筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Endpoint Management and Windows Deployment Services: 4-Wk ImplementationData Market Bilgi Hizmetleri A.SEndpoint Management and Windows Deployment Services Consultancy is a professional consultancy service for modernization of device and application management infrastructure .
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
1 out of 30
Microsoft 365 Copilot Foundations ProgramHSO From envisioning and assessment to deployment, embrace the power of Microsoft 365 Copilot - your Copilot for work!
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
2 out of 30
OENG - Next Generation Endpoints-1 Month Proof of ConceptSecure Nextgen SystemsLearn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
3 out of 30
Onesec Digital IdentitySecure Nextgen SystemsHaving a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
+2
Applicable to:
Identity & Access Management
Threat Protection
4 out of 30
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso CorporationHelping customers KickStart features in Microsoft 365 E3 Subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
5 out of 30
Modernize Endpoints Consulting Offer: 3 Days ImplementationAdaptive Business Communications Ltd t/a CloudAssistWith Hybrid work becoming prevalent and increasing threat trends, organizations need to proactively secure & modernize management of their endpoints across mobile, PCs and including virtual endpoints.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
6 out of 30
Microsoft 365 Threat Check Assessment: 3-Wk AssessmentInvokeThe Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 30
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro LtdWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 30
Microsoft 365 Copilot Data and Security Readiness: 4-Week AssessmentSpyglass MTG, LLCOur Microsoft 365 Copilot Data and Security Readiness Assessment is a scoped engagement that is designed to accelerate the ability to integrate and consume Copilot across your enterprise.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
9 out of 30
Defender Pak365: Microsoft Defender ImplementationRavanty Tech Consulting, Inc.Empower your organization with comprehensive, AI-driven protection tailored to meet evolving security needs with the help of Microsoft Defender.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
10 out of 30
Collab Now: 4-Wk ImplementationLong View SystemsCollab Now (Microsoft 365) supports worker productivity by delivering and managing a unified and integrated collaboration platform
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
11 out of 30
Implementation of Microsoft Copilot and AgentsStoneridge Software LLCA structured enablement journey that helps organizations strategically align, technically prepare, and culturally adopt Microsoft Copilot
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
12 out of 30
Microsoft 365 Cloud Security Readiness: 3-Wk AssessmentKiZAN TechnologiesLeverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
13 out of 30
Endpoint Management and Windows Deployment: 2-days ImplementationCC Bilgi TeknolojileriMicrosoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises.
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
14 out of 30
Zero Trust Baseline Pilot 8-Week ImplementationInvokeThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
15 out of 30
Microsoft 365 - Threat Protection: 2-week workshopForteventoWorkshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
16 out of 30
CS Data Security 360°: 2-Wk AssessmentCampana & Schott GmbHUtilize Microsoft Purview suite and Copilot for Security to safeguard your content and information.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
17 out of 30
HPT Nextgen Windows Experience_02 days workshopHPT Vietnam CorporationNextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
18 out of 30
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFTEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
19 out of 30
Data Protection and Governance with Microsoft PurviewAVASOFTConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
20 out of 30
Entra ID Identity and Application Governance Solutions by AVASOFTAVASOFTOur solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
21 out of 30
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVIdentify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
+2
Applicable to:
Identity & Access Management
Insider Risk
22 out of 30
AVASecure 360 - Microsoft 365 Security & Governance Solutions by AVASOFTAVASOFTAware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
23 out of 30
Windows 365: 4 Week Readiness AssessmentNetrix GlobalGet an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
24 out of 30
Remote Access to On-Prem Apps: 3 Wk ImplementationInvokeSurface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
+2
Applicable to:
Cloud Security
Identity & Access Management
25 out of 30
Teams Hosted Direct Routing: 2-wk ImplementationCatapult Systems, LLCCatapult Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
26 out of 30
Teams Hosted Direct Routing: 2-week ImplementationQuisitiveQuisitive Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
27 out of 30
Zero Trust Identity and Access Management: 8-16 Weeks Consulting + ImplementationAttosolIn today’s dynamic digital landscape, traditional security models fall short. Embrace Zero Trust with Microsoft and transform your security strategy to protect against evolving threats.
+2
Applicable to:
Compliance Advisory Services
Identity & Access Management
28 out of 30
Microsoft 365 Security Assessment up to 6 weeksACTSACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
29 out of 30
Retail Kiosk Program Workshop - 5 DaysCB5 SolutionsA secure kiosk management solution built for Zebra, Android and iOS devices in retail and finance services.
+3
Applicable to:
Frontline Workers
Identity & Access Management
Threat Protection
30 out of 30