フィルターすべてクリア
コンサルティング サービス 件の結果
561 件の結果を コンサルティング サービス で表示。
ID およびアクセス管理Remove ID およびアクセス管理
Microsoft 365Remove Microsoft 365
Deployment of Copilot for Microsoft 365Windows Management Experts, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionEnhance the productivity of Microsoft 365 with our premium Deployment service for Copilot for Microsoft 365.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 60
Intune Design and Deployment ServicesTrusted Tech Team
Identity & Access Management
Mobile Device Management
Threat ProtectionModernize deployment, configuration and management of your Windows devices while
improving your security posture.
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
2 out of 60
Fixing vulnerabilities based on Defender with ASR Module: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionThis service provides a comprehensive approach to identifying and fixing vulnerabilities in organization's devices, helping mitigate the risks of cyber-attacks.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Microsoft 365 Copilot Success FrameworkInsight
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceInsight’s Microsoft 365 Copilot Success Framework service is designed to enable your organization to securely drive ROI and take advantage of all that Microsoft 365 Copilot has to offer.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
4 out of 60
Active Directory Health CheckRavenswood Technology Group
Identity & Access ManagementAssess the configuration, security, and operational procedures of an Active Directory environment.
Applicable to:
Identity & Access Management
5 out of 60
Entra ID Health CheckRavenswood Technology Group
Identity & Access ManagementAssess the configuration, security, and operational procedures of an Entra ID environment.
Applicable to:
Identity & Access Management
6 out of 60
Healthcare & Education Cybersecurity AssessmentPSM Partners
Cloud Security
Identity & Access Management
Insider RiskThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
7 out of 60
MDS - Cybersecurity AssessmentMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Microsoft Intune QuickstartEmergent Software
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementDeploy Microsoft Intune via Microsoft 365 with Emergent's Quickstart for enhanced device management and security compliance.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
9 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionAssess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Modernize Identities with Entra ID PremiumDaymark Solutions
Adoption & Change Management
Cloud Security
Identity & Access ManagementStrengthen User Security with Advanced Identity Management.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
With Windows 365 Access data from anywhereSentinel Technologies Inc.
Device Deployment & Management
Identity & Access ManagementWith Windows 365, you can access a desktop computer from anywhere. It is available in Business and Enterprise SKUs and integrates easily with your current Microsoft 365 licensing.
Applicable to:
Device Deployment & Management
Identity & Access Management
12 out of 60
Security Foundations Data: Assessment and ImplementationProServeIT
Identity & Access Management
Threat ProtectionData security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
Applicable to:
Identity & Access Management
Threat Protection
13 out of 60
Microsoft 365 Copilot and AI AssessmentRedapt, Inc.
Identity & Access ManagementElevate Your Business with Microsoft 365 Copilot Assessment
Applicable to:
Identity & Access Management
14 out of 60
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITED
Identity & Access Management
Insider Risk
Threat ProtectionOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
15 out of 60
MDS Managed MXDR EngagementMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionDesigned to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Security Foundations Email: Assessment and ImplementationProServeIT
Cloud Security
Identity & Access Management
Threat ProtectionProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Identity and Access Management SolutionH One (Private) Limited
Cloud Security
Identity & Access Management
Insider RiskEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
18 out of 60
Security Foundations IdentityProServeIT
Identity & Access Management
Threat ProtectionFortify your online identity and access controls. Evaluate your risks and deploy modern security controls to mitigate against the most common identity-based vulnerabilities and attacks.
Applicable to:
Identity & Access Management
Threat Protection
19 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Managed IT Services for DentalOlive + Goose
Cloud Security
Device Deployment & Management
Identity & Access ManagementComprehensive managed IT services for dental offices, ensuring security, compliance, and continuity.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
24 out of 60
FastTrack for Microsoft 365Olive + Goose
Cloud Security
Device Deployment & Management
Identity & Access ManagementOur offer provides expert guidance as a FastTrack Ready Partner to help businesses deploy, secure, and optimize Microsoft 365 solutions seamlessly—ensuring a smooth transition with no extra cost.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
25 out of 60
Empowering Digital Transformation with AI Microsoft Copilot SolutionsSonata Software Ltd.
