FilterRensa alla
Konsulttjänster resultat
Visar resultat i konsulttjänster
Microsoft Secure Score - increase to 200: 3-Days Professional ServiceIT Partner LLCThe goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
1 out of 60
Ctelecoms Threat Protection EngagementConsolidated Telecoms (Ctelecoms)Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 60
Windows 365: 4 Week Readiness AssessmentNetrix GlobalGet an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
3 out of 60
DLP Implementation and Tuning ServicesINFOTECHTIONReduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
4 out of 60
BCN Cloud Readiness Assessment and ReportBCN Group Ltd.This assessment will help you decide whether you are ready to migrate IT systems and services to the cloud.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Meetings for Microsoft Teams
5 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLCEnhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Digital Transformation Calls: 1-Day Professional ServiceIT Partner LLCQualified assistance in resolving any issues after migration to the Microsoft 365 cloud services.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
7 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLCMulti-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Company Document Migration to SharePoint Online or Teams: 7-Days Consulting ServiceIT Partner LLCMigration of file shares, folders and documents from your file server or a third-party service like Box, Dropbox, or Google Drive to SharePoint Online or Teams.
+2
Applicable to:
Cloud Security
Teamwork Deployment
Endpoint Security Foundations 50 users: 1-YrRed River Technology LLCEndpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
11 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalystAlithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
12 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process AdoptionVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
13 out of 60
Microsoft 365 Security: 30-Days ServiceIT Partner LLCEstablish a foundational, secure environment for clients by configuring their Microsoft 365 tenant with core security features.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
14 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLCEstablish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLCEstablish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Zero Trust Security 10-Hour AssessmentJourneyTEAMJourneyTeam’s Zero Trust Security Assessment is designed to provide a clear, actionable strategy for strengthening your organization’s Microsoft 365 security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
17 out of 60
Enterprise Mobility + Security Quickstart for NonprofitSoftwareOneSecure, compliant, and adaptable productivity for mission-driven work
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
18 out of 60
Foundational Identity AnalysisJourneyTEAMEnsure a Secure Foundation for Microsoft Cloud Services using our Foundational Identity Analysis.
+1
Applicable to:
Cloud Security
19 out of 60
Copilot for Microsoft 365 AssessmentIt1 Source LLCPrepare your organization for the future of AI technology with a secure, productive, and modernized data foundation
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
20 out of 60
Avanade Security Business Value 4-Wk AssessmentAvanade, Inc.Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
21 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu TarsasagSafeguard your entire organization with Managed Security Services on Microsoft Defender
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
1-Tages Update Workshop: Cloud Security & Compliance mit Microsoft 365AppSphere AGEntdecken Sie das Fundament der Cloud-Sicherheit für eine Compliance konforme Nutzung von Microsoft 365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Knowledge & Insights
23 out of 60
Vulnerability ManagementBlack Cell Magyarország Korlatolt Felelossegu TarsasagRapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
+2
Applicable to:
Cloud Security
Threat Protection
24 out of 60
Defender for Office365Suri Services SCSuri Services y Office 365: La alianza impenetrable en ciberseguridad.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 60
Security Modernization: 3 Day WorkshopNetwovenSafeguard your business with a three-step security modernization solution from Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
26 out of 60
Avanade Modern Sec OpsAvanade, Inc.To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
27 out of 60
Modern Managed Services: 2-tägiges AssessmentnovaCapta GmbHIhre Optionen für Managed Services rund um Endpunkte, Microsoft Azure, Microsoft 365 und Security am Modern Workplace entdecken
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
28 out of 60
Microsoft Defender for Office 365: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Office 365
+2
Applicable to:
Cloud Security
Threat Protection
29 out of 60
Microsoft Defender for Cloud Apps: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Cloud Apps
+2
Applicable to:
Cloud Security
Threat Protection
30 out of 60
Secure Your Productivity 3-Day WorkshopHitachi SolutionsOrganizations are challenged with integrating their remote workforce, and to how best increase collaboration, productivity, and security.
