筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Copilot for Microsoft 365 Adoption Accelerator Program - 18 WeeksTrace3This program's primary objective is to help accelerate client adoption of Copilot for Microsoft 365 and setup the client for continued maturity with their usage of Copilot for Microsoft 365.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
1 out of 60
Security Outcomes SprintAscent Global, Inc.Understand the Business Value of Your Cybersecurity Investments
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
2 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
3 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, IncKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvokeThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
5 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONSUNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Defender for Endpoint Managed Servicee2e-assure LtdMicrosoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 60
XDR as a Service | Assure 365CyberOneFully Managed XDR with 24x7 detection, response and threat protection—Powered by Microsoft Defender XDR.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 60
Microsoft Copilot Readiness AssessmentInviso CorporationGet ready for Microsoft Copilot, by identifying best-in-class Microsoft 365 security solutions that will protect data and users by establishing a secure foundation, control content
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
9 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
10 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365 GCC High for CMMC/ITAR: 6-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity which includes partial or all going to Microsoft 365 GCC High by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
11 out of 60
Spyglass Managed Security Services: 2-week ImplementationQuisitiveSpyglass is a security and compliance program for cloud and on-premises organizations that aligns security and compliance with current requirements of best-in-class technology and expert deployment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO Digital, LLCProve the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
CCPA CPRA: 6 - Wk AssessmentHappiest Minds Technologies LimitedEnable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
14 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
CMMC Implementation for Microsoft 365 (8 Wk Proj)Summit 7 Systems, IncSummit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) practices associated with Levels 1-3 for Microsoft 365, as well as Azure and AAD where appropriate.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
16 out of 60
Microsoft Purview Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Purview while ensuring alignment with best practice for security, governance, and compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 60
Mergers, Acquisitions, and Divestitures: 5-Month ImplementationCyclotron Inc.Cyclotron helps organizations overcome the technical challenges of consolidating or divesting organization assets using Microsoft 365, Azure, and third-party migration tools.
+2
Applicable to:
Adoption & Change Management
Cloud Security
18 out of 60
Defender for IoT Operational Technology: 8-Week POCITC Secure LtdITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
19 out of 60
Microsoft 365 Incident Response - 5 Week AssessmentProtivitiAssessing the advanced security capabilities of Microsoft 365
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 60
Microsoft 365 Copilot Accelerator: 12Wk ImplementationBDO CanadaLeveraging BDO’s Microsoft 365 Copilot Framework, we'll quickly help you assess your readiness and then accelerate your deployment of Microsoft 365 Copilot in just 12 weeks.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
21 out of 60
Copilot Security Assessment: 4-Wk AssessmentManaged SolutionUnlock the full potential of AI with a comprehensive Microsoft Copilot Security Assessment, fully integrated with Microsoft 365
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
22 out of 60
Microsoft 365 Managed SupportIvision, Inc.iVision offers 24/7 advanced support for Microsoft 365, enhancing IT with agile, integrated cloud solutions.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
23 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk ImplementationNeway TechnologiesStreamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
26 out of 60
Microsoft Endpoint Manager BaselineSHI International CorpExplore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
27 out of 60
GDPR Assessment: 6-Week AssessmentHappiest Minds Technologies LimitedEnable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
28 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
29 out of 60
Microsoft Security: 4-Week ImplementationApex Digital SolutionsEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Data Security Engagement for Microsoft 365CompuNetIntelligently investigate and take action on data security risks.
+2
Applicable to:
Cloud Security
Information Protection & Governance
31 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
32 out of 60
Defender for Office 365: 3-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
33 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
34 out of 60
Red Canary Cloud Security AssessmentRed CanaryAssess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Microsoft 365 Copilot for HR WorkshopSMART business LLCJoin our interactive workshop designed specifically for HR professionals to explore the transformative capabilities of Microsoft Copilot for Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
36 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
37 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 WeeksNetrix GlobalUnderstand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
38 out of 60
Windows 365 Rapid DeployIvision, Inc.The ivision Windows 365 Rapid Deployment approach will accelerates the adoption and use case development of Windows 365 virtual desktops.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
39 out of 60
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDSEgyptian Data Protection Law offer aims to give you a brief description of the following:
Data Privacy Basics
The Egyptian Data Protection Law main highlights
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
40 out of 60
MDR Shield: 4-Wk ImplementationLong View Systems“MDR Shield” is Long View’s cyber security managed detection and response service.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
41 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
42 out of 60
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile ITA 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Microsoft Security Immersion: 1 Day BriefingSynergy Technical, LLCKnowing that your time is valuable, we have developed a true to life, hands-on, interactive session designed to give you a deep understanding of the Microsoft 365 Security suite of products.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
44 out of 60
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLCOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoiceThe Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Microsoft Defender for Business Managed Service: Monthly MDRe2e-assure LtdMaximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
48 out of 60
Microsoft 365 Security BriefingCDI LLCA Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Microsoft 365 Copilot Adoption: 2-3 Week AssessmentCoretek ServicesEvaluate the current customer Microsoft investments adoption of Microsoft Cloud Services and overall Security posture in an effort to develop a "Art of the Possible" to Adopt Microsoft 365 Copilot.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
50 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo SoftwareThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Copilot for Security Accelerator: 2-week ImplementationabraNeway’s Microsoft Copilot for Security Accelerator empowers security teams with enhanced protection and streamlined operations through eight key steps.
+2
Applicable to:
Cloud Security
Threat Protection
52 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo SoftwareCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Secure Your Productivity 3-Day WorkshopHitachi SolutionsOrganizations are challenged with integrating their remote workforce, and to how best increase collaboration, productivity, and security.
+2
Applicable to:
Cloud Security
Device Deployment & Management
54 out of 60
Hybrid Cloud Security Workshop - 1-DayZones, LLCIdentify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
+1
Applicable to:
Cloud Security
55 out of 60
Incident Response RetainerSentinel Technologies Inc.Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Darktrace Managed Network SensorSentinel Technologies Inc.Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
+2
Applicable to:
Cloud Security
Threat Protection
57 out of 60
Threat Protection Engagement FY25The Partner MastersLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Data Protection Impact Assessment: 8 WkLighthouse GlobalEmpowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
59 out of 60
Microsoft 365 E5 Zero Trust Security AssessmentSHI International CorpExplore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
60 out of 60