筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 560 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Autopilot: 1-Wk AssessmentFSI Strategies
Adoption & Change Management
Device Deployment & Management
Identity & Access ManagementFSi Strategies will review the deployment scenarios with the client and deliver a Discovery and Assessment document on Windows Autopilot, and the level of effort to deploy in the environment.
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
1 out of 60
eDiscovery Workshop: 4 hours WorkshopPlanet Technologies
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceA half-day Workshop that provides an overview and deep understanding of Microsoft 365 eDiscovery Standard and Premium products.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
2 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementShadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
3 out of 60
Cyber Security AssessmentAegis Innovators
Cloud Security
Identity & Access Management
Threat ProtectionUnderstand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Modern Management for EndpointsIvision, Inc.
Cloud Security
Device Deployment & Management
Identity & Access ManagementModern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
5 out of 60
Windows 365 Cloud PC 10-Days PoCSonata Information Technology Limited
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementPaid Assessment and PoC to deploy and use Windows 365 Cloud PC
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
6 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.
Cloud Security
Identity & Access Management
Information Protection & GovernanceUNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
7 out of 60
With Windows 365 Access data from anywhereSentinel Technologies Inc.
Device Deployment & Management
Identity & Access ManagementWith Windows 365, you can access a desktop computer from anywhere. It is available in Business and Enterprise SKUs and integrates easily with your current Microsoft 365 licensing.
Applicable to:
Device Deployment & Management
Identity & Access Management
8 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementStrengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
10 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwoven
Cloud Security
Identity & Access Management
Information Protection & GovernanceNetwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
11 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
12 out of 60
Eviden Compliance Assessment (CSAT) zur Einhaltung der europäischen NIS-2-RichtlinieEviden International France - SAS
Identity & Access Management
Information Protection & GovernanceUnternehmen stehen vor der Herausforderung, die europäische NIS2-Richtlinie bis zur nationalen Umsetzungsfrist im Oktober 2024 umzusetzen.
Applicable to:
Identity & Access Management
Information Protection & Governance
13 out of 60
Microsoft Defender for Endpoint - Vulnerability Assessment by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
14 out of 60
Threat Landscape AssessmentProServeIT
Identity & Access Management
Information Protection & Governance
Threat ProtectionGet critical cybersecurity insights with a global visualization of login attempts, dark web scan, & expert recommendations. We help secure your Microsoft 365 environment to protect your business.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
15 out of 60
Microsoft 365 Copilot and AI AssessmentRedapt, Inc.
Identity & Access ManagementElevate Your Business with Microsoft 365 Copilot Assessment
Applicable to:
Identity & Access Management
16 out of 60
CS Data Security 360°: 2-Wk AssessmentCampana & Schott GmbH
Identity & Access Management
Information Protection & Governance
Insider RiskUtilize Microsoft Purview suite and Copilot for Security to safeguard your content and information.
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
17 out of 60
Identity and Access Management SolutionH One (Private) Limited
Cloud Security
Identity & Access Management
Insider RiskEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
18 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITED
Identity & Access Management
Information Protection & Governance
Threat ProtectionConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
19 out of 60
Modern Endpoint Management Airlift: 2 Week POCSynergy Technical, LLC
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementOur Modern EndPoint Management Airfift will provide a deep dive into Microsoft's endpoint security solutions, as well as a proof of concept tailored to your specific concerns.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
20 out of 60
Security Foundations Data: Assessment and ImplementationProServeIT
Identity & Access Management
Threat ProtectionData security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
Applicable to:
Identity & Access Management
Threat Protection
21 out of 60
Security Foundations Email: Assessment and ImplementationProServeIT
Cloud Security
Identity & Access Management
Threat ProtectionProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Security Foundations IdentityProServeIT
Identity & Access Management
Threat ProtectionFortify your online identity and access controls. Evaluate your risks and deploy modern security controls to mitigate against the most common identity-based vulnerabilities and attacks.
Applicable to:
Identity & Access Management
Threat Protection
23 out of 60
Office 365: Setup, Demo Train: 3-Hr Implementationtrue org cloud
Device Deployment & Management
Identity & Access Management
Information Protection & GovernanceGain a competitive edge and be more productive with a higher growth in your business with the help of True.org Cloud’s Microsoft 365 Business implementation.
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
24 out of 60
Advanced Identity and Access Management with KiZANKiZAN Technologies
Identity & Access ManagementSafeguard your organization from devastating breaches with Microsoft 365 identity solutions.
