FiltriPočisti vse
Št. rezultatov: Svetovalne storitve
Prikaz toliko rezultatov v aplikaciji svetovalne storitve:
Vsi rezultati
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, IncTrustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+1
Applicable to:
Identity & Access Management
1 out of 48
Insight´s Microsoft Cloud Advisory ServiceInsight Technology SolutionsProvides a 2 weeks assessment of our client’s estate across the following six areas: Microsoft 365, Azure, On-Premises, Business Critical Applications, Skills & Resourcing & Cost optimisation.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
2 out of 48
IdentityGuard Managed ServiceCWSIIdentityGuard helps customers understand, implement and utilise all of the capabilities of Entra ID Suite to execute their Identity & Access Management Strategy and deliver business benefits
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceInsider Risk
3 out of 48
Identity Security Maturity: 6-day AssessmentResilient SecurityIdentity security maturity assessment to align business, processes and technology in an actionable roadmap and get the maximum out of your Azure Active Directory investment.
+1
Applicable to:
Identity & Access Management
4 out of 48
Rackspace Security & Compliance 10-hr AssessmentRackspace EMEARackspace helps you to identify potential risks in your current Microsoft 365 environment. Recommendations and improvement measures will be provided after the assessment.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
5 out of 48
Intune for Windows: 12-week ImplementationMobile MentorIntune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
6 out of 48
G Suite to M365 Migration: 1-Day Proof of concepttrue org cloudProof of concept for migration from G Suite to Microsoft 365
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementMeetings for Microsoft Teams
7 out of 48
SecWise Assess for Workplace: 5-Day Security AssessmentSecWiseAn assessment of your modern workplace set-up to make sure it matches cyber security standards and best-practices.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
8 out of 48
SecWise Identity (Zero Trust): Azure AD activationSecWiseIdentify your Zero Trust modern Identity & Access Management (IAM) jump-start configuration based on our pre-defined IAM Jump-start configurations.
+1
Applicable to:
Identity & Access Management
9 out of 48
Microsoft 365 Security Envisioning - 1day workshopOfficeline SALearn how to improve your organization’s security posture with Office Line’s Microsoft 365 Security 1-day Workshop.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
10 out of 48
Microsoft 365 Security Baseline: 3-WK AssessmentMotion10A three-week assessment to create a baseline for protecting (sensitive) information, identities and devices.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
11 out of 48
5 day security (CIS controls) AssessmentUnica ICT solutionsKrijg inzicht en grip op de security van jouw organisatie middels een benchmark (nul meting) op basis van het markt gerenommeerde framework CIS Controls.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
12 out of 48
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
13 out of 48
Microsoft 365 Security: 2-Week ImplementationTelelink Business Services EADCreate and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
+2
Applicable to:
Identity & Access ManagementThreat Protection
14 out of 48
Scan To Teams Migration: 8 wk ImplementationRubicon B.V.Automate your file-server migration to Microsoft Teams by using user friendly dashboards and insights
+3
Applicable to:
Identity & Access ManagementTeams Custom SolutionsTeamwork Deployment
15 out of 48
Microsoft 365 Data Modernizer - 6wk ImplementationRubicon B.V.The Rubicon Microsoft 365 Data Modernizer, will configure the capability within your tenant to enrich your documents and information (automatically or manually).
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
16 out of 48
Securing Identities and access Workshop including FastTrack guidanceXylosOur 4-day Identity Security workshop is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
+1
Applicable to:
Identity & Access Management
17 out of 48
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UKManage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
18 out of 48
Workplace Suite 365: 3-Weeks AssessmentArvato SystemsGanzheitliche Lösungen für die Transformation des Arbeitsplatzes und die neue Lust an produktiver Teamarbeit.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceTeamwork Deployment
19 out of 48
Seguridad Corporativa: Evaluación 4 semanasCIBERIT SRL.Con esta Solución usted podrá gestionar la seguridad en toda su empresa
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
20 out of 48
FastTrack Kick-start Microsoft 365 - 2h - WorkshopXylosXylos FastTrack envisioning workshop helps organizations accelerate deployment, migration, and adoption of their Microsoft 365 subscriptions at no additional cost.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementInformation Protection & Governance
21 out of 48
Secure Microsoft 365 Managed ServiceCWSICWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
22 out of 48
Cloud Security Assessment in 3 daysSCCTCloud Security Assessment in 3 days. Door middel van dit assessment wordt inzicht verschaft over de huidige security staat van uw Microsoft 365 omgeving.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
23 out of 48
Secure Remote Work: 3 Days Intro and Plan WorkshopLiveRoute FZ-LLCEngagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
24 out of 48
Transition to Cloud: 1-day Workshopthinformatics AGZiel des Workshops ist die gemeinsame Erarbeitung eines Fahrplans für Ihre Cloud Transition!