Frontline Workers
Identity & Access Management
Meetings for Microsoft TeamsOur tailored Microsoft Copilot solutions blend human expertise with intelligent automation, delivering efficiency, productivity, and personalization across industries.
Applicable to:
Frontline Workers
Identity & Access Management
Meetings for Microsoft Teams
26 out of 60
4Migrate – Google Workspace to Microsoft 365 Migration by 4Sight4Sight Holdings
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceSeamlessly Transition to Microsoft 365 with Zero Data Loss, Minimal Disruption, and Maximum Security
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
27 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight Holdings
Cloud Security
Identity & Access Management
Threat ProtectionStrengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
PlanB. Acceleration Workshops for Microsoft CopilotPlanB. GmbH
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceThe PlanB. Copilot Accelerator - Workshop Series helps organizations seamlessly integrate AI, ensure compliance, and maximize the benefits of Microsoft Copilot.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
29 out of 60
Google Drive To OneDrive Migration JumpstartSentinel Technologies Inc.
Identity & Access ManagementSentinel Technologies offers a structured and secure migration service for transitioning from Google Drive to Microsoft OneDrive. Our process minimizes disruptions while maintaining productivity.
Applicable to:
Identity & Access Management
30 out of 60
Gmail to Exchange JumpstartSentinel Technologies Inc.
Identity & Access ManagementSentinel Technologies offers a comprehensive Exchange Online Setup & Migration Jumpstart to streamline your organization's transition from Google Workspace to Microsoft 365.
Applicable to:
Identity & Access Management
31 out of 60
Threat Protection EngagementFIS Managed IT Solutions
Cloud Security
Identity & Access Management
Threat ProtectionLearn how to put next-generation Microsoft Security tools to work for you.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Identity as a Service | Assure 365CyberOne
Cloud Security
Identity & Access Management
Information Protection & GovernanceFully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
33 out of 60
Zero Trust: Microsoft Security BriefingRavanty Tech Consulting, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionLearn and Embrace Modern Work Zero Trust Pillars across Identity, Devices, Apps, and Data
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
34 out of 60
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology Holding
Cloud Security
Identity & Access Management
Insider RiskOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
35 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoice
Cloud Security
Identity & Access Management
Threat ProtectionThe Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data Ltd
Identity & Access Management
Information Protection & Governance
Threat ProtectionWhether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
37 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITED
Cloud Security
Identity & Access Management
Threat ProtectionProfessional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft Entra - Global Secure Access | Pilot DeploymentITC Secure Ltd
Identity & Access Management
Information Protection & Governance
Threat ProtectionMicrosoft Entra Global Secure Access pilot deployment for improved security posture, streamlined access management & regulatory compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
39 out of 60
Identity Foundation Proof Of Concept with Microsoft Entra in 4 WeeksArmis, Sistemas de Informação, Lda
Identity & Access ManagementLeverage the full suite of Microsoft 365 products - Secure internal and external Identities with Microsoft Entra
Applicable to:
Identity & Access Management
40 out of 60
Identity Governance Proof Of Concept with Microsoft Entra ID Governance in 4 WeeksArmis, Sistemas de Informação, Lda
Identity & Access ManagementLeverage Microsoft Entra ID Governance to ensure seamless and secure access to Microsoft 365 resources
Applicable to:
Identity & Access Management
41 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionTrustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
FortisX on Microsoft Defender: ProofofConcepSentinel Technologies Inc.
Identity & Access ManagementToday's security landscape is complex, dynamic, and constantly evolving.
Applicable to:
Identity & Access Management
43 out of 60
4migrate: ISP to Microsoft 3654Sight Holdings
Identity & Access Management
Information Protection & Governance
Meetings for Microsoft TeamsSeamless Microsoft 365 migration with expert guidance, minimal disruption, and full support.
