筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Implementation on Microsoft IntuneITX360 (Pvt) Ltd.Enhance security and efficiency with Microsoft Intune Implementation. Manage and secure devices across Windows, Android, iOS, and macOS with a seamless cloud-based solution.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
1 out of 60
Microsoft Purview Migration Accelerator: 1-Day Envisioning WorkshopMAQ SoftwareOur workshop assesses your data landscape, identifies challenges, provides tailored recommendations, and a phased migration strategy to Microsoft Purview in just one day.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
2 out of 60
Identity Health CheckMobile MentorMobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
3 out of 60
Entra ID Governance and Guest AccessMobile MentorEmpower your business with Mobile Mentor’s Microsoft Entra ID Governance and Guest Access service, built on Microsoft’s cutting-edge Entra Identity Governance platform.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
4 out of 60
Unified Access & Protection with Microsoft Entra Global Secure AccessMobile MentorStep confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
5 out of 60
ADFS to Entra ID Migration ServiceMobile MentorMobile Mentor’s ADFS to Entra ID Migration Service offers a secure, cloud-first Single Sign-On experience that eliminates outdated infrastructure and unlocks the full potential of Microsoft Entra ID.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
6 out of 60
Future Workplace PoC | 100% Cloud (~4 weeks)Glück & KanjaThe Future Workplace Blueprint implemented in your Microsoft 365 tenant.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
7 out of 60
Intune for Windows: 12-week ImplementationMobile MentorIntune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
8 out of 60
Advania: Intune Get Started: 2 d training and PoCAdvania ABUnderstand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
9 out of 60
Hybrid Identity Workshop: 1-daynovaCapta GmbHDer Hybrid Identity Workshop hilft Ihnen, eine Strategie für Identity und Access für die Zukunft einzuführen und die Microsoft 365 Suite zu nutzen. Wir unterstützen Sie bei der Umsetzung.
+1
Applicable to:
Identity & Access Management
10 out of 60
Google Workspace to Microsoft 365 Migration: 1-Day Proof of concepttrue org cloudProof of concept for migration from Google Workspace to Microsoft 365
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
11 out of 60
Microsoft 365 - Threat Protection: 2-week workshopForteventoWorkshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
12 out of 60
Microsoft 365 Tenant Setup, 1-Day ImplementationTec Networks GmbHWe provide you a good-practice configured tenant for the best experience with Microsoft 365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
13 out of 60
Microsoft 365 Security Assessment:1-Day, WorkshopAll for One Group SEStellen Sie die richtigen Stellschrauben um die Systemsicherheit Ihrer Office 365 / Microsoft 365 Umgebung zu erhöhen. Microsoft 365 Security Assessment via Secure-Score (eintägiger Workshop)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
14 out of 60
Micorsoft 365 Security Workshop: 1-Day, WorkshopAll for One Group SESie erhalten technische Einblicke zur Erhöhung der Sicherheit in Microsoft 365: von der Identitätsverwaltung und dem Authentifizierungsprozess bis hin zum Schutz der individuellen Information.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
15 out of 60
SharePoint Online, 2-Day ImplementationTec Networks GmbHWe migrate your existing data system to a modern SharePoint Online system
+3
Applicable to:
Identity & Access Management
Knowledge & Insights
Teamwork Deployment
Microsoft 365: 2-Week AssessmentPractical Solutions, IncEstablish a clear roadmap and change management plan for your journey to a modern workplace.
Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
17 out of 60
IT Security Assessment: 1 Day, AssessmentAll for One Group SEMit der IT-Sicherheitsanalyse alles zum gegenwärtigen Zustand erfahren, ihn bewerten, konkrete Handlungsfelder aufzeigen und geeignete Maßnahmen für mehr Sicherheit finden.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
18 out of 60
Secure Remote Work 360° by acontech - 1 wk implemaConTech GmbHSie erhalten folgende Leistungen: Die Implementierung von Identity & Access Management, Device Deployment Management, Mobile Device Management, Modern Workplace und Teamwork Deployment
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
19 out of 60
Security 360° by teccle - 1 wk implementationaConTech GmbHSie erhalten folgende Leistungen: Die Implementierung von Identity and Access Management, Threat Protection, Conditional Access, Microsoft 365 Defender sowie Security Monitoring.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
10WK-Implementation Cloud Migration/MWPHAT CONSULTING GmbHMit der Implementierung von Cloud-Lösungen nutzen Sie die Potenziale von Microsoft 365 ideal für den Modern Workplace. PHAT steht für Pairing Humans and Technology – sicher & compliant!
