筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Microsoft Funded Workshop for Copilot for Microsoft 365 Adoption Acceleration: 2-Wk ImplementationProServeITIf your company is eligible, we can deliver a Microsoft funded adoption accelerator engagement for Copilot for Microsoft 365 to you free of charge ($10,000 USD value).
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
1 out of 35
Microsoft 365 Copilot Workshop: 2daysInsightTake the first steps toward helping your organization unleash creativity, unlock productivity, and level up skills with Insight’s Microsoft 365 Copilot Workshop.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
2 out of 35
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 35
HSBS Cloud Modern Work Migração de Google para Microsoft 365HSBSMigração de Google para Microsoft 365: Simplifique a transição com eficiência e segurança
+3
Applicable to:
Adoption & Change Management
Frontline Workers
Identity & Access Management
4 out of 35
IGA Roadmap - 4 Weeks AssessmentArmis, Sistemas de Informação, LdaDevelop an outcome-based, design-led IGA strategy to secure access to your resources with Microsoft identity governance solutions
+1
Applicable to:
Identity & Access Management
5 out of 35
Microsoft Funded Workshop for Copilot for Microsoft 365: 2-Wk AssessmentProServeITIf your company is eligible, we can deliver a Microsoft funded readiness assessment for Copilot for Microsoft 365 to you free of charge ($5,000 USD value).
+2
Applicable to:
Compliance Advisory Services
Identity & Access Management
6 out of 35
Mergers and Acquisitions- Identity and Migration to Microsoft 365 GCC High for CMMC/ITAR: 6-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity which includes partial or all going to Microsoft 365 GCC High by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
7 out of 35
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 35
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso CorporationHelping customers KickStart features in Microsoft 365 E3 Subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
9 out of 35
Identity Governance Proof Of Concept with Microsoft Entra ID Governance in 4 WeeksArmis, Sistemas de Informação, LdaLeverage Microsoft Entra ID Governance to ensure seamless and secure access to Microsoft 365 resources
+1
Applicable to:
Identity & Access Management
10 out of 35
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile ITAgile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
11 out of 35
Sogeti SmartWorkspace: 4 Week ImplementationCapgemini GroupSogeti provides a one-stop shop set of offerings around the SharePoint solutions. Our offer comprises consultancy, discovery of the existing landscape, Solution Architecture, SharePoint migration etc.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
12 out of 35
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 35
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITEDConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
14 out of 35
Copilot for Microsoft 365 Pilot Launch: 2-Wk Proof of ConceptProServeITA rapid Copilot for Microsoft 365 pilot/proof of concept with an initial use case will provide quick value from AI and learnings to expand the roll out and more use cases to other groups.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
15 out of 35
CSE Security Baseline 3 days implementationComputer Solutions East3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 35
Microsoft 365 Tenant to Tenant Migration: 6 Week ImplementationAll Covered, a division of Konica MinoltaLet All Covered help you assess, plan and skillfully implement your Microsoft 365 Tenant to Tenant migration.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
17 out of 35
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data LtdWhether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
18 out of 35
Office 365 Migration from Exchange: 15-Day ImplementationProServeITMigrate on-premise Microsoft Exchange email infrastructure to Office 365 in Microsoft's cloud infrastructure
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
19 out of 35
Cyber Security Services 9 days AssessmentAlfa Connections Pte LtdHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 35
Modern Workplace AssessmentHTGThis assessment supports businesses in their cloud journey to quickly develop or migrate into a modern cloud-based organisation by implementing a Software as a Service Strategy with Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
21 out of 35
Modern Device Management ImplementationDXCImprove the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
22 out of 35
Microsoft Defender for Endpoint QuickStartPresidioPresidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 35
Microsoft 365 Security Health Check Assessment 3-WkBulletproof Solutions Inc.Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 35
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 35
Modern Endpoint Design and Planning WorkshopKraft KennedyKraft Kennedy will conduct a Modern Endpoint Design and Planning Workshop to review and discuss both your current management and deployment processes as well as plans for the future-state environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
26 out of 35
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, IncKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 35
Google Workspace to Microsoft 365 Migration: 1-Day Proof of concepttrue org cloudProof of concept for migration from Google Workspace to Microsoft 365
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
28 out of 35
Microsoft 365 - Threat Protection: 2-week workshopForteventoWorkshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
29 out of 35
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SASConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 35
Compliance Workshop Data Risk Management: 4 WeeksDiverge ITYou will be guided by our Microsoft 365 experts who are trusted by Pro Sports teams, Hollywood studios, and businesses across America to help protect and govern data to achieve complete compliance.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
31 out of 35
Secure Remote Work: 3 Days Intro and Plan WorkshopLiveRoute FZ-LLCEngagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
32 out of 35
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile ITA 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 35
Microsoft 365 Inter-Tenant Migration: 2 days AssessmentPreeminent Solutions, Inc.Preeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
34 out of 35
Windows 365: 1-month Proof of ConceptSoftline TradeAccess your data anywhere, anytime from any device with Windows 365. Softline is providing you with three different offerings for your organization to kick start Windows 365.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
35 out of 35