筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Advanced Identity and Access Management with KiZANKiZAN TechnologiesSafeguard your organization from devastating breaches with Microsoft 365 identity solutions.
+1
Applicable to:
Identity & Access Management
1 out of 60
Zero Trust Identity and Access Management: 8-16 Weeks Consulting + ImplementationAttosolIn today’s dynamic digital landscape, traditional security models fall short. Embrace Zero Trust with Microsoft and transform your security strategy to protect against evolving threats.
+2
Applicable to:
Compliance Advisory Services
Identity & Access Management
2 out of 60
Microsoft 365 Managed ServicesNetrix GlobalNetrix’s 24x7x365 managed services for Microsoft 365 combines a reactive service desk with proactive strategic planning to ensure your team is productive and secure.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
3 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
4 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
MDS Managed MXDR EngagementMaureen Data SystemsDesigned to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Microsoft 365 Defender: 2-Wk AssessmentAlithya Fullscope Solutions, Inc.Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Security Outcomes SprintAscent Global, Inc.Understand the Business Value of Your Cybersecurity Investments
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
8 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies LtdMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Autopilot: 1-Wk AssessmentFSI StrategiesFSi Strategies will review the deployment scenarios with the client and deliver a Discovery and Assessment document on Windows Autopilot, and the level of effort to deploy in the environment.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
10 out of 60
Quadra Entra Permissions ManagementQuadrasystems.net (India) P LtdUnderstand how permissions creep can impact the attack surface risk in your cloud infrastructure
Understand how to manage user and identity risk
+1
Applicable to:
Identity & Access Management
11 out of 60
Implementation of Microsoft Copilot and AgentsStoneridge Software LLCA structured enablement journey that helps organizations strategically align, technically prepare, and culturally adopt Microsoft Copilot
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
12 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu TarsasagInspect events in your network to locate threat indicators and entities
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Neway Security proposition: 3-WK implementationNeWay Technologies LtdThe Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
14 out of 60
Active Directory Services: Implementation, Upgrade, and MigrationITX360 (Pvt) Ltd.Boost productivity and security with expert Active Directory services. Integrate seamlessly with Microsoft 365 through our implementation, upgrade, and migration solutions
+1
Applicable to:
Identity & Access Management
15 out of 60
Mergers and Acquisitions PlaybookIvision, Inc.ivision leverages an approach and methodology designed to help clients successfully plan and design for a M/A&D migrations to achieve successful mergers, consolidation or a separation outcome.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
16 out of 60
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
17 out of 60
Microsoft 365 Copilot Everyday AI Adoption: 2wksInsightInsight’s Everyday AI Adoption for Microsoft 365 Copilot Program is designed to help organizations bring this technology to users in a way that promotes responsible adoption and drives productivity.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
18 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
19 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo SoftwareThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
NEST ArenaNoibitTwo-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Windows 11 Assessment: 1-WKSteeves Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
22 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365 GCC High for CMMC/ITAR: 6-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity which includes partial or all going to Microsoft 365 GCC High by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
23 out of 60
Secure Remote Workplace: 1-Wk WorkshopFSI Strategies5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
24 out of 60
Microsoft Cybersecurity AssessmentThe Partner MastersDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Incident Response RetainerSentinel Technologies Inc.Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Guardian 365 Managed Security Services (Microsoft MXDR Verified)Forsyte IT SolutionsGuardian 365 is the always-on security managed service offering end-to-end protection, monitoring, detection, and remediation of attacks on your infrastructure, data, users, and endpoints 24x7.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPOThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
28 out of 60
Introduction to Microsoft Purview Data Protection: 4-Hour TrainingLong View SystemsGain hands-on knowledge in data protection, governance, and compliance with Long View’s expert-led Microsoft Purview training.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
29 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, IncKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile ITAgile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
31 out of 60
