筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 639 个结果。
云安全Remove 云安全
Microsoft 365Remove Microsoft 365
Infosys Modern Identity and Access Solution with MS EntraInfosys Limited
Cloud Security
Identity & Access Management
Mobile Device ManagementMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
1 out of 60
Microsoft Intune & Autopilot in 30: Six (6)-Week ImplementationLong View Systems
Cloud Security
Device Deployment & Management
Mobile Device ManagementDeploy Microsoft Intune and Windows Autopilot—accelerating security, compliance, and IT efficiency with a structured, expert-led implementation.
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
2 out of 60
MDR Shield: 4-Wk ImplementationLong View Systems
Cloud Security
Device Deployment & Management
Mobile Device Management“MDR Shield” is Long View’s cyber security managed detection and response service.
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
3 out of 60
Copilot for Security Readiness AssessmentBulletproof Solutions Inc.
Cloud Security
Identity & Access Management
Threat ProtectionGet a Copilot for Security Readiness + a Security Health Check on your Microsoft 365 environment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO Digital, LLC
Cloud Security
Identity & Access Management
Threat ProtectionProve the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVASOFT
Cloud Security
Information Protection & Governance
Threat ProtectionEnhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 60
Security Outcomes SprintAscent Global, Inc.
Cloud Security
Compliance Advisory Services
Identity & Access ManagementUnderstand the Business Value of Your Cybersecurity Investments
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
7 out of 60
SmartStart for IntuneMobile Mentor
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
8 out of 60
Nonprofit Security Maturity Assessment - 4 weeksBDO Digital, LLC
Cloud Security
Identity & Access Management
Threat ProtectionRoadmap to increase your security score with cost-effective security tools
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Managed Extended Detection & Response (MXDR) for Workplace: 2 Hr WorkshopNetwoven
Cloud Security
Threat ProtectionLearn how to put next generation Microsoft security tools to work for you.
Applicable to:
Cloud Security
Threat Protection
10 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi Consulting
Cloud Security
Threat ProtectionDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
Applicable to:
Cloud Security
Threat Protection
11 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Information Protection & GovernanceThe goal of the service is to securely remove your previous Exchange Server, ensuring it doesn't disrupt your operations and enabling a smooth transition to Exchange Online.
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
12 out of 60
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POCatQor
Cloud Security
Compliance Advisory Services
Identity & Access ManagementOur Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
13 out of 60
Copilot Preparedness and Planning WorkshopCDI LLC
Adoption & Change Management
Cloud Security
Information Protection & GovernanceThe Copilot workshop will prepare your organization to utilize copilot by identifying key scenarios and gaps in current configuration to improve ROI of using Copilot.
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
14 out of 60
Data Protection Impact Assessment: 8 WkLighthouse Global
Cloud Security
Compliance Advisory Services
Identity & Access ManagementEmpowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
15 out of 60
Microsoft Intune ServiceSii Sp. z o.o.
Cloud Security
Device Deployment & Management
Insider RiskMicrosoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
Applicable to:
Cloud Security
Device Deployment & Management
Insider Risk
16 out of 60
Mitigate Compliance and Privacy Risks - 3 Day WorkshopProtiviti
Cloud Security
Compliance Advisory Services
Identity & Access ManagementMicrosoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
17 out of 60
BCN Cloud Readiness Assessment and ReportBCN Group Ltd.
Adoption & Change Management
Cloud Security
Meetings for Microsoft TeamsThis assessment will help you decide whether you are ready to migrate IT systems and services to the cloud.
Applicable to:
Adoption & Change Management
Cloud Security
Meetings for Microsoft Teams
18 out of 60
MDR for Microsoft DefenderADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.
Cloud Security
Threat ProtectionAdeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
Applicable to:
Cloud Security
Threat Protection
19 out of 60
Microsoft Sentinel Quick StartEdgile, Inc.
Cloud SecurityProduction pilot, which is expected to provide centralized log collection, detection of previously undetected threats, investigation with artificial intelligence, and Rapid Response to incidents.
Applicable to:
Cloud Security
20 out of 60
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.
Cloud Security
Information Protection & Governance
Insider RiskMicrosoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
21 out of 60
Endpoint Security Advanced Quick Start 14-wk ImplementationEdgile, Inc.
Cloud Security
Device Deployment & Management
Mobile Device ManagementPilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats.
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
22 out of 60
Endpoint Security Basic Quick Start 12-wk ImplementationEdgile, Inc.
Cloud Security
Device Deployment & Management
Mobile Device ManagementAchieve a Microsoft pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
23 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.
Cloud Security
Identity & Access ManagementThis offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
Applicable to:
Cloud Security
Identity & Access Management
24 out of 60
Citrix Endpoint Management to Microsoft Intune Migration PlanMobile Mentor
Adoption & Change Management
Cloud Security
Device Deployment & ManagementMobile Mentor’s Citrix Endpoint Management to Microsoft Intune services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
25 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 WeeksNetrix Global
Cloud Security
Insider Risk
Threat ProtectionUnderstand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
27 out of 60
Security Assessment for Copilot Readiness: 3 Day WorkshopNetwoven
Cloud Security
Knowledge & InsightsNetwoven's security assessment for Copilot workshop will train you to better discover, secure, and govern your corporate data for usage with Copilot for Microsoft 365
Applicable to:
Cloud Security
Knowledge & Insights
28 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Information Protection & GovernanceEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
29 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro Ltd
Cloud Security
Identity & Access Management
Threat ProtectionWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso Corporation
Cloud Security
Identity & Access Management
Workplace AnalyticsHelping customers KickStart features in Microsoft 365 E3 Subscription
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
31 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.
