筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 559 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Data Protection Impact Assessment: 8 WkLighthouse Global
Cloud Security
Compliance Advisory Services
Identity & Access ManagementEmpowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
1 out of 60
Zero Trust Identity and Access Management: 8-16 Weeks Consulting + ImplementationAttosol
Compliance Advisory Services
Identity & Access ManagementIn today’s dynamic digital landscape, traditional security models fall short. Embrace Zero Trust with Microsoft and transform your security strategy to protect against evolving threats.
Applicable to:
Compliance Advisory Services
Identity & Access Management
2 out of 60
Microsoft 365 Security: 2-Week ImplementationTelelink Business Services EAD
Identity & Access Management
Threat ProtectionCreate and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
Applicable to:
Identity & Access Management
Threat Protection
3 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies Ltd
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Your Smart Workplace AssessmentRackspace Technology
Cloud Security
Identity & Access Management
Information Protection & GovernanceYour Smart Workplace Assessment helps organizations develop secure, cost-effective, and productivity-enhancing strategies for modern work environments.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
5 out of 60
Office 365 Managment: 1 Day AssessmentEze Castle Integration
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementECI will review your Office 365 Tennant Configuration and suggest on-going managment needs
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
6 out of 60
Office 365 GCC High Migration +Tenant Imp 4WkSummit 7 Systems, Inc
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceCompanies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
7 out of 60
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) Ltd
Cloud Security
Identity & Access Management
Threat ProtectionReadiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week ProgramWindows Management Experts, Inc.
Identity & Access Management
Insider Risk
Threat ProtectionSecure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
9 out of 60
Microsoft 365 Secure Score: 4 Week ImplementationRazor Technology, LLC
Identity & Access Management
Information Protection & Governance
Threat ProtectionAudit, review, and improve security posture of Microsoft 365 Estate through Secure Score methodology. Receive expert advice for identity, compliance, and threat protection improvements.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 60
Securing Identities WorkshopSynergy Technical, LLC
Cloud Security
Identity & Access Management
Information Protection & GovernanceThe foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
11 out of 60
Zero Trust Defend Against Threats: 7-Wk ImplementationKiZAN Technologies
Identity & Access Management
Mobile Device Management
Threat ProtectionAccelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
12 out of 60
Zero Trust Foundation: 6-Wk ImplementationKiZAN Technologies
Identity & Access Management
Information Protection & Governance
Threat ProtectionAccelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
13 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk AssessmentKiZAN Technologies
Identity & Access Management
Mobile Device Management
Threat ProtectionLeverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
14 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Discover Sensitive Data: 3-Wk AssessmentKiZAN Technologies
Identity & Access Management
Information Protection & GovernanceIdentify and assess the security posture, location, and movement patterns of sensitive data in your organization to better understand required solutions.
Applicable to:
Identity & Access Management
Information Protection & Governance
16 out of 60
Microsoft 365 Passwordless Authentication: 3-Wk ImplementationKiZAN Technologies
Cloud Security
Identity & Access Management
Information Protection & GovernanceUnlock a new era of robust authentication with Microsoft's Passwordless Authentication solutions.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
17 out of 60
Zero Trust Protect and Govern Sensitive DataKiZAN Technologies
Cloud Security
Identity & Access Management
Information Protection & GovernanceLock down your data and take back control. Our Zero Trust Protect and Govern program empowers you to secure your sensitive information, simplify compliance, and gain peace of mind.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
18 out of 60
Modern Work Services Proof of ConceptCrayon US
Calling for Microsoft Teams
Identity & Access Management
Meetings for Microsoft TeamsCrayon Modern Work Services PoC will help you pilot a subset of users with the best of Microsoft 365 prior to implementation. This will allow us to ensure a smooth transition for all users.
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Meetings for Microsoft Teams
19 out of 60
Cloud-Native Migration Service: 4-Month ImplementationCyclotron Inc.
