FilterRensa alla
Konsulttjänster resultat
Visar resultat i konsulttjänster
Alla resultat
General Data Protection Regulation (GDPR): 4-Wk Data Discovery ServiceIT Partner LLCMulti-step process to discover and scan data sources within the organization for personal data. The outcome: detailed inventory of data sources, together with the data they contain.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
1 out of 60
BCN Intranet LiteBCN Group Ltd.We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
2 out of 60
Microsoft 365 Copilot Deployment and Readiness ServicesInsightInsight can guide you on your Microsoft 365 Copilot journey with help of more than 1,500 dedicated Modern Work professionals who have been working to optimize Microsoft environments for 20 years.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
3 out of 60
Lighthouse Microsoft Purview Deployment: 10-Wk IntegrationLighthouse GlobalImplement and integrate Microsoft Purview into your organization with confidence knowing you have mitigated risk factors and maximized your investment.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
4 out of 60
Securing Copilot for Microsoft 365 in Microsoft 365 for Business 1hour Implementationtrue org cloudThe security, compliance, and privacy policies that you have in place are adopted by Copilot for Microsoft 365.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
5 out of 60
Copilot for Microsoft 365 technical readiness assessment 6-WkSPAN d.d.Span Copilot Readiness Assessment offers technical insights into your tenant and Microsoft 365 services to leverage the capabilities of AI with Copilot for Microsoft 365.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
6 out of 60
Synergy Advisor Security Engagement (Pilot+) for Microsoft Copilot for SecuritySynergy Advisors LLCA Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceKnowledge & Insights
7 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentCompuNetThis engagement provides a comprehensive review of an organization's Microsoft 365 security controls, policies, and configurations to identify potential security risks and vulnerabilities.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
8 out of 60
Microsoft 365 Consulting Services: 12-Months ImplementationForsyte IT SolutionsOptimize your Microsoft 365 productivity, user experience, and security with the expertise of Forsyte I.T. Solutions consulting services when you need it most.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementInformation Protection & Governance
9 out of 60
Managed SOC_by SoftwareOneSoftwareOneSecure your IT Environment with Microsoft Services and on-call Cyber-security Analysts with Managed SOC by SoftwareOne
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
10 out of 60
Microsoft 365 - Threat Protection: 2-week workshopForteventoWorkshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
11 out of 60
Overwatch Microsoft 365 Security: 12 Month ImplementationTHREATSCAPE LIMITEDOverwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
12 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
13 out of 60
Copilot for Microsoft 365 Full AdoptionRSM Product Sales LLCA three-phased approach to assess needs, define a Copilot for Microsoft 365 deployment strategy, and launch Copilot for Microsoft 365 with a focus on governance, responsible AI, and engagement.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceKnowledge & Insights
14 out of 60
Exchange Online Migration: 6-Week DeploymentCyclotron Inc.Exchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
+2
Applicable to:
Cloud SecurityInformation Protection & Governance
15 out of 60
Rapid Zero Trust Deployment : 8-WK ImplementationMaureen Data SystemsThe purpose and objectives of this engagement are to develop a Zero Trust Implementation Strategy
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementInformation Protection & Governance
16 out of 60
Endpoint Management Advisory Service: 6-Wk ImplementationWragby Business Solutions & Technologies LimitedThis advisory service enables organizations efficiently manage end points leveraging Microsoft Intune & Configuration Manager through assessments, 1-day workshops and six weeks deployment
+3
Applicable to:
Information Protection & GovernanceMobile Device ManagementThreat Protection
17 out of 60
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
18 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days ImplementationHCL Technologies Limited.HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
19 out of 60
Finance Ind., Modern Workplace: 2-Days WorkshopCloudicaThis workshop will cover how Microsoft 365 technologies can be used to meet Finance company objectives such as increased efficiency and productivity, increased employee collaboration, and others.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceWorkplace Analytics
20 out of 60
Security Operations Center with Microsoft SentinelAVA SOFTWARE INCMonitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
21 out of 60
Spyglass Microsoft Intune: 4-Week ImplementationSpyglass MTG, LLCThe Spyglass Intune Implementation offer focuses on providing a fully functional and deployed instance of Intune that leverages all its capabilities.
+3
Applicable to:
Device Deployment & ManagementInformation Protection & GovernanceMobile Device Management
22 out of 60
Sensitive Data Protection with Microsoft PurviewAVA SOFTWARE INCSensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
23 out of 60
Sensitive data risk assessmentAVA SOFTWARE INCConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
24 out of 60
Microsoft Sentinel - Log Management and threat detectionAVA SOFTWARE INCIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
25 out of 60
Modern Management: 4 week ImplementationMobile MentorModern Management is a Microsoft 365 focused managed service that reduces cost, improves security and delights employees!
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementInformation Protection & Governance
26 out of 60
Office 365 Teamwork Security - Managed ServiceCognizantTeamwork Security provides a comprehensive security management service for Office 365 platforms
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
27 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareOneImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementInformation Protection & Governance
28 out of 60
Microsoft 365 Security Health Check: 3 day AssessmentISCG SP Z O OMicrosoft 365 is a multi-layer solution with the right security policies you can block over 99.9 percent of account compromise attacks!
