筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 567 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Cybersecurity Assessment: 5-Wk AssessmentPSM Partners
Cloud Security
Identity & Access Management
Insider RiskThis assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
1 out of 60
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.
Cloud Security
Identity & Access Management
Threat ProtectionThe Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender
for enterprises, resulting in improved detection rates, threat coverage, and
organizational security posture.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayon
Cloud Security
Identity & Access Management
Information Protection & GovernanceEvaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
3 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security Ltd
Cloud Security
Identity & Access Management
Information Protection & GovernanceThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
4 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLC
Cloud Security
Identity & Access Management
Threat ProtectionRoadmap to increase your security score with cost-effective security tools
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Manage Corporate Data on Devices with IntuneAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionCan you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 60
Fortis IR Table Top ExercisesSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionExercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Cutover Exchange Online Migration from a Third-Party Hosted Exchange Server: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceA flexible and quick way to migrate all emails, contacts, tasks, and other data from a third-party hosted and managed Exchange Server to Microsoft 365 Exchange Online.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
8 out of 60
Exchange Migration to Microsoft 365: 6-Week ImplementationAll Covered, a division of Konica Minolta
Adoption & Change Management
Identity & Access ManagementAll Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
Applicable to:
Adoption & Change Management
Identity & Access Management
9 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk AssessmentErgoServices
Cloud Security
Identity & Access Management
Information Protection & GovernanceErgo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
10 out of 60
Microsoft Yammer Tenant-to-Tenant Migration: 1-Wk Professional ServiceIT Partner LLC
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceFacilitate a smooth transition of your Yammer network and its associated data from one Microsoft 365 tenant to another.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
11 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
Cloud Security
Identity & Access ManagementPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
Applicable to:
Cloud Security
Identity & Access Management
12 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies Services
Identity & Access Management
Information Protection & Governance
Threat ProtectionDell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
13 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLC
Calling for Microsoft Teams
Cloud Security
Identity & Access ManagementIf you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
14 out of 60
On-Prem Exchange to Office 365 Migration: 4-Wk MigrationExodus Integrity Services, Inc.
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceSimplify your email migration process to Office 365 with ease and efficiency.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
15 out of 60
CMMC Data Enclave Dplymt: 4-Wk ImplementationC3 Integrated Solutions
Cloud Security
Device Deployment & Management
Identity & Access ManagementDeploy Microsoft 365 to meet CMMC Requirements
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
16 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementLeverage your Microsoft investment to create a strong Zero Trust security environment.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
17 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.
Cloud Security
Identity & Access Management
Threat ProtectionThis Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Lightstream Data Security AssessmentLightstream
Cloud Security
Identity & Access Management
Information Protection & GovernanceLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
19 out of 60
Enhanced Data Privacy with Microsoft PurviewAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
20 out of 60
eDiscovery Workshop: 4 hours WorkshopPlanet Technologies
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceA half-day Workshop that provides an overview and deep understanding of Microsoft 365 eDiscovery Standard and Premium products.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
21 out of 60
Co-pilot Technical ReadinessPHOENIX SOFTWARE LTD
Device Deployment & Management
Identity & Access Management
Knowledge & InsightsHelp your organisation ensure that they are technically ready for Co-pilot
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
22 out of 60
Copilot for Security Readiness AssessmentInvoke
Cloud Security
Identity & Access Management
Threat ProtectionInvoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwoven
Cloud Security
Identity & Access Management
Information Protection & GovernanceNetwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
24 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed Canary
Cloud Security
Identity & Access Management
Threat ProtectionGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloud
Cloud Security
Compliance Advisory Services
Identity & Access ManagementTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
26 out of 60
Microsoft 365 Copilot Readiness Assessment & DeploymentCentric Consulting, LLC
Adoption & Change Management
Identity & Access Management
Knowledge & InsightsA facilitated workshop to build a Roadmap to guide your organization in implementing Copilot
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
27 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLC
Cloud Security
Identity & Access Management
Information Protection & GovernanceBreach and Attack Simulations — We Attack to Defend You
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
28 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk AssessmentKiZAN Technologies
Identity & Access Management
Mobile Device Management
Threat ProtectionLeverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
29 out of 60
Modern Device Management ImplementationDXC
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementImprove the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
30 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SAS
Cloud Security
Identity & Access Management
Threat ProtectionConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
UNITE: Exploring E5 Security Workshop_INFINITY TECHNOLOGY SOLUTIONS
Identity & Access Management
Information Protection & Governance
Threat ProtectionUNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
32 out of 60
Avanade Microsoft 365 Copilot Information Management 4 wk Imp. FY24Avanade, Inc.
