筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 570 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Copilot Readiness AssessmentAscent Global, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAscent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Empowering Digital Transformation with AI Microsoft Copilot SolutionsSonata Software Ltd.
Frontline Workers
Identity & Access Management
Meetings for Microsoft TeamsOur tailored Microsoft Copilot solutions blend human expertise with intelligent automation, delivering efficiency, productivity, and personalization across industries.
Applicable to:
Frontline Workers
Identity & Access Management
Meetings for Microsoft Teams
2 out of 60
Secure Identities and Access: 4-Week Engagement & WorkshopCompuNet
Compliance Advisory Services
Identity & Access Management
Insider Risk4-week engagement and workshop that helps customers design and plan out their optimal identity model to ensure they have a roadmap to enhanced security using Microsoft 365 and Azure Active Directory
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
3 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
Cloud Security
Identity & Access Management
Threat ProtectionThis engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionInterlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionComplimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Secure Data Management with Microsoft PurviewAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionPrepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Intune Foundation JumpstartSentinel Technologies Inc.
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementMicrosoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM).
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
9 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionOur security services provide a holistic approach through advisory,implementation & managed services
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Implementation of Microsoft Defender for Cloud AppsCDW
Cloud Security
Identity & Access Management
Threat ProtectionCDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Copilot for Microsoft 365 Pilot Launch: 2-Wk Proof of ConceptProServeIT
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceA rapid Copilot for Microsoft 365 pilot/proof of concept with an initial use case will provide quick value from AI and learnings to expand the roll out and more use cases to other groups.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
12 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloud
Cloud Security
Compliance Advisory Services
Identity & Access ManagementTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
13 out of 60
Microsoft 365: 2-Week ImplementationTechnologent
Adoption & Change Management
Cloud Security
Identity & Access ManagementExpert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
14 out of 60
Windows 365: 10-day Pilot ServiceUltima Business
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementUltima Business Solutions offers a 10 day, potentially funded, pilot service to help you explore the benefits of Windows 365, the cloud-based Windows experience that enables hybrid work scenarios.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
15 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP Technologies
Cloud Security
Identity & Access Management
Threat ProtectionThe SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Modern Device Management ImplementationDXC
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementImprove the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
17 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
18 out of 60
Zero Trust as a Service (ZTaaS)Aegis Innovators
Cloud Security
Identity & Access Management
Threat ProtectionDigital transformation and adopting AI starts with building a secure foundation.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SAS
Cloud Security
Identity & Access Management
Threat ProtectionConsultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Identity WorkshopSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionLeave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAn in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Identity and Access Management SolutionH One (Private) Limited
Cloud Security
Identity & Access Management
Insider RiskEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
23 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementLeverage your Microsoft investment to create a strong Zero Trust security environment.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
24 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.
Cloud Security
Identity & Access Management
Threat ProtectionThis Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONS
Cloud Security
Identity & Access Management
Threat ProtectionUNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Lightstream Data Security AssessmentLightstream
Cloud Security
Identity & Access Management
Information Protection & GovernanceLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 60
Enhanced Data Privacy with Microsoft PurviewAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
28 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.
Cloud Security
Identity & Access Management
Threat ProtectionThis offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
On-Prem Exchange to Office 365 Migration: 4-Wk MigrationExodus Integrity Services, Inc.
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceSimplify your email migration process to Office 365 with ease and efficiency.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
30 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITED
Identity & Access Management
Information Protection & Governance
Threat ProtectionConditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
35 out of 60
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data Ltd
Identity & Access Management
Information Protection & Governance
Threat ProtectionWhether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLC
Cloud Security
Identity & Access Management
Threat ProtectionGet a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Data Security and Compliance Assessment for Microsoft 365Neway Technologies
Identity & Access Management
Information Protection & Governance
Threat ProtectionGet more out of compliance using your orgnaizations data and behaviors to drive policy. Ensuring you maintain productivity while ensuring your business is safe and secure.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
39 out of 60
Microsoft Entra Domain Services WiFi AuthenticationAlfa Connections Pte Ltd
Identity & Access Management
Information Protection & GovernanceEnable secure Wi-Fi and legacy app authentication using Microsoft Entra Domain Services with LDAP support—ideal for organizations migrating from on-premises AD to Azure.
