筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Microsoft Defender for Endpoint QuickStartPresidioPresidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 22
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso CorporationHelping customers KickStart features in Microsoft 365 E3 Subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
2 out of 22
IGA Roadmap - 4 Weeks AssessmentArmis, Sistemas de Informação, LdaDevelop an outcome-based, design-led IGA strategy to secure access to your resources with Microsoft identity governance solutions
+1
Applicable to:
Identity & Access Management
3 out of 22
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 22
Identity Governance Proof Of Concept with Microsoft Entra ID Governance in 4 WeeksArmis, Sistemas de Informação, LdaLeverage Microsoft Entra ID Governance to ensure seamless and secure access to Microsoft 365 resources
+1
Applicable to:
Identity & Access Management
5 out of 22
Mergers and Acquisitions- Identity and Migration to Microsoft 365 GCC High for CMMC/ITAR: 6-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity which includes partial or all going to Microsoft 365 GCC High by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
6 out of 22
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile ITAgile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
7 out of 22
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile ITA 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 22
Microsoft 365 - Threat Protection: 2-week workshopForteventoWorkshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
9 out of 22
CMMC Implementation for Microsoft 365 (8 Wk Proj)Summit 7 Systems, IncSummit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) practices associated with Levels 1-3 for Microsoft 365, as well as Azure and AAD where appropriate.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
10 out of 22
Secure Remote Work: 3 Days Intro and Plan WorkshopLiveRoute FZ-LLCEngagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
11 out of 22
Office 365 GCC High Migration +Tenant Imp 4WkSummit 7 Systems, IncCompanies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
12 out of 22
Modern Device Management ImplementationDXCImprove the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
13 out of 22
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data LtdWhether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
14 out of 22
CMMC Secure EnclavePlanet TechnologiesA secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
15 out of 22
Microsoft 365: 2-Week AssessmentPractical Solutions, IncEstablish a clear roadmap and change management plan for your journey to a modern workplace.
Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
16 out of 22
CMMC Assessment Ready SolutionPlanet TechnologiesBased off the Planet secure collaboration enclave, this provides customers with CMMC Assessment Ready artifacts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
17 out of 22
Modern Workplace AssessmentHTGThis assessment supports businesses in their cloud journey to quickly develop or migrate into a modern cloud-based organisation by implementing a Software as a Service Strategy with Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
18 out of 22
CMMC Data Enclave Dplymt: 4-Wk ImplementationC3 Integrated SolutionsDeploy Microsoft 365 to meet CMMC Requirements
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
19 out of 22
Microsoft 365 Copilot Readiness Assessment - CRATechPlus TalentThrough this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
20 out of 22
Sensitive data risk assessmentAVASOFTConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
21 out of 22
NEST ArenaNoibitTwo-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 22