筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 648 个结果。
云安全Remove 云安全
Microsoft 365Remove Microsoft 365
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It Security
Cloud Security
Identity & Access Management
Insider RiskEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
1 out of 48
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer Solutions
Cloud Security
Information Protection & Governance
Threat ProtectionSirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 48
discover-sensitive-data-workshopECF Data LLC
Cloud Security
Insider Risk
Threat ProtectionECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
3 out of 48
ECF Data Threat Protection: 3-Day WorkshopECF Data LLC
Cloud Security
Threat ProtectionThe Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
Applicable to:
Cloud Security
Threat Protection
4 out of 48
Securing Identities and Access: 3-day WorkshopECF Data LLC
Cloud Security
Identity & Access Management
Threat ProtectionThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 48
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd
Cloud Security
Device Deployment & Management
Identity & Access ManagementMicrosoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
6 out of 48
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
Cloud Security
Insider Risk
Threat ProtectionThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
7 out of 48
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd
Cloud Security
Device Deployment & Management
Identity & Access ManagementMicrosoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
8 out of 48
Security Assessment: 2 Week AssessmentTallan
Cloud Security
Identity & Access Management
Threat ProtectionTallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 48
Change Management 6-Months ImplementationSupremo Sp. z o.o.
Adoption & Change Management
Cloud Security
Knowledge & InsightsBądź pewny, że zaangażowanie użytkowników i przyjęcie nowych rozwiązań przyczyni się do sukcesu wdrożenia, sukcesu całej organizacji.
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
10 out of 48
Enhance IT Security: 1-2-Wk ImplementationFMT Consultants
Cloud Security
Identity & Access ManagementFMT offers a smart security solution that protects your business, your employees, and your clients while providing a reliable, scalable, and durable approach to keeping your business up and running.
Applicable to:
Cloud Security
Identity & Access Management
11 out of 48
Windows 365 QuickStart : 4 Day PoC + Surface GoSynergy Technical, LLC
Cloud Security
Device Deployment & Management
Frontline WorkersThe Windows 365 Quick Start engagement is designed to show you how Windows 365 + SurfaceGo keeps you productive. Included are a Surface Go, planning services, as well as a proof of concept.engagement
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
12 out of 48
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.
Cloud Security
Identity & Access Management
Threat ProtectionDeep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 48
Security Solutions:2-Weeks ImplementationAlpine Health Technologies Corp
Cloud Security
Insider Risk
Threat ProtectionDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
14 out of 48
Microsoft OT/IOT Security : 2-Wks AssessmentWipro Ltd
Cloud Security
Threat ProtectionIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
Applicable to:
Cloud Security
Threat Protection
15 out of 48
GDPR Assessment: 6-Week AssessmentHappiest Minds Technologies Limited
Cloud Security
Compliance Advisory Services
Threat ProtectionEnable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
16 out of 48
CCPA CPRA: 6 - Wk AssessmentHappiest Minds Technologies Limited
Cloud Security
Compliance Advisory Services
Threat ProtectionEnable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
17 out of 48
User Shield: 4-Wk ImplementationLong View Systems
Cloud Security
Insider Risk
Threat ProtectionComprehensive and straight-forward security services leveraging leading Partners and Technologies
Applicable to:
Cloud Security
Insider Risk
Threat Protection
18 out of 48
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.
Cloud Security
Identity & Access Management
Insider RiskWe will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
19 out of 48
Discover Sensitive Data Workshop: 4-Wk WorkshopProArch Technologies, Inc.
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceProArch’s Discover Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
20 out of 48
Digital Workplace Foundations: 4-wk AssessmentCatapult Systems, LLC
Adoption & Change Management
Cloud Security
Teamwork DeploymentCatapult’s Digital Workplace Foundations helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tools.
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
21 out of 48
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuest
Cloud Security
Information Protection & Governance
Threat ProtectionGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 48
Compliance Managed ServicesForsyte IT Solutions
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceOrganizations everywhere are experiencing the benefits of Compliance Managed Services. Work with our Microsoft Gold Partner team to establish governance and manage user access and data security.
