筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 560 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstream
Cloud Security
Identity & Access Management
Threat ProtectionLightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionTrustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Microsoft Intune Jumpstart for Endpoints - Mobile & Workstations: 2-Wk ImplementationProServeIT
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementEnable organization-wide management & security for your mobile devices & workstations with a Microsoft Intune jumpstart pilot.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
3 out of 60
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso Corporation
Cloud Security
Identity & Access Management
Workplace AnalyticsHelping customers KickStart features in Microsoft 365 E3 Subscription
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
4 out of 60
Implementation of Microsoft Entra ID GovernanceSpyglass MTG, LLC
Identity & Access Management
Information Protection & Governance
Threat ProtectionFor any business interested in securing internal and external Identities with Entra ID
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and PlanningAgile IT
Cloud Security
Identity & Access Management
Mobile Device ManagementShorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
6 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
Cloud Security
Identity & Access ManagementPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
Applicable to:
Cloud Security
Identity & Access Management
7 out of 60
Enhanced Data Privacy with Microsoft PurviewAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 60
Microsoft 365 Copilot Readiness: 2 week AssessmentTOKIOTA
Adoption & Change Management
Compliance Advisory Services
Identity & Access ManagementWe help our clients to integrate Microsoft 365 Copilot in their organization in the most secure and efficent way
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
9 out of 60
Managed IT for Financial Services- Microsoft 365FIS Managed IT Solutions
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceEnhance your organization's collaboration, productivity, and security with Microsoft 365.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
10 out of 60
Varonis JumpstartSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionSentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Start your GenAI journey with NTT DATA: Boost Copilot for Microsoft 365 adoption with our Adoption AcceleratorNTT DATA Inc.
Adoption & Change Management
Identity & Access Management
Mobile Device ManagementDiscover the Power of NTT DATA's Copilot for Microsoft 365 Implementation and Adoption Services, Engineered to Unlock the Full Potential of Generative AI Technology for Your Business
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
12 out of 60
Microsoft 365 FastTrack: 1-Day BriefingeGroup Enabling Technologies, LLC
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device ManagementMicrosoft's FastTrack benefit provides guidance to help you to deploy Microsoft 365 Cloud Solutions at no additional cost.
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device Management
13 out of 60
Capgemini Modern Workspace PortfolioCapgemini Group
Adoption & Change Management
Device Deployment & Management
Identity & Access ManagementCapgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
14 out of 60
Atos || Pilot program for Windows 365Atos International SAS
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementAtos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
15 out of 60
Your Smart Workplace AssessmentRackspace Technology
Cloud Security
Identity & Access Management
Information Protection & GovernanceYour Smart Workplace Assessment helps organizations develop secure, cost-effective, and productivity-enhancing strategies for modern work environments.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
16 out of 60
Implementation on Microsoft IntuneITX360 (Pvt) Ltd.
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementEnhance security and efficiency with Microsoft Intune Implementation. Manage and secure devices across Windows, Android, iOS, and macOS with a seamless cloud-based solution.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
17 out of 60
Modern Device Management ImplementationDXC
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementImprove the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
18 out of 60
Intune for macOS: 8-Week ImplementationMobile Mentor
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementManage your macOS devices from Microsoft Intune with zero-touch provisioning, OS and app updates, and more.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
19 out of 60
Microsoft 365 Cyber Insurance Review: 2-5 Wk AssessmentKiZAN Technologies
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceMap your business cyber insurance carrier requirements to Microsoft 365 environment controls ranked by priority and impact to your security posture.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
20 out of 60
Zero Trust as a Service (ZTaaS)Aegis Innovators
Cloud Security
Identity & Access Management
Threat ProtectionDigital transformation and adopting AI starts with building a secure foundation.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Modern Workplace Strategy: 12-Day AssessmentPerficient Inc
Identity & Access Management
Workplace AnalyticsTogether we assess your current environment and business goals, to provide best practices and recommendations that maximize your investment in Microsoft 365.
Applicable to:
Identity & Access Management
Workplace Analytics
22 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage WorkshopCGI Inc.
Cloud Security
Identity & Access Management
Threat ProtectionA 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Microsoft Intune QuickstartEmergent Software
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementDeploy Microsoft Intune via Microsoft 365 with Emergent's Quickstart for enhanced device management and security compliance.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
24 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.
Cloud Security
Identity & Access Management
Threat ProtectionWith the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Microsoft 365 Security AssessmentSii Sp. z o.o.
Cloud Security
Identity & Access Management
Threat ProtectionWe assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Copilot for Microsoft 365: 4 weeks Proof of ConceptReliance Infosystems Inc.
Adoption & Change Management
Compliance Advisory Services
Identity & Access ManagementWe are thrilled to present our Copilot Seed Investment Offer, crafted to help organizations validate and achieve their AI objectives using Microsoft 365.
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
27 out of 60
Onesec Digital IdentitySecure Nextgen Systems
Identity & Access Management
Threat ProtectionHaving a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
Applicable to:
Identity & Access Management
Threat Protection
28 out of 60
Microsoft Cloud Application for 3rd Party AppsAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionSecure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
29 out of 60
ITI Copilot Assessment: 4-5 Wk AssessmentITI Inc.
