FiltrosDesmarcar tudo
Serviços de consultoria resultados
Mostrando resultados no serviços de consultoria
Todos os resultados
Microsoft 365 Copilot Workshop: 2daysInsightTake the first steps toward helping your organization unleash creativity, unlock productivity, and level up skills with Insight’s Microsoft 365 Copilot Workshop.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
1 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
2 out of 60
Avanade Entra Verified ID Consulting ServicesAvanade, Inc.Microsoft Entra Verified ID is a Decentralized Identity implementation that streamlines any identity related process, simplifies it, reduce costs and increases convenience.
+1
Applicable to:
Identity & Access Management
3 out of 60
Intune Managed ServiceMobile MentorYour endpoint ecosystem is constantly evolving and needs proactive management, so we designed the Intune Managed Service to help customers unlock the full potential of Intune.
+2
Applicable to:
Cloud SecurityIdentity & Access Management
4 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
5 out of 60
Introducing Microsoft Entra: 2 Hour WorkshopSlalom ConsultingLearn about how Microsoft Entra will help your business step into tomorrow with modern identity and access solutions by introducing you to modern access security across a broad range of products.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
6 out of 60
Red Canary MSSP FastTrack for SecurityRed CanaryLeverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
7 out of 60
Microsoft Intune: 4-Wk Implementation ServicesTechNet UC LLCMicrosoft Intune Design and Deployment Services
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
8 out of 60
Microsoft 365 Copilot Foundations ProgramHSO From envisioning and assessment to deployment, embrace the power of Microsoft 365 Copilot - your Copilot for work!
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementTeamwork Deployment
9 out of 60
CGI - Managed Services for Microsoft 365 FY25CGI Inc.Leave the end-to-end Microsoft 365 support services to CGI so that your IT support team can focus on value-added tasks.
+2
Applicable to:
Adoption & Change ManagementIdentity & Access Management
10 out of 60
Microsoft 365 Copilot Readiness: 2-4 Week AssessmentInsightPrepare your business to realise the productivity promise of Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
11 out of 60
Microsoft 365 Copilot Readiness AssessmentDEFEND LimitedThe Microsoft 365 Copilot Readiness Assessment is purpose-built to help your organisation securely embrace the new wave of Generative AI with Microsoft 365 Copilot
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
12 out of 60
Accenture Modern Workplace ServicesAccentureAccenture Modern Workplace Services
+3
Applicable to:
Frontline WorkersIdentity & Access ManagementMeetings for Microsoft Teams
13 out of 60
BYOD 365: 6-week ImplementationMobile MentorThe BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
14 out of 60
Okta to Microsoft Entra ID MigrationPerformantaPerformanta's Okta to Microsoft Entra ID Application Migration service will give you a controlled, seamless and secure transition to Azure AD.
+1
Applicable to:
Identity & Access Management
15 out of 60
Introducing Microsoft Purview: 2 Hour WorkshopSlalom ConsultingLearn about how Microsoft Purview brings together comprehensive solutions from their compliance & data governance portfolios and Slalom's approach that provides security in harmony with your business.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
16 out of 60
Microsoft 365 Security: 3,5 Tage Tenant AssessmentAppSphere AGSicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementKnowledge & Insights
17 out of 60
Email Security Threat AssessmentAVA SOFTWARE INCConfident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
18 out of 60
IAM Roadmap - 4 Weeks AssessmentArmis, Sistemas de Informação, LdaDevelop an outcome-based, design-led IAM strategy to secure access to your resources with Azure identity and access management solutions.
+1
Applicable to:
Identity & Access Management
19 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
20 out of 60
HPT Nextgen Windows Experience_02 days workshopHPT Vietnam CorporationNextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
21 out of 60
Essential 8 Gap Analysis : AssessmentEighty20 Solutions Pty LtdOur Essential Eight gap analysis approach provides assurance on effective organisational alignment
with the eight essential controls to achieve a higher level of maturity.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
22 out of 60
Essential Eight Maturity AssessmentChamonix IT ConsultingThe culmination of this assessment is the establishment of a robust security foundation to equip you with a solid base upon which you can build and enhance your cybersecurity posture.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
23 out of 60
Capgemini Modern Workspace PortfolioCapgemini GroupCapgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementIdentity & Access Management
24 out of 60
MDS - Data Security Readiness Assessment for Copilot for Microsoft 365Maureen Data SystemsA 3-day comprehensive assessment to help organizations set the foundations of data security, privacy and governance in preparation for Copilot for Microsoft 365
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
25 out of 60
Microsoft 365 Security Assessment: 3-DaysResolution Technology Pty LtdThe Microsoft 365 Security Assessment provides a consultative and hands on review of your production environment including best practice recommendations to secure your business data.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
26 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
27 out of 60
Microsoft 365 Security Health Check: 3 day AssessmentISCG SP Z O OMicrosoft 365 is a multi-layer solution with the right security policies you can block over 99.9 percent of account compromise attacks!