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
23 out of 48
Microsoft 365 Manage Service–12 mth ImplementationAlfa Connections Pte Ltd
Adoption & Change Management
Cloud Security
Frontline WorkersAlfa Connections providing Microsoft 365 Managed service is designed to enhance your workforce experience by supporting your organization on planning, enablement, implementation, and adoption.
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
24 out of 48
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMS
Cloud Security
Device Deployment & Management
Mobile Device ManagementMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
25 out of 48
Modern Frontline Work Acceleration 2 days WorkshopLiveRoute FZ-LLC
Adoption & Change Management
Cloud Security
Frontline WorkersLiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
26 out of 48
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile IT
Cloud Security
Identity & Access Management
Threat ProtectionA 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 48
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure Ltd
Cloud Security
Identity & Access Management
Threat ProtectionKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 48
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLC
Cloud Security
Identity & Access Management
Threat ProtectionCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 48
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLC
Cloud Security
Identity & Access Management
Threat ProtectionSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 48
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.
Cloud Security
Identity & Access Management
Threat ProtectionWorkshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 48
Microsoft Security Assessment: 3-Wk AssessmenteGroup Enabling Technologies, LLC
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceAnalyze your cross platform security posture, with evaluated vulnerabilities and risks identified with a Microsoft Security Assessment.
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
32 out of 48
Licensing Microsoft 365: 1-day AssessmentInformatika a.d.
Adoption & Change Management
Cloud Security
Compliance Advisory ServicesWe offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
33 out of 48
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyant
Cloud Security
Threat ProtectionThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
Applicable to:
Cloud Security
Threat Protection
34 out of 48
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week ImplementationQuisitive
Adoption & Change Management
Cloud Security
Identity & Access ManagementQuisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
35 out of 48
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POCatQor
Cloud Security
Compliance Advisory Services
Identity & Access ManagementOur Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
36 out of 48
Microsoft Data Compliance Consulting Services - 2 Weeks AssessmentArmis, Sistemas de Informação, Lda
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceThe Microsoft 365 Compliance assessment helps organizations implement a compliance strategy that accelerates and streamlines data security and governance while reducing risk.
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
37 out of 48
Windows 365 Pilot: 5 Days Proof of ConceptDelphi Consulting
Cloud Security
Device Deployment & Management
Mobile Device ManagementDelphi Consulting will help you get started with Windows 365 Cloud-PC with its Pilot offering with the program running over 5 days.
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
38 out of 48
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdge
Cloud Security
Device Deployment & Management
Threat ProtectionEndpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
39 out of 48
Microsoft 365 Adoption & Change: 1-Year Managed ServiceSignal Alliance Technology Holding
Adoption & Change Management
Cloud Security
Frontline WorkersDiscover how our Adoption & Change Management program ensures that we effectively support your business to deploy, drive end-user adoption and maximise your Return on Investment (ROI).
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
40 out of 48
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse Global
Cloud Security
Information Protection & Governance
Insider RiskThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
41 out of 48
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology Ltd
Cloud Security
Identity & Access Management
Teamwork DeploymentSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
42 out of 48
Modern IT: 2 Hour AssessmentModern IT
Adoption & Change Management
Cloud Security
Device Deployment & ManagementIdentify areas for business process optimization through Modern IT
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
43 out of 48
Zero Trust Launchpad: 3-Wk AssessmentAscent Global, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAscent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 48
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLC
Cloud Security
Identity & Access Management
Threat ProtectionOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 48
Microsoft 365 Endpoint Manager Deployment Roadmap Assessment - 4 Week AssessmentProtiviti
Cloud SecurityActionable plan and high-level view to move towards a successful Microsoft Endpoint Manager (MEM) deployment and migration
Applicable to:
Cloud Security
46 out of 48
System Center Endpoint Manager 40 hour Quick Start Proof of Concept with Co-Management with Endpoint Manager in Office 365York Telecom Corp
Cloud Security
Device Deployment & Management
Mobile Device ManagementSystem Center Endpoint Manager 40-Hour Quick Start Proof-of-Concept. Design, deploy and learn SCEM in 40-hour proof-of-concept with Co-Management with Endpoint Manager Office 365
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
47 out of 48
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)
Cloud Security
Identity & Access Management
Information Protection & GovernanceFrom Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
48 out of 48