筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvokeProvide cross-domain threat protection and simplify breach prevention
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 40
Microsoft Funded Workshop for Copilot for Microsoft 365 Adoption Acceleration: 2-Wk ImplementationProServeITIf your company is eligible, we can deliver a Microsoft funded adoption accelerator engagement for Copilot for Microsoft 365 to you free of charge ($10,000 USD value).
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
2 out of 40
Microsoft 365 Copilot Foundations ProgramHSO From envisioning and assessment to deployment, embrace the power of Microsoft 365 Copilot - your Copilot for work!
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
3 out of 40
Microsoft 365 Copilot Workshop: 2daysInsightTake the first steps toward helping your organization unleash creativity, unlock productivity, and level up skills with Insight’s Microsoft 365 Copilot Workshop.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
4 out of 40
Defender Pak365: Microsoft Defender ImplementationRavanty Tech Consulting, Inc.Empower your organization with comprehensive, AI-driven protection tailored to meet evolving security needs with the help of Microsoft Defender.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
5 out of 40
Microsoft 365 Security Hardening; 4-Wk ServiceProArch Technologies, Inc.The Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 40
Endpoint Modernization Quickstart ServiceDell Technologies ServicesDell Quick Start service helps customers configure their environment and prepare it for Modern Device Management and Modern Provisioning.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
7 out of 40
Microsoft 365 Security Review: 3-Wk AssessmentProArch Technologies, Inc.Identifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 40
Avanade Hybrid Windows Endpoint Solutions FY24Avanade, Inc.Avanade has developed the next generation of endpoint solutions for the modern workforce, with integrated physical, virtual and hybrid solutions
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
9 out of 40
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-WeeksInvokeInvoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
10 out of 40
GoDaddy to Office 365 MigrationSkyTerra Technologies LLCIf you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
11 out of 40
Microsoft Funded Workshop for Copilot for Microsoft 365: 2-Wk AssessmentProServeITIf your company is eligible, we can deliver a Microsoft funded readiness assessment for Copilot for Microsoft 365 to you free of charge ($5,000 USD value).
+2
Applicable to:
Compliance Advisory Services
Identity & Access Management
12 out of 40
Red Canary MSSP FastTrack for SecurityRed CanaryLeverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 40
Microsoft Purview Microsoft 365: 4-Week ImplementationSpyglass MTG, LLCThe Microsoft Purview Microsoft 365 offering is a 4-week/$45,000 Minimum Viable Product (MVP) implementation of Microsoft 365 components of Purview to provide a jumpstart to your data governance.
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
14 out of 40
Copilot for Microsoft 365 Pilot Launch: 2-Wk Proof of ConceptProServeITA rapid Copilot for Microsoft 365 pilot/proof of concept with an initial use case will provide quick value from AI and learnings to expand the roll out and more use cases to other groups.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
15 out of 40
Microsoft 365 Security Health Check: 3 day AssessmentISCG SP Z O OMicrosoft 365 is a multi-layer solution with the right security policies you can block over 99.9 percent of account compromise attacks!
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
16 out of 40
Windows 365 Accelerator: 4 Week ImplementationKiZAN TechnologiesDuring this 4-week engagement, KiZAN will assist with the design and implementation of Windows 365, including education, planning, documentation, and pilot for up to 50 users.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
17 out of 40
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayonEvaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
18 out of 40
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPOThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
19 out of 40
Window 365 Cloud PC: 3-Day Proof-of-ConceptCTGlobal A/SAssess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
20 out of 40
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCShadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
21 out of 40
Data Protection and Governance with Microsoft PurviewAVASOFTConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
22 out of 40
Automate Identity Lifecycle Management: 8-16 Weeks Consulting + ImplementationAttosolIntegrate HRMS with Microsoft Entra ID for an automated, efficient and secure Identity Lifecycle Management.
+1
Applicable to:
Identity & Access Management
23 out of 40
Deployment of Copilot for Microsoft 365Windows Management Experts, Inc.Enhance the productivity of Microsoft 365 with our premium Deployment service for Copilot for Microsoft 365.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
24 out of 40
Copilot for Microsoft 365: 4 weeks Proof of ConceptReliance Infosystems Inc.We are thrilled to present our Copilot Seed Investment Offer, crafted to help organizations validate and achieve their AI objectives using Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
25 out of 40
PlanB. Acceleration Workshops for Microsoft CopilotPlanB. GmbHThe PlanB. Copilot Accelerator - Workshop Series helps organizations seamlessly integrate AI, ensure compliance, and maximize the benefits of Microsoft Copilot.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
26 out of 40
Microsoft Threat Protection EngagementRavanty Tech Consulting, Inc.Threat Protection Engagement helps you assess your security landscape, address most pressing security goals and challenges, and provide an immersive experience around Microsoft security capabilities.
+2
Applicable to:
Identity & Access Management
Threat Protection
27 out of 40
CSE CMMC L1 & L2 Assessment & ImplementationComputer Solutions EastAchieve CMMC 1 & 2 Compliance, Secure Your Cloud with Microsoft 365 & Expert Guidance.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
28 out of 40
Implementation of Microsoft Copilot and AgentsStoneridge Software LLCA structured enablement journey that helps organizations strategically align, technically prepare, and culturally adopt Microsoft Copilot
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
29 out of 40
Microsoft Entra Domain Services WiFi AuthenticationAlfa Connections Pte LtdEnable secure Wi-Fi and legacy app authentication using Microsoft Entra Domain Services with LDAP support—ideal for organizations migrating from on-premises AD to Azure.
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
30 out of 40
CMMC Secure EnclavePlanet TechnologiesA secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
31 out of 40
Google Workspace to Microsoft 365 Migration: 1-Day Proof of concepttrue org cloudProof of concept for migration from Google Workspace to Microsoft 365
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
32 out of 40
Microsoft 365 E5 CMMC L1 3 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 1 using Microsoft 365 security Suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 40
Microsoft 365 Threat Check Assessment: 3-Wk AssessmentInvokeThe Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 40
Zero Trust Baseline Pilot 8-Week ImplementationInvokeThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
35 out of 40
CMMC Data Enclave Dplymt: 4-Wk ImplementationC3 Integrated SolutionsDeploy Microsoft 365 to meet CMMC Requirements
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
36 out of 40
Office 365 GCC High Migration +Tenant Imp 4WkSummit 7 Systems, IncCompanies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
37 out of 40
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
38 out of 40
Assessment - Workplace Modernization & Optimization - 1-MonthZones, LLCAnalysis of current environment to highlight opportunities to reduce duplicative cost and modernize your workplace
+3
Applicable to:
Calling for Microsoft Teams
Compliance Advisory Services
Identity & Access Management
39 out of 40
Endpoint Management and Windows Deployment: 2-days ImplementationCC Bilgi TeknolojileriMicrosoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises.
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
40 out of 40