Cloud Security
Identity & Access Management
Threat ProtectionWith the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLC
Cloud Security
Identity & Access Management
Information Protection & GovernanceBreach and Attack Simulations — We Attack to Defend You
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
33 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionFortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Infosys Intelligent Security SolutionInfosys Limited
Cloud Security
Information Protection & Governance
Threat ProtectionInfosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 60
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.
Cloud Security
Information Protection & Governance
Insider RiskBoost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
36 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View Systems
Cloud Security
Identity & Access Management
Threat ProtectionSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY25CGI Inc.
Cloud Security
Device Deployment & Management
Identity & Access ManagementUtilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
38 out of 60
Microsoft 365 Security BriefingCDI LLC
Cloud Security
Identity & Access Management
Threat ProtectionA Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Copilot for Microsoft 365: Data Governance WorkshopReply
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceSecure and Enhance Your Microsoft 365 Experience with WM Reply's One-Day Copilot Data Governance Workshop
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
40 out of 60
Copilot for Micosoft 365 Readiness: 2-Day WorkshopCTGlobal A/S
Adoption & Change Management
Cloud Security
Information Protection & GovernancePlan adoption of Copilot for Microsoft 365 through explicit scenarios, use cases and data governance. Develop strategies for seamless onboarding and future integrations. In a safe and secure workshop.
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
41 out of 60
Cybersecurity AssessmentCDI LLC
Cloud Security
Information Protection & Governance
Insider RiskThe Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
42 out of 60
Microsoft Sentinel Proof of Concept: 4 WeeksNetrix Global
Cloud Security
Information Protection & Governance
Threat ProtectionUnderstand how prepared is your Microsoft infrastructure when adversaries attack
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 60
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.
Cloud Security
Identity & Access Management
Insider RiskWe will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
44 out of 60
Data Security & Threat Protection WorkshopITVT
Cloud Security
Information Protection & Governance
Threat ProtectionIdentify data security risks in your organizational data & discover vulnerabilities in your environment
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
45 out of 60
AVASecure 360 Next-Gen MXDR Managed ServicesAVASOFT
Cloud Security
Information Protection & Governance
Threat ProtectionAt AVASOFT, we are committed to securing your digital environment through a holistic Managed Extended Detection and Response (MXDR) solution.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
46 out of 60
Endpoint as a Service | Assure 365CyberOne
Cloud Security
Device Deployment & Management
Mobile Device ManagementFully Managed Endpoint Security with 24x7 monitoring, compliance and Zero Trust enforcement—powered by Microsoft Intune.
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
47 out of 60
Microsoft Sentinel Security Consulting ServiceComtrade System Integration
Cloud Security
Threat ProtectionMicrosoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
Applicable to:
Cloud Security
Threat Protection
48 out of 60
MDR WorkshopGrant Thornton LLP
Cloud Security
Identity & Access Management
Threat ProtectionMaximize Your Security Posture with Grant Thornton's MDR Program Assessment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Microsoft 365 E5 Cyber Range 2 Week ImplementationKAMIND IT, Inc
Cloud Security
Threat ProtectionKAMIND's cybersecurity immersive learning deployment utilizing Project Ares Cyber Range for Microsoft 365 Security Suites.
Applicable to:
Cloud Security
Threat Protection
50 out of 60
Avanade Modern Workplace FY23Avanade, Inc.
Adoption & Change Management
Cloud Security
Information Protection & GovernanceModern Workplace Consulting Services
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
51 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Microsoft 365 Security: 3,5 Tage Tenant AssessmentAppSphere AG
Cloud Security
Identity & Access Management
Knowledge & InsightsSicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
53 out of 60
Microsoft Purview & Generative AI Synergy: Data Governance for the FutureBlack Cell Magyarország Korlatolt Felelossegu Tarsasag
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceUsage of generative AI increases day by day in enterprise environments, in some cases without control. Act in time and prevent data breaches and exfiltration activities.
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
54 out of 60
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom Consulting
Cloud Security
Information Protection & Governance
Threat ProtectionThis FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
55 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
Cloud Security
Identity & Access Management
Threat ProtectionThis engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Copilot Advanced Services: 1 Day 3 WorkshopsNess Israel
Adoption & Change Management
Cloud Security
Workplace AnalyticsUnlock the full potential of Microsoft Copilot with our tailored AI services, enhancing security, development and productivity across Microsoft 365 applications through flexible, expert-led sessions.
Applicable to:
Adoption & Change Management
Cloud Security
Workplace Analytics
57 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareOne
Cloud Security
Device Deployment & Management
Information Protection & GovernanceImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
58 out of 60
Multi Cloud Security: Secure Multi & Hybrid Cloud Environments WorkshopCompuNet
Cloud Security
Compliance Advisory Services
Insider RiskFive week engagement that helps customers gain insights on active threats and vulnerabilities related to their hybrid and multi-cloud workloads within Microsoft 365.
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
59 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies Ltd
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60