筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 559 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstream
Cloud Security
Identity & Access Management
Threat ProtectionLightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Microsoft Funded Workshop for Copilot for Microsoft 365: 2-Wk AssessmentProServeIT
Compliance Advisory Services
Identity & Access ManagementIf your company is eligible, we can deliver a Microsoft funded readiness assessment for Copilot for Microsoft 365 to you free of charge ($5,000 USD value).
Applicable to:
Compliance Advisory Services
Identity & Access Management
2 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte Ltd
Cloud Security
Identity & Access Management
Threat ProtectionHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Office 365 Migration from Exchange: 15-Day ImplementationProServeIT
Adoption & Change Management
Identity & Access ManagementMigrate on-premise Microsoft Exchange email infrastructure to Office 365 in Microsoft's cloud infrastructure
Applicable to:
Adoption & Change Management
Identity & Access Management
4 out of 60
Windows 365 Assessment - 1 dayCC Bilgi Teknolojileri
Cloud Security
Device Deployment & Management
Identity & Access ManagementHybrid Windows for a hybrid world
Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
5 out of 60
Windows 365: 5-week Proof of ConceptInterlink Cloud Advisors, Inc.
Identity & Access Management
Information Protection & Governance
Mobile Device ManagementEnhance productivity through flexibility by enabling your team to create secure Cloud PCs and allowing BYOD without increasing risk to your environment
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
6 out of 60
Windows as a Service: 4-Wk ImplementationAMTRA Solutions Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionSecure your data and devices, identities and your business with Windows 10/11.
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
7 out of 60
Office 365 Managment: 1 Day AssessmentEze Castle Integration
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementECI will review your Office 365 Tennant Configuration and suggest on-going managment needs
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
8 out of 60
Windows 365 Accelerator: 4 Week ImplementationKiZAN Technologies
Device Deployment & Management
Identity & Access Management
Knowledge & InsightsDuring this 4-week engagement, KiZAN will assist with the design and implementation of Windows 365, including education, planning, documentation, and pilot for up to 50 users.
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
9 out of 60
Pentest-4wks AssessmentadaQuest
Identity & Access Management
Insider Risk
Threat ProtectionGain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
10 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementationCloudshift
Device Deployment & Management
Identity & Access Management
Mobile Device Management3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
11 out of 60
Microsoft 365: 2-Week ImplementationTechnologent
Adoption & Change Management
Cloud Security
Identity & Access ManagementExpert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
12 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServus
Cloud Security
Identity & Access Management
Information Protection & GovernanceGain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
13 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBA
Cloud Security
Identity & Access Management
Information Protection & GovernanceDefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
14 out of 60
Microsoft Endpoint Management: 5-Day Proof of ConcepteGroup Enabling Technologies, LLC
Identity & Access Management
Information Protection & Governance
Mobile Device ManagementeGroup Enabling Technologies, LLC. Microsoft Endpoint Management Proof of Concept will allow you to modernize your endpoint management as part of an overall device management strategy.
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
15 out of 60
OENG - Next Generation Endpoints-1 Month Proof of ConceptSecure Nextgen Systems
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementLearn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
16 out of 60
Offer Name: Microsoft 365 CrashCourse - 1 week WorkshopVirteva LLC
Identity & Access Management
Knowledge & Insights
Mobile Device ManagementEmpower organizations to gain a deeper understanding of Microsoft 365 and its vast array of services, features, and capabilities through Virteva's Microsoft 365 CrashCourse Workshop.
Applicable to:
Identity & Access Management
Knowledge & Insights
Mobile Device Management
17 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLC
Cloud Security
Identity & Access Management
Threat ProtectionGet a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Secure Remote Workplace: 1-Wk WorkshopFSI Strategies
Cloud Security
Device Deployment & Management
Identity & Access Management5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
19 out of 60
Modernize Endpoints Consulting Offer: 3 Days ImplementationAdaptive Business Communications Ltd t/a CloudAssist
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementWith Hybrid work becoming prevalent and increasing threat trends, organizations need to proactively secure & modernize management of their endpoints across mobile, PCs and including virtual endpoints.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
20 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
Cloud Security
Identity & Access ManagementPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
Applicable to:
Cloud Security
Identity & Access Management
21 out of 60
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix Global
Identity & Access Management
Information Protection & Governance
Insider RiskA 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
22 out of 60
Managed Endpoint AssessmentFSI Strategies
Device Deployment & Management
Identity & Access Management
Information Protection & GovernanceThis four-week engagement will determine the level of effort required for a migration to a fully modern desktop using Microsoft 365 services.
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
23 out of 60
Autopilot: 2-Wk Proof of ConceptFSI Strategies
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementFSi Strategies will review the deployment scenarios with the client and execute a proof of concept up to 25 devices in order to demonstrate the capabilities of Windows Autopilot
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
24 out of 60
Autopilot: 1-Wk AssessmentFSI Strategies
Adoption & Change Management
Device Deployment & Management
Identity & Access ManagementFSi Strategies will review the deployment scenarios with the client and deliver a Discovery and Assessment document on Windows Autopilot, and the level of effort to deploy in the environment.
