PenapisKosongkan semua
Perkhidmatan perundingan hasil
Menunjukkan dalam perkhidmatan perundingan%1!s!.
Semua keputusan
Modern Device Management ImplementationDXCImprove the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
1 out of 60
Cloud Identity Foundation Workshop (5-day)DexMachGet knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
+2
Applicable to:
Identity & Access Management
Threat Protection
2 out of 60
Endpoint Management: 8h WorkshopadaQuestManage and protect your devices, your apps, and your users.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
3 out of 60
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) LtdReadiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Threat Check: 4-Hr WorkshopNetrix LLCAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Identity: 8H-Workshop Secure Identities & DevicesadaQuestSecure user identities and devices.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 60
Mergers and Acquisitions: 1-month implementationInterlink Cloud Advisors, Inc.Mergers and acquisitions are messy. Interlink will build the foundation for a smooth infrastructure consolidation process.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
7 out of 60
Secure Workspace: 1 Day WorkshopWatserv Inc.A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
8 out of 60
Microsoft 365 Azure AD 3-wk Implementation RoadmapCyclotron Inc.Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
9 out of 60
App Identity Evaluation: 8H WorkshopadaQuestSecure & manage your entire application estate.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Okta Migration to Azure AD: 3-Week AssessmentInvoke, LLCThe Okta Migration to Azure AD Assessment offering is designed to assess & plan your migration efforts to your existing investments in Azure AD.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
11 out of 60
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender
for enterprises, resulting in improved detection rates, threat coverage, and
organizational security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Microsoft Endpoint Manager 10-wks ImplementationCyclotron Inc.Cyclotron's Endpoint Manager provides an introduction, education, and production-ready framework for IT teams
to revolutionize their device management strategy and enhance their end user security.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
13 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Compliance Workshop Data Risk Management: 4 WeeksDiverge ITYou will be guided by our Microsoft 365 experts who are trusted by Pro Sports teams, Hollywood studios, and businesses across America to help protect and govern data to achieve complete compliance.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
15 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Seguridad Corporativa: Evaluación 4 semanasConsultora CognosIT LimitadaCon esta Solución usted podrá gestionar la seguridad en toda su empresa
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
17 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeITCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
1-Day Security & Identity WorkshopConvergeOneTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Ransomware Protection: 1 Day-WorkshopConvergeOneLearn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Managed Services - Microsoft 365ConvergeOneFully utilize your Microsoft 365 Solution with all the Identity, Security, and Collaboration portions available to you
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
21 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Collab Now: 4-Wk ImplementationLong View SystemsCollab Now (Microsoft 365) supports worker productivity by delivering and managing a unified and integrated collaboration platform
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
23 out of 60
Rapid Zero Trust Deployment : 8-WK ImplementationMaureen Data SystemsThe purpose and objectives of this engagement are to develop a Zero Trust Implementation Strategy
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
24 out of 60
ThreatHunter Implementation 3 weeksEnabling Technologies CorporationMicrosoft Gold Partner Enabling Technologies provides ThreatHunter: consulting, configuration, and training services to help organizations protect, detect, and respond to risks.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
25 out of 60
Modern Workplace Strategy: 12-Day AssessmentPerficient IncTogether we assess your current environment and business goals, to provide best practices and recommendations that maximize your investment in Microsoft 365.
+2
Applicable to:
Identity & Access Management
Workplace Analytics
26 out of 60
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
27 out of 60
Secure Remote Work: 3 Days Intro and Plan WorkshopLiveRoute FZ-LLCEngagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
28 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Insight Managed Endpoint: Managed ServiceInsightInsight’s Managed Endpoint service offers a modern and cost-effective approach to the administration and support of your new or existing endpoint management solution.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
30 out of 60
Microsoft 365 Managed ServicesNetrix LLCNetrix’s 24x7x365 managed services for Microsoft 365 combines a reactive service desk with proactive strategic planning to ensure your team is productive and secure.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
31 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
32 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
33 out of 60
Security Assessment: 2 Week AssessmentTallanTallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Avanade Hybrid Windows Endpoint Solutions FY23Avanade, Inc.Avanade has developed the next generation of endpoint solutions for the modern workforce, with integrated physical, virtual and hybrid solutions
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
35 out of 60
Accenture Modern Workplace ServicesAccentureAccenture Modern Workplace Services
+3
Applicable to:
Frontline Workers
Identity & Access Management
Meetings for Microsoft Teams
36 out of 60
GoDaddy Office 365 Defederation:1-D ImplementationFinchloomConvert your GoDaddy Office 365 tenant into a standard Microsoft Office 365 Tenant
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
37 out of 60
Avanade Secure Identities and Access FY23Avanade, Inc.We help our customers to define a modern identity strategy
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
38 out of 60
Secure Identities and Access: 8H WorkshopadaQuestAn executive deep dive into foundational identity strategy, tailored to your customers’ organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Enhance IT Security: 1-2-Wk ImplementationFMT ConsultantsFMT offers a smart security solution that protects your business, your employees, and your clients while providing a reliable, scalable, and durable approach to keeping your business up and running.
