FiltraiValyti viską
Rezultatų: Konsultavimo paslaugos
Rodomi rezultatai konsultavimo paslaugos.
Visi rezultatai
OENG - Next Generation Endpoints-1 Month Proof of ConceptSecure Nextgen SystemsLearn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
1 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLCLeverage your Microsoft investment to create a strong Zero Trust security environment.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
2 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud SecurityIdentity & Access Management
3 out of 60
Defend Against Threats with SIEM Plus XDR: 2-W WorkshopExelegentThe Defend Against Threats with SIEM Plus XDR (with Attack Simulation) workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
4 out of 60
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix GlobalA 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceInsider Risk
5 out of 60
Windows 365 Cloud PC: 4-Wk Proof of ConceptSignal Alliance Technology HoldingDiscover how Signal Alliance Consulting helps you get started with Windows 365, the worlds first cloud PC that helps you access your data from anywhere, anytime from any device.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementIdentity & Access Management
6 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
7 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbHStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
Microsoft Endpoint Management: 3- W WorkshopExelegentMicrosoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
9 out of 60
CGI - Managed Services for Microsoft 365 FY25CGI Inc.Leave the end-to-end Microsoft 365 support services to CGI so that your IT support team can focus on value-added tasks.
+2
Applicable to:
Adoption & Change ManagementIdentity & Access Management
10 out of 60
Microsoft 365 Defender: 2-Wk AssessmentAlithya Fullscope Solutions, Inc.Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
11 out of 60
Difenda - Information Protection and Governance - 4-week ImplementationDifendaUse Microsoft Purview to Implement an Information (Data) Protection and Governance solution to improve Security.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
12 out of 60
Secure Identities and Access: 3 W - WorkshopExelegentHelp customers find and mitigate identity risks and safeguard their organization with a seamless identity solution.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
13 out of 60
OAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen SystemsLearn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
+3
Applicable to:
Identity & Access ManagementInsider RiskThreat Protection
14 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
15 out of 60
Digital Security:1 Months AssessmentAtos International SASDigital Security, expertise : Cyber Sécurité Services, Systèmes critiques, IAM, Cloud Security, 6000 personnes dédiées
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
16 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
17 out of 60
Introducing Microsoft Purview: 2 Hour WorkshopSlalom ConsultingLearn about how Microsoft Purview brings together comprehensive solutions from their compliance & data governance portfolios and Slalom's approach that provides security in harmony with your business.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
18 out of 60
Collaborative Apps: 3 - W WorkshopExelegentBuild Solutions for your Customers to drive organizations goals and create collaborative experiences.
+3
Applicable to:
Identity & Access ManagementPower Platform for TeamsTeamwork Deployment
19 out of 60
Introducing Microsoft Entra: 2 Hour WorkshopSlalom ConsultingLearn about how Microsoft Entra will help your business step into tomorrow with modern identity and access solutions by introducing you to modern access security across a broad range of products.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
20 out of 60
Ctelecoms Endpoint Management WorkshopConsolidated Telecoms (Ctelecoms)Microsoft Endpoint Management is Endpoint Security, device management, and intelligent cloud actions in a unified management platform with Microsoft Intune and Configuration Manager.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
21 out of 60
Mitigate Compliance and Privacy Risks - 3 Day WorkshopProtivitiMicrosoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
22 out of 60
Ctelecoms Microsoft 365 Digital Workforce WorkshopConsolidated Telecoms (Ctelecoms)Productivity and teamwork are fundamental to build resilience for your people, teams, and organization with Microsoft 365.
+3
Applicable to:
Frontline WorkersIdentity & Access ManagementTeamwork Deployment
23 out of 60
Microsoft 365 Cybersecurity Jumpstart: 1Wk ImplementationBDO CanadaEnsure the right safeguards are in place. Secure your Microsoft 365 tenant through BDO Lixar’s security configuration services and the cloud provisioning expertise
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
24 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
25 out of 60
Enable Windows 365 Cloud PCCofomoWith the right endpoint modernization strategy and tools, employees get a secure experience on every mobile device, tablet, or laptop they’re using, all while eliminating major management headaches.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
26 out of 60
HPT Nextgen Windows Experience_02 days workshopHPT Vietnam CorporationNextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
27 out of 60
NTT Americas - Microsoft Device ManagementNTT LimitedDeployment of Microsoft Unified Endpoint Management Services. Assessment of your resources and business objectives to develop a fresh approach to your security strategy.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
28 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POCITC Secure LtdExperience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
29 out of 60
Microsoft Purview Records Management Assessment & Strategy - 9 Week AssessmentProtivitiProtiviti assists organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
30 out of 60
Identity and Access Management Quick StartSoftchoicePrioritizing security services to combat identity breaches by prioritizing security services, and protecting against mismanaged privileges, and access-related data breaches.
