筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 568 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Microsoft Cloud App Security (MCAS) Solutions for Native Apps by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionEnhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight Holdings
Cloud Security
Identity & Access Management
Threat ProtectionStrengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
User Home Folder Migration to One Drive for Business: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceWe will migrate files and documents stored in a user drive or folder on a file server(s) to user’s folder on OneDrive for Business.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
3 out of 60
4migrate: ISP to Microsoft 3654Sight Holdings
Identity & Access Management
Information Protection & Governance
Meetings for Microsoft TeamsSeamless Microsoft 365 migration with expert guidance, minimal disruption, and full support.
Applicable to:
Identity & Access Management
Information Protection & Governance
Meetings for Microsoft Teams
4 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365 GCC High for CMMC/ITAR: 6-Wk Assessment and PlanningAgile IT
Cloud Security
Identity & Access Management
Mobile Device ManagementShorten the time to value from an M&A activity which includes partial or all going to Microsoft 365 GCC High by starting with an assessment and plan to rationalize identities, tenants, and costs.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
5 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.
Cloud Security
Identity & Access Management
Insider RiskDescubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
6 out of 60
Varonis JumpstartSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionSentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Cutover Google Workspace to Office 365 migration (IMAP migration). Just email and email folders: 7-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Teamwork DeploymentMigration of email data and email folders from G Suite (Google Apps) to Microsoft 365 / Exchange Online.
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
8 out of 60
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.
Cloud Security
Identity & Access Management
Threat ProtectionThe Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender
for enterprises, resulting in improved detection rates, threat coverage, and
organizational security posture.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte Ltd
Cloud Security
Identity & Access Management
Threat ProtectionHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLC
Cloud Security
Identity & Access Management
Threat ProtectionRoadmap to increase your security score with cost-effective security tools
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementLeverage your Microsoft investment to create a strong Zero Trust security environment.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
12 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.
Cloud Security
Identity & Access Management
Threat ProtectionThis Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Enhanced Data Privacy with Microsoft PurviewAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
14 out of 60
Modern Endpoint Management Airlift: 2 Week POCSynergy Technical, LLC
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementOur Modern EndPoint Management Airfift will provide a deep dive into Microsoft's endpoint security solutions, as well as a proof of concept tailored to your specific concerns.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
15 out of 60
Office 365 Managment: 1 Day AssessmentEze Castle Integration
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementECI will review your Office 365 Tennant Configuration and suggest on-going managment needs
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
16 out of 60
Empowering Digital Transformation with AI Microsoft Copilot SolutionsSonata Software Ltd.
Frontline Workers
Identity & Access Management
Meetings for Microsoft TeamsOur tailored Microsoft Copilot solutions blend human expertise with intelligent automation, delivering efficiency, productivity, and personalization across industries.
Applicable to:
Frontline Workers
Identity & Access Management
Meetings for Microsoft Teams
17 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
Cloud Security
Identity & Access Management
Threat ProtectionThis engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionInterlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionComplimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Microsoft Intune Jumpstart for Endpoints - Mobile & Workstations: 2-Wk ImplementationProServeIT
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementEnable organization-wide management & security for your mobile devices & workstations with a Microsoft Intune jumpstart pilot.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
21 out of 60
Secure Data Management with Microsoft PurviewAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionPrepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Microsoft 365 E5 CMMC L1 3 Week ImplementationKAMIND IT, Inc
Cloud Security
Identity & Access Management
Threat ProtectionKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 1 using Microsoft 365 security Suite and Azure Sentinel SIEM.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed Canary
Cloud Security
Identity & Access Management
Threat ProtectionGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Microsoft 365 Copilot Readiness Assessment & DeploymentCentric Consulting, LLC
Adoption & Change Management
Identity & Access Management
Knowledge & InsightsA facilitated workshop to build a Roadmap to guide your organization in implementing Copilot
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
26 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLC
Cloud Security
Identity & Access Management
Information Protection & GovernanceBreach and Attack Simulations — We Attack to Defend You
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk AssessmentKiZAN Technologies
Identity & Access Management
Mobile Device Management
Threat ProtectionLeverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
28 out of 60
SmartStart for IntuneMobile Mentor
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
29 out of 60
Insight Managed Endpoint: Managed ServiceInsight
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementInsight’s Managed Endpoint service offers a modern and cost-effective approach to the administration and support of your new or existing endpoint management solution.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
30 out of 60
UNITE: Exploring E5 Security Workshop_INFINITY TECHNOLOGY SOLUTIONS
Identity & Access Management
Information Protection & Governance
Threat ProtectionUNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
31 out of 60
Threat Protection Assessment & Zero Trust ArchitectureBDO Digital, LLC
Device Deployment & Management
Identity & Access Management
Threat ProtectionSet Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Architecture and Threat Protection Assessment
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
32 out of 60
Sogeti SmartWorkspace: 4 Week ImplementationCapgemini Group
Adoption & Change Management
Device Deployment & Management
Identity & Access ManagementSogeti provides a one-stop shop set of offerings around the SharePoint solutions. Our offer comprises consultancy, discovery of the existing landscape, Solution Architecture, SharePoint migration etc.
