FiltrelerTümünü temizle
Danışmanlık hizmetleri sonuç
içinde danışmanlık hizmetleri sonuç gösteriliyor.
Tüm sonuçlar
Sensitive Data Protection with Microsoft PurviewAVA SOFTWARE INCSensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
1 out of 60
Copilot for Microsoft 365: Taller De Seguridad Y Datos De 1 DíaAwara ITDesbloquea el máximo potencial de Copilot for Microsoft 365 mientras refuerzas la seguridad y protección de tus datos con un taller intensivo de un día dirigido por los expertos de Awara IT.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
2 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
3 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
4 out of 60
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse GlobalThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
5 out of 60
Data Access Control with MCASAVA SOFTWARE INCAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
6 out of 60
Secure Data Management with Microsoft PurviewAVA SOFTWARE INCConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
7 out of 60
Infosys Intelligent Security SolutionInfosys LimitedInfosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
8 out of 60
Defender for Endpoint Managed Servicee2e-assure LtdMicrosoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
9 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCThe primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
10 out of 60
Microsoft Security Immersion: 1 Day BriefingSynergy Technical, LLCKnowing that your time is valuable, we have developed a true to life, hands-on, interactive session designed to give you a deep understanding of the Microsoft 365 Security suite of products.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
11 out of 60
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
12 out of 60
Advisory Service for Microsoft CloudDell Technologies ServicesLeverage our expertise to uncover the insights to right-size your environment, minimize risk and optimize Microsoft 365 and Azure costs
+3
Applicable to:
Adoption & Change ManagementCloud SecurityKnowledge & Insights
13 out of 60
Endpoint Management WorkshopYork Telecom Corp3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
+3
Applicable to:
Cloud SecurityMobile Device ManagementThreat Protection
14 out of 60
Microsoft Endpoint Management: 3- W WorkshopExelegentMicrosoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
15 out of 60
Protect 365 App - 1 hour implementationCloud LifeThe Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
+3
Applicable to:
Cloud SecurityMobile Device ManagementThreat Protection
16 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
17 out of 60
Microsoft Sentinel - Log Management and threat detectionAVA SOFTWARE INCBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
18 out of 60
Information Protection with Microsoft PurviewAVA SOFTWARE INCOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
19 out of 60
Integrating Microsoft Sentinel with External EDR ServiceAVA SOFTWARE INCEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
20 out of 60
Office 365 Teamwork Security - Managed ServiceCognizantTeamwork Security provides a comprehensive security management service for Office 365 platforms
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
21 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVA SOFTWARE INCThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
22 out of 60
Managed Extended Detection & Response (MXDR) for Workplace: 2 Hr WorkshopNetwovenLearn how to put next generation Microsoft security tools to work for you.
+2
Applicable to:
Cloud SecurityThreat Protection
23 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
24 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SASConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
25 out of 60
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud SecurityThreat Protection
26 out of 60
Microsoft Entra Private Access and Entra Internet AccessSentinel Technologies Inc.Transform your organization's security landscape with our latest jumpstart, designed to fortify managed applications for your remote workforce and ensure secure access to Microsoft 365.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
27 out of 60
Implementation of Microsoft Identity SecurityCDWCDW's Implementation of Microsoft Identity Security service helps customers strengthen their security posture, reduce the risk of data breaches and improve compliance with industry regulations.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
28 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
29 out of 60
KMicro's Sentinel360 MXDR with Microsoft Copilot for Security: 4-Wk POC/POVKMicro Tech, Inc.Enhance threat hunting & accelerated MXDR for Microsoft Sentinel with Copilot for Security integration
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
30 out of 60
Microsoft Copilot for Security: 2-Day WorkshopPlanet TechnologiesThis 2-day workshop covers the essential aspects you need to effectively and efficiently leverage Microsoft Copilot for Security for your organization's security operations and needs.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityThreat Protection
31 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
32 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
33 out of 60
Copilot for Security Accelerator: 2-week ImplementationNeway TechnologiesNeway’s Microsoft Copilot for Security Accelerator empowers security teams with enhanced protection and streamlined operations through eight key steps.
