筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 559 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
SCCM to Intune Migration Plan: 2-week AssessmentMobile Mentor
Device Deployment & Management
Identity & Access Management
Information Protection & GovernanceOur migration plan gives you a roadmap, a timeline, and best practices to migrate from SCCM / ConfigMan to Intune.
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
1 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
2 out of 60
Microsoft Entra in 30: 6-wk ImplementationLong View Systems
Identity & Access ManagementLong View’s Entra in 30 offers a unified identity, access security, and data governance solution to help minimize these cybersecurity risks in 30 days.
Applicable to:
Identity & Access Management
3 out of 60
Microsoft 365 Security: 3,5 Tage Tenant AssessmentAppSphere AG
Cloud Security
Identity & Access Management
Knowledge & InsightsSicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
4 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoft
Cloud Security
Identity & Access Management
Threat ProtectionBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Microsoft 365 Inter-Tenant Migration: 2 days AssessmentPreeminent Solutions, Inc.
Adoption & Change Management
Cloud Security
Identity & Access ManagementPreeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
6 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro Ltd
Cloud Security
Identity & Access Management
Threat ProtectionWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Threat Protection Engagement: 3-Day AssessmentPSM Partners
Cloud Security
Identity & Access Management
Threat ProtectionDo more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
MicroAge ManageWise Microsoft 365 Assessment & ServicesMicroAge
Cloud Security
Identity & Access Management
Knowledge & InsightsComprehensive assessment of our clients Microsoft 365 tenant providing an Executive summary detailed report to reduce vulnerabilities improving Secure Score with 40 hours of Engineer time
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
9 out of 60
Microsoft 365 Copilot Data and Security Readiness: 4-Week AssessmentSpyglass MTG, LLC
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceOur Microsoft 365 Copilot Data and Security Readiness Assessment is a scoped engagement that is designed to accelerate the ability to integrate and consume Copilot across your enterprise.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
10 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk ImplementationNeway Technologies
Adoption & Change Management
Cloud Security
Identity & Access ManagementStreamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
11 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
Cloud Security
Identity & Access Management
Threat ProtectionInspect events in your network to locate threat indicators and entities
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Security Baseline Integrity ManagerAegis Innovators
Identity & Access Management
Information Protection & Governance
Threat ProtectionSingle pane of glass for unified configuration, governance, and lifecycle management of security workloads across Microsoft 365.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
13 out of 60
Microsoft 365 Cyber Insurance Review: 2-5 Wk AssessmentKiZAN Technologies
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceMap your business cyber insurance carrier requirements to Microsoft 365 environment controls ranked by priority and impact to your security posture.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
14 out of 60
Red Canary MSSP FastTrack for SecurityRed Canary
Cloud Security
Identity & Access Management
Threat ProtectionLeverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementLeverage your Microsoft investment to create a strong Zero Trust security environment.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
16 out of 60
Empowering Digital Transformation with AI Microsoft Copilot SolutionsSonata Software Ltd.
Frontline Workers
Identity & Access Management
Meetings for Microsoft TeamsOur tailored Microsoft Copilot solutions blend human expertise with intelligent automation, delivering efficiency, productivity, and personalization across industries.
Applicable to:
Frontline Workers
Identity & Access Management
Meetings for Microsoft Teams
17 out of 60
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology Holding
Cloud Security
Identity & Access Management
Insider RiskOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
18 out of 60
MDS - Data Security Readiness Assessment for Copilot for Microsoft 365Maureen Data Systems
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceA 3-day comprehensive assessment to help organizations set the foundations of data security, privacy and governance in preparation for Copilot for Microsoft 365
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
19 out of 60
Workshop for Microsoft 365 Threat ProtectionCDW
Cloud Security
Identity & Access Management
Threat ProtectionThe Workshop for Microsoft 365 Threat Protection provides the following objectives to ensure thorough enablement of crucial Microsoft products for a more secure environment.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Incident Response RetainerSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionProactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
4migrate: Tenant to Tenant Microsoft 3654Sight Holdings
Device Deployment & Management
Identity & Access Management
Information Protection & GovernanceAre you planning a Microsoft 365 tenant-to-tenant migration? 4Sight offers expertly crafted migration packages!
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
22 out of 60
Windows10 EOL to Windows11 Foundations - 1 Week QuickStartCoretek Services
Device Deployment & Management
Frontline Workers
Identity & Access ManagementWindows 10 EOL is right around the corner, prepare with the Windows 11 foundations QuickStart for your organization today.
Applicable to:
Device Deployment & Management
Frontline Workers
Identity & Access Management
23 out of 60
Google to Microsoft 365 MigrationManaged Solution
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceEmpowering digital transformation through a Google to Microsoft 365 migration with world-class support, so you can focus on what matters most—your business.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
24 out of 60
Defender Pak365: Microsoft Defender ImplementationRavanty Tech Consulting, Inc.
Identity & Access Management
Insider Risk
Threat ProtectionEmpower your organization with comprehensive, AI-driven protection tailored to meet evolving security needs with the help of Microsoft Defender.
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
25 out of 60
Microsoft 365 Threat Check Assessment: 3-Wk AssessmentInvoke
Cloud Security
Identity & Access Management
Threat ProtectionThe Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionTrustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLC
Cloud Security
Identity & Access Management
Threat ProtectionOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
General Data Protection Regulation (GDPR): 4-Wk Data Discovery ServiceIT Partner LLC
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceMulti-step process to discover and scan data sources within the organization for personal data. The outcome: detailed inventory of data sources, together with the data they contain.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
29 out of 60
Microsoft 365 Mergers and Acquisitions (M&A): 4-Week ImplementationSpyglass MTG, LLC
Adoption & Change Management
Identity & Access Management
Teamwork DeploymentSpyglass’s Microsoft 365 Mergers and Acquisitions (M&A) Implementation is a 4-week/ $50k engagement that focuses on quickly being able to move data to its desired destination.