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
33 out of 60
Avanade Microsoft 365 Copilot Information Management 4 wk Imp. FY24Avanade, Inc.
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceAvanade Microsoft 365 Copilot Information Management Accelerator ensures your data meets high standards of security, privacy and compliance so you can confidently unlock Copilot's full potential.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
34 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage WorkshopCGI Inc.
Cloud Security
Identity & Access Management
Threat ProtectionA 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Modern Workplace AssessmentHTG
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceThis assessment supports businesses in their cloud journey to quickly develop or migrate into a modern cloud-based organisation by implementing a Software as a Service Strategy with Microsoft 365.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
36 out of 60
Microsoft Purview Records Management Assessment & Strategy - 9 Week AssessmentProtiviti
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceProtiviti assists organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
37 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbH
Cloud Security
Identity & Access Management
Information Protection & GovernanceMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
38 out of 60
Endpoint Modernization Quickstart ServiceDell Technologies Services
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementDell Quick Start service helps customers configure their environment and prepare it for Modern Device Management and Modern Provisioning.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
39 out of 60
Lightstream Data Security AssessmentLightstream
Cloud Security
Identity & Access Management
Information Protection & GovernanceLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
40 out of 60
Office 365 GCC High Migration +Tenant Imp 4WkSummit 7 Systems, Inc
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceCompanies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
41 out of 60
Implementation of Microsoft Defender for EndpointCDW
Cloud Security
Identity & Access Management
Threat ProtectionCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Microsoft 365 Copilot: 2-Wk Readiness AssessmentInvoke
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceInvoke's Microsoft 365 Copilot Readiness Assessment is a service that helps customers prepare for using Copilot 365, a solution that leverages data to enhance creativity, productivity, and skills.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
43 out of 60
Hybrid Office 365 Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Identity & Access ManagementHybrid migration integrates on-premises Exchange with Microsoft 365, facilitating migration or serving as a permanent state for both organizations.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
44 out of 60
Compliance Manager: 8 Week ImplementationRazor Technology, LLC
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceComprehensive orientation, deployment, training, support, administration, updates, documentation and testing services to get started quickly and expand with Compliance Manager and Compliance Score
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
45 out of 60
Microsoft 365 Security: 2-Week ImplementationTelelink Business Services EAD
Identity & Access Management
Threat ProtectionCreate and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
Applicable to:
Identity & Access Management
Threat Protection
46 out of 60
FortisX™ Next Generation Cyber Detection & ResponseSentinel Technologies Inc.
Identity & Access ManagementToday's security landscape is complex, dynamic, and constantly evolving. FortisX™, powered by Cisco XDR, is a security solution that delivers best-in-class cyber protection: the top extended detention
Applicable to:
Identity & Access Management
47 out of 60
MDM Migration Plan: 1-week AssessmentMobile Mentor
Device Deployment & Management
Identity & Access Management
Information Protection & GovernanceMDM Migration is an assessment and planning service that guides your move to Intune.
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
48 out of 60
Modern Workplace - Cloud Endpoint ManagementArxus
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementOur Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
49 out of 60
MDS - Threat Protection EngagementMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionA 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week ProgramWindows Management Experts, Inc.
Identity & Access Management
Insider Risk
Threat ProtectionSecure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
51 out of 60
Microsoft Endpoint Management: 5-Day Proof of ConcepteGroup Enabling Technologies, LLC
Identity & Access Management
Information Protection & Governance
Mobile Device ManagementeGroup Enabling Technologies, LLC. Microsoft Endpoint Management Proof of Concept will allow you to modernize your endpoint management as part of an overall device management strategy.
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
52 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen Systems
Cloud Security
Identity & Access Management
Insider RiskThe Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
53 out of 60
R3 Unified Device Management SuiteR3 LLC
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementThe R3 Unified Device Management Suite revolutionizes how businesses manage their digital ecosystem. Devices-Apps-Conditional Access-Compliance-Productivity
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
54 out of 60
Modern Managed Endpoints: 4-Wk Proof of ConceptFSI Strategies
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementModernize your organization with end-to-end device management and monitoring, FSi Strategies will demonstrate modern device management and security using the latest in Microsoft 365 technology
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
55 out of 60
Modern Work Services Proof of ConceptCrayon US
Calling for Microsoft Teams
Identity & Access Management
Meetings for Microsoft TeamsCrayon Modern Work Services PoC will help you pilot a subset of users with the best of Microsoft 365 prior to implementation. This will allow us to ensure a smooth transition for all users.
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Meetings for Microsoft Teams
56 out of 60
Microsoft 365 Inter-Tenant Migration: 2 days AssessmentPreeminent Solutions, Inc.
Adoption & Change Management
Cloud Security
Identity & Access ManagementPreeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
57 out of 60
Modern Management: 4 week ImplementationMobile Mentor
Device Deployment & Management
Identity & Access Management
Information Protection & GovernanceModern Management is a Microsoft 365 focused managed service that reduces cost, improves security and delights employees!
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
58 out of 60
Fortis Assessment Microsoft Online SecuritySentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionReduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Teams & SharePoint Security HardeningAVASOFT
Identity & Access Management
Teams Custom Solutions
Threat ProtectionTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection