筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 639 个结果。
云安全Remove 云安全
Microsoft 365Remove Microsoft 365
MDS - Microsoft Security Copilot WorkshopMaureen Data SystemsDiscover how Microsoft Security Copilot can enhance your security operations, streamline incident response, and empower your security teams
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
1 out of 60
Security Foundations Email: Assessment and ImplementationProServeITProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
4Sight's Microsoft Data Security Engagement4Sight HoldingsIdentify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
3 out of 60
Microsoft 365 Security Assessment - 4wk AssessmentProtivitiEffective Analysis of CIS & NIST Benchmarking, Active Directory to Azure and Microsoft 365 Configurations
+1
Applicable to:
Cloud Security
4 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Tenant to Tenant Migration for AAD, EXO and OD4B Services Only: 1-Week ImplementationIT Partner LLCMicrosoft 365 Tenant-to-Tenant Migration Including Azure AD, Exchange Online and OneDrive for Business services and data
+2
Applicable to:
Adoption & Change Management
Cloud Security
6 out of 60
Microsoft Cybersecurity AssessmentAkins ITDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLCCatapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 60
Microsoft 365 Migration for Mergers and Divestitures: 8 Wk ImplementationeGroup Enabling TechnologieseGroup Enabling Technologies, LLC. will move your companies Microsoft 365 email, files, and other workloads to another Microsoft 365 environment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Mobile Device Management
9 out of 60
XDR as a Service | Assure 365CyberOneFully Managed XDR with 24x7 detection, response and threat protection—Powered by Microsoft Defender XDR.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Okta Migration to Azure AD: 3-Week AssessmentInvokeThe Okta Migration to Azure AD Assessment offering is designed to assess & plan your migration efforts to your existing investments in Azure AD.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
12 out of 60
Advisory Service for Microsoft CloudDell Technologies ServicesLeverage our expertise to uncover the insights to right-size your environment, minimize risk and optimize Microsoft 365 and Azure costs
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
13 out of 60
Microsoft 365 E5 CMMC L3 8 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
14 out of 60
Data Security Engagement with Microsoft PurviewInviso CorporationOur Data Security engagement will look over your data estate and establish areas of Security Risk. We will show you the benefits to Microsoft Purview to help protect your environment from risks.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
15 out of 60
NIST800-171-Microsoft 365-Accelerator-Guided-DeploymentKMicro Tech, Inc.Provides expert guidance to help organizations achieve NIST 800-171 compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
16 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
17 out of 60
Microsoft 365 Copilot: 1-Day AssessmentData Market Bilgi Hizmetleri A.SHow Microsoft 365 Copilot can transform your business and the overall concepts you must understand to better daily business life.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Power Platform for Teams
18 out of 60
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLCSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Microsoft Security: 4-Week ImplementationApex Digital SolutionsEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
21 out of 60
Copilot for Microsoft 365: Security AcceleratorKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Accelerator: Tailored insights and guided deployments.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
23 out of 60
TGS Windows 11TEKsystems Global Services LLCTEKsystems partners with you to navigate the transition to Windows 11
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
24 out of 60
Adopción de Copilot chat Enterprise - Bing Chat Enterprise: 3-WkENCAMINA S.L.Adopta Copilot Chat Enterptise para multiplicar la productividad de tus empleados protegiendo los datos en tu empresa
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
25 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLCEnhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
4security: Microsoft 365 Communication Protect4Sight Holdings4security: Microsoft 365 Communication Protect, a solution to safeguard your organisation’s communications
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
27 out of 60
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, LdaThe engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
28 out of 60
Microsoft 365 / Office 365 / Azure / Dynamics 365 Knowledge Transfer: 3-Hours Professional ServiceIT Partner LLCUnlock the true potential of your Microsoft 365 environment with our specialized "Knowledge Transfer" consulting service – a roadmap to maximize your organization's capabilities.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
29 out of 60
Microsoft 365 Endpoint Manager Deployment Roadmap Assessment - 4 Week AssessmentProtivitiActionable plan and high-level view to move towards a successful Microsoft Endpoint Manager (MEM) deployment and migration
+1
Applicable to:
Cloud Security
30 out of 60
Windows 365 PilotCDWWith the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Licensing Microsoft 365: 1-day AssessmentInformatika a.d.We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
32 out of 60
Microsoft Security Immersion: 1 Day BriefingSynergy Technical, LLCKnowing that your time is valuable, we have developed a true to life, hands-on, interactive session designed to give you a deep understanding of the Microsoft 365 Security suite of products.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
33 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Threat Protection EngagementFIS Managed IT SolutionsLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Cyderes Microsoft Security Adoption AdvisoryCyderesThe Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
36 out of 60
Discover Sensitive Data: 6W - WorkshopExelegentSensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
37 out of 60
End-to-end Threat Protection Workshop and PilotExelegentThe Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Windows in Cloud AssessmentInviso CorporationMaximize your Endpoints! Find out how a Cloud PC could potentially save you money!
+1
Applicable to:
Cloud Security
39 out of 60
MDS - Cybersecurity AssessmentMaureen Data SystemsThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Microsoft 365 Migration 12 Hour Proof-of-ConceptNew Charter Technologies, Inc.Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
41 out of 60
Licensing Optimization: 2-Wk WorkshopeGroup Enabling TechnologiesGain confidence in your level of control with your Microsoft 365 licensing.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
42 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Document Airlift-OneDrive ImplementationSynergy Technical, LLCOur Document Airlift will enable and configure your organization’s environment to use OneDrive for Business services in your Office 365 tenant.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
44 out of 60
Microsoft Sentinel Workshop and PilotCDWThe Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Microsoft 365 Adoption & Change: 1-Year Managed ServiceSignal Alliance Technology HoldingDiscover how our Adoption & Change Management program ensures that we effectively support your business to deploy, drive end-user adoption and maximise your Return on Investment (ROI).
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
46 out of 60
TS As a Services (TSaaS): 5-day ImplementationE-Level Cloud Services S.A. de C.V.Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
47 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight HoldingsStrengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstreamLightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Defender for Endpoint Managed Servicee2e-assure LtdMicrosoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
51 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte LtdHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Hybrid Cloud Security Workshop - 1-DayZones, LLCIdentify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
+1
Applicable to:
Cloud Security
53 out of 60
Windows 365 Assessment - 1 dayCC Bilgi TeknolojileriHybrid Windows for a hybrid world
Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
54 out of 60
Google Workspace to Microsoft 365 Migration - 4 Week AssessmentProtivitiHigh-level migration strategy and assessment for migrating from Google Workspace to Microsoft 365.
+2
Applicable to:
Adoption & Change Management
Cloud Security
55 out of 60
Microsoft 365: 3 Week Solution AssessmentFirst National Technology Solutions, Inc.Partner with FNTS to conduct a 3 week workplace modernization solution assessment to build a TOC analysis & evaluate current purchasing structure to make recommendations for adoption of Microsoft 365.
+3
Applicable to:
Cloud Security
Meetings for Microsoft Teams
Teamwork Deployment
56 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day WorkshopeGroup Enabling Technologies, LLCWith Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
57 out of 60
Microsoft 365 Strategy, guidance and governance workshop by Nexer: 1 DayNexer Group ABWe will help you go through your Microsoft 365 implementation and make sure that you follow Microsofts Best Practices.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
58 out of 60
Microsoft 365: 2-Week ImplementationTechnologentExpert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
59 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServusGain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
60 out of 60