筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Entra ID Health CheckRavenswood Technology GroupAssess the configuration, security, and operational procedures of an Entra ID environment.
+1
Applicable to:
Identity & Access Management
1 out of 47
Implementation of Microsoft Defender for Office 365CDWThe Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 47
Secure Data on Personally-Owned Devices: 2 Week ImplementationCDI LLCDeploy Intune App Protection Policies to secure organization data on employee-owned devices
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
3 out of 47
Active Directory Health CheckRavenswood Technology GroupAssess the configuration, security, and operational procedures of an Active Directory environment.
+1
Applicable to:
Identity & Access Management
4 out of 47
Microsoft 365 E3 12-Months ImplementationOffice DepotConnected Workplace for All Users with Microsoft 365 E3 Bundle
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
5 out of 47
Secure Identities and Access Management AssessmentInvokeTo provide enterprise customers with a detailed identity assessment report, a high-level migration plan, and demonstrations of Microsoft Entra Azure AD and Microsoft Entra Identity Governance features
+1
Applicable to:
Identity & Access Management
6 out of 47
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
7 out of 47
Data Security and Governance Assessment and RoadmapCentric Consulting, LLCProvide customers with a clear path forward in addressing data security needs
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
8 out of 47
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLCEnhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 47
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLCThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 47
Cyclotron Beam White Glove IDP MigrationCyclotron Inc.Seamlessly migrate applications from Okta to Microsoft Entra ID with Cyclotron Beam’s automated platform.
+1
Applicable to:
Identity & Access Management
11 out of 47
Apply Information Rights Management protection to email: 5-Day Professional ServiceIT Partner LLCEnsure that only authorized individuals can access and use the information. This can be especially useful for sensitive or confidential information that needs to be protected from unauthorized access
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
12 out of 47
Centric Endpoint Management with Security WorkshopCentric Consulting, LLCHelping organizations modernize their endpoint management and security capabilities using Microsoft 365
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
13 out of 47
Threat Protection Engagement - 4 weeksGrant Thornton LLPImprove your Security Posture with Grant Thornton's Threat Protection Engagement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 47
Passwordless Authentication: 2 Week ImplementationCDI LLCImplement passwordless authentication solutions for up to twenty pilot users
+1
Applicable to:
Identity & Access Management
15 out of 47
Mail Airlift: Exchange Online ImplementationSynergy Technical, LLCOur Mail Airlift engagement will get you up and running with Microsoft Exchange online in the fastest, most secure manner.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
16 out of 47
Microsoft 365 Security: 2-week assessmentMirai Security Inc.We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 47
Threat Protection EngagementTierPointLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 47
Google Drive To OneDrive Migration JumpstartSentinel Technologies Inc.Sentinel Technologies offers a structured and secure migration service for transitioning from Google Drive to Microsoft OneDrive. Our process minimizes disruptions while maintaining productivity.
+1
Applicable to:
Identity & Access Management
19 out of 47
Healthcare Innovations Strategic Alignment WorkshopSentinel Technologies Inc.At the start of 2020, the charge of the Healthcare Technology Executive focused on key areas for improvement & alignment with their business along with providing a secure environment that allowed for
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Knowledge & Insights
20 out of 47
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 47
Deployment of Windows 365 Enterprise (Cloud PC): ImplementationDataVoxDataVox offer services to deploy Windows 365 for Enterprise (Cloud PC) in Azure and deploy applications
+3
Applicable to:
Device Deployment & Management
Frontline Workers
Identity & Access Management
22 out of 47
Threat Protection EngagementFIS Managed IT SolutionsLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 47
Security Foundations Email: Assessment and ImplementationProServeITProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 47
Windows 365 PilotCDWWith the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 47
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCThe primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
26 out of 47
FortisX on Microsoft Defender: ProofofConcepSentinel Technologies Inc.Today's security landscape is complex, dynamic, and constantly evolving.
+1
Applicable to:
Identity & Access Management
27 out of 47
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.According to multiple studies, breaches and ransomware have more than doubled in the past year.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 47
Microsoft 365 Copilot and AI AssessmentRedapt, Inc. Elevate Your Business with Microsoft 365 Copilot Assessment
+1
Applicable to:
Identity & Access Management
29 out of 47
Gmail to Exchange JumpstartSentinel Technologies Inc.Sentinel Technologies offers a comprehensive Exchange Online Setup & Migration Jumpstart to streamline your organization's transition from Google Workspace to Microsoft 365.
+1
Applicable to:
Identity & Access Management
30 out of 47
Security Foundations for Microsoft 365Cyclotron Inc.Secure and govern Microsoft 365 with best practices for thread detection, compliance & data protection, identity access, device & app management with Microsoft’s security and governance framework.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
31 out of 47
Armor Defender XDR Foundational AssessmentArmorTailored consulting engagement designed to evaluate your current security environment and establish a baseline for implementing Microsoft Defender XDR.
+2
Applicable to:
Identity & Access Management
Threat Protection
32 out of 47
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLCSkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 47
Google Workspace to Microsoft 365 MigrationSkyTerra Technologies LLCMove from Google Workspace to Microsoft 365 with a structured, low-risk migration that protects data, minimizes downtime, and accelerates adoption.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Teamwork Deployment
34 out of 47
Office 365 to Office 365 Migration Tenant to TenantSkyTerra Technologies LLCTenant to tenant consolidation and migration for Microsoft 365, planned and executed for minimal disruption and maximum control.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Teamwork Deployment
35 out of 47
Unified Identity & Secure Edge Modernization with Entra SuiteBDOModernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 47
Okta to Microsoft Entra ID ConversionSkyTerra Technologies LLCConsolidate identity on Microsoft Entra ID, reduce cost and complexity, and raise your security baseline without disrupting your users.
+2
Applicable to:
Cloud Security
Identity & Access Management
37 out of 47
Frontier Firm Transformation - Free 2 Hour AI Security Risk AssessmentNetwoven Inc.To help businesses securely adopt AI within Microsoft 365, enabling confident use of Copilots and other AI solutions while protecting sensitive data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
38 out of 47
Redapt Data Security EngagementRedapt, Inc. Safeguard Your Enterprise Data with Confidence
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
39 out of 47
Redapt Threat Protection EngagementRedapt, Inc. Proactive Cybersecurity for Resilient Enterprises
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
40 out of 47
Modern SecOps Envisioning WorkshopSentinel Technologies Inc.As IT becomes more strategic, the importance of security grows daily. Security information and event management (SIEM) solutions built for yesterday’s environments struggle to keep pace.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
41 out of 47
Modern SecOps Envisioning WorkshopTierPointUnlock unmatched security with TierPoint’s Microsoft cloud-native security solutions with our Modern SecOps Envisioning Workshop
+2
Applicable to:
Cloud Security
Identity & Access Management
42 out of 47
Pently Microsoft 365 - AssessmentPently GmbHStructured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
43 out of 47
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 47
Entra ID AssessmentTechNet UC LLCAssess your Entra ID tenant for security, governance, and compliance. Receive expert insights and actionable recommendations to strengthen identity posture and align with Microsoft best practices.
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
45 out of 47
Microsoft 365 Identity & Security: 2-Wk AssessmentPSM PartnersCustomized identity and security assessment focused on the Microsoft 365 platform
+2
Applicable to:
Cloud Security
Identity & Access Management
46 out of 47
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
47 out of 47