筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 639 个结果。
云安全Remove 云安全
Microsoft 365Remove Microsoft 365
Threat Protection WorkshopMobile Mentor
Adoption & Change Management
Cloud Security
Threat ProtectionDuring this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
1 out of 60
Data Security: 2-Weeks WorkshopConterra
Cloud Security
Information Protection & Governance
Insider RiskIdentify data security risks in your organizational data
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
2 out of 60
Copilot for Microsoft 365: Data Governance WorkshopReply
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceSecure and Enhance Your Microsoft 365 Experience with WM Reply's One-Day Copilot Data Governance Workshop
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
3 out of 60
Microsoft 365 Data oversharing report: 5-D Implementation and consultingReply
Cloud Security
Information Protection & Governance
Teamwork DeploymentComprehensive Insights: Get a holistic overview of your environment and uncover overshared sites, documents, and items without the need for expensive Microsoft 365 E5 licenses.
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
4 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.
Cloud Security
Identity & Access ManagementThis offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
Applicable to:
Cloud Security
Identity & Access Management
5 out of 60
Endpoint Security Advanced Quick Start 14-wk ImplementationEdgile, Inc.
Cloud Security
Device Deployment & Management
Mobile Device ManagementPilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats.
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
6 out of 60
Endpoint Security Basic Quick Start 12-wk ImplementationEdgile, Inc.
Cloud Security
Device Deployment & Management
Mobile Device ManagementAchieve a Microsoft pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
7 out of 60
Cyderes Microsoft Security Adoption AdvisoryCyderes
Cloud Security
Compliance Advisory Services
Threat ProtectionThe Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
8 out of 60
Infosys Intelligent Security SolutionInfosys Limited
Cloud Security
Information Protection & Governance
Threat ProtectionInfosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBA
Cloud Security
Identity & Access Management
Threat ProtectionA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Intune Security Reviewmnemonic
Cloud Security
Mobile Device ManagementEnhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
Applicable to:
Cloud Security
Mobile Device Management
11 out of 60
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)
Cloud Security
Identity & Access Management
Information Protection & GovernanceFrom Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
12 out of 60
Security Foundations Email: Assessment and ImplementationProServeIT
Cloud Security
Identity & Access Management
Threat ProtectionProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Microsoft 365 Security Assessment - 4wk AssessmentProtiviti
Cloud SecurityEffective Analysis of CIS & NIST Benchmarking, Active Directory to Azure and Microsoft 365 Configurations
Applicable to:
Cloud Security
14 out of 60
Microsoft Cybersecurity AssessmentAkins IT
Cloud Security
Identity & Access Management
Threat ProtectionDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Modern Workplace Optimization - 4 Week AssessmentProtiviti
Cloud Security
Information Protection & Governance
Threat ProtectionThis assessment for Microsoft 365 helps customers obtain insights to what it takes to improve productivity against Cyber Threats for Workforce Productivity.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
16 out of 60
Workshop for Microsoft 365 Threat ProtectionCDW
Cloud Security
Identity & Access Management
Threat ProtectionThe Workshop for Microsoft 365 Threat Protection provides the following objectives to ensure thorough enablement of crucial Microsoft products for a more secure environment.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Microsoft 365 Tenant Security AssessmentDaymark Solutions
Cloud Security
Compliance Advisory Services
Threat ProtectionStrengthen the Security of Your Microsoft 365 Environment.
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
18 out of 60
Cybersecurity Assessment: 3-Wk WorkshopExelegent
Cloud Security
Information Protection & Governance
Insider RiskThe Cybersecurity Assessment is designed to evaluate your cybersecurity posture and reduce risks exposure by using advanced Microsoft 365 Security products
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
19 out of 60
Darktrace Managed Network SensorSentinel Technologies Inc.
Cloud Security
Threat ProtectionSophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
Applicable to:
Cloud Security
Threat Protection
20 out of 60
Microsoft 365 GCC High Rapid DeploymentDaymark Solutions
Adoption & Change Management
Cloud Security
Compliance Advisory ServicesDeploy Microsoft 365 GCC High services in days, not weeks, while leveraging Daymark’s enhanced security baseline.
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
21 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP Technologies
Cloud Security
Identity & Access Management
Threat ProtectionThe SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY25CGI Inc.
Cloud Security
Device Deployment & Management
Identity & Access ManagementUtilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
23 out of 60
Copilot for Micosoft 365 Readiness: 2-Day WorkshopCTGlobal A/S
Adoption & Change Management
Cloud Security
Information Protection & GovernancePlan adoption of Copilot for Microsoft 365 through explicit scenarios, use cases and data governance. Develop strategies for seamless onboarding and future integrations. In a safe and secure workshop.
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
24 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5Collective Insights
Cloud Security
Device Deployment & Management
Threat ProtectionUpgrade to Microsoft 365 E5 for Advanced Productivity and Security
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
25 out of 60
Microsoft 365 / Office 365 / Azure / Dynamics 365 Knowledge Transfer: 3-Hours Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Knowledge & InsightsUnlock the true potential of your Microsoft 365 environment with our specialized "Knowledge Transfer" consulting service – a roadmap to maximize your organization's capabilities.
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
26 out of 60
License Advisory ServicesSynergy Technical, LLC
Cloud Security
Teamwork Deployment
Threat ProtectionWhether you’ve been approached by Microsoft for an audit or simply want to conduct a self-assessment, our License Advisory Services is a great solution for understanding your real licensing needs.