+2
Applicable to:
Cloud Security
Identity & Access Management
40 out of 60
Avanade Defend Against Threats with SIEM Plus XDR FY23Avanade, Inc.Cybercrime is an ongoing and escalating challenge for organizations around the globe. We help clients modernize their security and defend against these threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Microsoft 365 Managed Service (EE): 4wk ImplementRackspaceElastic Engineering for Microsoft 365: On-demand access to a team of email and productivity application experts that work with you to drive outcomes and continuously evolve your environment.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
42 out of 60
Threat Protection: 2-Week WorkshopForsyte IT SolutionsLearn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Endpoint Modernization Quickstart ServiceDell Technologies ServicesDell Quick Start service helps customers configure their environment and prepare it for Modern Device Management and Modern Provisioning.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
44 out of 60
Guardian 365 Managed Security ServicesForsyte IT SolutionsProtection is key to the security of your organization. Defend against threats with Guardian 365, your key to better managed security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Modern Device Management: 1 Month ImplementationHTGHTG’s Device Management Configuration Pack rapidly deploys Microsoft Endpoint Manager to enable modern device management that keeps data secure on-premises and in the cloud.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
46 out of 60
Security Assessment - 4-Week AssessmentCoretek ServicesAnalysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
47 out of 60
Modern Workplace AssessmentHTGThis assessment supports businesses in their cloud journey to quickly develop or migrate into a modern cloud-based organisation by implementing a Software as a Service Strategy with Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
48 out of 60
Collaboration & Data Governance 4Wk ImplementationHTGHTG’s Collaboration & Data Governance pack can help companies achieve the right balance of user freedom while ensuring compliance with corporate policies.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
49 out of 60
Teams Hosted Direct Routing: 2-wk ImplementationCatapult Systems, LLCCatapult Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
50 out of 60
Microsoft 365 Security: 1 Month ImplementationValorem LLCA detailed baseline assessment of your current and desired state followed by a pilot production of Microsoft’s advanced security solutions to accelerate your modern security journey.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
51 out of 60
Microsoft 365 Security: 3 Week Exec WorkshopValorem LLCA strategic deep dive for security decision-makers to better understand, prioritize, and mitigate real-time threats in your environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
52 out of 60
Zero Trust Foundation: 6 Week ImplementationValorem LLCUsing Azure Active Directory and Microsoft 365 Security, our teams will custom design a zero trust foundation that advances your security posture, reduces risk and makes your environment more secure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
53 out of 60
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
54 out of 60
Microsoft 365 Roadmap: 1-Wk WorkshopEgroup, Inc.Enable a Secure and Productive Workforce with a Modern Workplace Roadmap powered by Microsoft 365 solutions.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
55 out of 60
Identity & Access Management : 6 Wk ImplementationHappiest Minds Technologies LimitedEnd to end Microsoft IAM Analysis & License Utilization, Plan- Deploy- Implement & Roll Out Microsoft IAM Suite, followed by ongoing managed services.
+1
Applicable to:
Identity & Access Management
56 out of 60
Endpoint Management: 8H WorkshopadaQuestManage and protect your devices, your apps, and your users with the Endpoint Management Workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Securing Identities: 3 Days WorkshopInovaSysSecuring Identities is a Microsoft Funded Workshop to help Microsoft customers realize the full value of their Microsoft services investment.
+1
Applicable to:
Identity & Access Management
58 out of 60
Nonprofit Security Maturity Assessment - 4 weeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60