Bộ lọcXóa tất cả
Dịch vụ tư vấn kết quả
Hiển thị kết quả trong dịch vụ tư vấn.
Tất cả kết quả
Avanade Entra Verified ID Consulting ServicesAvanade, Inc.Microsoft Entra Verified ID is a Decentralized Identity implementation that streamlines any identity related process, simplifies it, reduce costs and increases convenience.
+1
Applicable to:
Identity & Access Management
1 out of 60
Intune Managed ServiceMobile MentorYour endpoint ecosystem is constantly evolving and needs proactive management, so we designed the Intune Managed Service to help customers unlock the full potential of Intune.
+2
Applicable to:
Cloud SecurityIdentity & Access Management
2 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
3 out of 60
Data Security Engagement: 4-Week WorkshopTech One GlobalThe Data Security Engagement is a comprehensive 4-week assessment designed to identify and mitigate data security risks within your organization leveraging Microsoft Purview tools and services.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceInsider Risk
4 out of 60
Red Canary MSSP FastTrack for SecurityRed CanaryLeverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
5 out of 60
Microsoft 365 Copilot Foundations ProgramHSO From envisioning and assessment to deployment, embrace the power of Microsoft 365 Copilot - your Copilot for work!
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementTeamwork Deployment
6 out of 60
Okta to Microsoft Entra ID MigrationPerformantaPerformanta's Okta to Microsoft Entra ID Application Migration service will give you a controlled, seamless and secure transition to Azure AD.
+1
Applicable to:
Identity & Access Management
7 out of 60
Microsoft 365 Security: 3,5 Tage Tenant AssessmentAppSphere AGSicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementKnowledge & Insights
8 out of 60
Modern SecOps Engagement: 4-Week WorkshopTech One GlobalThe Modern SecOps Engagement is a comprehensive 4-week assessment designed to provide a bird’s eye view across your enterprise using Microsoft Sentinel and the Unified SecOps Platform.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
9 out of 60
Email Security Threat AssessmentAVA SOFTWARE INCConfident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
10 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
11 out of 60
HPT Nextgen Windows Experience_02 days workshopHPT Vietnam CorporationNextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
12 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 WksWipro LtdWipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
+2
Applicable to:
Identity & Access ManagementThreat Protection
13 out of 60
Teams & SharePoint Security HardeningAVA SOFTWARE INCTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to:
Identity & Access ManagementTeams Custom SolutionsThreat Protection
Data Protection and Governance with Microsoft PurviewAVA SOFTWARE INCConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
15 out of 60
Phishing, Malware & Spam protection- 2 weeks ImplementationAVA SOFTWARE INCPhishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
16 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
17 out of 60
Journey to Microsoft 365 Copilot: 4-hours WorkshopPROJECT INFORMATICA SRLMicrosoft 365 Copilot workshop bring to you the opportunity to create awareness about holistic to Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
18 out of 60
Shadow IT discovery with Microsoft cloud app securityAVA SOFTWARE INCKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
19 out of 60
Enhanced Data Privacy with Microsoft PurviewAVA SOFTWARE INCConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
20 out of 60
Co-pilot Technical ReadinessPHOENIX SOFTWARE LTDHelp your organisation ensure that they are technically ready for Co-pilot
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementKnowledge & Insights
21 out of 60
Microsoft Sentinel - Log Management and threat detectionAVA SOFTWARE INCIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
22 out of 60
Atos || Pilot program for Windows 365Atos International SASAtos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
23 out of 60
Microsoft 365 Copilot Readiness: 2 week AssessmentTOKIOTAWe help our clients to integrate Microsoft 365 Copilot in their organization in the most secure and efficent way
+3
Applicable to:
Adoption & Change ManagementCompliance Advisory ServicesIdentity & Access Management
24 out of 60
Microsoft 365 Email Threat Protection AssessmentAVA SOFTWARE INCMicrosoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
25 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
26 out of 60
Copilot Readiness Assessment for Microsoft 365Mint Management TechnologiesMint Group is thrilled to bring you a consulting service designed to supercharge your Microsoft 365 experience and get you Microsoft 365 Copilot ready.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementKnowledge & Insights
27 out of 60
Avanade Microsoft 365 Copilot Information Management 4 wk Imp. FY24Avanade, Inc.Avanade Microsoft 365 Copilot Information Management Accelerator ensures your data meets high standards of security, privacy and compliance so you can confidently unlock Copilot's full potential.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
28 out of 60
Logicalis Digital Workplace (DWP) - 2 weeks ImplementationLOGICALIS ASIALogicalis Managed Services provides full service monitoring and management of digital workplace that empowering employee in using digital technologies to collaborate freely and improved performance
+3
Applicable to:
Calling for Microsoft TeamsIdentity & Access ManagementMeetings for Microsoft Teams
29 out of 60
Atos || Microsoft Windows 365 PilotAtos International SASAtos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
30 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro LtdWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
31 out of 60
Modern Workplace - Cloud Endpoint ManagementArxusOur Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
32 out of 60
ADFS to Microsoft Entra ID Migration: 4-Wk ImplementationPerformantaUndertake a seamless ADFS to Microsoft Entra ID app migration, improving security, offering up new features, and getting your organisation back on track.