Applicable to:
Cloud Security
Teamwork Deployment
Threat Protection
27 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvoke
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
28 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-WeeksmyCloudDoor
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceAssess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
29 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.
Cloud Security
Insider Risk
Threat ProtectionNTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
30 out of 60
Microsoft 365 Implementation for Financial ServiceNew Charter Technologies, Inc.
Cloud Security
Compliance Advisory Services
Information Protection & GovernancePaid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
31 out of 60
CT - Microsoft 365 Copilot Readiness AssessmentCloud Target
Adoption & Change Management
Cloud Security
Teamwork DeploymentAssessment in Microsoft 365 environment to enable Microsoft 365 Copilot deploy
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
32 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure Ltd
Cloud Security
Insider Risk
Threat ProtectionApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
33 out of 60
Zero Trust Assessment: 3-Week WorkshopAccountabilIT
Cloud Security
Information Protection & Governance
Threat ProtectionOur Microsoft Zero Trust Assessment: 3-Week Workshop is designed to evaluate an organization's security posture and provide guidance on implementing a Zero Trust security model.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 60
Microsoft 365 Inter-Tenant Migration: 2 days AssessmentPreeminent Solutions, Inc.
Adoption & Change Management
Cloud Security
Identity & Access ManagementPreeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
35 out of 60
Spyglass Managed Security Services: 2-week ImplementationQuisitive
Cloud Security
Information Protection & Governance
Threat ProtectionSpyglass is a security and compliance program for cloud and on-premises organizations that aligns security and compliance with current requirements of best-in-class technology and expert deployment.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
36 out of 60
Copilot for Security Readiness AssessmentBulletproof Solutions Inc.
Cloud Security
Identity & Access Management
Threat ProtectionGet a Copilot for Security Readiness + a Security Health Check on your Microsoft 365 environment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Cyderes Managed Security Services for Microsoft SentinelCyderes
Cloud Security
Device Deployment & Management
Threat ProtectionCyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
38 out of 60
AI Security Readiness: 4 week AssessmentQuisitive
Cloud Security
Information Protection & Governance
Teamwork DeploymentQuisitive's AI Security Readiness Assessment provides organizations with an in-depth understanding of how best to adopt Copilot and Generative AI without putting their organization at risk.
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
39 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoice
Cloud Security
Identity & Access Management
Threat ProtectionThe Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Windows Virtual Desktop Implementation: 5-Days Professional ServiceIT Partner LLC
Cloud Security
Device Deployment & Management
Identity & Access ManagementProvide a streamlined solution using Windows Virtual Desktop (WVD) on Microsoft Azure, offering efficient remote workstations, cost-effective licensing, and Windows 365 in a terminal server format.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
41 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies Services
Cloud SecurityReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
Applicable to:
Cloud Security
42 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi Consulting
Cloud Security
Threat ProtectionDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
Applicable to:
Cloud Security
Threat Protection
43 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security ServicesCognizant
Cloud Security
Information Protection & Governance
Threat ProtectionDefend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
44 out of 60
AVASecure 360 Next-Gen MXDR Managed ServicesAVASOFT
Cloud Security
Information Protection & Governance
Threat ProtectionAt AVASOFT, we are committed to securing your digital environment through a holistic Managed Extended Detection and Response (MXDR) solution.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
45 out of 60
Microsoft Sentinel Security Consulting ServiceComtrade System Integration
Cloud Security
Threat ProtectionMicrosoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
Applicable to:
Cloud Security
Threat Protection
46 out of 60
Endpoint as a Service | Assure 365CyberOne
Cloud Security
Device Deployment & Management
Mobile Device ManagementFully Managed Endpoint Security with 24x7 monitoring, compliance and Zero Trust enforcement—powered by Microsoft Intune.
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
47 out of 60
MDR WorkshopGrant Thornton LLP
Cloud Security
Identity & Access Management
Threat ProtectionMaximize Your Security Posture with Grant Thornton's MDR Program Assessment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Identity as a Service | Assure 365CyberOne
Cloud Security
Identity & Access Management
Information Protection & GovernanceFully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
50 out of 60
Copilot Planning WorkshopAhead, Inc
Adoption & Change Management
Cloud Security
Information Protection & GovernanceThis Copilot workshop will prepare your organization to utilize Copilot by identifying key scenarios and gaps in current Microsoft 365 configurations to improve ROI of initial Copilot deployments.
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
51 out of 60
Invoke Data Risk AssessmentInvoke
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThis assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
52 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.
Cloud Security
Threat ProtectionTrustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
Applicable to:
Cloud Security
Threat Protection
53 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementShadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
54 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.
Cloud Security
Identity & Access Management
Information Protection & GovernanceUNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
55 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementStrengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
56 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwoven
Cloud Security
Identity & Access Management
Information Protection & GovernanceNetwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
57 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage WorkshopCGI Inc.
Cloud Security
Identity & Access Management
Threat ProtectionA 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Cloud App Security – Advanced CASB Solution for Cloud Data ProtectionITX360 (Pvt) Ltd.
Cloud SecuritySecure your cloud apps with real-time monitoring, Shadow IT discovery, and automated data protection. Integrated with Microsoft Information Protection for enhanced compliance and threat detection.
Applicable to:
Cloud Security
59 out of 60
Management Services: 3-month AssessmentQuisitive
Cloud Security
Device Deployment & Management
Information Protection & GovernanceQuisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
60 out of 60