+3
Applicable to:
Cloud Security
Identity & Access Management
Teams Custom Solutions
21 out of 60
Compliance 360° by teccle - 1 wk implementationaConTech GmbHSie erhalten folgende Leistungen: Die Implementierung von Azure Information Protection, Mobile Device Management, WhatsApp Secure, Governance & Advisory Services sowie DSGVO Beratung.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
22 out of 60
sepago Envisioning Workshopsepago GmbHGet a deeper insight into Microsoft Defender 365 Portfolio and why it should be your future security solution!
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Microsoft Cloud App Security Workshopscopewyse gmbhNach dem Workshop verfügen die Teilnehmer über die notwendigen Basiskenntnisse für die Konfiguration und Nutzung von Microsoft Cloud App Security.
+2
Applicable to:
Cloud Security
Identity & Access Management
24 out of 60
Security Assessment Microsoft 365: 2day assessmentProdware GroupA service for Office 365 and Microsoft 365 protection
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
25 out of 60
Change Management: 4-week ImplementationMobile MentorChange Management is a proven methodology to deploy technology changes to large groups of diverse Microsoft 365 users.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
26 out of 60
Sycor.ManagedSecurity: 4-hr Implementation ServiceSycorIT-Sicherheit heute - Make or buy?
Mit unseren standardisierten Leistungspaketen des Sycor.ManagedSecurity steigern Sie dauerhaft die IT-Sicherheit in Ihrem Unternehmen.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
27 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Einstieg in Azure Active Directory (POC 5 Tage)PlanB. GmbHInventarisierung und Aufnahme von 10 Cloud-Anwendungen und Definition einer geeigneten Personengruppe (max. 100) für die erste AAD Implementierung.
+1
Applicable to:
Identity & Access Management
29 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Cloud Identity Foundation Workshop (5-day)DexMachGet knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
+2
Applicable to:
Identity & Access Management
Threat Protection
31 out of 60
Unified Endpoint Management 10-Days AssessmentVenzo A/SVENZO's Unified Endpoint Management solution keeps devices used to utilize organizational updated and secure no matter location or network
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
32 out of 60
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UKManage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
33 out of 60
Secure Remote Workplace: 5-Days WorkshopTechniData IT AGLernen Sie alles zur Modernisierung eines sicheren Arbeitsplatzes, bis hin zur Übernahme des Betriebs und Supports.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
34 out of 60
Workplace Suite 365: 3-Weeks AssessmentArvato SystemsGanzheitliche Lösungen für die Transformation des Arbeitsplatzes und die neue Lust an produktiver Teamarbeit.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Teamwork Deployment
35 out of 60
Cloud Security 360° - 10wk ImplementationNTT Germany AG & Co. KGEvaluate, assess and optimize your Cloud Security with our 360° offer
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
36 out of 60
Seguridad Corporativa: Evaluación 4 semanasCIBERIT SRL.Con esta Solución usted podrá gestionar la seguridad en toda su empresa
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
37 out of 60
Security Readiness Assessment | 5 D | AssessmentInSys AGAssessment zur Überprüfung, Herstellung oder Verbesserung der Security in Infrastrukturen zur sicheren Anwendung von Microsoft 365 und Azure
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
38 out of 60
Microsoft 365 Security 360° WorkshopNTT Germany AG & Co. KGEstablish a modern security framework across identities, devices, apps, access and data based on Zero Trust with our Microsoft 365 Security 360° offering
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
39 out of 60
Azure Active Directory Readiness Assessment | 5 DInSys AGAssessment zur Überprüfung, Herstellung oder Verbesserung der Kopplung / Replikation von Active Directory mit Azure AD als Voraussetzung zur Nutzung von Microsoft 365 und Azure
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
40 out of 60
1-Day Envisioning Workshop - Microsoft XDRwater IT Security GmbHIn product dedicated sessions we will explain the different pieces of Microsoft XDR product families and show the unique value add as solution but also as security platform in the bigger picture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
