technology changes to large groups of diverse Microsoft 365 users.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
24 out of 60
Modern EndPoint: 3 Day WorkshopInsentra Pty LtdAn executive deep dive into remote deployment, management, and the security of corporate and BYOD devices in your organization
+2
Applicable to:
Identity & Access Management
Mobile Device Management
25 out of 60
Secure Identities and Access Management AssessmentInvokeTo provide enterprise customers with a detailed identity assessment report, a high-level migration plan, and demonstrations of Microsoft Entra Azure AD and Microsoft Entra Identity Governance features
+1
Applicable to:
Identity & Access Management
26 out of 60
Microsoft 365 License Optimization:1-hr AssessmentFrontier Technology, LLCReview current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
27 out of 60
Cybersecurity Assessment Engagement - 4 weeksGrant Thornton LLPEnhance Your Cloud Security Posture with Grant Thornton’s Cybersecurity Assessment
+2
Applicable to:
Cloud Security
Identity & Access Management
28 out of 60
eDiscovery Workshop: 4 hours WorkshopPlanet TechnologiesA half-day Workshop that provides an overview and deep understanding of Microsoft 365 eDiscovery Standard and Premium products.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
29 out of 60
Microsoft 365: 4-Wk Zero Trust AssessmentCentric Consulting, LLCAn assessment of an organization's current state security posture for Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
30 out of 60
Offer Name: Microsoft 365 CrashCourse - 1 week WorkshopVirteva LLCEmpower organizations to gain a deeper understanding of Microsoft 365 and its vast array of services, features, and capabilities through Virteva's Microsoft 365 CrashCourse Workshop.
+3
Applicable to:
Identity & Access Management
Knowledge & Insights
Mobile Device Management
31 out of 60
Security Assessment - 4-Week AssessmentCoretek ServicesAnalysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
32 out of 60
Windows 365 Accelerator: 4 Week ImplementationKiZAN TechnologiesDuring this 4-week engagement, KiZAN will assist with the design and implementation of Windows 365, including education, planning, documentation, and pilot for up to 50 users.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
33 out of 60
Cloud Device Management - 4hours BriefingReplyImprove the security, manageability, and efficiency of your corporate devices with Intune. Ideal for businesses looking to move to centralized IT management and reduce operational costs.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
34 out of 60
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
35 out of 60
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLCCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage WorkshopCGI Inc.A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft Cloud PC - 4 Day Proof of Concept EngagementSynergy Technical, LLCOur Microsoft Cloud PC offering is designed to help organizations simplify desktop management, increase security, streamline application delivery and increase end user satisfaction.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
39 out of 60
OENG - Next Generation Endpoints-1 Month Proof of ConceptSecure Nextgen SystemsLearn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
40 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era TechnologyM&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
41 out of 60
Managed Services - Microsoft 365ConvergeOneFully utilize your Microsoft 365 Solution with all the Identity, Security, and Collaboration portions available to you
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
42 out of 60
Microsoft 365 Identity & Security: 2-Wk AssessmentPSM PartnersCustomized identity and security assessment focused on the Microsoft 365 platform
+2
Applicable to:
Cloud Security
Identity & Access Management
43 out of 60
Microsoft 365 - Threat Protection: 2-week workshopForteventoWorkshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
44 out of 60
Copilot For Microsoft 365 - ImplementationITQAN GLOBAL FOR CLOUD AND DIGITAL COMPUTING SYSTEMS L.L.C.Guided Setup and Customization of Copilot and Copilot Studio for Microsoft 365- Training, Data Selection, Workflow Design Development
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Teamwork Deployment
45 out of 60
Microsoft 365 Roadmap: 1-Wk WorkshopEgroup, Inc.Enable a Secure and Productive Workforce with a Modern Workplace Roadmap powered by Microsoft 365 solutions.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Mobile Device Management
46 out of 60
Tailored Managed Services for Microsoft IntuneFinchloomOptimize your organization’s device management with Finchloom+ for Microsoft Intune. Tailored monthly managed service ensures streamlined, cloud-based endpoint management for company and BYOD devices.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
47 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServusGain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
48 out of 60
Microsoft Entra Verified ID and Credivera: 3-day Planning WorkshopOxford Computer Group LLCThis Planning Workshop is designed to help you get started with a verifiable credentials solution using Credivera and Microsoft Entra Verified ID.
+1
Applicable to:
Identity & Access Management
49 out of 60
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix GlobalA 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
50 out of 60
Microsoft Purview Records Management Assessment & Strategy for Financial Services - 9 Week AssessmentProtivitiProtiviti assists Financial Services organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
51 out of 60
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLCRavenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
52 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View SystemsSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Office 365 Managment: 1 Day AssessmentEze Castle IntegrationECI will review your Office 365 Tennant Configuration and suggest on-going managment needs
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
55 out of 60
Microsoft 365 GCC High Migration from Microsoft 365 Commercial: 6 Week ImplementationDaymark SolutionsWhite-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Microsoft 365 Commercial
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
56 out of 60
Modern Work Services Proof of ConceptCrayon USCrayon Modern Work Services PoC will help you pilot a subset of users with the best of Microsoft 365 prior to implementation. This will allow us to ensure a smooth transition for all users.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Meetings for Microsoft Teams
57 out of 60
OAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen SystemsLearn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
58 out of 60
Office 365 to Office 365 Migration: 4-Wk ImplementationExodus Integrity Services, Inc.Simplify the complexities of merging, consolidating, or transitioning your Office 365 environments with our specialized Office 365 Migration Service.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
59 out of 60
Office 365: Setup, Demo Train: 3-Hr Implementationtrue org cloudGain a competitive edge and be more productive with a higher growth in your business with the help of True.org Cloud’s Microsoft 365 Business implementation.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
60 out of 60