筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 641 个结果。
云安全Remove 云安全
Microsoft 365Remove Microsoft 365
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.
Cloud Security
Threat ProtectionComprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
Applicable to:
Cloud Security
Threat Protection
1 out of 60
KK_Intune ImplementationKraft Kennedy
Cloud Security
Device Deployment & Management
Mobile Device ManagementKraft Kennedy's Implementation service for Migration to Microsoft Intune is designed to assist customers in an Intune Deployment Architecture Scenario
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
2 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLP
Cloud Security
Identity & Access Management
Threat ProtectionTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Secure and Maximize Your Microsoft 365 Tenant with Manage & ProtectAll Covered, a division of Konica Minolta
Adoption & Change Management
Cloud Security
Threat ProtectionMicrosoft 365 tenant management to provide you with continuous security & compliance, enhanced administration, and actionable insights.
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
4 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLC
Cloud Security
Identity & Access Management
Threat ProtectionThe Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Insider Risk Management: 8-Wk implementationPwC
Cloud Security
Insider Risk
Threat ProtectionEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
6 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, Inc
Cloud Security
Identity & Access Management
Threat ProtectionKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Microsoft 365: 2-Week AssessmentApex Digital Solutions
Cloud Security
Device Deployment & Management
Teamwork DeploymentEstablish a clear roadmap and change management plan for your journey to a modern workplace.
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
8 out of 60
Endpoint Management: 3-Day WorkshopApex Digital Solutions
Cloud Security
Device Deployment & Management
Mobile Device ManagementBegin the steps to manage and protect your devices, your apps, and your users
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
9 out of 60
Microsoft Security: 3-Day WorkshopApex Digital Solutions
Cloud Security
Identity & Access Management
Threat ProtectionDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Cyber Portfolio Rationalization: 3-Day WorkshopPwC
Cloud Security
Information Protection & Governance
Knowledge & InsightsSimplify your cybersecurity portfolio to reduce the cost and complexity of your Microsoft 365 and Microsoft Azure environment
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
11 out of 60
Endpoint Management: 2-Week ImplementationApex Digital Solutions
Cloud Security
Device Deployment & Management
Mobile Device ManagementMaintain control over your devices and the data stored on them to stay protected in a cloud-focused environment.
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
12 out of 60
Microsoft 365 Identity & Security: 2-Wk AssessmentPSM Partners
Cloud Security
Identity & Access ManagementCustomized identity and security assessment focused on the Microsoft 365 platform
Applicable to:
Cloud Security
Identity & Access Management
13 out of 60
Cloud Security Journey: 2 Hour Proof of Concept360 Visibility Inc.
Cloud Security
Identity & Access Management
Threat ProtectionSee how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Microsoft 365/Azure Cloud Secure 5 Day AssessmentDynTek Inc.
Cloud Security
Information Protection & Governance
Threat ProtectionDynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT Limited
Cloud Security
Information Protection & Governance
Threat ProtectionCybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
16 out of 60
Microsoft 365 OnDemand - 2 Week ImplementationProtiviti
Adoption & Change Management
Cloud Security
Knowledge & InsightsMicrosoft 365 On Demand Support - providing you with dedicated experts to support and maintain your Microsoft 365 environment
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
17 out of 60
Microsoft 365 Migration: 10-Wk ImplementationNeway Technologies
Cloud Security
Power Platform for TeamsSuccessfully migrate your Microsoft 365 environment to a managed services model.
Applicable to:
Cloud Security
Power Platform for Teams
18 out of 60
Microsoft Security Deployment: 5-day WorkshopCampana & Schott GmbH
Cloud Security
Information Protection & Governance
Threat ProtectionUnderstand your Microsoft security posture and minimize risks with the right experts
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 60
Security Assessment: 2-Wk AssessmentAscent Global, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAscent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Data Loss Prevention: 3-Wk POCFPT/Intellinet
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceDiscover, classify, and protect sensitive data to prevent any inadvertent exposure.
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
21 out of 60
Threat Protection: 3-Wk POCFPT/Intellinet
Cloud Security
Threat ProtectionIdentify security threats and begin to respond and mitigate.
Applicable to:
Cloud Security
Threat Protection
22 out of 60
Intelligent Shield: 1d AssessmentCorporate Software
Cloud Security
Compliance Advisory Services
Threat ProtectionAn Audit for your Microsoft 365 tenant based on Best Practices
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
23 out of 60
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Management Services: 10-Week AssessmentCatapult Systems, LLC
Cloud Security
Device Deployment & Management
Information Protection & GovernanceCatapult Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
25 out of 60
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLC
Cloud Security
Identity & Access Management
Information Protection & GovernanceRavenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
26 out of 60
CMMC Compliance with Microsoft 365: 4 wk impl.Insight
Cloud SecurityInsight’s CMMC services program helps clients understand DoD requirements, develop a strategy to achieve compliance in hybrid and cloud models, and execute to implementation and ongoing operations.
