FiltriPočisti vse
Št. rezultatov: Svetovalne storitve
Prikaz toliko rezultatov v aplikaciji svetovalne storitve:
Vsi rezultati
Threat Protection EngagementadaQuestLearn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
1 out of 60
Data Security EngagementadaQuestThe Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
2 out of 60
Copilot Value DiscoveryadaQuestThe Copilot Value Discovery is a three-phase process that helps customers grasp the benefits of AI reinvention, pinpoint key functional scenarios, create a business case, and develop a strategic plan.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
3 out of 60
Intune Managed ServiceMobile MentorYour endpoint ecosystem is constantly evolving and needs proactive management, so we designed the Intune Managed Service to help customers unlock the full potential of Intune.
+2
Applicable to:
Cloud SecurityIdentity & Access Management
4 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
5 out of 60
Microsoft Intune: 4-Wk Implementation ServicesTechNet UC LLCMicrosoft Intune Design and Deployment Services
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
6 out of 60
Microsoft 365 Copilot Foundations ProgramHSO From envisioning and assessment to deployment, embrace the power of Microsoft 365 Copilot - your Copilot for work!
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementTeamwork Deployment
7 out of 60
Red Canary MSSP FastTrack for SecurityRed CanaryLeverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
8 out of 60
Microsoft 365 Copilot: Adoption and Change Management (ACM)NOVENTIQMicrosoft 365 Copilot Adoption and Change Management service by Noventiq helps organizations accelerate Microsoft 365 Copilot Success through AI Adoption Excellence
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
9 out of 60
Microsoft 365 Security: 3,5 Tage Tenant AssessmentAppSphere AGSicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementKnowledge & Insights
10 out of 60
Email Security Threat AssessmentAVA SOFTWARE INCConfident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
11 out of 60
Zero Touch Provisioning: 3-week ImplementationMobile MentorZero-Touch Provisioning sets you up to ship devices straight to users, with auto-configuration occurring over the air on initial sign in.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
12 out of 60
MDS - Data Security Readiness Assessment for Copilot for Microsoft 365Maureen Data SystemsA 3-day comprehensive assessment to help organizations set the foundations of data security, privacy and governance in preparation for Copilot for Microsoft 365
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
13 out of 60
Microsoft 365 Copilot Readiness: 2 week AssessmentTOKIOTAWe help our clients to integrate Microsoft 365 Copilot in their organization in the most secure and efficent way
+3
Applicable to:
Adoption & Change ManagementCompliance Advisory ServicesIdentity & Access Management
14 out of 60
Copilot for Microsoft 365 Full Security and Adoption Enablement Solution "ONESEC.AI"Secure Nextgen SystemsIt is your ally in artificial intelligence to enhance productivity, innovation and efficiency in organizations.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
15 out of 60
Accenture Modern Workplace ServicesAccentureAccenture Modern Workplace Services
+3
Applicable to:
Frontline WorkersIdentity & Access ManagementMeetings for Microsoft Teams
16 out of 60
BYOD 365: 6-week ImplementationMobile MentorThe BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
17 out of 60
Okta to Microsoft Entra ID MigrationPerformantaPerformanta's Okta to Microsoft Entra ID Application Migration service will give you a controlled, seamless and secure transition to Azure AD.
+1
Applicable to:
Identity & Access Management
18 out of 60
Microsoft 365 Security Health Check: 3 day AssessmentISCG SP Z O OMicrosoft 365 is a multi-layer solution with the right security policies you can block over 99.9 percent of account compromise attacks!
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
19 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
20 out of 60
Journey to Microsoft 365 Copilot: 4-hours WorkshopPROJECT INFORMATICA SRLMicrosoft 365 Copilot workshop bring to you the opportunity to create awareness about holistic to Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
21 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoft BrasilBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
22 out of 60
Intune for Windows: 6-week ImplementationMobile MentorIntune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
23 out of 60
Modern Management: 4 week ImplementationMobile MentorModern Management is a Microsoft 365 focused managed service that reduces cost, improves security and delights employees!
