筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Windows 365 Assessment - 1 dayCC Bilgi TeknolojileriHybrid Windows for a hybrid world
Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
1 out of 60
Complete MXDR Threat Protection Powered by Microsoft SentinelKiZAN TechnologiesManaged security services to protect against an evolving cyber threat landscape 24x7x365 with Microsoft Entra ID Protection, Microsoft Sentinel, and Microsoft Defender.
+2
Applicable to:
Cloud Security
Threat Protection
2 out of 60
4security: Backup as a Service for Microsoft 3654Sight HoldingsProtect your data with 4Security's Microsoft 365 Backup as a Service. Seamless integration, automated backups, and reliable data recovery for businesses of all sizes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 60
Adopción de Copilot chat Enterprise - Bing Chat Enterprise: 3-WkENCAMINA S.L.Adopta Copilot Chat Enterptise para multiplicar la productividad de tus empleados protegiendo los datos en tu empresa
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
4 out of 60
Data Security Engagement: 4-Wk WorkshopExelegentThe Data Security Engagement provides a summary of an organization’s data protection and compliance stature with actionable recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
5 out of 60
Windows 365 Pilot: 5 Days Proof of ConceptDelphi ConsultingDelphi Consulting will help you get started with Windows 365 Cloud-PC with its Pilot offering with the program running over 5 days.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
6 out of 60
Copilot Business Value DiscoveryNetwovenReady to embrace AI? Join our Microsoft 365 Copilot Value Discovery Workshop and learn how to maximize its potential for your business
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
7 out of 60
NIST800-171-Microsoft 365-Accelerator-Guided-DeploymentKMicro Tech, Inc.Provides expert guidance to help organizations achieve NIST 800-171 compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
8 out of 60
Microsoft Sentinel Integration with Carbon Black by AVASOFTAVASOFTImprove endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
9 out of 60
Infosys Microsoft 365 Security and Compliance: 8 Weeks AssessmentInfosys LimitedInfosys Microsoft 365 security expert team offers a full spectrum security service for microsoft 365 services facilitated digital workplace.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Workplace Analytics
10 out of 60
SoftwareOne Managed Detection and Response Service for Microsoft SentinelSoftwareOneSecure your IT Environment with Microsoft Services and on-call Cyber-security Analysts with end-to-end MDR and optimise costs
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
11 out of 60
Invoke Data Risk AssessmentInvokeThis assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
12 out of 60
Microsoft 365 Security AssessmentCDWCDW’s Microsoft 365 Security Assessment allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Copilot for Microsoft 365: Security AcceleratorKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Accelerator: Tailored insights and guided deployments.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 60
Microsoft Purview Insider Risk Management (IRM): 2-Week ImplementationSpyglass MTG, LLCOur engagement is designed to accelerate the ability to integrate and consume IRM across your enterprise while better securing data and identities in the environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
15 out of 60
Microsoft 365 Rapid Security Assessment: 1-Wk AssessmentAwara ITMicrosoft 365 Rapid Security Assessment is a quick yet comprehensive evaluation to enhance Microsoft 365 security against evolving cyber threats
+2
Applicable to:
Cloud Security
Threat Protection
16 out of 60
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) LtdReadiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
AI Security and Microsoft 365 Copilot Readiness Assessment ProgramExelegentMaster control over your data and get ready to deploy Copilot in 60-90 days with a simple engagement process
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
18 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
19 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen SystemsThe OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
21 out of 60
Windows 365 Standardized PilotMobile MentorThe Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
22 out of 60
Microsoft 365 Security AssessmentSii Sp. z o.o.We assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro LtdWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Microsoft 365 Data oversharing report: 5-D Implementation and consultingReplyComprehensive Insights: Get a holistic overview of your environment and uncover overshared sites, documents, and items without the need for expensive Microsoft 365 E5 licenses.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
25 out of 60
Endpoint Management WorkshopYork Telecom Corp3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
26 out of 60
Microsoft 365 Copilot - AdvisoryCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Readiness Workshop – your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
27 out of 60
Defend, Protect, Secure with Microsoft Defender XDRComtrade System IntegrationTake the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
+2
Applicable to:
Cloud Security
Threat Protection
28 out of 60
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
29 out of 60
End-to-end Threat Protection Workshop and PilotExelegentThe Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Intune Health Check (All OS): 2-week AssessmentMobile MentorOur certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
31 out of 60
Virtual CISO (vCISO) Managed ServicesNetrix GlobalOur virtual CISO offering provides organizations a senior level security executive for ongoing security program management and governance.