+2
Applicable to:
Cloud Security
Device Deployment & Management
31 out of 60
Office 365 Encrypted Email - Initial Setup: 1-Day Professional ServiceIT Partner LLCBoost Microsoft 365 security with default encryption. Elevate messaging protection and implement email encryption and rights protection for sensitive data.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 60
Hybrid Office 365 Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLCHybrid migration integrates on-premises Exchange with Microsoft 365, facilitating migration or serving as a permanent state for both organizations.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
33 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLCEnhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
GoDaddy Office 365 to Microsoft Office 365 Tenant-to-Tenant Cutover Email Migration: 7-Days Professional ServiceIT Partner LLCSeamless, short-term-downtime migration of email service from GoDaddy Office 365 to Microsoft Office 365, ensuring user access and Exchange Online functionality.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 60
Cutover Exchange Online migration from any IMAP email system: 7-Days Professional serviceIT Partner LLCMigrate users, email data, and email folders from any IMAP system to Microsoft 365 / Exchange Online.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
36 out of 60
MDR WorkshopGrant Thornton LLPMaximize Your Security Posture with Grant Thornton's MDR Program Assessment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Cutover Google Workspace to Office 365 migration (IMAP migration). Just email and email folders: 7-Days Professional ServiceIT Partner LLCMigration of email data and email folders from G Suite (Google Apps) to Microsoft 365 / Exchange Online.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
38 out of 60
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling TechnologiesCyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
39 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Fortis Assessment Microsoft Online SecuritySentinel Technologies Inc.Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.A high-level forensics evaluation designed to identify current and past threat activity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Identity WorkshopSentinel Technologies Inc.Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.According to multiple studies, breaches and ransomware have more than doubled in the past year.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
46 out of 60
Microsoft 365 Copilot: 1-Day AssessmentData Market Bilgi Hizmetleri A.SHow Microsoft 365 Copilot can transform your business and the overall concepts you must understand to better daily business life.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Power Platform for Teams
47 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
48 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
49 out of 60
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstreamLightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Cybersecurity Assessment: 3-Wk WorkshopExelegentThe Cybersecurity Assessment is designed to evaluate your cybersecurity posture and reduce risks exposure by using advanced Microsoft 365 Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
51 out of 60
Microsoft Cybersecurity: 1 Month AssessmentBig Cloud ConsultantsOur expert team will work with you to assess your current security posture and develop recommendations for appropriate improvements.
+2
Applicable to:
Cloud Security
Threat Protection
52 out of 60
Security Assessment for Copilot Readiness: 3 Day WorkshopNetwovenNetwoven's security assessment for Copilot workshop will train you to better discover, secure, and govern your corporate data for usage with Copilot for Microsoft 365
+2
Applicable to:
Cloud Security
Knowledge & Insights
53 out of 60
Copilot Preparedness and Planning WorkshopCDI LLCThe Copilot workshop will prepare your organization to utilize copilot by identifying key scenarios and gaps in current configuration to improve ROI of using Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
54 out of 60
Lightstream Data Security AssessmentLightstreamLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
55 out of 60
AI Governance Workshop: 4-Hour WorkshopVitalystBe introduced to Microsoft's AI Services, Azure Open AI and Copilot, and better understand the governance principles and practices tailored to them, like transparency, fairness, privacy, and security.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
56 out of 60
End-to-end Threat Protection Workshop and PilotExelegentThe Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Lightstream Threat Protection Assessment and Deployment RoadmapLightstreamLeveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
+2
Applicable to:
Cloud Security
Threat Protection
58 out of 60
Sentinel Readiness WorkshopSentinel Technologies Inc.Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
59 out of 60
Defender for Office 365: 5-Day AssessmenteGroup Enabling TechnologiesMicrosoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
60 out of 60