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
25 out of 48
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
26 out of 48
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
27 out of 48
Identity & Access Management: 1-Mth ImplementationOfficeline SAMicrosoft 365 Identity & Access Management to improve and streamline security on cloud and applications
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
28 out of 48
Managed Modern Workplace: 2 hrs BriefingCentric Netherlands b.v.With the Managed Modern Workplace briefing you gain insight in our approach to setup and maintain and adoption of your Microsoft 365 workplace.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementIdentity & Access Management
29 out of 48
Approach of the Modern Workplace: 4 hours BriefingCegeka NVThe goal of this briefing is to clarify some misconceptions about the approach to a modern digital workplace.
+2
Applicable to:
Device Deployment & ManagementIdentity & Access Management
30 out of 48
Secure Identities and Access Expert-as-a-service, 1 y, Mgd serviceXylosXylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your cloud or hybrid Identity environment based on Microsoft 365 technology.
+2
Applicable to:
Cloud SecurityIdentity & Access Management
31 out of 48
Secure Remote Work 365: 1-Wo. ImplementierungArvato SystemsUnlock the potential of your workplace by Arvato Systems. Azure Virtual Desktop als Managed Service mit Full Service Management nach definierten SLAs
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
32 out of 48
NextGen Windows Experiences, 5d, Proof of ConceptXylosMicrosoft Endpoint Manager PoC is a scenario-based engagement that addresses Windows 10/11 management, and iOS, Android, and macOS management with Microsoft 365 Endpoint Manager
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
33 out of 48
Defend against threats with SIEM + XDR Expert-as-a-service 1 y, Mgd svcXylosXylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your Threat Protection environment based on Microsoft 365 technology.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
34 out of 48
Secure Identities and Access Assessment, 3 daysXylosOur Identity Security Assessment is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
35 out of 48
Next Gen Endpoints 3-Day WorkshopFUJITSUProvide your employees with access to a secure desktop experience from virtually anywhere.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
36 out of 48
Securing Identities: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Securing Identities is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+1
Applicable to:
Identity & Access Management
37 out of 48
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
38 out of 48
Workplace Security Maturity: 6-day assessmentResilient SecurityWorkplace security maturity assessment to get the most out of your Microsoft 365 security platform
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
39 out of 48
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
40 out of 48
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
41 out of 48
Neway Security proposition: 3-WK implementationNeWay Technologies LtdThe Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
42 out of 48
Sogeti SmartWorkspace: 4 Week ImplementationCapgemini GroupSogeti provides a one-stop shop set of offerings around the SharePoint solutions. Our offer comprises consultancy, discovery of the existing landscape, Solution Architecture, SharePoint migration etc.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementIdentity & Access Management
43 out of 48
Secure Hybrid Identity - Defender for Identity: 6 week ImplementationPerformantaSecure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
+2
Applicable to:
Identity & Access ManagementThreat Protection
44 out of 48
Insight Security Mini Audit: 1 Day WorkshopInsight Technology SolutionsInsight will work with you to evaluate your Microsoft 365 environment to make sure that it is in line with industry security best practices.
+3
Applicable to:
Identity & Access ManagementInsider RiskThreat Protection
45 out of 48
Microsoft 365 Security Assessment: 6-day AssessmentPerformantaPerformanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
46 out of 48
[Identity Management: 5-Days Assessment]Computacenter PlcCustomer security assessment in regards of Identity management: 5 day offer
+1
Applicable to:
Identity & Access Management
47 out of 48
Endpoint Management and Windows Deployment: 2-days ImplementationCC Bilgi TeknolojileriMicrosoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises.
+2
Applicable to:
Device Deployment & ManagementIdentity & Access Management
48 out of 48