+1
Applicable to:
Cloud Security
32 out of 60
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLCCatapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 60
Microsoft 365 Defender: 2-Wk AssessmentAlithya Fullscope Solutions, Inc.Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-WeeksInvokeInvoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
35 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
AvePoint Backup: 4 Weeks Proof Of ConceptSentinel Technologies Inc.Sentinel Technologies is proud to offer AvePoint’s Cloud Backup, a powerful cloud-to-cloud backup solution for Microsoft 365 and Azure.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 60
MDS Managed MXDR EngagementMaureen Data SystemsDesigned to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft Defender for Endpoint QuickStartPresidioPresidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Microsoft 365 Manage Service–12 mth ImplementationAlfa Connections Pte LtdAlfa Connections providing Microsoft 365 Managed service is designed to enhance your workforce experience by supporting your organization on planning, enablement, implementation, and adoption.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
40 out of 60
Unified Identity & Secure Edge Modernization with Entra Suite+BDO Digital, LLCModernize Identity & Network Access to enable Zero Trust for employees, customers and partners in any cloud from anywhere, to any app, AI, or resource
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen SystemsThe Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
42 out of 60
Microsoft 365 E5 CMMC L3 8 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
43 out of 60
Spyglass-MXDR Managed Detection & Response: 2-week ImplementationQuisitiveSpyglass-MXDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
44 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
KMicro MXDR for SMBKMicro Tech, Inc.KMicro MXDR for SMB helps businesses reduce operational complexity and strengthen cybersecurity defenses by managing their Microsoft Defender XDR environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
46 out of 60
CMMC Compliance with Microsoft 365: 4 wk impl.InsightInsight’s CMMC services program helps clients understand DoD requirements, develop a strategy to achieve compliance in hybrid and cloud models, and execute to implementation and ongoing operations.
+1
Applicable to:
Cloud Security
47 out of 60
Microsoft Sentinel Security Consulting ServiceComtrade System IntegrationMicrosoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
48 out of 60
Implementation of Microsoft Security CopilotAlfa Connections Pte LtdTo assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
49 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
50 out of 60
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
51 out of 60
Discover Sensitive Data Workshop: 4-Wk WorkshopProArch Technologies, IncProArch’s Discover Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
52 out of 60
ThreatHunter MXDR MSSP: 12-Mo ImplementationeGroup Enabling TechnologiesTo assist our customers with advanced security services focused on identifying and mitigating cloud and device malicious threats and providing 24x7 monitoring and response services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
53 out of 60
Microsoft 365 Copilot Value DiscoveryCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Value Discovery Workshop – your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
54 out of 60
AI Governance Workshop: 4-Hour WorkshopVitalystBe introduced to Microsoft's AI Services, Azure Open AI and Copilot, and better understand the governance principles and practices tailored to them, like transparency, fairness, privacy, and security.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
55 out of 60
Health-Check for Microsoft 365 Tenant: AssessmentnovaCapta GmbHMicrosoft 365 nach höchsten Sicherheitsstandards und Best Practices absichern, schützen und optimieren
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
56 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security ServicesCognizantDefend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
57 out of 60
Deploying Purview Data Security - Labels and DLPBulletproof Solutions Inc.A dependable approach to deployment of Data Security workloads led by governance and following our standard framework for Microsoft 365 customers
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
58 out of 60
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, LdaThe engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
59 out of 60
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
60 out of 60