FiltraiValyti viską
Rezultatų: Konsultavimo paslaugos
Rodomi  rezultatai konsultavimo paslaugos.
Microsoft Defender for Endpoint - Vulnerability Assessment by AVASOFTAVASOFTEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
1 out of 60
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
2 out of 60
IGA Roadmap - 4 Weeks AssessmentArmis, Sistemas de Informação, LdaDevelop an outcome-based, design-led IGA strategy to secure access to your resources with Microsoft identity governance solutions
+1
Applicable to: Identity & Access Management
Identity & Access Management
3 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbHStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
5 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
6 out of 60
CS Data Security 360°: 2-Wk AssessmentCampana & Schott GmbHUtilize Microsoft Purview suite and Copilot for Security to safeguard your content and information.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Insider Risk
Insider Risk
7 out of 60
Rapid Zero Trust Deployment : 8-WK ImplementationMaureen Data SystemsThe purpose and objectives of this engagement are to develop a Zero Trust Implementation Strategy
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
8 out of 60
Identity and Access Mgm - 12 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+1
Applicable to: Identity & Access Management
Identity & Access Management
9 out of 60
Sogeti SmartWorkspace: 4 Week ImplementationCapgemini GroupSogeti provides a one-stop shop set of offerings around the SharePoint solutions. Our offer comprises consultancy, discovery of the existing landscape, Solution Architecture, SharePoint migration etc.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management
10 out of 60
Zero Trust Identity and Access Management: 8-16 Weeks Consulting + ImplementationAttosolIn today’s dynamic digital landscape, traditional security models fall short. Embrace Zero Trust with Microsoft and transform your security strategy to protect against evolving threats.
+2
Applicable to: Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
11 out of 60
Microsoft 365 Migration Service上海诺未网络科技有限公司NovaTech offers Microsoft 365 migration services to help enterprises achieve efficient collaboration, ensure data security, and save costs.
+3
Applicable to: Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management Teamwork Deployment
Teamwork Deployment
12 out of 60
Security Architecture Design and Implementation Service上海诺未网络科技有限公司NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
13 out of 60
Microsoft Copilot Data SecurityFAST: 6-Week Secure Copilot Implementation using Microsoft Purview, Entra, and SentinelMAQ SoftwareElevate your AI adoption with enterprise-grade security
+1
Applicable to: Identity & Access Management
Identity & Access Management
14 out of 60
Modernize Endpoints Consulting Offer: 3 Days ImplementationAdaptive Business Communications Ltd t/a CloudAssistWith Hybrid work becoming prevalent and increasing threat trends, organizations need to proactively secure & modernize management of their endpoints across mobile, PCs and including virtual endpoints.
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
15 out of 60
Copilot for Microsoft 365 Pilot Launch: 2-Wk Proof of ConceptProServeITA rapid Copilot for Microsoft 365 pilot/proof of concept with an initial use case will provide quick value from AI and learnings to expand the roll out and more use cases to other groups.
+3
Applicable to: Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
16 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
17 out of 60
Office 365 Migration from Exchange: 15-Day ImplementationProServeITMigrate on-premise Microsoft Exchange email infrastructure to Office 365 in Microsoft's cloud infrastructure
+2
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management
18 out of 60
Identity & Access Management : 6 Wk ImplementationHappiest Minds Technologies LimitedEnd to end Microsoft IAM Analysis & License Utilization, Plan- Deploy- Implement & Roll Out Microsoft IAM Suite, followed by ongoing managed services.
+1
Applicable to: Identity & Access Management
Identity & Access Management
19 out of 60
Microsoft Funded Workshop for Copilot for Microsoft 365 Adoption Acceleration: 2-Wk ImplementationProServeITIf your company is eligible, we can deliver a Microsoft funded adoption accelerator engagement for Copilot for Microsoft 365 to you free of charge ($10,000 USD value).
+3
Applicable to: Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
20 out of 60
Automate Identity Lifecycle Management: 8-16 Weeks Consulting + ImplementationAttosolIntegrate HRMS with Microsoft Entra ID for an automated, efficient and secure Identity Lifecycle Management.
+1
Applicable to: Identity & Access Management
Identity & Access Management
21 out of 60
Defender for Endpoint: 5-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
22 out of 60
HSBS Cloud Modern Work Migração de Google para Microsoft 365HSBSMigração de Google para Microsoft 365: Simplifique a transição com eficiência e segurança
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Frontline Workers
Frontline Workers Identity & Access Management
Identity & Access Management
23 out of 60
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, IncWe will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Insider Risk
Insider Risk
24 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense GlobalStop threats with a cloud-native SIEM adapted to your new business needs.
