筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Exchange Online MigrationDataVoxMigrating emails to Office 365 includes assessing the environment, choosing a method (Cutover, Staged, Hybrid, or IMAP), migrating data, updating DNS, configuring devices, and user training.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Mobile Device Management
1 out of 60
Microsoft 365 AssessmentTechNet UC LLCOur assessment provides a thorough analysis of your current Microsoft 365 environment, identifying areas for improvement and offering actionable recommendations to enhance performance and security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
2 out of 60
Security Best Practices AssessmentTechNet UC LLCOur assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 60
Comprehensive Exchange Online Security ConfigurationTechNet UC LLCUnmatched Security and Compliance for Your Exchange Online Environment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
4 out of 60
Copilot adoption for customer serviceConterraTransform customer service processes with Copilot and Conterra Copilot Adoption Offer: 4-Wk Imp
+2
Applicable to:
Adoption & Change Management
Cloud Security
5 out of 60
Copilot adoption for legalConterraTransform legal service processes with Copilot and Conterra Copilot Adoption Offer: 4-Wk Imp
+2
Applicable to:
Adoption & Change Management
Cloud Security
6 out of 60
Data Security implementation for generative AI: 8-Wk ImpConterraHelp your organization to govern, monitor, and secure the use of generative AI tools like Copilot, ChatGPT, or custom GPT applications
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
7 out of 60
KK_Exchange_Migration Consulting ServicesKraft KennedyMoving to Exchange Online significantly extends the use of Microsoft 365 by modernizing communication infrastructure, enhancing security, and unlocking integrated productivity features.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
8 out of 60
CMMC Secure Enclave with User TrainingPlanet TechnologiesA secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov and including User Training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
9 out of 60
CMMC Secure EnclavePlanet TechnologiesA secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
10 out of 60
impelSecure Modern SecOps Engagement: Free 4-week workshopimpeltec Pty LtdGain visibility into threats to your Microsoft 365 and Azure clouds and on-premises environments across email, identity, endpoints, and third-party data
+2
Applicable to:
Cloud Security
Threat Protection
11 out of 60
CMMC Assessment Ready SolutionPlanet TechnologiesBased off the Planet secure collaboration enclave, this provides customers with CMMC Assessment Ready artifacts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
12 out of 60
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLPOffice 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
13 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
14 out of 60
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
15 out of 60
Managed Services ProviderSkyTerra Technologies LLCSkyTerra delivers seamless integration with your existing Microsoft ecosystem, from Azure infrastructure to Microsoft 365 productivity suites.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
16 out of 60
Atos || Accessibility as a Service - ATVisor ConsoleAtos International SAS12-month Assistive Technology (AT) analytics add-on for Microsoft Intune. Analytics to provide actionable insights on AT / Accessibility feature availability, use, adoption & stability.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Workplace Analytics
17 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLCThe Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
19 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, IncKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Microsoft 365: 2-Week AssessmentApex Digital SolutionsEstablish a clear roadmap and change management plan for your journey to a modern workplace.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
21 out of 60
Endpoint Management: 3-Day WorkshopApex Digital SolutionsBegin the steps to manage and protect your devices, your apps, and your users
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
22 out of 60
Microsoft Security: 3-Day WorkshopApex Digital SolutionsDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Cyber Portfolio Rationalization: 3-Day WorkshopPwCSimplify your cybersecurity portfolio to reduce the cost and complexity of your Microsoft 365 and Microsoft Azure environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
24 out of 60
Endpoint Management: 2-Week ImplementationApex Digital SolutionsMaintain control over your devices and the data stored on them to stay protected in a cloud-focused environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
25 out of 60
Microsoft 365 Identity & Security: 2-Wk AssessmentPSM PartnersCustomized identity and security assessment focused on the Microsoft 365 platform
+2
Applicable to:
Cloud Security
Identity & Access Management
26 out of 60
Cloud Security Journey: 2 Hour Proof of Concept360 Visibility Inc.See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Microsoft 365/Azure Cloud Secure 5 Day AssessmentDynTek Inc.DynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 60
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
29 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT LimitedCybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 60
Microsoft 365 Value Discovery - Workshop - 1 DayDynTek Inc.OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT
OF MICROSOFT 365 IN YOUR ENVIRONMENT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
31 out of 60
Microsoft 365 OnDemand - 2 Week ImplementationProtivitiMicrosoft 365 On Demand Support - providing you with dedicated experts to support and maintain your Microsoft 365 environment
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
32 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
33 out of 60
Microsoft 365 Migration: 10-Wk ImplementationNeway TechnologiesSuccessfully migrate your Microsoft 365 environment to a managed services model.
+2
Applicable to:
Cloud Security
Power Platform for Teams
34 out of 60
Microsoft Security Deployment: 5-day WorkshopCampana & Schott GmbHUnderstand your Microsoft security posture and minimize risks with the right experts
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 60
Security Assessment: 2-Wk AssessmentAscent Global, Inc.Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Data Loss Prevention: 3-Wk POCFPT/Intellinet Discover, classify, and protect sensitive data to prevent any inadvertent exposure.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
37 out of 60
Threat Protection: 3-Wk POCFPT/Intellinet Identify security threats and begin to respond and mitigate.
+2
Applicable to:
Cloud Security
Threat Protection
38 out of 60
Intelligent Shield: 1d AssessmentCorporate SoftwareAn Audit for your Microsoft 365 tenant based on Best Practices
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
39 out of 60
Management Services: 10-Week AssessmentCatapult Systems, LLCCatapult Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
40 out of 60
Remote Access to On-Prem Apps: 3 Wk ImplementationInvokeSurface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
+2
Applicable to:
Cloud Security
Identity & Access Management
41 out of 60
CMMC Data Enclave Dplymt: 4-Wk ImplementationC3 Integrated SolutionsDeploy Microsoft 365 to meet CMMC Requirements
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
42 out of 60
Microsoft 365 Security Assessment up to 6 weeksACTSACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
43 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud Security
Threat Protection
45 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Microsoft Security Workshop: 3-dayOxford Computer Group LLCThis 3-day workshop shows you how to put Microsoft’s security capabilities to work. Learn how secure your organization is now and how to mitigate and protect against threats in the future.
+2
Applicable to:
Cloud Security
Threat Protection
47 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SASConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Office 365 Security: 1-Day AssessmentNetrix GlobalSecurity assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
+1
Applicable to:
Cloud Security
49 out of 60
Defend Against Threats with SIEM Plus XDRNetrix GlobalAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Endpoint Management WorkshopYork Telecom Corp3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
51 out of 60
Secure Workspace: 1 Day WorkshopWatserv Inc.A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
52 out of 60
Microsoft 365 Security: 1-Day BriefingNetrix GlobalA tailored planning engagement targeted at ensuring your Microsoft cloud solutions are aligned with your needs.
+1
Applicable to:
Cloud Security
53 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
54 out of 60
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender
for enterprises, resulting in improved detection rates, threat coverage, and
organizational security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
TS As a Services (TSaaS): 5-day ImplementationE-Level Cloud Services S.A. de C.V.Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
56 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLCIntroducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
57 out of 60
Mail Airlift: Exchange Online ImplementationSynergy Technical, LLCOur Mail Airlift engagement will get you up and running with Microsoft Exchange online in the fastest, most secure manner.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
58 out of 60
Document Airlift-OneDrive ImplementationSynergy Technical, LLCOur Document Airlift will enable and configure your organization’s environment to use OneDrive for Business services in your Office 365 tenant.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
59 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeITCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60