Cloud Security
Identity & Access ManagementWith Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
Applicable to:
Cloud Security
Identity & Access Management
20 out of 60
Threat Protection Engagement FY25The Partner Masters
Cloud Security
Identity & Access Management
Threat ProtectionLearn how to put next-generation Microsoft Security tools to work for you.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Implementation of Microsoft Purview QuickStartPresidio
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceEnhance security posture, data protection, and governance with Microsoft Purview QuickStart: implementation by Presidio offering.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
22 out of 60
Varonis JumpstartSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionSentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Okta to Entra Migration: Roadmap ArchitectAscent Global, Inc.
Identity & Access ManagementRoadmap and architect the shift from Okta to Microsoft Entra’s enhanced data security
Applicable to:
Identity & Access Management
24 out of 60
Copilot for Microsoft 365 Pilot Launch: 2-Wk Proof of ConceptProServeIT
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceA rapid Copilot for Microsoft 365 pilot/proof of concept with an initial use case will provide quick value from AI and learnings to expand the roll out and more use cases to other groups.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
25 out of 60
Journey to Microsoft 365 Copilot: 4-hours WorkshopPROJECT INFORMATICA SRL
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceMicrosoft 365 Copilot workshop bring to you the opportunity to create awareness about holistic to Microsoft 365 Copilot
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
26 out of 60
Active Directory Services: Implementation, Upgrade, and MigrationITX360 (Pvt) Ltd.
Identity & Access ManagementBoost productivity and security with expert Active Directory services. Integrate seamlessly with Microsoft 365 through our implementation, upgrade, and migration solutions
Applicable to:
Identity & Access Management
27 out of 60
atQor Microsoft 365 Security Assessment: 3-Wk AssessmentatQor
Identity & Access Management
Information Protection & Governance
Threat ProtectionGet expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
28 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era Technology
Adoption & Change Management
Identity & Access Management
Teamwork DeploymentM&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
29 out of 60
Data Security and Governance Assessment and RoadmapCentric Consulting, LLC
Identity & Access Management
Information Protection & GovernanceProvide customers with a clear path forward in addressing data security needs
Applicable to:
Identity & Access Management
Information Protection & Governance
30 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte Ltd
Cloud Security
Identity & Access Management
Threat ProtectionHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Office 365 Migration from Exchange: 15-Day ImplementationProServeIT
Adoption & Change Management
Identity & Access ManagementMigrate on-premise Microsoft Exchange email infrastructure to Office 365 in Microsoft's cloud infrastructure
Applicable to:
Adoption & Change Management
Identity & Access Management
32 out of 60
Windows 365 Assessment - 1 dayCC Bilgi Teknolojileri
Cloud Security
Device Deployment & Management
Identity & Access ManagementHybrid Windows for a hybrid world
Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
33 out of 60
Windows 365: 5-week Proof of ConceptInterlink Cloud Advisors, Inc.
Identity & Access Management
Information Protection & Governance
Mobile Device ManagementEnhance productivity through flexibility by enabling your team to create secure Cloud PCs and allowing BYOD without increasing risk to your environment
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
34 out of 60
Windows as a Service: 4-Wk ImplementationAMTRA Solutions Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionSecure your data and devices, identities and your business with Windows 10/11.
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
35 out of 60
Windows 365 Accelerator: 4 Week ImplementationKiZAN Technologies
Device Deployment & Management
Identity & Access Management
Knowledge & InsightsDuring this 4-week engagement, KiZAN will assist with the design and implementation of Windows 365, including education, planning, documentation, and pilot for up to 50 users.
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
36 out of 60
Pentest-4wks AssessmentadaQuest
Identity & Access Management
Insider Risk
Threat ProtectionGain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
37 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementationCloudshift
Device Deployment & Management
Identity & Access Management
Mobile Device Management3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
38 out of 60
Microsoft 365: 2-Week ImplementationTechnologent
Adoption & Change Management
Cloud Security
Identity & Access ManagementExpert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
39 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServus
Cloud Security
Identity & Access Management
Information Protection & GovernanceGain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
40 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBA
Cloud Security
Identity & Access Management
Information Protection & GovernanceDefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
41 out of 60
Microsoft Endpoint Management: 5-Day Proof of ConcepteGroup Enabling Technologies, LLC
Identity & Access Management
Information Protection & Governance
Mobile Device ManagementeGroup Enabling Technologies, LLC. Microsoft Endpoint Management Proof of Concept will allow you to modernize your endpoint management as part of an overall device management strategy.