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementInformation Protection & Governance
24 out of 60
Microsoft 365 Email Threat Protection AssessmentAVA SOFTWARE INCMicrosoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
25 out of 60
Phishing, Malware & Spam protection- 2 weeks ImplementationAVA SOFTWARE INCPhishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
26 out of 60
Data Protection and Governance with Microsoft PurviewAVA SOFTWARE INCConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
27 out of 60
Co-pilot Technical ReadinessPHOENIX SOFTWARE LTDHelp your organisation ensure that they are technically ready for Co-pilot
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementKnowledge & Insights
28 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 WksWipro LtdWipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
+2
Applicable to:
Identity & Access ManagementThreat Protection
29 out of 60
Teams & SharePoint Security HardeningAVA SOFTWARE INCTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to:
Identity & Access ManagementTeams Custom SolutionsThreat Protection
MDM Health Check (Mobile OS Only): 2-week AssessmentMobile MentorOur certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
31 out of 60
Shadow IT discovery with Microsoft cloud app securityAVA SOFTWARE INCKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
32 out of 60
Modern Workplace - Cloud Endpoint ManagementArxusOur Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
33 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalystAlithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
34 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayonEvaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
35 out of 60
Enhanced Data Privacy with Microsoft PurviewAVA SOFTWARE INCConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
36 out of 60
Endpoint Modernization Quickstart ServiceDell Technologies ServicesDell Quick Start service helps customers configure their environment and prepare it for Modern Device Management and Modern Provisioning.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
37 out of 60
SmartStart for IntuneMobile MentorThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
38 out of 60
Microsoft Sentinel - Log Management and threat detectionAVA SOFTWARE INCIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
39 out of 60
Microsoft Defender for Endpoint SMC Deployment: 4-Week ImplementationBlueVoyantOur services are designed to maximize your investment with Microsoft with hands-on onboarding & baseline configuration services.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
40 out of 60
Suri Services y Microsoft Defender for Endpoint: Tu Escudo de Seguridad EmpresarialSuri Services SCSuri Services, en colaboración con Microsoft Defender for Endpoint, ofrece una solución de seguridad excepcional para tus puntos de acceso.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
41 out of 60
Endpoint Ecosystem Technical Support: 12-month Support ImplementationMobile MentorProvide support and advice to IT administrators on Microsoft Endpoint Manager
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
42 out of 60
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
43 out of 60
Microsoft Cloud Application for 3rd Party AppsAVA SOFTWARE INCSecure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
44 out of 60
Windows 11 Assessment: 1-WKSteeves Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
45 out of 60
MXDR services 4 weeks ImplWhite Hat Consultores S.A. de C.V.Servicios administrados de seguridad para detección y respuesta a incidentes basados en plataforma MXDR
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
46 out of 60
Intune for iOS, iPadOS 2-Weeks ImplementationMobile MentorManage corporate and personal iOS and iPadOS devices with Microsoft Intune. Get zero-touch, OS and app updates, and more.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
47 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
48 out of 60
Copilot Readiness Assessment for Microsoft 365Mint Management TechnologiesMint Group is thrilled to bring you a consulting service designed to supercharge your Microsoft 365 experience and get you Microsoft 365 Copilot ready.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementKnowledge & Insights
49 out of 60
Red Canary Cloud Security AssessmentRed CanaryAssess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
50 out of 60
Sensitive Data Protection with Microsoft PurviewAVA SOFTWARE INCSensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
51 out of 60
Microsoft 365 complete security HardneningAVA SOFTWARE INCAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
52 out of 60
Modern Workplace Security 10-Wk ImplementationWipro LtdWipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
53 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInsider Risk
54 out of 60
Data Access Control with MCASAVA SOFTWARE INCAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
55 out of 60
Atos || Pilot program for Windows 365Atos International SASAtos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
56 out of 60
Intune Implementación EstándarSuri Services SCEn Suri Services, te ayudamos a implementar Microsoft Intune, una solución que mejora la seguridad y facilita la gestión de tus dispositivos y aplicaciones.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
57 out of 60
Microsoft 365 Defender for Endpoint Vulnerability AssessmentAVA SOFTWARE INCEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
58 out of 60
Atos || Microsoft Windows 365 PilotAtos International SASAtos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
59 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
60 out of 60