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
28 out of 60
Microsoft Copilot for Security Readiness AssessmentDEFEND LimitedAssess your organisations' readiness for the power of Copilot for Security
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
29 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
30 out of 60
Data Protection and Governance with Microsoft PurviewAVA SOFTWARE INCConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
31 out of 60
Phishing, Malware & Spam protection- 2 weeks ImplementationAVA SOFTWARE INCPhishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
32 out of 60
Neway Security proposition: 3-WK implementationNeWay Technologies LtdThe Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
33 out of 60
SharePoint Premium Readiness Assessment & Roadmap - 5 Week AssessmentProtivitiEvaluate and ensure your readiness for implementing SharePoint Premium, considering technical, business case, data lifecycle, and administration perspectives.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementKnowledge & Insights
Edgile Caller Verifier Powered by Entra ID : 8 WksWipro LtdWipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
+2
Applicable to:
Identity & Access ManagementThreat Protection
35 out of 60
Journey to Microsoft 365 Copilot: 4-hours WorkshopPROJECT INFORMATICA SRLMicrosoft 365 Copilot workshop bring to you the opportunity to create awareness about holistic to Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
36 out of 60
Teams & SharePoint Security HardeningAVA SOFTWARE INCTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to:
Identity & Access ManagementTeams Custom SolutionsThreat Protection
Cloud Safeguard - 12 Month ImplementationRapid CircleOur Cloud Safeguard managed security service enables customers to focus on core business and innovation while we keep your Microsoft 365 platforms safe & secure.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
38 out of 60
Co-pilot Technical ReadinessPHOENIX SOFTWARE LTDHelp your organisation ensure that they are technically ready for Co-pilot
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementKnowledge & Insights
39 out of 60
Microsoft Sentinel - Log Management and threat detectionAVA SOFTWARE INCIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
40 out of 60
Microsoft 365 Copilot Readiness: 2 week AssessmentTOKIOTAWe help our clients to integrate Microsoft 365 Copilot in their organization in the most secure and efficent way
+3
Applicable to:
Adoption & Change ManagementCompliance Advisory ServicesIdentity & Access Management
41 out of 60
Microsoft 365 Copilot Discover and Envision SessionInsightDiscover the Power of AI with Copilot
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
42 out of 60
G Suite to M365 Migration: 1-Day Proof of concepttrue org cloudProof of concept for migration from G Suite to Microsoft 365
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementMeetings for Microsoft Teams
43 out of 60
Atos || Pilot program for Windows 365Atos International SASAtos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
44 out of 60
Shadow IT discovery with Microsoft cloud app securityAVA SOFTWARE INCKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
45 out of 60
Microsoft 365 Email Threat Protection AssessmentAVA SOFTWARE INCMicrosoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
46 out of 60
Zero Touch Provisioning: 3-week ImplementationMobile MentorZero-Touch Provisioning sets you up to ship devices straight to users, with auto-configuration occurring over the air on initial sign in.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
47 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
48 out of 60
Defender for Endpoint: 5-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
49 out of 60
Copilot Readiness Assessment for Microsoft 365Mint Management TechnologiesMint Group is thrilled to bring you a consulting service designed to supercharge your Microsoft 365 experience and get you Microsoft 365 Copilot ready.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementKnowledge & Insights
50 out of 60
Enhanced Data Privacy with Microsoft PurviewAVA SOFTWARE INCConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
51 out of 60
Entra User ID ProvisioningQUORUM SYSTEMS PTY LTDWith Entra ID HR Driven User Provisioning you can remove aging infrastructure like Microsoft Identity Manager or other third party solutions.
+1
Applicable to:
Identity & Access Management
52 out of 60
Avanade Microsoft 365 Copilot Information Management 4 wk Imp. FY24Avanade, Inc.Avanade Microsoft 365 Copilot Information Management Accelerator ensures your data meets high standards of security, privacy and compliance so you can confidently unlock Copilot's full potential.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
53 out of 60
Microsoft Intune DeploymentSecure Future Bilgi Tek. ve Hiz. Tic A.S.The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
+3
Applicable to:
Identity & Access ManagementMobile Device ManagementThreat Protection
54 out of 60
Modern Workplace - Cloud Endpoint ManagementArxusOur Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
55 out of 60
Secure Identities and Access: 3 W - WorkshopExelegentHelp customers find and mitigate identity risks and safeguard their organization with a seamless identity solution.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
56 out of 60
Red Canary Cloud Security AssessmentRed CanaryAssess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
57 out of 60
Sensitive data risk assessmentAVA SOFTWARE INCConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
58 out of 60
Intune for iOS, iPadOS 2-Weeks ImplementationMobile MentorManage corporate and personal iOS and iPadOS devices with Microsoft Intune. Get zero-touch, OS and app updates, and more.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
59 out of 60
Microsoft 365 complete security HardneningAVA SOFTWARE INCAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
60 out of 60