筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Microsoft 365 Tenant to Tenant Migration: 6 Week ImplementationAll Covered, a division of Konica MinoltaLet All Covered help you assess, plan and skillfully implement your Microsoft 365 Tenant to Tenant migration.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
1 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu TarsasagInspect events in your network to locate threat indicators and entities
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
3 out of 60
Windows as a Service: 4-Wk ImplementationAMTRA Solutions LtdSecure your data and devices, identities and your business with Windows 10/11.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
4 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
5 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Defender Pak365: Microsoft Defender ImplementationRavanty Tech Consulting, Inc.Empower your organization with comprehensive, AI-driven protection tailored to meet evolving security needs with the help of Microsoft Defender.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
7 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoiceThe Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Enhanced Data Privacy with Microsoft PurviewAVASOFTConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
9 out of 60
Windows Virtual Desktop Implementation: 5-Days Professional ServiceIT Partner LLCProvide a streamlined solution using Windows Virtual Desktop (WVD) on Microsoft Azure, offering efficient remote workstations, cost-effective licensing, and Windows 365 in a terminal server format.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
10 out of 60
UNITE: Exploring E5 Security Workshop_INFINITY TECHNOLOGY SOLUTIONSUNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
11 out of 60
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstreamLightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Offer Name: Microsoft 365 CrashCourse - 1 week WorkshopVirteva LLCEmpower organizations to gain a deeper understanding of Microsoft 365 and its vast array of services, features, and capabilities through Virteva's Microsoft 365 CrashCourse Workshop.
+3
Applicable to:
Identity & Access Management
Knowledge & Insights
Mobile Device Management
13 out of 60
Deployment of Copilot for Microsoft 365Windows Management Experts, Inc.Enhance the productivity of Microsoft 365 with our premium Deployment service for Copilot for Microsoft 365.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
14 out of 60
Autopilot: 1-Wk AssessmentFSI StrategiesFSi Strategies will review the deployment scenarios with the client and deliver a Discovery and Assessment document on Windows Autopilot, and the level of effort to deploy in the environment.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
15 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Modern Endpoint Management: 2-Hr AssessmentAscent Global, Inc.There’s a reason Microsoft chose us as their Modern Endpoint Management Partner of the Year for 2023. We believe you can reduce your threat risk by modernizing your Endpoint Management Strategy.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
17 out of 60
FortisX™ Next Generation Cyber Detection & ResponseSentinel Technologies Inc.Today's security landscape is complex, dynamic, and constantly evolving. FortisX™, powered by Cisco XDR, is a security solution that delivers best-in-class cyber protection: the top extended detention
+1
Applicable to:
Identity & Access Management
18 out of 60
Microsoft Copilot Readiness Discovery: 3-Wk AssessmentProServeITA Microsoft Copilot Readiness Assessment will identify your AI foundational requirements & permission settings to prepare your organization for leading edge efficiency.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
19 out of 60
Microsoft Defender Secure Score, Security Licensing and Security Skill OptimizationBlue Cycle LLCService to optimize organizational security posture and increase your Microsoft Defender Secure Score.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
20 out of 60
Microsoft Entra - Global Secure Access | Pilot DeploymentITC Secure LtdMicrosoft Entra Global Secure Access pilot deployment for improved security posture, streamlined access management & regulatory compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
21 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week ProgramWindows Management Experts, Inc.Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
22 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Microsoft Intune Jumpstart for Endpoints - Mobile & Workstations: 2-Wk ImplementationProServeITEnable organization-wide management & security for your mobile devices & workstations with a Microsoft Intune jumpstart pilot.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
24 out of 60
Microsoft 365 Copilot: 2-Wk Readiness AssessmentInvokeInvoke's Microsoft 365 Copilot Readiness Assessment is a service that helps customers prepare for using Copilot 365, a solution that leverages data to enhance creativity, productivity, and skills.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
25 out of 60
Threat Landscape AssessmentProServeITGet critical cybersecurity insights with a global visualization of login attempts, dark web scan, & expert recommendations. We help secure your Microsoft 365 environment to protect your business.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
26 out of 60
Microsoft 365 Email Threat Protection AssessmentAVASOFTMicrosoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
27 out of 60
Empowering Digital Transformation with AI Microsoft Copilot SolutionsSonata Software Ltd.Our tailored Microsoft Copilot solutions blend human expertise with intelligent automation, delivering efficiency, productivity, and personalization across industries.
+3
Applicable to:
Frontline Workers
Identity & Access Management
Meetings for Microsoft Teams
28 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data SystemsAssess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLCLeverage your Microsoft investment to create a strong Zero Trust security environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
30 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed CanaryGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Microsoft 365 Copilot Success FrameworkInsightInsight’s Microsoft 365 Copilot Success Framework service is designed to enable your organization to securely drive ROI and take advantage of all that Microsoft 365 Copilot has to offer.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
32 out of 60
Data Security and Governance Assessment and RoadmapCentric Consulting, LLCProvide customers with a clear path forward in addressing data security needs
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
33 out of 60
Identity as a Service | Assure 365CyberOneFully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
34 out of 60
Cyber Security AssessmentAegis InnovatorsUnderstand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
eDiscovery Workshop: 4 hours WorkshopPlanet TechnologiesA half-day Workshop that provides an overview and deep understanding of Microsoft 365 eDiscovery Standard and Premium products.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
36 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCShadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
37 out of 60
Modern Management for EndpointsIvision, Inc.Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
38 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
39 out of 60
With Windows 365 Access data from anywhereSentinel Technologies Inc.With Windows 365, you can access a desktop computer from anywhere. It is available in Business and Enterprise SKUs and integrates easily with your current Microsoft 365 licensing.
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
40 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional ServiceIT Partner LLCStrengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
41 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwovenNetwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
42 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage WorkshopCGI Inc.A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Microsoft Defender for Endpoint - Vulnerability Assessment by AVASOFTAVASOFTEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
44 out of 60
Eviden Compliance Assessment (CSAT) zur Einhaltung der europäischen NIS-2-RichtlinieEviden International France - SASUnternehmen stehen vor der Herausforderung, die europäische NIS2-Richtlinie bis zur nationalen Umsetzungsfrist im Oktober 2024 umzusetzen.
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
45 out of 60
CS Data Security 360°: 2-Wk AssessmentCampana & Schott GmbHUtilize Microsoft Purview suite and Copilot for Security to safeguard your content and information.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
46 out of 60
Identity and Access Management SolutionH One (Private) LimitedEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
47 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITEDConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
48 out of 60
Security Foundations Data: Assessment and ImplementationProServeITData security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
+2
Applicable to:
Identity & Access Management
Threat Protection
49 out of 60
Security Foundations Email: Assessment and ImplementationProServeITProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Security Foundations IdentityProServeITFortify your online identity and access controls. Evaluate your risks and deploy modern security controls to mitigate against the most common identity-based vulnerabilities and attacks.
+2
Applicable to:
Identity & Access Management
Threat Protection
51 out of 60
Microsoft 365 Protecting Corporate Identities: 5-Wk ImplementationKiZAN TechnologiesSafeguard your organization from devastating breaches with Microsoft 365 identity solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Endpoint Management Solutions: 4-Wk ImplementationSignal Alliance Technology HoldingDiscover how Signal Alliance Consulting enables users in your organization to be productive, on any device, without compromising IT security by leveraging Microsoft Endpoint Management.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
53 out of 60
Teams & SharePoint Security HardeningAVASOFTTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Entra ID: 5-day AssessmentCDI LLCProtect identities in Microsoft 365 by hardening your Entra ID configuration as a result of this 5-day identity and authentication assessment
+1
Applicable to:
Identity & Access Management
55 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
R3 Unified Device Management SuiteR3 LLCThe R3 Unified Device Management Suite revolutionizes how businesses manage their digital ecosystem. Devices-Apps-Conditional Access-Compliance-Productivity
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
57 out of 60
Risk/Compliance/SecurityR3 LLCProvide Compliance as a service (CaaS) to assist our customers with obtaining certification in the frameworks they are targeting such as CMMC, ISO, NIST, CMMI, HIPAA, SOC 2
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
58 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View SystemsSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Window 365 Cloud PC: 3-Day Proof-of-ConceptCTGlobal A/SAssess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
60 out of 60