+1
Applicable to:
Identity & Access Management
33 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
34 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalystAlithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
35 out of 60
SmartStart for IntuneMobile MentorThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
36 out of 60
Microsoft 365 complete security HardneningAVA SOFTWARE INCAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
37 out of 60
Microsoft Intune DeploymentSecure Future Bilgi Tek. ve Hiz. Tic A.S.The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
+3
Applicable to:
Identity & Access ManagementMobile Device ManagementThreat Protection
38 out of 60
Secure Identities and Access: 3 W - WorkshopExelegentHelp customers find and mitigate identity risks and safeguard their organization with a seamless identity solution.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
39 out of 60
Threat Protection Engagement: 4-Week WorkshopTech One GlobalThis 4-week engagement deep dives into the next-gen Microsoft Security tools, provides a thorough analysis of your security posture, and offers actionable steps to enhance your threat protection.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
40 out of 60
Microsoft Copilot for Security Readiness Assessment: 4-Week AssessmentTech One GlobalOur Microsoft Copilot for Security Readiness Assessment encompasses a thorough evaluation of your existing security infrastructure, policies, and procedures.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
41 out of 60
Sensitive data risk assessmentAVA SOFTWARE INCConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
42 out of 60
Defend Against Threats with SIEM Plus XDR: 2-W WorkshopExelegentThe Defend Against Threats with SIEM Plus XDR (with Attack Simulation) workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
43 out of 60
Red Canary Cloud Security AssessmentRed CanaryAssess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
44 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementationCloudshift3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
45 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed CanaryGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
46 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
47 out of 60
Windows 365 Cloud PC: 4-Wk Proof of ConceptSignal Alliance Technology HoldingDiscover how Signal Alliance Consulting helps you get started with Windows 365, the worlds first cloud PC that helps you access your data from anywhere, anytime from any device.
+3
Applicable to:
Adoption & Change ManagementDevice Deployment & ManagementIdentity & Access Management
48 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInsider Risk
49 out of 60
Microsoft Cloud application security Assessment - 2 weeksAVA SOFTWARE INCUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
50 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayonEvaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
51 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
52 out of 60
Integrating Microsoft Sentinel with External EDR ServiceAVA SOFTWARE INCEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
53 out of 60
Microsoft 365 Defender for Endpoint Vulnerability AssessmentAVA SOFTWARE INCEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
54 out of 60
Microsoft Cloud Application for 3rd Party AppsAVA SOFTWARE INCSecure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
55 out of 60
Wc-PC- Wragby Cloud PCWragby Business Solutions & Technologies LimitedThe Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
56 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPOThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementThreat Protection
57 out of 60
Avanade Microsoft Security Service Edge Quick StartAvanade, Inc.Microsoft’s new Security Service Edge (SSE) capability empowers organizations on their Zero Trust journey though unique in the market integration with Microsoft Entra.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
58 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITEDConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
59 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
60 out of 60