筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
1 out of 20
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 20
Compliance: 1 Day Workshop - Manage and Investigate RiskConvergeOneEveryone seems to be aware of external risk factors such as Ransomware, but what out Insider Risk? Find out the importance of proper controls and governance to protect yourself from bigger threats
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
3 out of 20
Endpoint Ecosystem Technical Support: 12-month Support ImplementationMobile MentorProvide support and advice to IT administrators on Microsoft Endpoint Manager
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
4 out of 20
Neway Security proposition: 3-WK implementationNeWay Technologies LtdThe Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
5 out of 20
Adoption and Consumption Services- 4 Weeks Implementation Drive ConsumptionNewWave Computing Private LimitedAssist Customers to achieve continuous business value through the use of your Microsoft Modern Workplace Cloud Solutions
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
6 out of 20
Modern EndPoint: 3 Day WorkshopInsentra Pty LtdAn executive deep dive into remote deployment, management, and the security of corporate and BYOD devices in your organization
+2
Applicable to:
Identity & Access Management
Mobile Device Management
7 out of 20
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POCatQorOur Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
8 out of 20
IGA Roadmap - 4 Weeks AssessmentArmis, Sistemas de Informação, LdaDevelop an outcome-based, design-led IGA strategy to secure access to your resources with Microsoft identity governance solutions
+1
Applicable to:
Identity & Access Management
9 out of 20
Data Governance & Migration Energize: 3-wk assessInterlink Cloud Advisors, Inc.Protecting your data & organization requires strong governance, increased visibility, & a holistic understanding
of your data. Know where your data is stored, how it is classified, managed, & tracked
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
10 out of 20
Endpoint Management and Windows Deployment Services: 4-Wk ImplementationData Market Bilgi Hizmetleri A.SEndpoint Management and Windows Deployment Services Consultancy is a professional consultancy service for modernization of device and application management infrastructure .
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
11 out of 20
Zero Trust Workplace Implementation ServicesSoftchoiceSolution for organizations wanting to improve their overall security posture by implementing key security features for protecting user identity, devices, and data.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
12 out of 20
Secure Hybrid Identity - Defender for Identity: 6 week ImplementationPerformantaSecure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
+2
Applicable to:
Identity & Access Management
Threat Protection
13 out of 20
Windows 365: 1-month Proof of ConceptSoftline TradeAccess your data anywhere, anytime from any device with Windows 365. Softline is providing you with three different offerings for your organization to kick start Windows 365.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
14 out of 20
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
15 out of 20
Microsoft 365 E3 12-Months ImplementationOffice DepotConnected Workplace for All Users with Microsoft 365 E3 Bundle
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
16 out of 20
Zero Trust Launchpad: 3-Wk AssessmentAscent Global, Inc.Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 20
Endpoint Management and Windows Deployment: 2-days ImplementationCC Bilgi TeknolojileriMicrosoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises.
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
18 out of 20
Information Discovery Week: 1-Week AssesmentCipher (Prosegur Ciberseguridad SL)One of the big problems that all organizations encounter is the classification of information and its discovery. From Cipher we offer a service, which performs this function for a short period.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
19 out of 20
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
20 out of 20