+3
Applicable to: Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
25 out of 60
Avanade Cyber Portfolio EvaluationAvanade, Inc.The Cyber Portfolio Evaluation maps your tools with Microsoft solutions, cutting costs and enhancing efficiency.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
26 out of 60
Guardian 365 Managed Security Services (Microsoft MXDR Verified)Forsyte IT SolutionsGuardian 365 is the always-on security managed service offering end-to-end protection, monitoring, detection, and remediation of attacks on your infrastructure, data, users, and endpoints 24x7.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
27 out of 60
Securing Identities: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Securing Identities is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+1
Applicable to: Identity & Access Management
Identity & Access Management
28 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte LtdHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
29 out of 60
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvokeProvide cross-domain threat protection and simplify breach prevention
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
30 out of 60
Microsoft Copilot Readiness Discovery: 3-Wk AssessmentProServeITA Microsoft Copilot Readiness Assessment will identify your AI foundational requirements & permission settings to prepare your organization for leading edge efficiency.
+3
Applicable to: Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
31 out of 60
Microsoft 365 Security ReviewProArch Technologies, IncThis assessment identifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
32 out of 60
Full Cutover Google Workspace to Office 365 migration: 7-Days Professional ServiceIT Partner LLCMigrate G Suite (Google Apps) to Microsoft 365, transferring mailboxes, calendars, tasks, contacts, files, and documents seamlessly to Exchange Online and OneDrive.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
33 out of 60
Microsoft Data Security EngagementRackspace TechnologyThe Data Security Engagement is designed to help organizations identify and mitigate data security risks, especially in the context of the increasing deployment of generative AI applications.
+3
Applicable to: Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
34 out of 60
Microsoft 365 Security Hardening ServicesProArch Technologies, IncThe Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
35 out of 60
Secure Your Hybrid WorkplaceRackspace TechnologyThe purpose of this offer is to provide a comprehensive endpoint security and management solution aimed at enhancing hybrid workplaces
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
36 out of 60
Your Smart Workplace AssessmentRackspace TechnologyYour Smart Workplace Assessment helps organizations develop secure, cost-effective, and productivity-enhancing strategies for modern work environments.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
37 out of 60
Threat Protection: 2-Week WorkshopForsyte IT SolutionsLearn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
38 out of 60
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) LtdReadiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
39 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
40 out of 60
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
41 out of 60
MDS Managed MXDR EngagementMaureen Data SystemsDesigned to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
42 out of 60
Security Copilot Value AcceleratorAvanade, Inc.Designed to help organizations modernize their security operations and administration by leveraging Gen AI.
+3
Applicable to: Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
43 out of 60
Microsoft Windows 11 in 90: 12-Week ImplementationLong View SystemsBoost security and user experience with Windows 11 in 90 business days, implemented two (2) to three (3) times faster than in-house.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
44 out of 60
Information Discovery Week: 1-Week AssesmentCipher (Prosegur Ciberseguridad SL)One of the big problems that all organizations encounter is the classification of information and its discovery. From Cipher we offer a service, which performs this function for a short period.
+3
Applicable to: Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
45 out of 60
Window 365 Cloud PC: 3-Day Proof-of-ConceptCTGlobal A/SAssess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
46 out of 60
Enhance Identity Security with Microsoft Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.Bulletproof’s six-week Microsoft Entra ID P2 implementation empowers your organization to significantly strengthen identity security by ensuring only authorized access to critical systems and data.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
47 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SASConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
48 out of 60
Capgemini Modern Workspace PortfolioCapgemini GroupCapgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management
49 out of 60
Empowering Digital Transformation with AI Microsoft Copilot SolutionsSonata Software Ltd.Our tailored Microsoft Copilot solutions blend human expertise with intelligent automation, delivering efficiency, productivity, and personalization across industries.
+3
Applicable to: Frontline Workers
Frontline Workers Identity & Access Management
Identity & Access Management Meetings for Microsoft Teams
Meetings for Microsoft Teams
50 out of 60
Microsoft 365 AssessmentTechNet UC LLCOur assessment provides a thorough analysis of your current Microsoft 365 environment, identifying areas for improvement and offering actionable recommendations to enhance performance and security.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Knowledge & Insights
Knowledge & Insights
51 out of 60
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POCatQorOur Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
52 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
53 out of 60
CGI - Managed Services for Microsoft 365 FY25CGI Inc.Leave the end-to-end Microsoft 365 support services to CGI so that your IT support team can focus on value-added tasks.
+2
Applicable to: Adoption & Change Management
Adoption & Change Management Identity & Access Management
Identity & Access Management
54 out of 60
Quadra DefendX Managed Threat Protection ServicesQuadrasystems.net (India) P LtdMaximize Microsoft Defender XDR capabilities with DefendX - Quadra's Managed Threat Protection Services
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
55 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Teamwork Deployment
Teamwork Deployment
56 out of 60
Invoke Data Risk AssessmentInvokeThis assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
57 out of 60
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLCSecure email solution based on the latest trend in security: the Zero Trust Framework.  It focuses on how users engage with technology to improve their security maturity level
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
58 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
59 out of 60
Modernize Your Workplace with a Standardized Windows PilotadaQuestProtect, Simplify, Power better experience with Windows 11, Windows 365 and Intune. Unlock hybrid work scenarios!
+3
Applicable to: Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
60 out of 60