AppSource
Pateikti atsiliepimą
Žinynas ir palaikymas
Įrašyti elementai
Privatūs planai
Luktelėkite, prijungiame jus...
Viskas
Programos
Kategorijos
Pramonės šakos
Konsultavimo paslaugos
Partneriai
Filtrai
Valyti viską
Jūsų vieta
Produktai (1)
Pramonės šakos
Paslaugos tipas
Rezultatų: Konsultavimo paslaugos
Rodomi rezultatai konsultavimo paslaugos.
Rodyti
susijusių rezultatų pramonės debesys
.
Visi rezultatai
Healthcare Innovations Strategic Alignment Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Knowledge & Insights
At the start of 2020, the charge of the Healthcare Technology Executive focused on key areas for improvement & alignment with their business along with providing a secure environment that allowed for
1 out of 60
Identity Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
2 out of 60
Fortis IR Active Recovery
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
3 out of 60
Fortis Activerecovery Incident Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
According to multiple studies, breaches and ransomware have more than doubled in the past year.
4 out of 60
JourneyTEAM Security Solutions for Higher Education
JourneyTEAM
+1
Applicable to:
Identity & Access Management
Unlock the future of secure access in Higher Education environments using Microsoft 365.
5 out of 60
Microsoft Intune Endpoint Mgmt Managed Serv: 12-Mo Install
ProServeIT
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Continuously improve your organization-wide management and security for endpoints such as mobile devices, workstations & more with our Endpoint Management Managed Services engagement.
6 out of 60
Lightstream Complimentary Microsoft 365 Core Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
7 out of 60
Microsoft Copilot Readiness: 2-Wk Workshop
Centric Consulting, LLC
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
A facilitated workshop to build a Roadmap to guide your organization in implementing Microsoft Copilot
8 out of 60
Lightstream Data Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Lightstream will Identify data security risks in your organizational data. Identify data security risks in your organizational data
9 out of 60
Microsoft Entra Private Access and Entra Internet Access
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Transform your organization's security landscape with our latest jumpstart, designed to fortify managed applications for your remote workforce and ensure secure access to Microsoft 365.
10 out of 60
Microsoft Defender for Business Deployment: 6-Wk Implementation
Algen Solutions S.A. de C.V.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
We will provide you with a suite of security features that can help protect devices and data, reduce the burden on IT staff and meet regulation compliance requirements with Microsoft Defender.
11 out of 60
eDiscovery Workshop: 4 hours Workshop
Planet Technologies
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
A half-day Workshop that provides an overview and deep understanding of Microsoft 365 eDiscovery Standard and Premium products.
12 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk Assessment
ErgoServices
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ergo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
13 out of 60
Microsoft Cloud PC - 4 Day Proof of Concept Engagement
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Our Microsoft Cloud PC offering is designed to help organizations simplify desktop management, increase security, streamline application delivery and increase end user satisfaction.
14 out of 60
Implementation of Microsoft Identity Security
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW's Implementation of Microsoft Identity Security service helps customers strengthen their security posture, reduce the risk of data breaches and improve compliance with industry regulations.
15 out of 60
Teams Collab Rapid Deploy
Ivision, Inc.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
ivision’s Teams Collab Rapid Deploy service leverages a speed-to-market methodology designed to help clients successfully plan and deploy a Microsoft Teams collaboration environment.
16 out of 60
Data Security and Governance Assessment and Roadmap
Centric Consulting, LLC
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
Provide customers with a clear path forward in addressing data security needs
17 out of 60
MXDR Consultation
CBTS Technology Solutions LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
18 out of 60
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
19 out of 60
Device Security Management with Microsoft Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Seamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
20 out of 60
Infra & Network Monitoring with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Boost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
21 out of 60
Integrating Microsoft Sentinel with External EDR Service
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
22 out of 60
Device Monitoring with Microsoft Defender for Endpoint
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
23 out of 60
Device Domain Migration from On-Premises to Cloud
AVA SOFTWARE INC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Seamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
24 out of 60
Copilot for Security Rapid Test Flight | 2-Wk Workshop
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
25 out of 60
Office 365: Setup, Demo Train: 3-Hr Implementation
true org cloud
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Gain a competitive edge and be more productive with a higher growth in your business with the help of True.org Cloud’s Microsoft 365 Business implementation.
26 out of 60
Cloud Security Assessment - 3 Day Workshop
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
27 out of 60
Microsoft 365 Identity & Security: 2-Wk Assessment
PSM Partners
+2
Applicable to:
Cloud Security
Identity & Access Management
Customized identity and security assessment focused on the Microsoft 365 platform
28 out of 60
Microsoft Intune: 4-Wk Implementation
eGroup Enabling Technologies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Enable users to be productive on any device, without compromising security.
29 out of 60
Life Science 1 Day Compliance Assessment
Xantrion
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
A scalable and auditable modern workplace environment for life science companies managed by experts.
30 out of 60
Hybrid Identity and Security Expert Consulting Imp
Ravenswood Technology Group, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ravenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
31 out of 60
EMS Energize: 1-month proof of concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Interlink Cloud Advisors’ EMS Energize engagement provides you with security experts who can help guide your business into a secure, productive cloud platform.
32 out of 60
Remote Access to On-Prem Apps: 3 Wk Implementation
Invoke
+2
Applicable to:
Cloud Security
Identity & Access Management
Surface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
33 out of 60
Compliance Manager: 8 Week Implementation
Razor Technology, LLC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Comprehensive orientation, deployment, training, support, administration, updates, documentation and testing services to get started quickly and expand with Compliance Manager and Compliance Score
34 out of 60
Microsoft 365 Secure Score: 4 Week Implementation
Razor Technology, LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Audit, review, and improve security posture of Microsoft 365 Estate through Secure Score methodology. Receive expert advice for identity, compliance, and threat protection improvements.
35 out of 60
Microsoft 365 Security Assessment up to 6 weeks
ACTS
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
ACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
36 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
37 out of 60
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
38 out of 60
Microsoft Windows Autopilot Services: 5-Day Proof of Concept
eGroup Enabling Technologies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Reduce IT complexity and eliminate time-consuming corporate re-imaging by shipping and deploying straight to users with Microsoft Windows Autopilot.
39 out of 60
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
40 out of 60
BUI Cyber MDR - 1 Day Discovery Workshop
BUI (Pty) Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
41 out of 60
Secure Workspace: 1 Day Workshop
Watserv Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
42 out of 60
Microsoft Endpoint Manager 10-wks Implementation
Cyclotron Inc.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Cyclotron's Endpoint Manager provides an introduction, education, and production-ready framework for IT teams to revolutionize their device management strategy and enhance their end user security.
43 out of 60
CSE Security Baseline 3 days implementation
Computer Solutions East
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
44 out of 60
Compliance Workshop Data Risk Management: 4 Weeks
Diverge IT
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
You will be guided by our Microsoft 365 experts who are trusted by Pro Sports teams, Hollywood studios, and businesses across America to help protect and govern data to achieve complete compliance.
45 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
46 out of 60
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
47 out of 60
Modern Endpoint Management Airlift: 2 Week POC
Synergy Technical, LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Our Modern EndPoint Management Airfift will provide a deep dive into Microsoft's endpoint security solutions, as well as a proof of concept tailored to your specific concerns.
48 out of 60
Mail Airlift: Exchange Online Implementation
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Our Mail Airlift engagement will get you up and running with Microsoft Exchange online in the fastest, most secure manner.
49 out of 60
Collab Now: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
Collab Now (Microsoft 365) supports worker productivity by delivering and managing a unified and integrated collaboration platform
50 out of 60
Rapid Zero Trust Deployment : 8-WK Implementation
Maureen Data Systems
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
The purpose and objectives of this engagement are to develop a Zero Trust Implementation Strategy
51 out of 60
ThreatHunter MXDR: 3-Wk Implemenation
eGroup Enabling Technologies
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
eGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.
52 out of 60
Microsoft 365: 4-Wk Zero Trust Assessment
Centric Consulting, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
An assessment of an organization's current state security posture for Microsoft 365.
53 out of 60
Modern Workplace Strategy: 12-Day Assessment
Perficient Inc
+2
Applicable to:
Identity & Access Management
Workplace Analytics
Together we assess your current environment and business goals, to provide best practices and recommendations that maximize your investment in Microsoft 365.
54 out of 60
Secure Remote Work: 3 Days Intro and Plan Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Engagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
55 out of 60
Securing Identities and Access: 3-day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
56 out of 60
Security Assessment: 2 Week Assessment
Tallan
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
57 out of 60
Retail Kiosk Program Workshop - 5 Days
CB5 Solutions
+3
Applicable to:
Frontline Workers
Identity & Access Management
Threat Protection
A secure kiosk management solution built for Zebra, Android and iOS devices in retail and finance services.
58 out of 60
Threat Protection: 2-Week Workshop
Forsyte IT Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
59 out of 60
Modern Workplace Assessment
HTG
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
This assessment supports businesses in their cloud journey to quickly develop or migrate into a modern cloud-based organisation by implementing a Software as a Service Strategy with Microsoft 365.
60 out of 60
Atgal
4
5
6
7
8
Pirmyn