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceAvanade Microsoft 365 Copilot Information Management Accelerator ensures your data meets high standards of security, privacy and compliance so you can confidently unlock Copilot's full potential.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
33 out of 60
Teams Hosted Direct Routing: 2-week ImplementationQuisitive
Calling for Microsoft Teams
Identity & Access Management
Teams Custom SolutionsQuisitive Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
34 out of 60
Data Governance & Migration Energize: 3-wk assessInterlink Cloud Advisors, Inc.
Identity & Access Management
Information Protection & GovernanceProtecting your data & organization requires strong governance, increased visibility, & a holistic understanding
of your data. Know where your data is stored, how it is classified, managed, & tracked
Applicable to:
Identity & Access Management
Information Protection & Governance
35 out of 60
Ransomware Protection: 1 Day-WorkshopConvergeOne
Cloud Security
Identity & Access Management
Threat ProtectionLearn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage WorkshopCGI Inc.
Cloud Security
Identity & Access Management
Threat ProtectionA 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Implementation of Microsoft Defender for EndpointCDW
Cloud Security
Identity & Access Management
Threat ProtectionCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft 365 Copilot: 2-Wk Readiness AssessmentInvoke
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceInvoke's Microsoft 365 Copilot Readiness Assessment is a service that helps customers prepare for using Copilot 365, a solution that leverages data to enhance creativity, productivity, and skills.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
39 out of 60
Hybrid Office 365 Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Identity & Access ManagementHybrid migration integrates on-premises Exchange with Microsoft 365, facilitating migration or serving as a permanent state for both organizations.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
40 out of 60
Modern Endpoint Management Airlift: 2 Week POCSynergy Technical, LLC
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementOur Modern EndPoint Management Airfift will provide a deep dive into Microsoft's endpoint security solutions, as well as a proof of concept tailored to your specific concerns.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
41 out of 60
Modern Workplace - Cloud Endpoint ManagementArxus
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementOur Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
42 out of 60
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLC
Cloud Security
Identity & Access Management
Information Protection & GovernanceRavenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
43 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen Systems
Cloud Security
Identity & Access Management
Insider RiskThe Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
44 out of 60
Endpoint Management Solutions: 4-Wk ImplementationSignal Alliance Technology Holding
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementDiscover how Signal Alliance Consulting enables users in your organization to be productive, on any device, without compromising IT security by leveraging Microsoft Endpoint Management.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
45 out of 60
Windows 365 Assessment - 1 dayCC Bilgi Teknolojileri
Cloud Security
Device Deployment & Management
Identity & Access ManagementHybrid Windows for a hybrid world
Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
46 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies Ltd
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Windows 365: 5-week Proof of ConceptInterlink Cloud Advisors, Inc.
Identity & Access Management
Information Protection & Governance
Mobile Device ManagementEnhance productivity through flexibility by enabling your team to create secure Cloud PCs and allowing BYOD without increasing risk to your environment
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
48 out of 60
Windows as a Service: 4-Wk ImplementationAMTRA Solutions Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionSecure your data and devices, identities and your business with Windows 10/11.
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
49 out of 60
Windows 365 Accelerator: 4 Week ImplementationKiZAN Technologies
Device Deployment & Management
Identity & Access Management
Knowledge & InsightsDuring this 4-week engagement, KiZAN will assist with the design and implementation of Windows 365, including education, planning, documentation, and pilot for up to 50 users.
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
50 out of 60
Pentest-4wks AssessmentadaQuest
Identity & Access Management
Insider Risk
Threat ProtectionGain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
51 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro Ltd
Cloud Security
Identity & Access Management
Threat ProtectionWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementationCloudshift
Device Deployment & Management
Identity & Access Management
Mobile Device Management3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
53 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServus
Cloud Security
Identity & Access Management
Information Protection & GovernanceGain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
54 out of 60
OENG - Next Generation Endpoints-1 Month Proof of ConceptSecure Nextgen Systems
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementLearn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
55 out of 60
Offer Name: Microsoft 365 CrashCourse - 1 week WorkshopVirteva LLC
Identity & Access Management
Knowledge & Insights
Mobile Device ManagementEmpower organizations to gain a deeper understanding of Microsoft 365 and its vast array of services, features, and capabilities through Virteva's Microsoft 365 CrashCourse Workshop.
Applicable to:
Identity & Access Management
Knowledge & Insights
Mobile Device Management
56 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLC
Cloud Security
Identity & Access Management
Threat ProtectionGet a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Secure Remote Workplace: 1-Wk WorkshopFSI Strategies
Cloud Security
Device Deployment & Management
Identity & Access Management5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
58 out of 60
Modernize Endpoints Consulting Offer: 3 Days ImplementationAdaptive Business Communications Ltd t/a CloudAssist
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementWith Hybrid work becoming prevalent and increasing threat trends, organizations need to proactively secure & modernize management of their endpoints across mobile, PCs and including virtual endpoints.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
59 out of 60
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix Global
Identity & Access Management
Information Protection & Governance
Insider RiskA 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
60 out of 60