+1
Applicable to:
Identity & Access Management
31 out of 60
Windows 365: 4 Week Readiness AssessmentNetrix GlobalGet an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
32 out of 60
Office 365 Security & Protection: 2-Week ImplementationIT WeaponsIT Weapons can protect your Office 365 tenant against cyber threats by reviewing the tenant and making key changes within it. We also include an ongoing managed service to keep your tenant secure.
+2
Applicable to:
Identity & Access ManagementThreat Protection
33 out of 60
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVIdentify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
+2
Applicable to:
Identity & Access ManagementInsider Risk
34 out of 60
Defender for Identity Professional Security Services | Customized Deployment in as Little As 6-WeeksDifendaSecure Azure Active Directory with Difenda, the 2023 Microsoft Security Impact Award Winner.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
35 out of 60
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso CorporationHelping customers KickStart features in Microsoft 365 E3 Subscription
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementWorkplace Analytics
36 out of 60
Microsoft 365 Service : Productivity and SecurityCofomoOur "Microsoft 365 Service" package is designed to help your organization harness the full potential of Microsoft 365 while ensuring top-notch productivity and security
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
37 out of 60
Hiram MachadoadaQuestProtect, Simplify, Power better experience with Windows 11, Windows 365 and Intune. Unlock hybrid work scenarios!
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
38 out of 60
Microsoft Purview Records Management Assessment & Strategy for Government - 9 Week AssessmentProtivitiProtiviti assists government departments and agencies with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
39 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
40 out of 60
SharePoint Premium Readiness Assessment & Roadmap - 5 Week AssessmentProtivitiEvaluate and ensure your readiness for implementing SharePoint Premium, considering technical, business case, data lifecycle, and administration perspectives.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementKnowledge & Insights
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
42 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
43 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITEDConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
44 out of 60
Office 365: Setup, Demo Train: 3-Hr Implementationtrue org cloudGain a competitive edge and be more productive with a higher growth in your business with the help of True.org Cloud’s Microsoft 365 Business implementation.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementInformation Protection & Governance
45 out of 60
Endpoint Management WorkshopAvalerisThis Cloud Accelerator Workshop will demonstrate how Microsoft Endpoint Manager can help your organization protect endpoint devices, secure user identities, and increase user productivity.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
46 out of 60
Secure Work from Anywhere WorkshopAvalerisTeamwork & collaboration are needed to build resilience for your people, teams, & organization. Empower people to be productive & secure as they adapt to new ways of working with Microsoft365
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementTeamwork Deployment
47 out of 60
Device Lifecycle Management: 1-Hour AssessmentWBM Technologies Inc.A Holistic Approach to Device Selection, Deployment, and Management
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementMobile Device Management
48 out of 60
Microsoft 365 Security Assessment up to 6 weeksACTSACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
49 out of 60
QC Education- Threat Protection - 2 Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #14 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
50 out of 60
QC Education- Identity Management- 2Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #4 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
51 out of 60
Quebec Education - DLP - 2 Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #5 and #6 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
52 out of 60
Mobile Device Management - 2 Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #1, #2 and #3 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
53 out of 60
QC Education Security Directives -1 Day BriefingAvalerisThis one day GAP Analysis will help you assess your current state of compliance for Quebec Ministry of Education Security Directives and provide high-level recommendations to address any shortcomings.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
54 out of 60
Secure Workspace: 1 Day WorkshopWatserv Inc.A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementTeamwork Deployment
55 out of 60
Secure Work from Anywhere Workshop: 1 day-WorkshopInsight Canada IncDiscuss the most critical steps for remote work, and how we can rapidly deploy key scenarios. We’ll evaluate your options and leave you with a concrete deployment plan and next steps.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementMeetings for Microsoft Teams
56 out of 60
Teams FastStart: 1-Wk ImplementationInsight Canada IncTeams FastStart is a Teams Enablement and Pilot that will enable your users to start collaborating and communicating using Microsoft's Teams platform.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementMeetings for Microsoft Teams
57 out of 60
Enterprise Identity and Governance -1 Day BriefingAvalerisAvaleris developed a Capability Maturity Model to help organizations quickly assess the current state of Identity Management and Governance policies, procedures and technology against best practice.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
58 out of 60
Information Protection - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Information Protection policies, procedures and technology against best practices.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
59 out of 60
Collab Now: 4-Wk ImplementationLong View SystemsCollab Now (Microsoft 365) supports worker productivity by delivering and managing a unified and integrated collaboration platform
+3
Applicable to:
Calling for Microsoft TeamsIdentity & Access ManagementTeamwork Deployment
60 out of 60