Applicable to:
Identity & Access Management
Information Protection & Governance
40 out of 60
Endpoint Management Solutions: 4-Wk ImplementationSignal Alliance Technology Holding
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementDiscover how Signal Alliance Consulting enables users in your organization to be productive, on any device, without compromising IT security by leveraging Microsoft Endpoint Management.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
41 out of 60
Windows 365 Assessment - 1 dayCC Bilgi Teknolojileri
Cloud Security
Device Deployment & Management
Identity & Access ManagementHybrid Windows for a hybrid world
Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
42 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies Ltd
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Windows 365: 5-week Proof of ConceptInterlink Cloud Advisors, Inc.
Identity & Access Management
Information Protection & Governance
Mobile Device ManagementEnhance productivity through flexibility by enabling your team to create secure Cloud PCs and allowing BYOD without increasing risk to your environment
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
44 out of 60
Windows as a Service: 4-Wk ImplementationAMTRA Solutions Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionSecure your data and devices, identities and your business with Windows 10/11.
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
45 out of 60
Windows 365 Accelerator: 4 Week ImplementationKiZAN Technologies
Device Deployment & Management
Identity & Access Management
Knowledge & InsightsDuring this 4-week engagement, KiZAN will assist with the design and implementation of Windows 365, including education, planning, documentation, and pilot for up to 50 users.
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
46 out of 60
Pentest-4wks AssessmentadaQuest
Identity & Access Management
Insider Risk
Threat ProtectionGain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
47 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro Ltd
Cloud Security
Identity & Access Management
Threat ProtectionWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementationCloudshift
Device Deployment & Management
Identity & Access Management
Mobile Device Management3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
49 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServus
Cloud Security
Identity & Access Management
Information Protection & GovernanceGain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
50 out of 60
OENG - Next Generation Endpoints-1 Month Proof of ConceptSecure Nextgen Systems
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementLearn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
51 out of 60
Offer Name: Microsoft 365 CrashCourse - 1 week WorkshopVirteva LLC
Identity & Access Management
Knowledge & Insights
Mobile Device ManagementEmpower organizations to gain a deeper understanding of Microsoft 365 and its vast array of services, features, and capabilities through Virteva's Microsoft 365 CrashCourse Workshop.
Applicable to:
Identity & Access Management
Knowledge & Insights
Mobile Device Management
52 out of 60
Secure Remote Workplace: 1-Wk WorkshopFSI Strategies
Cloud Security
Device Deployment & Management
Identity & Access Management5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
53 out of 60
Modernize Endpoints Consulting Offer: 3 Days ImplementationAdaptive Business Communications Ltd t/a CloudAssist
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementWith Hybrid work becoming prevalent and increasing threat trends, organizations need to proactively secure & modernize management of their endpoints across mobile, PCs and including virtual endpoints.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
54 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
Cloud Security
Identity & Access ManagementPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
Applicable to:
Cloud Security
Identity & Access Management
55 out of 60
Windows 365 Cloud PC: 4-Wk Proof of ConceptSignal Alliance Technology Holding
Adoption & Change Management
Device Deployment & Management
Identity & Access ManagementDiscover how Signal Alliance Consulting helps you get started with Windows 365, the worlds first cloud PC that helps you access your data from anywhere, anytime from any device.
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
56 out of 60
Managed Endpoint AssessmentFSI Strategies
Device Deployment & Management
Identity & Access Management
Information Protection & GovernanceThis four-week engagement will determine the level of effort required for a migration to a fully modern desktop using Microsoft 365 services.
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
57 out of 60
Autopilot: 2-Wk Proof of ConceptFSI Strategies
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementFSi Strategies will review the deployment scenarios with the client and execute a proof of concept up to 25 devices in order to demonstrate the capabilities of Windows Autopilot
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
58 out of 60
Autopilot: 1-Wk AssessmentFSI Strategies
Adoption & Change Management
Device Deployment & Management
Identity & Access ManagementFSi Strategies will review the deployment scenarios with the client and deliver a Discovery and Assessment document on Windows Autopilot, and the level of effort to deploy in the environment.
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
59 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbH
Cloud Security
Identity & Access Management
Threat ProtectionStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection