筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 561 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Microsoft 365 Copilot & Sales Readiness AssessmentJourneyTEAMAccelerate your sales team's performance with JourneyTEAM's Copilot & Sales Readiness Assessment
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
1 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
JourneyTEAM Security Solutions for Higher EducationJourneyTEAMUnlock the future of secure access in Higher Education environments using Microsoft 365.
+1
Applicable to:
Identity & Access Management
3 out of 60
Modern Work Services Proof of ConceptCrayon USCrayon Modern Work Services PoC will help you pilot a subset of users with the best of Microsoft 365 prior to implementation. This will allow us to ensure a smooth transition for all users.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Meetings for Microsoft Teams
4 out of 60
Windows 365 Cloud PC: 4-Wk Proof of ConceptSignal Alliance Technology HoldingDiscover how Signal Alliance Consulting helps you get started with Windows 365, the worlds first cloud PC that helps you access your data from anywhere, anytime from any device.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
5 out of 60
UNITE: Exploring E5 Security Workshop_INFINITY TECHNOLOGY SOLUTIONSUNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 60
Windows 365 Cloud PC 10-Days PoCSonata Information Technology LimitedPaid Assessment and PoC to deploy and use Windows 365 Cloud PC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
7 out of 60
Microsoft 365 Copilot: 2-Wk Readiness AssessmentInvokeInvoke's Microsoft 365 Copilot Readiness Assessment is a service that helps customers prepare for using Copilot 365, a solution that leverages data to enhance creativity, productivity, and skills.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
8 out of 60
Autopilot: 1-Wk AssessmentFSI StrategiesFSi Strategies will review the deployment scenarios with the client and deliver a Discovery and Assessment document on Windows Autopilot, and the level of effort to deploy in the environment.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
9 out of 60
Intune Foundation JumpstartSentinel Technologies Inc.Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM).
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
10 out of 60
Cyber Security AssessmentAegis InnovatorsUnderstand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCShadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
12 out of 60
Modern Management for EndpointsIvision, Inc.Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
13 out of 60
ThreatHunter MXDR: 3-Wk ImplemenationeGroup Enabling TechnologieseGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
14 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
15 out of 60
Atos || Pilot program for Windows 365Atos International SASAtos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
16 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
17 out of 60
Microsoft 365 Copilot Deployment and Readiness ServicesInsightInsight can guide you on your Microsoft 365 Copilot journey with help of more than 1,500 dedicated Modern Work professionals who have been working to optimize Microsoft environments for 20 years.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
18 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk AssessmentErgoServicesErgo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
19 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFTBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
20 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFTIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
21 out of 60
Co-pilot Technical ReadinessPHOENIX SOFTWARE LTDHelp your organisation ensure that they are technically ready for Co-pilot
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
22 out of 60
IGA Roadmap - 4 Weeks AssessmentArmis, Sistemas de Informação, LdaDevelop an outcome-based, design-led IGA strategy to secure access to your resources with Microsoft identity governance solutions
+1
Applicable to:
Identity & Access Management
23 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
25 out of 60
Start your GenAI journey with NTT DATA: Boost Copilot for Microsoft 365 adoption with our Adoption AcceleratorNTT DATA Inc.Discover the Power of NTT DATA's Copilot for Microsoft 365 Implementation and Adoption Services, Engineered to Unlock the Full Potential of Generative AI Technology for Your Business
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
26 out of 60
Apply Information Rights Management protection to email: 5-Day Professional ServiceIT Partner LLCEnsure that only authorized individuals can access and use the information. This can be especially useful for sensitive or confidential information that needs to be protected from unauthorized access
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
27 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week ImplementationQuisitiveQuisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
29 out of 60
Security Baseline Integrity ManagerAegis InnovatorsSingle pane of glass for unified configuration, governance, and lifecycle management of security workloads across Microsoft 365.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
30 out of 60
Enhance IT Security: 1-2-Wk ImplementationFMT ConsultantsFMT offers a smart security solution that protects your business, your employees, and your clients while providing a reliable, scalable, and durable approach to keeping your business up and running.