+2
Applicable to:
Cloud SecurityThreat Protection
34 out of 60
Zero Trust ImplementationJourneyTEAMUnlock the potential of your Microsoft 365 cybersecurity with JourneyTEAM's comprehensive Zero Trust Implementation.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
35 out of 60
Copilot for Microsoft 365 Data Security QuickStartSoftchoiceSetting the foundation for data security and governance in preparation for Copilot for Microsoft 365
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
36 out of 60
Management Services: 3-month AssessmentQuisitiveQuisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementInformation Protection & Governance
37 out of 60
Windows 365 Rapid DeployIvision, Inc.The ivision Windows 365 Rapid Deployment approach will accelerates the adoption and use case development of Windows 365 virtual desktops.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityDevice Deployment & Management
38 out of 60
Microsoft 365 Security: 4-hour AssessmentQuisitiveThe Microsoft 365 Security Assessment provides an in-depth assessment of your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
39 out of 60
Avanade Modern Workplace FY23Avanade, Inc.Modern Workplace Consulting Services
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
40 out of 60
Change Management 6-Months ImplementationSupremo Sp. z o.o.Bądź pewny, że zaangażowanie użytkowników i przyjęcie nowych rozwiązań przyczyni się do sukcesu wdrożenia, sukcesu całej organizacji.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityKnowledge & Insights
41 out of 60
Microsoft Security Workshop: 3-dayOxford Computer Group LLCThis 3-day workshop shows you how to put Microsoft’s security capabilities to work. Learn how secure your organization is now and how to mitigate and protect against threats in the future.
+2
Applicable to:
Cloud SecurityThreat Protection
42 out of 60
Fortis IR Table Top ExercisesSentinel Technologies Inc.Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
43 out of 60
M365 Compliance Assessment: 4-Wk AssessmentKiZAN TechnologiesManage and Improve your organizations compliance
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
44 out of 60
Microsoft 365 HIPAA/HITECH 20 Hour ImplementationNew Charter Technologies, Inc.Implementation of Microsoft 365 to include compliance policies and templates for health care.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
45 out of 60
Microsoft Sentinel Quick StartEdgile, Inc.Production pilot, which is expected to provide centralized log collection, detection of previously undetected threats, investigation with artificial intelligence, and Rapid Response to incidents.
+1
Applicable to:
Cloud Security
46 out of 60
Microsoft 365 Inter-Tenant Migration: 2 days AssessmentPreeminent Solutions, Inc.Preeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
47 out of 60
Advanced Threat Analytics: 7-Day InstallationIT Partner LLCAdvanced Threat Analytics (ATA) is a complex system that allows you to protect your IT infrastructure from a variety of information threats and cyberattacks.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
48 out of 60
Avanade Microsoft Security Service Edge Quick StartAvanade, Inc.Microsoft ’s new Security Service Edge (SSE) capability empowers organizations on their Zero Trust journey though unique in the market integration with Microsoft Entra.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
49 out of 60
Microsoft Purview Insider Risk Management (IRM): 2-Week ImplementationSpyglass MTG, LLCOur engagement is designed to accelerate the ability to integrate and consume IRM across your enterprise while better securing data and identities in the environment.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
50 out of 60
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso CorporationHelping customers KickStart features in Microsoft 365 E3 Subscription
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementWorkplace Analytics
51 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
52 out of 60
Fortis Assessment Microsoft Online SecuritySentinel Technologies Inc.Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
53 out of 60
Copilot for Microsoft 365 AssessmentIt1 Source LLCPrepare your organization for the future of AI technology with a secure, productive, and modernized data foundation
+3
Applicable to:
Adoption & Change ManagementCloud SecurityTeamwork Deployment
54 out of 60
Application Monitoring Solution with Microsoft SentinelAVA SOFTWARE INCEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
55 out of 60
Mergers, Acquisitions, and Divestitures: 5-Month ImplementationCyclotron Inc.Cyclotron helps organizations overcome the technical challenges of consolidating or divesting organization assets using Microsoft 365, Azure, and third-party migration tools.
+2
Applicable to:
Adoption & Change ManagementCloud Security
56 out of 60
Microsoft 365 CISO Security Workshop with SentinelCDWMicrosoft 365 CISO Security Workshop with Sentinel is designed as a day engagement for Business Decision Makers (BDM) to help showcase the value proposition of Microsoft Security.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
57 out of 60
Microsoft Security: 3-Day WorkshopApex Digital SolutionsDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
58 out of 60
Microsoft Defender for Endpoint: 4-Week ImplementationInvokeUnderstand your current use cases for antimalware / endpoint detection and response, map those use cases to Defender, and execute on a migration and rollout to Defender for Endpoint.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
59 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und AusarbeitungAppSphere AGVom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
60 out of 60