Applicable to:
Identity & Access Management
25 out of 60
Endpoint Management Solutions: 4-Wk ImplementationSignal Alliance Technology Holding
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementDiscover how Signal Alliance Consulting enables users in your organization to be productive, on any device, without compromising IT security by leveraging Microsoft Endpoint Management.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
26 out of 60
Teams & SharePoint Security HardeningAVASOFT
Identity & Access Management
Teams Custom Solutions
Threat ProtectionTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Entra ID: 5-day AssessmentCDI LLC
Identity & Access ManagementProtect identities in Microsoft 365 by hardening your Entra ID configuration as a result of this 5-day identity and authentication assessment
Applicable to:
Identity & Access Management
28 out of 60
Pentest-4wks AssessmentadaQuest
Identity & Access Management
Insider Risk
Threat ProtectionGain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
29 out of 60
Cybersecurity Assessment: 5-Wk AssessmentPSM Partners
Cloud Security
Identity & Access Management
Insider RiskThis assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
30 out of 60
Microsoft Cybersecurity AssessmentAkins IT
Cloud Security
Identity & Access Management
Threat ProtectionDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionComplimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
MDS - Threat Protection EngagementMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionA 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Secure Data Management with Microsoft PurviewAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
PlanB. Acceleration Workshops for Microsoft CopilotPlanB. GmbH
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceThe PlanB. Copilot Accelerator - Workshop Series helps organizations seamlessly integrate AI, ensure compliance, and maximize the benefits of Microsoft Copilot.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
35 out of 60
Microsoft 365 Information Protection 1-day WorkshopGrant Thornton LLP
Identity & Access Management
Information Protection & Governance
Threat ProtectionReview your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
Cybersecurity Assessment Engagement - 4 weeksGrant Thornton LLP
Cloud Security
Identity & Access ManagementEnhance Your Cloud Security Posture with Grant Thornton’s Cybersecurity Assessment
Applicable to:
Cloud Security
Identity & Access Management
37 out of 60
Threat Protection Engagement - 4 weeksGrant Thornton LLP
Cloud Security
Identity & Access Management
Threat ProtectionImprove your Security Posture with Grant Thornton's Threat Protection Engagement
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Data Security and Compliance Assessment for Microsoft 365Neway Technologies
Identity & Access Management
Information Protection & Governance
Threat ProtectionGet more out of compliance using your orgnaizations data and behaviors to drive policy. Ensuring you maintain productivity while ensuring your business is safe and secure.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
39 out of 60
Cutover Exchange Online Migration from a Third-Party Hosted Exchange Server: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceA flexible and quick way to migrate all emails, contacts, tasks, and other data from a third-party hosted and managed Exchange Server to Microsoft 365 Exchange Online.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
40 out of 60
Risk/Compliance/SecurityR3 LLC
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceProvide Compliance as a service (CaaS) to assist our customers with obtaining certification in the frameworks they are targeting such as CMMC, ISO, NIST, CMMI, HIPAA, SOC 2
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
41 out of 60
Microsoft Cloud App Security (MCAS) for Custom Apps by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionKnow your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
42 out of 60
4migrate: Tenant to Tenant Microsoft 3654Sight Holdings
Device Deployment & Management
Identity & Access Management
Information Protection & GovernanceAre you planning a Microsoft 365 tenant-to-tenant migration? 4Sight offers expertly crafted migration packages!
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
43 out of 60
Data Protection and Governance with Microsoft PurviewAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
44 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
MDM Migration Plan: 1-week AssessmentMobile Mentor
Device Deployment & Management
Identity & Access Management
Information Protection & GovernanceMDM Migration is an assessment and planning service that guides your move to Intune.
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
46 out of 60
Autopilot: 2-Wk Proof of ConceptFSI Strategies
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementFSi Strategies will review the deployment scenarios with the client and execute a proof of concept up to 25 devices in order to demonstrate the capabilities of Windows Autopilot
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
47 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThis service moves key server tasks to a new one for upgrades or system changes.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
48 out of 60
SharePoint Premium Readiness Assessment & Roadmap - 5 Week AssessmentProtiviti
Cloud Security
Identity & Access Management
Knowledge & InsightsEvaluate and ensure your readiness for implementing SharePoint Premium, considering technical, business case, data lifecycle, and administration perspectives.
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Modern Endpoint Design and Planning WorkshopKraft Kennedy
Cloud Security
Device Deployment & Management
Identity & Access ManagementKraft Kennedy will conduct a Modern Endpoint Design and Planning Workshop to review and discuss both your current management and deployment processes as well as plans for the future-state environment.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
50 out of 60
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
51 out of 60
Office 365 GCC High Migration +Tenant Imp 4WkSummit 7 Systems, Inc
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceCompanies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
52 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloud
Cloud Security
Compliance Advisory Services
Identity & Access ManagementTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
53 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY25CGI Inc.
Cloud Security
Device Deployment & Management
Identity & Access ManagementUtilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
54 out of 60
Solution Assessment for Security: 30 DayConcurrency, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionAn assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
55 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionOur security services provide a holistic approach through advisory,implementation & managed services
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
ThreatHunter MXDR: 3-Wk ImplemenationeGroup Enabling Technologies
Identity & Access Management
Information Protection & Governance
Threat ProtectioneGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
57 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionPrepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Identity Foundation Implementation Services with Microsoft Entra in 70 DaysArmis, Sistemas de Informação, Lda
Identity & Access ManagementLeverage the full suite of Microsoft 365 products - Secure internal and external Identities with Microsoft Entra
Applicable to:
Identity & Access Management
59 out of 60
Apply Information Rights Management protection to email: 5-Day Professional ServiceIT Partner LLC
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceEnsure that only authorized individuals can access and use the information. This can be especially useful for sensitive or confidential information that needs to be protected from unauthorized access
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
60 out of 60