+2
Applicable to:
Cloud Security
Identity & Access Management
31 out of 60
Modern Endpoint Management: 2-Hr AssessmentAscent Global, Inc.There’s a reason Microsoft chose us as their Modern Endpoint Management Partner of the Year for 2023. We believe you can reduce your threat risk by modernizing your Endpoint Management Strategy.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
32 out of 60
Microsoft Windows Autopilot Services: 5-Day Proof of ConcepteGroup Enabling TechnologiesReduce IT complexity and eliminate time-consuming corporate re-imaging by shipping and deploying straight to users with Microsoft Windows Autopilot.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
33 out of 60
Microsoft Copilot Readiness Discovery: 3-Wk AssessmentProServeITA Microsoft Copilot Readiness Assessment will identify your AI foundational requirements & permission settings to prepare your organization for leading edge efficiency.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
34 out of 60
1-Day Security & Identity WorkshopConvergeOneTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Zero Trust as a Service (ZTaaS)Aegis InnovatorsDigital transformation and adopting AI starts with building a secure foundation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Advanced Identity and Access Management with KiZANKiZAN TechnologiesSafeguard your organization from devastating breaches with Microsoft 365 identity solutions.
+1
Applicable to:
Identity & Access Management
37 out of 60
Secure Identities and Access Management AssessmentInvokeTo provide enterprise customers with a detailed identity assessment report, a high-level migration plan, and demonstrations of Microsoft Entra Azure AD and Microsoft Entra Identity Governance features
+1
Applicable to:
Identity & Access Management
38 out of 60
Microsoft 365 Azure AD 3-wk Implementation RoadmapCyclotron Inc.Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
39 out of 60
Intune for macOS: 8-Week ImplementationMobile MentorManage your macOS devices from Microsoft Intune with zero-touch provisioning, OS and app updates, and more.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
40 out of 60
Offer Name: Microsoft 365 CrashCourse - 1 week WorkshopVirteva LLCEmpower organizations to gain a deeper understanding of Microsoft 365 and its vast array of services, features, and capabilities through Virteva's Microsoft 365 CrashCourse Workshop.
+3
Applicable to:
Identity & Access Management
Knowledge & Insights
Mobile Device Management
41 out of 60
Deployment of Copilot for Microsoft 365Windows Management Experts, Inc.Enhance the productivity of Microsoft 365 with our premium Deployment service for Copilot for Microsoft 365.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
42 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Microsoft 365 Information Protection 1-day WorkshopGrant Thornton LLPReview your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
44 out of 60
Cybersecurity Assessment Engagement - 4 weeksGrant Thornton LLPEnhance Your Cloud Security Posture with Grant Thornton’s Cybersecurity Assessment
+2
Applicable to:
Cloud Security
Identity & Access Management
45 out of 60
Threat Protection Engagement - 4 weeksGrant Thornton LLPImprove your Security Posture with Grant Thornton's Threat Protection Engagement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Cutover Exchange Online Migration from a Third-Party Hosted Exchange Server: 7-Days Professional ServiceIT Partner LLCA flexible and quick way to migrate all emails, contacts, tasks, and other data from a third-party hosted and managed Exchange Server to Microsoft 365 Exchange Online.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
47 out of 60
Microsoft 365 FastTrack: 1-Day BriefingeGroup Enabling Technologies, LLCMicrosoft's FastTrack benefit provides guidance to help you to deploy Microsoft 365 Cloud Solutions at no additional cost.
+3
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device Management
48 out of 60
Microsoft Cloud App Security (MCAS) for Custom Apps by AVASOFTAVASOFTKnow your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
49 out of 60
Data Protection and Governance with Microsoft PurviewAVASOFTConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
50 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage WorkshopCGI Inc.A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLCLeverage your Microsoft investment to create a strong Zero Trust security environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
53 out of 60
Lightstream Data Security AssessmentLightstreamLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
54 out of 60
Modern Endpoint Management Airlift: 2 Week POCSynergy Technical, LLCOur Modern EndPoint Management Airfift will provide a deep dive into Microsoft's endpoint security solutions, as well as a proof of concept tailored to your specific concerns.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
55 out of 60
Copilot For Microsoft 365 - ImplementationITQAN GLOBAL FOR CLOUD AND DIGITAL COMPUTING SYSTEMS L.L.C.Guided Setup and Customization of Copilot and Copilot Studio for Microsoft 365- Training, Data Selection, Workflow Design Development
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Teamwork Deployment
56 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
User Home Folder Migration to One Drive for Business: 7-Days Professional ServiceIT Partner LLCWe will migrate files and documents stored in a user drive or folder on a file server(s) to user’s folder on OneDrive for Business.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
58 out of 60
Microsoft 365 Security WorkshopCollective InsightsEquip your organization with insights, strategies, and tools to fortify defenses, mitigate threats, and enhance overall security readiness across your digital estate.
+2
Applicable to:
Identity & Access Management
Threat Protection
59 out of 60
Identity and Access Management Quick StartSoftchoicePrioritizing security services to combat identity breaches by prioritizing security services, and protecting against mismanaged privileges, and access-related data breaches.
+1
Applicable to:
Identity & Access Management
60 out of 60