Applicable to:
Cloud Security
27 out of 60
Remote Access to On-Prem Apps: 3 Wk ImplementationInvoke
Cloud Security
Identity & Access ManagementSurface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
Applicable to:
Cloud Security
Identity & Access Management
28 out of 60
Big Green IT Security Assessment: 3-WeekBig Green IT - Dev
Cloud Security
Information Protection & Governance
Threat ProtectionSecure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
29 out of 60
CMMC Data Enclave Dplymt: 4-Wk ImplementationC3 Integrated Solutions
Cloud Security
Device Deployment & Management
Identity & Access ManagementDeploy Microsoft 365 to meet CMMC Requirements
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
30 out of 60
Microsoft 365 Security Assessment up to 6 weeksACTS
Cloud Security
Identity & Access Management
Information Protection & GovernanceACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
31 out of 60
Microsoft 365 Security: 3-Day Workshopdelaware
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Managed Security for Compliance: 1 yr Mgd ServiceInsight
Cloud Security
Compliance Advisory ServicesDiscover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
Applicable to:
Cloud Security
Compliance Advisory Services
33 out of 60
Microsoft 365 License Optimization:1-hr AssessmentFrontier Technology, LLC
Adoption & Change Management
Cloud Security
Identity & Access ManagementReview current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
34 out of 60
Microsoft Security Workshop: 3-dayOxford Computer Group LLC
Cloud Security
Threat ProtectionThis 3-day workshop shows you how to put Microsoft’s security capabilities to work. Learn how secure your organization is now and how to mitigate and protect against threats in the future.
Applicable to:
Cloud Security
Threat Protection
35 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SAS
Cloud Security
Identity & Access Management
Threat ProtectionConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) Ltd
Cloud Security
Identity & Access Management
Threat ProtectionReadiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Office 365 Security: 1-Day AssessmentNetrix Global
Cloud SecuritySecurity assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
Applicable to:
Cloud Security
38 out of 60
Defend Against Threats with SIEM Plus XDRNetrix Global
Cloud Security
Identity & Access Management
Threat ProtectionAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Endpoint Management WorkshopYork Telecom Corp
Cloud Security
Mobile Device Management
Threat Protection3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
40 out of 60
Secure Workspace: 1 Day WorkshopWatserv Inc.
Cloud Security
Identity & Access Management
Teamwork DeploymentA 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
41 out of 60
Microsoft 365 Security: 1-Day BriefingNetrix Global
Cloud SecurityA tailored planning engagement targeted at ensuring your Microsoft cloud solutions are aligned with your needs.
Applicable to:
Cloud Security
42 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.
Cloud Security
Information Protection & Governance
Threat ProtectionNTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 60
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.
Cloud Security
Identity & Access Management
Threat ProtectionThe Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender
for enterprises, resulting in improved detection rates, threat coverage, and
organizational security posture.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East
Cloud Security
Identity & Access Management
Threat Protection3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Mail Airlift: Exchange Online ImplementationSynergy Technical, LLC
Cloud Security
Identity & Access Management
Information Protection & GovernanceOur Mail Airlift engagement will get you up and running with Microsoft Exchange online in the fastest, most secure manner.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
46 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeIT
Cloud Security
Identity & Access Management
Threat ProtectionCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
1-Day Security & Identity WorkshopConvergeOne
Cloud Security
Identity & Access Management
Threat ProtectionTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLC
Cloud Security
Identity & Access Management
Threat ProtectionRoadmap to increase your security score with cost-effective security tools
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Compliance Assessment - 6 weeksBDO Digital, LLC
Cloud Security
Compliance Advisory Services
Threat ProtectionIdentify your compliance maturity and areas that need improvement
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
50 out of 60
Microsoft 365 Defender Threat Check: 4-wk assessInterlink Cloud Advisors, Inc.
Cloud Security
Threat ProtectionEvaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
Applicable to:
Cloud Security
Threat Protection
51 out of 60
Office 365 Protection: Design & Pilot 1-Wk POCManaged Solution
Cloud Security
Threat ProtectionProtect Your Employees from External Email Threats with Defender for Office 365 Protection
Applicable to:
Cloud Security
Threat Protection
52 out of 60
Secure Live Workspace - 8 Weeks AssessmentLTIMindtree Limited
Cloud Security
Power Platform for Teams
Teams Custom SolutionsOur Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
Applicable to:
Cloud Security
Power Platform for Teams
Teams Custom Solutions
53 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk AssessmentApex Digital Solutions
Adoption & Change Management
Cloud Security
Threat ProtectionAchieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
54 out of 60
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It Security
Cloud Security
Identity & Access Management
Insider RiskEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
55 out of 60
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer Solutions
Cloud Security
Information Protection & Governance
Threat ProtectionSirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
56 out of 60
discover-sensitive-data-workshopECF Data LLC
Cloud Security
Insider Risk
Threat ProtectionECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
57 out of 60
ECF Data Threat Protection: 3-Day WorkshopECF Data LLC
Cloud Security
Threat ProtectionThe Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
Applicable to:
Cloud Security
Threat Protection
58 out of 60
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
Cloud Security
Insider Risk
Threat ProtectionThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
59 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd
Cloud Security
Device Deployment & Management
Identity & Access ManagementMicrosoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
60 out of 60