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
30 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.
Cloud Security
Identity & Access Management
Threat ProtectionProvide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY25CGI Inc.
Cloud Security
Device Deployment & Management
Identity & Access ManagementUtilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
32 out of 60
Fortis IR Table Top ExercisesSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionExercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Microsoft 365 Security AssessmentSii Sp. z o.o.
Cloud Security
Identity & Access Management
Threat ProtectionWe assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Co-pilot Technical ReadinessPHOENIX SOFTWARE LTD
Device Deployment & Management
Identity & Access Management
Knowledge & InsightsHelp your organisation ensure that they are technically ready for Co-pilot
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
35 out of 60
Data Protection and Governance with Microsoft PurviewAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLC
Calling for Microsoft Teams
Cloud Security
Identity & Access ManagementIf you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
37 out of 60
HSBS Cloud Modern Work Migração de Google para Microsoft 365HSBS
Adoption & Change Management
Frontline Workers
Identity & Access ManagementMigração de Google para Microsoft 365: Simplifique a transição com eficiência e segurança
Applicable to:
Adoption & Change Management
Frontline Workers
Identity & Access Management
38 out of 60
Entra ID: 5-day AssessmentCDI LLC
Identity & Access ManagementProtect identities in Microsoft 365 by hardening your Entra ID configuration as a result of this 5-day identity and authentication assessment
Applicable to:
Identity & Access Management
39 out of 60
Eviden Compliance Assessment (CSAT) zur Einhaltung der europäischen NIS-2-RichtlinieEviden International France - SAS
Identity & Access Management
Information Protection & GovernanceUnternehmen stehen vor der Herausforderung, die europäische NIS2-Richtlinie bis zur nationalen Umsetzungsfrist im Oktober 2024 umzusetzen.
Applicable to:
Identity & Access Management
Information Protection & Governance
40 out of 60
Microsoft Threat Protection EngagementRavanty Tech Consulting, Inc.
Identity & Access Management
Threat ProtectionThreat Protection Engagement helps you assess your security landscape, address most pressing security goals and challenges, and provide an immersive experience around Microsoft security capabilities.
Applicable to:
Identity & Access Management
Threat Protection
41 out of 60
Accelerate Windows 365: 1-mo Proof of ConceptAMTRA Solutions Ltd
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementAccelerate Windows 365 offers innovative management capabilities for your environment and optimizes your existing investment in cloud solutions.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
42 out of 60
Office 365 to Office 365 Migration: 4-Wk ImplementationExodus Integrity Services, Inc.
Adoption & Change Management
Identity & Access ManagementSimplify the complexities of merging, consolidating, or transitioning your Office 365 environments with our specialized Office 365 Migration Service.
Applicable to:
Adoption & Change Management
Identity & Access Management
43 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.
Cloud Security
Identity & Access Management
Threat ProtectionThis Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoice
Cloud Security
Identity & Access Management
Threat ProtectionThe Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Microsoft Sentinel - Monitor file access and permission changes in SharePoint Implementation: 5-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Information Protection & GovernanceImplement Microsoft Sentinel for monitoring file access and permission changes in SharePoint, ensuring prompt detection and notification of unauthorized or unwanted activities.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Zero Trust Workplace Implementation ServicesSoftchoice
Device Deployment & Management
Identity & Access Management
Information Protection & GovernanceSolution for organizations wanting to improve their overall security posture by implementing key security features for protecting user identity, devices, and data.
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
47 out of 60
4migrate: ISP to Microsoft 3654Sight Holdings
Identity & Access Management
Information Protection & Governance
Meetings for Microsoft TeamsSeamless Microsoft 365 migration with expert guidance, minimal disruption, and full support.
Applicable to:
Identity & Access Management
Information Protection & Governance
Meetings for Microsoft Teams
48 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile IT
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceAgile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
49 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies Services
Identity & Access Management
Information Protection & Governance
Threat ProtectionDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
50 out of 60
Modern Workplace - Cloud Endpoint ManagementArxus
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementOur Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
51 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys Limited
Cloud Security
Identity & Access Management
Mobile Device ManagementMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
52 out of 60
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)
Cloud Security
Identity & Access Management
Information Protection & GovernanceFrom Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
53 out of 60
Zero Trust as a Service (ZTaaS)Aegis Innovators
Cloud Security
Identity & Access Management
Threat ProtectionDigital transformation and adopting AI starts with building a secure foundation.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO Digital, LLC
Cloud Security
Identity & Access Management
Threat ProtectionProve the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Intune for macOS: 8-Week ImplementationMobile Mentor
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementManage your macOS devices from Microsoft Intune with zero-touch provisioning, OS and app updates, and more.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
56 out of 60
Intune Foundation JumpstartSentinel Technologies Inc.
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementMicrosoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM).
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
57 out of 60
Onesec Digital IdentitySecure Nextgen Systems
Identity & Access Management
Threat ProtectionHaving a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
Applicable to:
Identity & Access Management
Threat Protection
58 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvoke
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
59 out of 60
Cyber Security AssessmentAegis Innovators
Cloud Security
Identity & Access Management
Threat ProtectionUnderstand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60