sepago adapt:impl Microsoft 365 processes in 9 wkssepago GmbHsepago adapt ensures that your security team can follow processes fitting your organization at each point in time. This makes sure that Microsoft 365 solutions can unfold their full potential.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Threat Protection
42 out of 60
Encrypt Premium Paket - 2 Tage Impl.aConTech GmbHWir unterstützen Sie bei der Einrichtung und Implementierung des Unified Labeling Clients zur Verschlüsselung von Mails und Dokumenten.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
43 out of 60
IAM Assessment 3-weeksVenzo A/SOur 3-week assessment gives your organization an overview of your identity protection and access management delegation as to identify next steps in your identity protection journey.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
44 out of 60
baseVISION - Modern Workplace: 6-Mt ImplementationbaseVISION AGWe make the IT workplace ready for the future – modern, flexible and secure.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
45 out of 60
Mobile Device Management Paket - 3 Tage Impl.aConTech GmbHMit dem Mobile Device Management Paket stellen wir für Sie innerhalb weniger Tage einen Geräte und standortunabhängigen Zugriff auf Ihre Unternehmensdaten sicher.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
46 out of 60
Conditional Access Paket - 3 Tage Implement.aConTech GmbHMit Conditional Access definieren wir Richtlinien, die beim Zugriff auf Ihre Cloudumgebung sowie Geräte erfüllt werden müssen. Für einen sicheren Zugriff auf Ihre Microsoft 365 Ressourcen.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
47 out of 60
Secure Remote Work: 3 Days Intro and Plan WorkshopLiveRoute FZ-LLCEngagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
48 out of 60
Transition to Cloud: 1-day Workshopthinformatics AGZiel des Workshops ist die gemeinsame Erarbeitung eines Fahrplans für Ihre Cloud Transition!
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
49 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
50 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
51 out of 60
Identity & Access Management: 1-Mth ImplementationOfficeline SAMicrosoft 365 Identity & Access Management to improve and streamline security on cloud and applications
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
52 out of 60
Office 365 Managed Service: 1-tägiger WorkshopOrange Networks GmbHErfahren Sie mehr über Office 365 als Managed Service und wie unser Angebot Ihre Rentabilität steigert und IT-Verwaltungskosten senkt.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
53 out of 60
HomeRun mit Microsoft 365: 1-tägiges AssessmentOrange Networks GmbHMit HomeRun haben wir eine integrierte Lösung auf Basis von Microsoft 365 entwickelt, mit der sichere Zusammenarbeit für Ihre Mitarbeiter im Homeoffice im Handumdrehen funktioniert.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
54 out of 60
Modern Endpoint Management by sepago-3 month implsepago GmbHTogether we will move towards a modern workplace in a Zero Trust environment.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
55 out of 60
Approach of the Modern Workplace: 4 hours BriefingCegeka NVThe goal of this briefing is to clarify some misconceptions about the approach to a modern digital workplace.
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
56 out of 60
Secure Remote Work 365: 1-Wo. ImplementierungArvato SystemsUnlock the potential of your workplace by Arvato Systems. Azure Virtual Desktop als Managed Service mit Full Service Management nach definierten SLAs
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
57 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Microsoft 365 - 4wk WKSHFUJITSUGemeinsam mit unseren Beraterteams gestalten wir kundenindividuell Microsoft 365 entlang Ihrer Geschäftsziele, Mitarbeiterbedürfnisse und technischen Anforderungen.
+2
Applicable to:
Cloud Security
Identity & Access Management
59 out of 60
Bechtle Microsoft 365 E5 Security - 2d WorkshopBechtle AGIn this workshop we will talk about today's cyber security risks and show you how you can use the Microsoft 365 E5 Security Suite to initiate a zero trust approach.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
60 out of 60