筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Windows 365: 1-month Proof of ConceptSoftline TradeAccess your data anywhere, anytime from any device with Windows 365. Softline is providing you with three different offerings for your organization to kick start Windows 365.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
1 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
2 out of 60
Assessment - Workplace Modernization & Optimization - 1-MonthZones Inc.Analysis of current environment to highlight opportunities to reduce duplicative cost and modernize your workplace
+3
Applicable to:
Calling for Microsoft Teams
Compliance Advisory Services
Identity & Access Management
3 out of 60
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso CorporationHelping customers KickStart features in Microsoft 365 E3 Subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
4 out of 60
HSBS Cloud Modern Work Migração de Google para Microsoft 365HSBSMigração de Google para Microsoft 365: Simplifique a transição com eficiência e segurança
+3
Applicable to:
Adoption & Change Management
Frontline Workers
Identity & Access Management
5 out of 60
Threat Protection Assessment & Zero Trust ArchitectureBDO Digital, LLCSet Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Architecture and Threat Protection Assessment
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
6 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Window 365 Cloud PC: 3-Day Proof-of-ConceptCTGlobal A/SAssess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
8 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense GlobalStop threats with a cloud-native SIEM adapted to your new business needs.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
9 out of 60
Fortis IR Table Top ExercisesSentinel Technologies Inc.Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Copilot Readiness AssessmentAscent Global, Inc.Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Okta to Entra Migration: Roadmap ArchitectAscent Global, Inc.Roadmap and architect the shift from Okta to Microsoft Entra’s enhanced data security
+1
Applicable to:
Identity & Access Management
12 out of 60
Microsoft 365 Copilot Data and Security Readiness: 4-Week AssessmentSpyglass MTG, LLCOur Microsoft 365 Copilot Data and Security Readiness Assessment is a scoped engagement that is designed to accelerate the ability to integrate and consume Copilot across your enterprise.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
13 out of 60
Microsoft Sentinel - Monitor file access and permission changes in SharePoint Implementation: 5-Days Professional ServiceIT Partner LLCImplement Microsoft Sentinel for monitoring file access and permission changes in SharePoint, ensuring prompt detection and notification of unauthorized or unwanted activities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Google to Microsoft 365 MigrationManaged SolutionEmpowering digital transformation through a Google to Microsoft 365 migration with world-class support, so you can focus on what matters most—your business.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
15 out of 60
Autopilot: 1-Wk AssessmentFSI StrategiesFSi Strategies will review the deployment scenarios with the client and deliver a Discovery and Assessment document on Windows Autopilot, and the level of effort to deploy in the environment.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
16 out of 60
Implementation of Microsoft Copilot and AgentsStoneridge Software LLCA structured enablement journey that helps organizations strategically align, technically prepare, and culturally adopt Microsoft Copilot
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
17 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeITCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Incident Response RetainerSentinel Technologies Inc.Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Copilot for Security Readiness AssessmentBulletproof Solutions Inc.Get a Copilot for Security Readiness + a Security Health Check on your Microsoft 365 environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Security Outcomes SprintAscent Global, Inc.Understand the Business Value of Your Cybersecurity Investments
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
21 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era TechnologyM&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
22 out of 60
Capgemini Modern Workspace PortfolioCapgemini GroupCapgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
23 out of 60
Microsoft Security Copilot Readiness AssessmentSoftchoiceAims to ensure organizations can securely utilize Microsoft’s Copilot for Security and identifying gaps in signal data from core Microsoft security products
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Microsoft Yammer Tenant-to-Tenant Migration: 1-Wk Professional ServiceIT Partner LLCFacilitate a smooth transition of your Yammer network and its associated data from one Microsoft 365 tenant to another.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
25 out of 60
Microsoft 365 Copilot Everyday AI Adoption: 2wksInsightInsight’s Everyday AI Adoption for Microsoft 365 Copilot Program is designed to help organizations bring this technology to users in a way that promotes responsible adoption and drives productivity.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
26 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 60
Securing Identities: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Securing Identities is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+1
Applicable to:
Identity & Access Management
28 out of 60
MDS - Cybersecurity AssessmentMaureen Data SystemsThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Microsoft Intune: 4-Wk Implementation ServicesTechNet UC LLCBaseline Microsoft Intune Design and Deployment Services - Comprehensive
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
30 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
31 out of 60
Microsoft Entra in 30: 6-wk ImplementationLong View SystemsLong View’s Entra in 30 offers a unified identity, access security, and data governance solution to help minimize these cybersecurity risks in 30 days.