Applicable to:
Identity & Access Management
Information Protection & Governance
Meetings for Microsoft Teams
44 out of 60
Your Smart Workplace AssessmentRackspace Technology
Cloud Security
Identity & Access Management
Information Protection & GovernanceYour Smart Workplace Assessment helps organizations develop secure, cost-effective, and productivity-enhancing strategies for modern work environments.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
45 out of 60
Threat Landscape AssessmentProServeIT
Identity & Access Management
Information Protection & Governance
Threat ProtectionGet critical cybersecurity insights with a global visualization of login attempts, dark web scan, & expert recommendations. We help secure your Microsoft 365 environment to protect your business.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
46 out of 60
Implementation on Microsoft IntuneITX360 (Pvt) Ltd.
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementEnhance security and efficiency with Microsoft Intune Implementation. Manage and secure devices across Windows, Android, iOS, and macOS with a seamless cloud-based solution.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
47 out of 60
Microsoft Threat Protection EngagementRavanty Tech Consulting, Inc.
Identity & Access Management
Threat ProtectionThreat Protection Engagement helps you assess your security landscape, address most pressing security goals and challenges, and provide an immersive experience around Microsoft security capabilities.
Applicable to:
Identity & Access Management
Threat Protection
48 out of 60
FortisX™ Next Generation Cyber Detection & ResponseSentinel Technologies Inc.
Identity & Access ManagementToday's security landscape is complex, dynamic, and constantly evolving. FortisX™, powered by Cisco XDR, is a security solution that delivers best-in-class cyber protection: the top extended detention
Applicable to:
Identity & Access Management
49 out of 60
CSE CMMC L1 & L2 Assessment & ImplementationComputer Solutions East
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceAchieve CMMC 1 & 2 Compliance, Secure Your Cloud with Microsoft 365 & Expert Guidance.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
50 out of 60
Microsoft Security Copilot Readiness AssessmentSoftchoice
Cloud Security
Identity & Access Management
Threat ProtectionAims to ensure organizations can securely utilize Microsoft’s Copilot for Security and identifying gaps in signal data from core Microsoft security products
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Modern Endpoint Design and Planning WorkshopKraft Kennedy
Cloud Security
Device Deployment & Management
Identity & Access ManagementKraft Kennedy will conduct a Modern Endpoint Design and Planning Workshop to review and discuss both your current management and deployment processes as well as plans for the future-state environment.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
52 out of 60
Microsoft Purview Migration Accelerator: 1-Day Envisioning WorkshopMAQ Software
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceOur workshop assesses your data landscape, identifies challenges, provides tailored recommendations, and a phased migration strategy to Microsoft Purview in just one day.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
53 out of 60
HSBS Cloud Modern Work Migração de Google para Microsoft 365HSBS
Adoption & Change Management
Frontline Workers
Identity & Access ManagementMigração de Google para Microsoft 365: Simplifique a transição com eficiência e segurança
Applicable to:
Adoption & Change Management
Frontline Workers
Identity & Access Management
54 out of 60
Threat Protection EngagementTierPoint
Cloud Security
Identity & Access Management
Threat ProtectionLearn how to put next-generation Microsoft Security tools to work for you.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Microsoft 365 Copilot Readiness Assessment - CRATechPlus Talent
Cloud Security
Identity & Access Management
Information Protection & GovernanceThrough this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
56 out of 60
Microsoft Defender for Endpoint QuickStartPresidio
Cloud Security
Identity & Access Management
Threat ProtectionPresidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLP
Cloud Security
Identity & Access Management
Threat ProtectionTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Security Copilot Value AcceleratorAvanade, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionDesigned to help organizations modernize their security operations and administration by leveraging Gen AI.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
59 out of 60
Secure Your Hybrid WorkplaceRackspace Technology
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementThe purpose of this offer is to provide a comprehensive endpoint security and management solution aimed at enhancing hybrid workplaces
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
60 out of 60