筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Microsoft 365 Security WorkshopCollective InsightsEquip your organization with insights, strategies, and tools to fortify defenses, mitigate threats, and enhance overall security readiness across your digital estate.
+2
Applicable to:
Identity & Access Management
Threat Protection
1 out of 60
Microsoft Endpoint Manager BaselineSHI International CorpExplore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
2 out of 60
Microsoft Security: 4-Week ImplementationApex Digital SolutionsEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Microsoft 365 Mergers and Acquisitions (M&A): 4-Week ImplementationSpyglass MTG, LLCSpyglass’s Microsoft 365 Mergers and Acquisitions (M&A) Implementation is a 4-week/ $50k engagement that focuses on quickly being able to move data to its desired destination.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
4 out of 60
Introducing Microsoft Entra: 2 Hour WorkshopSlalom ConsultingLearn about how Microsoft Entra will help your business step into tomorrow with modern identity and access solutions by introducing you to modern access security across a broad range of products.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso CorporationHelping customers KickStart features in Microsoft 365 E3 Subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
6 out of 60
Modern Management: 4 week ImplementationMobile MentorModern Management is a Microsoft 365 focused managed service that reduces cost, improves security and delights employees!
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
7 out of 60
Invoke Data Risk AssessmentInvokeThis assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
8 out of 60
Microsoft Sentinel - Monitor file access and permission changes in SharePoint Implementation: 5-Days Professional ServiceIT Partner LLCImplement Microsoft Sentinel for monitoring file access and permission changes in SharePoint, ensuring prompt detection and notification of unauthorized or unwanted activities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Microsoft 365 FastTrack: 1-Day BriefingeGroup Enabling Technologies, LLCMicrosoft's FastTrack benefit provides guidance to help you to deploy Microsoft 365 Cloud Solutions at no additional cost.
+3
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device Management
10 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
11 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era TechnologyM&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
12 out of 60
Microsoft 365 Copilot Readiness Assessment & DeploymentCentric Consulting, LLCA facilitated workshop to build a Roadmap to guide your organization in implementing Copilot
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
13 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
14 out of 60
Ransomware Protection: 1 Day-WorkshopConvergeOneLearn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile ITAgile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
16 out of 60
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
17 out of 60
Windows 365 Cloud PC: 4-Wk Proof of ConceptSignal Alliance Technology HoldingDiscover how Signal Alliance Consulting helps you get started with Windows 365, the worlds first cloud PC that helps you access your data from anywhere, anytime from any device.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
18 out of 60
Copilot Readiness AssessmentAscent Global, Inc.Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Microsoft Cloud Application for 3rd Party AppsAVASOFTSecure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
20 out of 60
Mergers and Acquisitions: 1-month implementationInterlink Cloud Advisors, Inc.Mergers and acquisitions are messy. Interlink will build the foundation for a smooth infrastructure consolidation process.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
21 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk AssessmentKiZAN TechnologiesLeverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
22 out of 60
Microsoft 365 Copilot Deployment and Readiness ServicesInsightInsight can guide you on your Microsoft 365 Copilot journey with help of more than 1,500 dedicated Modern Work professionals who have been working to optimize Microsoft environments for 20 years.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
23 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLCIf you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
24 out of 60
Incident Response RetainerSentinel Technologies Inc.Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Modern Workplace Security 10-Wk ImplementationWipro LtdWipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
26 out of 60
Threat Protection: 2-Week WorkshopForsyte IT SolutionsLearn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Microsoft Yammer Tenant-to-Tenant Migration: 1-Wk Professional ServiceIT Partner LLCFacilitate a smooth transition of your Yammer network and its associated data from one Microsoft 365 tenant to another.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
28 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
atQor Microsoft 365 Security Assessment: 3-Wk AssessmentatQorGet expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
30 out of 60
Okta Migration to Azure AD: 3-Week AssessmentInvokeThe Okta Migration to Azure AD Assessment offering is designed to assess & plan your migration efforts to your existing investments in Azure AD.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
31 out of 60
Atos || Pilot program for Windows 365Atos International SASAtos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
32 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
34 out of 60
Endpoint Ecosystem Technical Support: 12-month Support ImplementationMobile MentorProvide support and advice to IT administrators on Microsoft Endpoint Manager
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
35 out of 60
Microsoft Intune Jumpstart for Endpoints - Mobile & Workstations: 2-Wk ImplementationProServeITEnable organization-wide management & security for your mobile devices & workstations with a Microsoft Intune jumpstart pilot.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
36 out of 60
Modern Endpoint Management Airlift: 2 Week POCSynergy Technical, LLCOur Modern EndPoint Management Airfift will provide a deep dive into Microsoft's endpoint security solutions, as well as a proof of concept tailored to your specific concerns.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
37 out of 60
Microsoft 365 License Optimization:1-hr AssessmentFrontier Technology, LLCReview current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
38 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLCGet a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Modern Workplace Strategy: 12-Day AssessmentPerficient IncTogether we assess your current environment and business goals, to provide best practices and recommendations that maximize your investment in Microsoft 365.
+2
Applicable to:
Identity & Access Management
Workplace Analytics
40 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM Systems• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
42 out of 60
Microsoft Sentinel Workshop and PilotCDWThe Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Windows 11 Assessment: 1-WKSteeves Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
44 out of 60
cyber security threat analysis workshopU-BTech Solutionsthe workshop is design to discover threats and risks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix GlobalA 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
46 out of 60
Microsoft 365 Defender: 2-Wk AssessmentAlithya Fullscope Solutions, Inc.Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Wc-PC- Wragby Cloud PCWragby Business Solutions & Technologies LimitedThe Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
48 out of 60
Microsoft Intune: 4-Wk Implementation ServicesTechNet UC LLCBaseline Microsoft Intune Design and Deployment Services - Comprehensive
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
49 out of 60
SmartStart for IntuneMobile MentorThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
50 out of 60
Intune Foundation JumpstartSentinel Technologies Inc.Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM).
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
51 out of 60
Microsoft Purview Records Management Assessment & Strategy - 9 Week AssessmentProtivitiProtiviti assists organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
52 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.Our security services provide a holistic approach through advisory,implementation & managed services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
R3 Unified Device Management SuiteR3 LLCThe R3 Unified Device Management Suite revolutionizes how businesses manage their digital ecosystem. Devices-Apps-Conditional Access-Compliance-Productivity
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
54 out of 60
Data Governance & Migration Energize: 3-wk assessInterlink Cloud Advisors, Inc.Protecting your data & organization requires strong governance, increased visibility, & a holistic understanding
of your data. Know where your data is stored, how it is classified, managed, & tracked
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
55 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Windows 365 Standardized PilotMobile MentorThe Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
57 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk AssessmentErgoServicesErgo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
58 out of 60
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLCRavenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
59 out of 60
Windows 365 PilotCDWWith the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60