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
25 out of 60
Modern Managed Endpoints: 4-Wk Proof of ConceptFSI Strategies
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementModernize your organization with end-to-end device management and monitoring, FSi Strategies will demonstrate modern device management and security using the latest in Microsoft 365 technology
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
26 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbH
Cloud Security
Identity & Access Management
Threat ProtectionStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure Identities and Access: 4-Week Engagement & WorkshopCompuNet
Compliance Advisory Services
Identity & Access Management
Insider Risk4-week engagement and workshop that helps customers design and plan out their optimal identity model to ensure they have a roadmap to enhanced security using Microsoft 365 and Azure Active Directory
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
28 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementationInterlink Cloud Advisors, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionLearn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Multifactor Authentication: 4-Day ImplementationFSI Strategies
Cloud Security
Identity & Access Management
Threat ProtectionImplementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Microsoft 365 Defender: 2-Wk AssessmentAlithya Fullscope Solutions, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAlithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
OAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen Systems
Identity & Access Management
Insider Risk
Threat ProtectionLearn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
32 out of 60
The Modern Workplace: 1 hour Briefing SessionAutomize
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device ManagementThis 1 hours briefing session provides a complete overview of our Modern Workplace concept of Endpoint Management, Identity & Access Management and Collaboration Solutions in context to your business.
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device Management
33 out of 60
Solution Assessment for Security: 30 DayConcurrency, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionAn assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
34 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformanta
Cloud Security
Identity & Access Management
Threat ProtectionThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk EngagementCloudScale International
Cloud Security
Identity & Access Management
Mobile Device ManagementThis assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
36 out of 60
Modern Work Services Proof of ConceptCrayon US
Calling for Microsoft Teams
Identity & Access Management
Meetings for Microsoft TeamsCrayon Modern Work Services PoC will help you pilot a subset of users with the best of Microsoft 365 prior to implementation. This will allow us to ensure a smooth transition for all users.
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Meetings for Microsoft Teams
37 out of 60
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-WeeksInvoke
Cloud Security
Compliance Advisory Services
Identity & Access ManagementInvoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
38 out of 60
Defender for Endpoint: 5-Day ImplementationITC Secure Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionAccelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
39 out of 60
Windows Intune: 1-Wk Accelerated ImplementionITC Secure Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionAccelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
40 out of 60
cyber security threat analysis workshopU-BTech Solutions
Cloud Security
Identity & Access Management
Threat Protectionthe workshop is design to discover threats and risks
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Exchange Migration to Microsoft 365: 6-Week ImplementationAll Covered, a division of Konica Minolta
Adoption & Change Management
Identity & Access ManagementAll Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
Applicable to:
Adoption & Change Management
Identity & Access Management
42 out of 60
NTT Americas - Microsoft Device ManagementNTT Limited
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementDeployment of Microsoft Unified Endpoint Management Services. Assessment of your resources and business objectives to develop a fresh approach to your security strategy.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
43 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionInterlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era Technology
Adoption & Change Management
Identity & Access Management
Teamwork DeploymentM&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
45 out of 60
Data Protection Program & Strategy Design - 12 Week ImplementationProtiviti
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceEnd-to-End Data Protection to Identify, Classify, Protect and Optimize Your Data in Microsoft 365
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
46 out of 60
Invoke Data Risk AssessmentInvoke
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThis assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
47 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and PlanningAgile IT
Cloud Security
Identity & Access Management
Mobile Device ManagementShorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
48 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
Cloud Security
Identity & Access Management
Threat ProtectionWith Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security Ltd
Cloud Security
Identity & Access Management
Information Protection & GovernanceThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
50 out of 60
Quadra Entra Permissions ManagementQuadrasystems.net (India) P Ltd
Identity & Access ManagementUnderstand how permissions creep can impact the attack surface risk in your cloud infrastructure
Understand how to manage user and identity risk
Applicable to:
Identity & Access Management
51 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş.
Cloud Security
Identity & Access Management
Threat Protection"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed Canary
Cloud Security
Identity & Access Management
Threat ProtectionGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Modern EndPoint Management - Jumpstart: 1-Wk Proof of ConceptLogicalis, Inc.
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementIntune Jumpstart will help showcase the value of Microsoft Intune, to show you how to more effectively manage endpoints within Intune. Proof of Concept deployment included!
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
54 out of 60
Red Canary Cloud Security AssessmentRed Canary
Cloud Security
Identity & Access Management
Threat ProtectionAssess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.
Cloud Security
Identity & Access Management
Threat ProtectionWe will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPO
Device Deployment & Management
Identity & Access Management
Threat ProtectionThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
57 out of 60
Endpoint Management with Security WorkshopMigrate LLC
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementLet us show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
58 out of 60
Wc-PC- Wragby Cloud PCWragby Business Solutions & Technologies Limited
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
59 out of 60
Windows 365 Deployment : 12 month ImplementationPatriot Consulting Technology Group LLC
Cloud Security
Identity & Access Management
Mobile Device ManagementPatriot will design, configure, test and deploy Microsoft Windows 365 for your environment.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
60 out of 60