FiltriPočisti vse
Št. rezultatov: Svetovalne storitve
Prikaz toliko rezultatov v aplikaciji svetovalne storitve:
Vsi rezultati
Bitscape Microsoft 365 Security Assessment: 3-Wk AssessmentatQorGet expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 60
C1st End-user Device Security Zero TrustC1st Technologies LLCC1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Collaborative Apps: 3 - W WorkshopExelegentBuild Solutions for your Customers to drive organizations goals and create collaborative experiences.
+3
Applicable to:
Identity & Access Management
Power Platform for Teams
Teamwork Deployment
3 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.Our security services provide a holistic approach through advisory,implementation & managed services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Office 365 GCC High Migration +Tenant Imp 4WkSummit 7 Systems, IncCompanies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
6 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPOThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
7 out of 60
Insight Managed Endpoint: Managed ServiceInsightInsight’s Managed Endpoint service offers a modern and cost-effective approach to the administration and support of your new or existing endpoint management solution.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
8 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu TarsasagInspect events in your network to locate threat indicators and entities
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Microsoft Defender for Business Deployment: 6-Wk ImplementationAlgen Solutions S.A. de C.V.We will provide you with a suite of security features that can help protect devices and data, reduce the burden on IT staff and meet regulation compliance requirements with Microsoft Defender.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
10 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
12 out of 60
Enhanced Data Privacy with Microsoft PurviewAVASOFTConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
13 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCThe primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
14 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
15 out of 60
Modern Device Management ImplementationDXCImprove the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
16 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLCThe Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementationInterlink Cloud Advisors, Inc.Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Window 365 Cloud PC: 3-Day Proof-of-ConceptCTGlobal A/SAssess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
19 out of 60
Security Foundations Data: Assessment and ImplementationProServeITData security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
+2
Applicable to:
Identity & Access Management
Threat Protection
20 out of 60
Fortis Assessment Microsoft Online SecuritySentinel Technologies Inc.Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
23 out of 60
Zero Trust Security 10-Hour AssessmentJourneyTEAMJourneyTeam’s Zero Trust Security Assessment is designed to provide a clear, actionable strategy for strengthening your organization’s Microsoft 365 security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
24 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstreamLightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Copilot Readiness: 2-Wk WorkshopCentric Consulting, LLCA facilitated workshop to build a Roadmap to guide your organization in implementing Copilot
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
27 out of 60
Windows 365: 5-week Proof of ConceptInterlink Cloud Advisors, Inc.Enhance productivity through flexibility by enabling your team to create secure Cloud PCs and allowing BYOD without increasing risk to your environment
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
28 out of 60
Teams Hosted Direct Routing: 2-week ImplementationQuisitiveQuisitive Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
29 out of 60
Microsoft Endpoint Management: 5-Day Proof of ConcepteGroup Enabling Technologies, LLCeGroup Enabling Technologies, LLC. Microsoft Endpoint Management Proof of Concept will allow you to modernize your endpoint management as part of an overall device management strategy.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
30 out of 60
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLCRavenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
31 out of 60
Compliance Manager: 8 Week ImplementationRazor Technology, LLCComprehensive orientation, deployment, training, support, administration, updates, documentation and testing services to get started quickly and expand with Compliance Manager and Compliance Score
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
32 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Defender for Endpoint: 5-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
34 out of 60
Windows Intune: 1-Wk Accelerated ImplementionITC Secure LtdAccelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
35 out of 60
Microsoft 365 Security: 30-Days ServiceIT Partner LLCEstablish a foundational, secure environment for clients by configuring their Microsoft 365 tenant with core security features.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
36 out of 60
Google Drive To OneDrive Migration JumpstartSentinel Technologies Inc.Sentinel Technologies offers a structured and secure migration service for transitioning from Google Drive to Microsoft OneDrive. Our process minimizes disruptions while maintaining productivity.
+1
Applicable to:
Identity & Access Management
37 out of 60
Secure Identities and Access: 4-Week Engagement & WorkshopCompuNet4-week engagement and workshop that helps customers design and plan out their optimal identity model to ensure they have a roadmap to enhanced security using Microsoft 365 and Azure Active Directory
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
38 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
39 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense GlobalStop threats with a cloud-native SIEM adapted to your new business needs.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
40 out of 60
Secure Productive Workplace: Implement 4-WkNetsuritNetsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
41 out of 60
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POCatQorOur Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
42 out of 60
Data Security and Governance Assessment and RoadmapCentric Consulting, LLCProvide customers with a clear path forward in addressing data security needs
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
43 out of 60
Microsoft 365: 2-Week ImplementationTechnologentExpert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
44 out of 60
MFA JumpstartSentinel Technologies Inc.Multi-factor authentication is a process in which users are prompted during the sign-in
process for an additional form of identification, such as a code on their cellphone or a
fingerprint scan.
+2
Applicable to:
Cloud Security
Identity & Access Management
45 out of 60
Security Baseline Integrity ManagerAegis InnovatorsSingle pane of glass for unified configuration, governance, and lifecycle management of security workloads across Microsoft 365.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
46 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
EMS Energize: 1-month proof of conceptInterlink Cloud Advisors, Inc.Interlink Cloud Advisors’ EMS Energize engagement provides you with security experts who can help guide your business into a secure, productive cloud platform.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
48 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
49 out of 60
Zero Trust as a Service (ZTaaS)Aegis InnovatorsDigital transformation and adopting AI starts with building a secure foundation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Microsoft 365 Copilot Everyday AI Adoption: 2wksInsightInsight’s Everyday AI Adoption for Microsoft 365 Copilot Program is designed to help organizations bring this technology to users in a way that promotes responsible adoption and drives productivity.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
51 out of 60
Microsoft Defender Secure Score, Security Licensing and Security Skill OptimizationBlue Cycle LLCService to optimize organizational security posture and increase your Microsoft Defender Secure Score.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
52 out of 60
Mitigate Compliance and Privacy Risks - 3 Day WorkshopProtivitiMicrosoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
53 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFTConfident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
54 out of 60
Secure Remote Work: 3 Days Intro and Plan WorkshopLiveRoute FZ-LLCEngagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
55 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
56 out of 60
Microsoft 365 Security WorkshopCollective InsightsEquip your organization with insights, strategies, and tools to fortify defenses, mitigate threats, and enhance overall security readiness across your digital estate.
+2
Applicable to:
Identity & Access Management
Threat Protection
57 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.A high-level forensics evaluation designed to identify current and past threat activity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Modernize Identities with Entra ID PremiumDaymark SolutionsStrengthen User Security with Advanced Identity Management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Managed IT Services for DentalOlive + GooseComprehensive managed IT services for dental offices, ensuring security, compliance, and continuity.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
60 out of 60