筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Managed IT for Financial Services- Microsoft 365FIS Managed IT SolutionsEnhance your organization's collaboration, productivity, and security with Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
1 out of 60
C1st End-user Device Security Zero TrustC1st Technologies LLCC1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Microsoft Endpoint Manager: 8-Hours WorkshopOnex GroupLearn how to secure Windows 11 environments with Microsoft Endpoint Manager
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
3 out of 60
Threat Landscape AssessmentProServeITGet critical cybersecurity insights with a global visualization of login attempts, dark web scan, & expert recommendations. We help secure your Microsoft 365 environment to protect your business.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 60
Modern Workplace Strategy: 12-Day AssessmentPerficient IncTogether we assess your current environment and business goals, to provide best practices and recommendations that maximize your investment in Microsoft 365.
+2
Applicable to:
Identity & Access Management
Workplace Analytics
5 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
ADFS to Microsoft Entra ID Migration: 4-Wk ImplementationPerformantaUndertake a seamless ADFS to Microsoft Entra ID app migration, improving security, offering up new features, and getting your organisation back on track.
+1
Applicable to:
Identity & Access Management
7 out of 60
Microsoft Copilot for Security: 6-Wk EnablementCyclotron Inc.Copilot for Security empowers security teams investigations and operations, harnessing real-time data across digital security estates to improve response time, intelligence, and investigation quality.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso CorporationHelping customers KickStart features in Microsoft 365 E3 Subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
10 out of 60
Identity Governance Proof Of Concept with Microsoft Entra ID Governance in 4 WeeksArmis, Sistemas de Informação, LdaLeverage Microsoft Entra ID Governance to ensure seamless and secure access to Microsoft 365 resources
+1
Applicable to:
Identity & Access Management
11 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
12 out of 60
Defend Against Threats with SIEM Plus XDRNetrix GlobalAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Microsoft 365 Tenant to Tenant Migration: 6 Week ImplementationAll Covered, a division of Konica MinoltaLet All Covered help you assess, plan and skillfully implement your Microsoft 365 Tenant to Tenant migration.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
14 out of 60
Data Security and Governance Assessment and RoadmapCentric Consulting, LLCProvide customers with a clear path forward in addressing data security needs
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
15 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
16 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
17 out of 60
Copilot for Microsoft 365: 4 weeks Proof of ConceptReliance Infosystems Inc.We are thrilled to present our Copilot Seed Investment Offer, crafted to help organizations validate and achieve their AI objectives using Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
18 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLCAdvanced endpoint security and threat protection: detect, investigate, and respond to attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Nonprofit Security Maturity Assessment - 4 weeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Copilot Readiness AssessmentAscent Global, Inc.Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFTIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
23 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
24 out of 60
Threat Protection EngagementTierPointLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLCOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Autopilot: 2-Wk Proof of ConceptFSI StrategiesFSi Strategies will review the deployment scenarios with the client and execute a proof of concept up to 25 devices in order to demonstrate the capabilities of Windows Autopilot
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
27 out of 60
Microsoft 365 Copilot & Sales Readiness AssessmentJourneyTEAMAccelerate your sales team's performance with JourneyTEAM's Copilot & Sales Readiness Assessment
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
28 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.A high-level forensics evaluation designed to identify current and past threat activity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Identity Foundation Implementation Services with Microsoft Entra in 70 DaysArmis, Sistemas de Informação, LdaLeverage the full suite of Microsoft 365 products - Secure internal and external Identities with Microsoft Entra
+1
Applicable to:
Identity & Access Management
30 out of 60
Implementation of Microsoft Defender for Cloud AppsCDWCDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.Our security services provide a holistic approach through advisory,implementation & managed services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Atos || Pilot program for Windows 365Atos International SASAtos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
33 out of 60
Passwordless Authentication: 2 Week ImplementationCDI LLCImplement passwordless authentication solutions for up to twenty pilot users
+1
Applicable to:
Identity & Access Management
34 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFTBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
IBM Digital Workforce OfferingIBM Consulting - EAIBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Power Platform for Teams
37 out of 60
Microsoft Cybersecurity AssessmentAkins ITDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data SystemsAssess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Intune for Android: 4-Week ImplementationMobile MentorAndroid devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
40 out of 60
Collab Now: 4-Wk ImplementationLong View SystemsCollab Now (Microsoft 365) supports worker productivity by delivering and managing a unified and integrated collaboration platform
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
41 out of 60
Microsoft Copilot Readiness Discovery: 3-Wk AssessmentProServeITA Microsoft Copilot Readiness Assessment will identify your AI foundational requirements & permission settings to prepare your organization for leading edge efficiency.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
42 out of 60
Microsoft 365 Copilot and AI AssessmentRedapt, Inc. Elevate Your Business with Microsoft 365 Copilot Assessment
+1
Applicable to:
Identity & Access Management
43 out of 60
Copilot Readiness Assessment for Microsoft 365Mint Management TechnologiesMint Group is thrilled to bring you a consulting service designed to supercharge your Microsoft 365 experience and get you Microsoft 365 Copilot ready.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
44 out of 60
Microsoft 365 Copilot Everyday AI Adoption: 2wksInsightInsight’s Everyday AI Adoption for Microsoft 365 Copilot Program is designed to help organizations bring this technology to users in a way that promotes responsible adoption and drives productivity.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
45 out of 60
Mergers and Acquisitions: 1-month implementationInterlink Cloud Advisors, Inc.Mergers and acquisitions are messy. Interlink will build the foundation for a smooth infrastructure consolidation process.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
46 out of 60
Eviden Compliance Assessment (CSAT) zur Einhaltung der europäischen NIS-2-RichtlinieEviden International France - SASUnternehmen stehen vor der Herausforderung, die europäische NIS2-Richtlinie bis zur nationalen Umsetzungsfrist im Oktober 2024 umzusetzen.
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
47 out of 60
Deployment of Copilot for Microsoft 365Windows Management Experts, Inc.Enhance the productivity of Microsoft 365 with our premium Deployment service for Copilot for Microsoft 365.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
48 out of 60
Microsoft Cloud App Security (MCAS) Solutions for Native Apps by AVASOFTAVASOFTEnhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
49 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight HoldingsStrengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
4migrate: ISP to Microsoft 3654Sight HoldingsSeamless Microsoft 365 migration with expert guidance, minimal disruption, and full support.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Meetings for Microsoft Teams
51 out of 60
User Home Folder Migration to One Drive for Business: 7-Days Professional ServiceIT Partner LLCWe will migrate files and documents stored in a user drive or folder on a file server(s) to user’s folder on OneDrive for Business.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
52 out of 60
SmartStart for IntuneMobile MentorThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
53 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies ServicesDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
54 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLCIf you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
55 out of 60
Microsoft 365 Security Review: 3-Wk AssessmentProArch Technologies, Inc.Identifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
56 out of 60
On-Prem Exchange to Office 365 Migration: 4-Wk MigrationExodus Integrity Services, Inc.Simplify your email migration process to Office 365 with ease and efficiency.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
57 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed CanaryGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Microsoft 365 Copilot Readiness Assessment & DeploymentCentric Consulting, LLCA facilitated workshop to build a Roadmap to guide your organization in implementing Copilot
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
59 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLCBreach and Attack Simulations — We Attack to Defend You
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
60 out of 60