+1
Applicable to:
Identity & Access Management
32 out of 60
Microsoft Copilot Data SecurityFAST: 6-Week Secure Copilot Implementation using Microsoft Purview, Entra, and SentinelMAQ SoftwareElevate your AI adoption with enterprise-grade security
+1
Applicable to:
Identity & Access Management
33 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Windows 365: 4 Week Readiness AssessmentNetrix GlobalGet an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
35 out of 60
Secure Remote Workplace: 1-Wk WorkshopFSI Strategies5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
36 out of 60
CSE CMMC L1 & L2 Assessment & ImplementationComputer Solutions EastAchieve CMMC 1 & 2 Compliance, Secure Your Cloud with Microsoft 365 & Expert Guidance.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
37 out of 60
Threat Protection: 2-Week WorkshopForsyte IT SolutionsLearn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile ITA 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Microsoft 365 Mergers and Acquisitions (M&A): 4-Week ImplementationSpyglass MTG, LLCSpyglass’s Microsoft 365 Mergers and Acquisitions (M&A) Implementation is a 4-week/ $50k engagement that focuses on quickly being able to move data to its desired destination.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
40 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, IncKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Microsoft Cloud PC - 4 Day Proof of Concept EngagementSynergy Technical, LLCOur Microsoft Cloud PC offering is designed to help organizations simplify desktop management, increase security, streamline application delivery and increase end user satisfaction.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
42 out of 60
Collab Now: 4-Wk ImplementationLong View SystemsCollab Now (Microsoft 365) supports worker productivity by delivering and managing a unified and integrated collaboration platform
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
43 out of 60
CMMC Implementation for Microsoft 365 (8 Wk Proj)Summit 7 Systems, IncSummit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) practices associated with Levels 1-3 for Microsoft 365, as well as Azure and AAD where appropriate.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
44 out of 60
Zero Trust Workplace Implementation ServicesSoftchoiceSolution for organizations wanting to improve their overall security posture by implementing key security features for protecting user identity, devices, and data.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
45 out of 60
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
46 out of 60
Microsoft 365 Managed ServicesNetrix GlobalNetrix’s 24x7x365 managed services for Microsoft 365 combines a reactive service desk with proactive strategic planning to ensure your team is productive and secure.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
47 out of 60
Varonis JumpstartSentinel Technologies Inc.Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile ITAgile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
49 out of 60
Implementation of Microsoft Purview QuickStartPresidioEnhance security posture, data protection, and governance with Microsoft Purview QuickStart: implementation by Presidio offering.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
50 out of 60
General Data Protection Regulation (GDPR): 4-Wk Data Discovery ServiceIT Partner LLCMulti-step process to discover and scan data sources within the organization for personal data. The outcome: detailed inventory of data sources, together with the data they contain.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
51 out of 60
Zero Trust Security AssessmentConcurrency, Inc.Assess and advance your Zero Trust security posture—and accelerate or expand your Microsoft 365 security strategy with expert-led guidance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365 GCC High for CMMC/ITAR: 6-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity which includes partial or all going to Microsoft 365 GCC High by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
53 out of 60
Windows 365 Jumpstart: 3 Week ImplementationSteeves We'll discuss the value of Windows 365 and its key functionalities, followed by a workshop to expose key areas and document decisions that drive implementation to ensure a successful adoption.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
54 out of 60
Windows 365: 5-week Proof of ConceptInterlink Cloud Advisors, Inc.Enhance productivity through flexibility by enabling your team to create secure Cloud PCs and allowing BYOD without increasing risk to your environment
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
55 out of 60
Modern Work Services Proof of ConceptCrayon USCrayon Modern Work Services PoC will help you pilot a subset of users with the best of Microsoft 365 prior to implementation. This will allow us to ensure a smooth transition for all users.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Meetings for Microsoft Teams
56 out of 60
Mergers and Acquisitions PlaybookIvision, Inc.ivision leverages an approach and methodology designed to help clients successfully plan and design for a M/A&D migrations to achieve successful mergers, consolidation or a separation outcome.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
57 out of 60
Microsoft 365 Security BriefingCDI LLCA Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Microsoft Security: 4-Week ImplementationApex Digital SolutionsEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Windows 365 Accelerator: 4 Week ImplementationKiZAN TechnologiesDuring this 4-week engagement, KiZAN will assist with the design and implementation of Windows 365, including education, planning, documentation, and pilot for up to 50 users.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
60 out of 60