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
42 out of 60
OENG - Next Generation Endpoints-1 Month Proof of ConceptSecure Nextgen Systems
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementLearn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
43 out of 60
Offer Name: Microsoft 365 CrashCourse - 1 week WorkshopVirteva LLC
Identity & Access Management
Knowledge & Insights
Mobile Device ManagementEmpower organizations to gain a deeper understanding of Microsoft 365 and its vast array of services, features, and capabilities through Virteva's Microsoft 365 CrashCourse Workshop.
Applicable to:
Identity & Access Management
Knowledge & Insights
Mobile Device Management
44 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLC
Cloud Security
Identity & Access Management
Threat ProtectionGet a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Secure Remote Workplace: 1-Wk WorkshopFSI Strategies
Cloud Security
Device Deployment & Management
Identity & Access Management5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
46 out of 60
Modernize Endpoints Consulting Offer: 3 Days ImplementationAdaptive Business Communications Ltd t/a CloudAssist
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementWith Hybrid work becoming prevalent and increasing threat trends, organizations need to proactively secure & modernize management of their endpoints across mobile, PCs and including virtual endpoints.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
47 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
Cloud Security
Identity & Access ManagementPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
Applicable to:
Cloud Security
Identity & Access Management
48 out of 60
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix Global
Identity & Access Management
Information Protection & Governance
Insider RiskA 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
49 out of 60
Managed Endpoint AssessmentFSI Strategies
Device Deployment & Management
Identity & Access Management
Information Protection & GovernanceThis four-week engagement will determine the level of effort required for a migration to a fully modern desktop using Microsoft 365 services.
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
50 out of 60
Autopilot: 2-Wk Proof of ConceptFSI Strategies
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementFSi Strategies will review the deployment scenarios with the client and execute a proof of concept up to 25 devices in order to demonstrate the capabilities of Windows Autopilot
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
51 out of 60
Autopilot: 1-Wk AssessmentFSI Strategies
Adoption & Change Management
Device Deployment & Management
Identity & Access ManagementFSi Strategies will review the deployment scenarios with the client and deliver a Discovery and Assessment document on Windows Autopilot, and the level of effort to deploy in the environment.
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
52 out of 60
Modern Managed Endpoints: 4-Wk Proof of ConceptFSI Strategies
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementModernize your organization with end-to-end device management and monitoring, FSi Strategies will demonstrate modern device management and security using the latest in Microsoft 365 technology
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
53 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbH
Cloud Security
Identity & Access Management
Threat ProtectionStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure Identities and Access: 4-Week Engagement & WorkshopCompuNet
Compliance Advisory Services
Identity & Access Management
Insider Risk4-week engagement and workshop that helps customers design and plan out their optimal identity model to ensure they have a roadmap to enhanced security using Microsoft 365 and Azure Active Directory
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
55 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementationInterlink Cloud Advisors, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionLearn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Multifactor Authentication: 4-Day ImplementationFSI Strategies
Cloud Security
Identity & Access Management
Threat ProtectionImplementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Microsoft 365 Defender: 2-Wk AssessmentAlithya Fullscope Solutions, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAlithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
OAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen Systems
Identity & Access Management
Insider Risk
Threat ProtectionLearn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
59 out of 60
The Modern Workplace: 1 hour Briefing SessionAutomize
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device ManagementThis 1 hours briefing session provides a complete overview of our Modern Workplace concept of Endpoint Management, Identity & Access Management and Collaboration Solutions in context to your business.
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device Management
60 out of 60