FiltreGoliți tot
Servicii de consultanță rezultate
Se afișează rezultate în servicii de consultanță.
Toate rezultatele
1-Tages KI Praxis Update Workshop (inkl. Copilot): Ihr Kompass durch die Welt der Künstlichen IntelligenzAppSphere AGMit dem KI Praxis Update Workshop statten wir Ihr Team mit dem neuesten Wissen über KI aus. Lernen Sie, wie Sie KI zielgerichtet und profitabel in Ihrer Organisation nutzen können.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityKnowledge & Insights
1 out of 60
Prepárate para Microsoft Copilot con ENCAMINA: Assesment 3 semanasENCAMINA S.L.Obtén un assessment integral: análisis de información, optimización de arquitectura y seguridad, más plan de comunicación y Road Map personalizado
+3
Applicable to:
Adoption & Change ManagementCloud SecurityKnowledge & Insights
2 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud SecurityThreat Protection
3 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
4 out of 60
NIST800-171-Microsoft 365-Accelerator-Guided-DeploymentKMicro Tech, Inc.Provides expert guidance to help organizations achieve NIST 800-171 compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
5 out of 60
CMMC Implementation for Microsoft 365 (8 Wk Proj)Summit 7 Systems, IncSummit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) practices associated with Levels 1-3 for Microsoft 365, as well as Azure and AAD where appropriate.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
6 out of 60
Microsoft 365 Protecting Corporate Identities: 5-Wk ImplementationKiZAN TechnologiesSafeguard your organization from devastating breaches with Microsoft 365 identity solutions.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
7 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVA SOFTWARE INCSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
8 out of 60
Copilot for Microsoft 365 Adoption Accelerator Program - 18 WeeksTrace3This program's primary objective is to help accelerate client adoption of Copilot for Microsoft 365 and setup the client for continued maturity with their usage of Copilot for Microsoft 365.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceTeamwork Deployment
9 out of 60
CIS Top 20 Control Gap Analysis: 3-Day AssmtCompuNetBy leveraging CompuNet, armed with CIS top 20 controls and its team of experts, they can advise on what controls to leverage inside the Microsoft suite as well as when to leverage 3rd party solutions.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
10 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLCLeverage your Microsoft investment to create a strong Zero Trust security environment.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
11 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-WeeksmyCloudDoorAssess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
12 out of 60
Microsoft 365 Security: 4-hour AssessmentQuisitiveThe Microsoft 365 Security Assessment provides an in-depth assessment of your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
13 out of 60
Infosys Intelligent Security SolutionInfosys LimitedInfosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
14 out of 60
TGS Windows 11Teksystems, Inc.TEKsystems partners with you to navigate the transition to Windows 11
+3
Applicable to:
Adoption & Change ManagementCloud SecurityDevice Deployment & Management
15 out of 60
Microsoft Security Assessment: 3-Wk AssessmenteGroup Enabling Technologies, LLCAnalyze your cross platform security posture, with evaluated vulnerabilities and risks identified with a Microsoft Security Assessment.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
16 out of 60
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud SecurityThreat Protection
17 out of 60
Invoke Data Risk AssessmentInvokeThis assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
18 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu TarsasagSafeguard your entire organization with Managed Security Services on Microsoft Defender
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
19 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
20 out of 60
Microsoft 365 Security BriefingCDI LLCA Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
21 out of 60
Microsoft 365 Security and Compliance AssessmentAVA SOFTWARE INCMicrosoft 365 Security and Compliance Assessment evaluates your current security posture, identifies vulnerabilities, and offers tailored solutions to enhance your data security and compliance.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
22 out of 60
Data Security & Protection: 8 weeks - ImplementationMazzy Technologies Corp.Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementInformation Protection & Governance
23 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLCIf you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
+3
Applicable to:
Calling for Microsoft TeamsCloud SecurityIdentity & Access Management
24 out of 60
Security Outcomes SprintAscent Global, Inc.Understand the Business Value of Your Cybersecurity Investments
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
25 out of 60
CT - Microsoft 365 Copilot Readiness AssessmentCloud TargetAssessment in Microsoft 365 environment to enable Microsoft 365 Copilot deploy
+3
Applicable to:
Adoption & Change ManagementCloud SecurityTeamwork Deployment
26 out of 60
Defender for Office365Suri Services SCSuri Services y Office 365: La alianza impenetrable en ciberseguridad.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
27 out of 60
Microsoft Entra Private Access and Entra Internet AccessSentinel Technologies Inc.Transform your organization's security landscape with our latest jumpstart, designed to fortify managed applications for your remote workforce and ensure secure access to Microsoft 365.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
28 out of 60
Microsoft 365 Manage Service–12 mth ImplementationAlfa Connections Pte LtdAlfa Connections providing Microsoft 365 Managed service is designed to enhance your workforce experience by supporting your organization on planning, enablement, implementation, and adoption.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityFrontline Workers
29 out of 60
Copilot Security Assessment: 4-Wk AssessmentManaged SolutionUnlock the full potential of AI with a comprehensive Microsoft Copilot Security Assessment, fully integrated with Microsoft 365
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementKnowledge & Insights
30 out of 60
Copilot for Security Accelerator: 2-week ImplementationNeway TechnologiesNeway’s Microsoft Copilot for Security Accelerator empowers security teams with enhanced protection and streamlined operations through eight key steps.