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
29 out of 60
Modern Workplace Security 10-Wk ImplementationWipro LtdWipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
30 out of 60
Application Monitoring Solution with Microsoft SentinelAVA SOFTWARE INCEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
31 out of 60
Step forward with Sii support and Copilot for Microsoft 365 featuresSii Sp. z o.o.A comprehensive solution for your business needs with trusted Microsoft Partner. Together, let's revolutionize your daily processes with the power of Copilot and expert IT support and best practises.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementInformation Protection & Governance
32 out of 60
Athenagy™ E-Discovery Assessment: 4 weeksBDO Digital, LLCCentralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
33 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReplyValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
34 out of 60
Synergy Advisors POC-in-a-box for Microsoft Purview Information ProtectionSynergy Advisors LLCThe Synergy Advisors POC-in-a-box offers a flexible solution designed to elevate your compliance use cases without requiring you to invest in architecture or setup tasks
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceKnowledge & Insights
35 out of 60
Microsoft Purview eDiscovery POC (5 Day)Epiq Global5-Day eDiscovery POC demonstrating standard & premium capabilities of Microsoft Purview components
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
36 out of 60
Synergy Advisor Architecture Design Sessions (ADS) for Microsoft Copilot for SecuritySynergy Advisors LLCA Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceThreat Protection
37 out of 60
UNITE: Exploring E5 Security Workshop_INFINITY TECHNOLOGY SOLUTIONSUNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
38 out of 60
Copilot for Microsoft 365 Readiness 2-Day WorkshopCompuNetCompuNet's Copilot for Microsoft 365 Readiness Workshop will prepare your organization's employees to take full advantage of the power of AI
+3
Applicable to:
Adoption & Change ManagementCompliance Advisory ServicesInformation Protection & Governance
39 out of 60
Microsoft Cloud application security Assessment - 2 weeksAVA SOFTWARE INCUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
40 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
41 out of 60
Microsoft Priva Assessment: 2 WkLighthouse GlobalEmpowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
+2
Applicable to:
Cloud SecurityInformation Protection & Governance
42 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POCITC Secure LtdExperience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
43 out of 60
Microsoft Defender for Cloud Apps JumpstartSentinel Technologies Inc.Microsoft Defender for Cloud Apps address security gaps in an organization's environment.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
44 out of 60
Copilot Data ProtectionCloud LifeCopilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
45 out of 60
Avanade Modern Sec OpsAvanade, Inc.To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
46 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und AusarbeitungAppSphere AGVom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
47 out of 60
Security and compliance assessment with Microsoft PurviewAVA SOFTWARE INCFortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
48 out of 60
Infosys EMS solution : 1 Month ImplementationInfosys LimitedEMS + Security solution helps organizations to build a secure Modern Workplace by protecting the corporate data and simplifying workforce mobility.
+3
Applicable to:
Device Deployment & ManagementInformation Protection & GovernanceMobile Device Management
49 out of 60
Microsoft 365 Email Threat Protection AssessmentAVA SOFTWARE INCMicrosoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
50 out of 60
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLCWe understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
51 out of 60
Microsoft Defender for Endpoint Professional Services: 1-Wk ImplementationOptiv Security Inc.Provide comprehensive, powerful protection at your organization's endpoints from Optiv utilizing the Microsoft Defender for Endpoint solution.
+3
Applicable to:
Information Protection & GovernanceKnowledge & InsightsThreat Protection
52 out of 60
Intranet in a Box Basic Package: 2-Hours ImplementationJourneyTEAMGet your intranet and your organization to its optimal efficiency using SharePoint online within Microsoft 365
+3
Applicable to:
Information Protection & GovernanceKnowledge & InsightsTeamwork Deployment
53 out of 60
Cybersecurity AssessmentCDI LLCThe Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
54 out of 60
Modern IntranetPlanet TechnologiesModern intranet engagement is designed to deploy a new modern intranet on SharePoint Online and published utilizing Viva Connections.
+2
Applicable to:
Adoption & Change ManagementInformation Protection & Governance
55 out of 60
Intranet in a Box Gold Package: 2-Hours ImplementationJourneyTEAMGet your intranet and your organization to its optimal efficiency using SharePoint online within Microsoft 365
+3
Applicable to:
Information Protection & GovernanceKnowledge & InsightsTeamwork Deployment
56 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-WeeksmyCloudDoorAssess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
57 out of 60
Epiq Data SecurityEpiq GlobalComprehensive safeguarding of sensitive data, enabling organizations to proactively identify and mitigate risks while protecting data and maintaining compliance with regulations.
+2
Applicable to:
Information Protection & GovernanceInsider Risk
58 out of 60
Copilot for Microsoft 365 Ideation: 3-Hour AI Advisory WorkshopRSM Product Sales LLCExperience the power of the Microsoft AI framework and identify value added AI solutions for your organization.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceKnowledge & Insights
59 out of 60
Managed Information Protection & GovernanceInfolockInfolock addresses the challenges of understaffed organizations by providing skilled and specialized professionals to optimize and administer their data protection program
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
60 out of 60