Varonis JumpstartSentinel Technologies Inc.Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo SoftwareCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Implementation of Microsoft Purview QuickStartPresidioEnhance security posture, data protection, and governance with Microsoft Purview QuickStart: implementation by Presidio offering.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
34 out of 60
Microsoft Entra - Global Secure Access | Pilot DeploymentITC Secure LtdMicrosoft Entra Global Secure Access pilot deployment for improved security posture, streamlined access management & regulatory compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
35 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş."Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
General Data Protection Regulation (GDPR): 4-Wk Data Discovery ServiceIT Partner LLCMulti-step process to discover and scan data sources within the organization for personal data. The outcome: detailed inventory of data sources, together with the data they contain.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
37 out of 60
Microsoft Intune 10-wks ImplementationCyclotron Inc.Cyclotron's Intune implementation provides an introduction, education and production-ready framework for IT teams to revolutionize their device management strategy and enhance their end user security.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
38 out of 60
Avanade Cyber Portfolio EvaluationAvanade, Inc.The Cyber Portfolio Evaluation maps your tools with Microsoft solutions, cutting costs and enhancing efficiency.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
39 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk AssessmentKiZAN TechnologiesLeverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
40 out of 60
Microsoft 365 Security Readiness: 4-Wk AssessmentQuadrasystems.net (India) P LtdIdentify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
41 out of 60
Okta to Entra Migration: Roadmap ArchitectAscent Global, Inc.Roadmap and architect the shift from Okta to Microsoft Entra’s enhanced data security
+1
Applicable to:
Identity & Access Management
42 out of 60
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVIdentify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
+2
Applicable to:
Identity & Access Management
Insider Risk
43 out of 60
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile ITA 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Microsoft Intune Jumpstart for Endpoints - Mobile & Workstations: 2-Wk ImplementationProServeITEnable organization-wide management & security for your mobile devices & workstations with a Microsoft Intune jumpstart pilot.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
45 out of 60
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
46 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SASConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Zero Trust Security AssessmentConcurrency, Inc.Assess and advance your Zero Trust security posture—and accelerate or expand your Microsoft 365 security strategy with expert-led guidance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Collab Now: 4-Wk ImplementationLong View SystemsCollab Now (Microsoft 365) supports worker productivity by delivering and managing a unified and integrated collaboration platform
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
49 out of 60
Windows 365 Accelerator: 4 Week ImplementationKiZAN TechnologiesDuring this 4-week engagement, KiZAN will assist with the design and implementation of Windows 365, including education, planning, documentation, and pilot for up to 50 users.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
50 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Sovereign Cloud-Go China上海南洋万邦软件技术有限公司将原部署在全球版 Microsoft 365 的数据迁移至由世纪互联运营的中国版 Microsoft 365(21Vianet)环境中,以满足监管要求。To comply with regulatory requirements, data originally hosted in the global version of Microsoft 365 is being migrated to t
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
52 out of 60
Copilot for Security Readiness AssessmentInvokeInvoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
MFA JumpstartSentinel Technologies Inc.Multi-factor authentication is a process in which users are prompted during the sign-in
process for an additional form of identification, such as a code on their cellphone or a
fingerprint scan.
+2
Applicable to:
Cloud Security
Identity & Access Management
54 out of 60
Automate Identity Lifecycle Management: 8-16 Weeks Consulting + ImplementationAttosolIntegrate HRMS with Microsoft Entra ID for an automated, efficient and secure Identity Lifecycle Management.
+1
Applicable to:
Identity & Access Management
55 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Microsoft 365 Copilot Deployment and Readiness ServicesInsightInsight can guide you on your Microsoft 365 Copilot journey with help of more than 1,500 dedicated Modern Work professionals who have been working to optimize Microsoft environments for 20 years.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
57 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu TarsasagSafeguard your entire organization with Managed Security Services on Microsoft Defender
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLCOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Windows10 EOL to Windows11 Foundations - 1 Week QuickStartCoretek ServicesWindows 10 EOL is right around the corner, prepare with the Windows 11 foundations QuickStart for your organization today.
+3
Applicable to:
Device Deployment & Management
Frontline Workers
Identity & Access Management
60 out of 60