+2
Applicable to:
Cloud SecurityThreat Protection
31 out of 60
Office 365 Protection: Design & Pilot 1-Wk POCManaged SolutionProtect Your Employees from External Email Threats with Defender for Office 365 Protection
+2
Applicable to:
Cloud SecurityThreat Protection
32 out of 60
Zero Trust ImplementationJourneyTEAMUnlock the potential of your Microsoft 365 cybersecurity with JourneyTEAM's comprehensive Zero Trust Implementation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
33 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
34 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLCIntroducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
35 out of 60
Management Services: 3-month AssessmentQuisitiveQuisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementInformation Protection & Governance
36 out of 60
Microsoft 365 Managed SupportIvision, Inc.iVision offers 24/7 advanced support for Microsoft 365, enhancing IT with agile, integrated cloud solutions.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
37 out of 60
Defend, Protect, Secure with Microsoft Defender XDRComtrade System IntegrationTake the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
+2
Applicable to:
Cloud SecurityThreat Protection
38 out of 60
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse GlobalThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
39 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLCBreach and Attack Simulations — We Attack to Defend You
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
40 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed CanaryGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
41 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5Collective InsightsUpgrade to Microsoft 365 E5 for Advanced Productivity and Security
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
42 out of 60
Defender for IoT Operational Technology: 8-Week POCITC Secure LtdITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
43 out of 60
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstreamLightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
44 out of 60
UNITE: AI Aware Workshop_INFINITY TECHNOLOGY SOLUTIONSFor business leaders who seek to understand AI in a business context, UNITE: AI Aware_ is an expert-led workshop for all departments. Participants can learn about AI types, capabilities and benefits.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityKnowledge & Insights
45 out of 60
Microsoft 365 / Office 365 / Azure / Dynamics 365 Knowledge Transfer: 3-Hours Professional ServiceIT Partner LLCUnlock the true potential of your Microsoft 365 environment with our specialized "Knowledge Transfer" consulting service – a roadmap to maximize your organization's capabilities.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityKnowledge & Insights
46 out of 60
Avanade Microsoft Security Service Edge Quick StartAvanade, Inc.Microsoft’s new Security Service Edge (SSE) capability empowers organizations on their Zero Trust journey though unique in the market integration with Microsoft Entra.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
47 out of 60
Microsoft 365 Strategy, guidance and governance workshop by Nexer: 1 DayNexer Group ABWe will help you go through your Microsoft 365 implementation and make sure that you follow Microsofts Best Practices.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
48 out of 60
Microsoft Purview Insider Risk Management (IRM): 2-Week ImplementationSpyglass MTG, LLCOur engagement is designed to accelerate the ability to integrate and consume IRM across your enterprise while better securing data and identities in the environment.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
49 out of 60
Copilot for Microsoft 365 AssessmentIt1 Source LLCPrepare your organization for the future of AI technology with a secure, productive, and modernized data foundation
+3
Applicable to:
Adoption & Change ManagementCloud SecurityTeamwork Deployment
50 out of 60
Fortis Assessment Microsoft Online SecuritySentinel Technologies Inc.Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
51 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdgeEndpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
52 out of 60
Microsoft 365 CISO Security Workshop with SentinelCDWMicrosoft 365 CISO Security Workshop with Sentinel is designed as a day engagement for Business Decision Makers (BDM) to help showcase the value proposition of Microsoft Security.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
53 out of 60
Microsoft Security Immersion: 1 Day BriefingSynergy Technical, LLCKnowing that your time is valuable, we have developed a true to life, hands-on, interactive session designed to give you a deep understanding of the Microsoft 365 Security suite of products.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
54 out of 60
Microsoft Defender for Endpoint ImplementationCDWCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
55 out of 60
Mergers, Acquisitions, and Divestitures: 5-Month ImplementationCyclotron Inc.Cyclotron helps organizations overcome the technical challenges of consolidating or divesting organization assets using Microsoft 365, Azure, and third-party migration tools.
+2
Applicable to:
Adoption & Change ManagementCloud Security
56 out of 60
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week ImplementationQuisitiveQuisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
57 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwovenNetwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
58 out of 60
Microsoft 365 E5 Cyber Range 2 Week ImplementationKAMIND IT, IncKAMIND's cybersecurity immersive learning deployment utilizing Project Ares Cyber Range for Microsoft 365 Security Suites.
+2
Applicable to:
Cloud SecurityThreat Protection
59 out of 60
Difenda - Information Protection and Governance - 4-week ImplementationDifendaUse Microsoft Purview to Implement an Information (Data) Protection and Governance solution to improve Security.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
60 out of 60