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceAre you fully ready for Microsoft's Copilot? Our assessment will assure you are ready for Copilot and highlight areas where action will be needed prior to doing so.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
30 out of 60
Implementation of Microsoft Copilot and AgentsStoneridge Software LLC
Adoption & Change Management
Identity & Access Management
Knowledge & InsightsA structured enablement journey that helps organizations strategically align, technically prepare, and culturally adopt Microsoft Copilot
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
31 out of 60
Windows 11 Assessment: 1-WKSteeves
Adoption & Change Management
Cloud Security
Identity & Access ManagementPrepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
32 out of 60
Threat Protection Assessment & Zero Trust ArchitectureBDO Digital, LLC
Device Deployment & Management
Identity & Access Management
Threat ProtectionSet Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Architecture and Threat Protection Assessment
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
33 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
Cloud Security
Identity & Access Management
Threat ProtectionInspect events in your network to locate threat indicators and entities
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
CSE CMMC L1 & L2 Assessment & ImplementationComputer Solutions East
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceAchieve CMMC 1 & 2 Compliance, Secure Your Cloud with Microsoft 365 & Expert Guidance.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
35 out of 60
Modern Workplace Security 10-Wk ImplementationWipro Ltd
Identity & Access Management
Information Protection & Governance
Threat ProtectionWipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
Windows as a Service: 4-Wk ImplementationAMTRA Solutions Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionSecure your data and devices, identities and your business with Windows 10/11.
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
37 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLC
Cloud Security
Identity & Access Management
Threat ProtectionRoadmap to increase your security score with cost-effective security tools
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Accelerate Windows 365: 1-mo Proof of ConceptAMTRA Solutions Ltd
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementAccelerate Windows 365 offers innovative management capabilities for your environment and optimizes your existing investment in cloud solutions.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
39 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformanta
Cloud Security
Identity & Access Management
Threat ProtectionThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Copilot for Microsoft 365 technical readiness assessment 6-WkSPAN d.d.
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceSpan Copilot Readiness Assessment offers technical insights into your tenant and Microsoft 365 services to leverage the capabilities of AI with Copilot for Microsoft 365.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
41 out of 60
End-to-end Threat Protection Workshop and PilotExelegent
Cloud Security
Identity & Access Management
Threat ProtectionThe Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionAdvanced endpoint security and threat protection: detect, investigate, and respond to attacks.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Security Copilot Value AcceleratorAvanade, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionDesigned to help organizations modernize their security operations and administration by leveraging Gen AI.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
44 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era Technology
Adoption & Change Management
Identity & Access Management
Teamwork DeploymentM&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
45 out of 60
Okta to Entra Migration: Roadmap ArchitectAscent Global, Inc.
Identity & Access ManagementRoadmap and architect the shift from Okta to Microsoft Entra’s enhanced data security
Applicable to:
Identity & Access Management
46 out of 60
Endpoint Modernization Quickstart ServiceDell Technologies Services
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementDell Quick Start service helps customers configure their environment and prepare it for Modern Device Management and Modern Provisioning.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
47 out of 60
Microsoft Defender Secure Score, Security Licensing and Security Skill OptimizationBlue Cycle LLC
Identity & Access Management
Information Protection & Governance
Threat ProtectionService to optimize organizational security posture and increase your Microsoft Defender Secure Score.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
48 out of 60
Fortis IR Table Top ExercisesSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionExercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Microsoft 365 E5 CMMC L1 3 Week ImplementationKAMIND IT, Inc
Cloud Security
Identity & Access Management
Threat ProtectionKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 1 using Microsoft 365 security Suite and Azure Sentinel SIEM.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Avanade Hybrid Windows Endpoint Solutions FY24Avanade, Inc.
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementAvanade has developed the next generation of endpoint solutions for the modern workforce, with integrated physical, virtual and hybrid solutions
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
51 out of 60
Threat Protection: 2-Week WorkshopForsyte IT Solutions
Cloud Security
Identity & Access Management
Threat ProtectionLearn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoice
Cloud Security
Identity & Access Management
Threat ProtectionThe Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
Cloud Security
Identity & Access Management
Threat ProtectionThis engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Microsoft Intune: 4-Wk ImplementationeGroup Enabling Technologies
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementEnable users to be productive on any device, without compromising security.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
55 out of 60
Windows 365 Cloud PC: 4-Wk Proof of ConceptSignal Alliance Technology Holding
Adoption & Change Management
Device Deployment & Management
Identity & Access ManagementDiscover how Signal Alliance Consulting helps you get started with Windows 365, the worlds first cloud PC that helps you access your data from anywhere, anytime from any device.
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
56 out of 60
UNITE: Exploring E5 Security Workshop_INFINITY TECHNOLOGY SOLUTIONS
Identity & Access Management
Information Protection & Governance
Threat ProtectionUNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
57 out of 60
Identity as a Service | Assure 365CyberOne
Cloud Security
Identity & Access Management
Information Protection & GovernanceFully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
58 out of 60
eDiscovery Workshop: 4 hours WorkshopPlanet Technologies
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceA half-day Workshop that provides an overview and deep understanding of Microsoft 365 eDiscovery Standard and Premium products.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
59 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementShadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
60 out of 60