筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 559 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Microsoft 365: 2-Week ImplementationTechnologent
Adoption & Change Management
Cloud Security
Identity & Access ManagementExpert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
1 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServus
Cloud Security
Identity & Access Management
Information Protection & GovernanceGain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBA
Cloud Security
Identity & Access Management
Information Protection & GovernanceDefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
3 out of 60
Microsoft Endpoint Management: 5-Day Proof of ConcepteGroup Enabling Technologies, LLC
Identity & Access Management
Information Protection & Governance
Mobile Device ManagementeGroup Enabling Technologies, LLC. Microsoft Endpoint Management Proof of Concept will allow you to modernize your endpoint management as part of an overall device management strategy.
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
4 out of 60
OENG - Next Generation Endpoints-1 Month Proof of ConceptSecure Nextgen Systems
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementLearn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
5 out of 60
Offer Name: Microsoft 365 CrashCourse - 1 week WorkshopVirteva LLC
Identity & Access Management
Knowledge & Insights
Mobile Device ManagementEmpower organizations to gain a deeper understanding of Microsoft 365 and its vast array of services, features, and capabilities through Virteva's Microsoft 365 CrashCourse Workshop.
Applicable to:
Identity & Access Management
Knowledge & Insights
Mobile Device Management
6 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLC
Cloud Security
Identity & Access Management
Threat ProtectionGet a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Secure Remote Workplace: 1-Wk WorkshopFSI Strategies
Cloud Security
Device Deployment & Management
Identity & Access Management5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
8 out of 60
Modernize Endpoints Consulting Offer: 3 Days ImplementationAdaptive Business Communications Ltd t/a CloudAssist
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementWith Hybrid work becoming prevalent and increasing threat trends, organizations need to proactively secure & modernize management of their endpoints across mobile, PCs and including virtual endpoints.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
9 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
Cloud Security
Identity & Access ManagementPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
Applicable to:
Cloud Security
Identity & Access Management
10 out of 60
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix Global
Identity & Access Management
Information Protection & Governance
Insider RiskA 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
11 out of 60
Managed Endpoint AssessmentFSI Strategies
Device Deployment & Management
Identity & Access Management
Information Protection & GovernanceThis four-week engagement will determine the level of effort required for a migration to a fully modern desktop using Microsoft 365 services.
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
12 out of 60
Autopilot: 2-Wk Proof of ConceptFSI Strategies
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementFSi Strategies will review the deployment scenarios with the client and execute a proof of concept up to 25 devices in order to demonstrate the capabilities of Windows Autopilot
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
13 out of 60
Autopilot: 1-Wk AssessmentFSI Strategies
Adoption & Change Management
Device Deployment & Management
Identity & Access ManagementFSi Strategies will review the deployment scenarios with the client and deliver a Discovery and Assessment document on Windows Autopilot, and the level of effort to deploy in the environment.
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
14 out of 60
Modern Managed Endpoints: 4-Wk Proof of ConceptFSI Strategies
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementModernize your organization with end-to-end device management and monitoring, FSi Strategies will demonstrate modern device management and security using the latest in Microsoft 365 technology
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
15 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbH
Cloud Security
Identity & Access Management
Threat ProtectionStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure Identities and Access: 4-Week Engagement & WorkshopCompuNet
Compliance Advisory Services
Identity & Access Management
Insider Risk4-week engagement and workshop that helps customers design and plan out their optimal identity model to ensure they have a roadmap to enhanced security using Microsoft 365 and Azure Active Directory
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
17 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementationInterlink Cloud Advisors, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionLearn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Multifactor Authentication: 4-Day ImplementationFSI Strategies
Cloud Security
Identity & Access Management
Threat ProtectionImplementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Microsoft 365 Defender: 2-Wk AssessmentAlithya Fullscope Solutions, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAlithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
OAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen Systems
Identity & Access Management
Insider Risk
Threat ProtectionLearn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
21 out of 60
The Modern Workplace: 1 hour Briefing SessionAutomize
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device ManagementThis 1 hours briefing session provides a complete overview of our Modern Workplace concept of Endpoint Management, Identity & Access Management and Collaboration Solutions in context to your business.
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device Management
22 out of 60
Solution Assessment for Security: 30 DayConcurrency, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionAn assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
23 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformanta
Cloud Security
Identity & Access Management
Threat ProtectionThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk EngagementCloudScale International
Cloud Security
Identity & Access Management
Mobile Device ManagementThis assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
25 out of 60
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-WeeksInvoke
Cloud Security
Compliance Advisory Services
Identity & Access ManagementInvoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
26 out of 60
Defender for Endpoint: 5-Day ImplementationITC Secure Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionAccelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
27 out of 60
Windows Intune: 1-Wk Accelerated ImplementionITC Secure Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionAccelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
28 out of 60
cyber security threat analysis workshopU-BTech Solutions
Cloud Security
Identity & Access Management
Threat Protectionthe workshop is design to discover threats and risks
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Exchange Migration to Microsoft 365: 6-Week ImplementationAll Covered, a division of Konica Minolta
Adoption & Change Management
Identity & Access ManagementAll Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
Applicable to:
Adoption & Change Management
Identity & Access Management
30 out of 60
NTT Americas - Microsoft Device ManagementNTT Limited
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementDeployment of Microsoft Unified Endpoint Management Services. Assessment of your resources and business objectives to develop a fresh approach to your security strategy.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
31 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionInterlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Invoke Data Risk AssessmentInvoke
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThis assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
33 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and PlanningAgile IT
Cloud Security
Identity & Access Management
Mobile Device ManagementShorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
34 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
Cloud Security
Identity & Access Management
Threat ProtectionWith Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security Ltd
Cloud Security
Identity & Access Management
Information Protection & GovernanceThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
36 out of 60
Quadra Entra Permissions ManagementQuadrasystems.net (India) P Ltd
Identity & Access ManagementUnderstand how permissions creep can impact the attack surface risk in your cloud infrastructure
Understand how to manage user and identity risk
Applicable to:
Identity & Access Management
37 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş.
Cloud Security
Identity & Access Management
Threat Protection"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed Canary
Cloud Security
Identity & Access Management
Threat ProtectionGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Modern EndPoint Management - Jumpstart: 1-Wk Proof of ConceptLogicalis, Inc.
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementIntune Jumpstart will help showcase the value of Microsoft Intune, to show you how to more effectively manage endpoints within Intune. Proof of Concept deployment included!
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
40 out of 60
Red Canary Cloud Security AssessmentRed Canary
Cloud Security
Identity & Access Management
Threat ProtectionAssess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.
Cloud Security
Identity & Access Management
Threat ProtectionWe will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPO
Device Deployment & Management
Identity & Access Management
Threat ProtectionThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
43 out of 60
Endpoint Management with Security WorkshopMigrate LLC
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementLet us show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
44 out of 60
Wc-PC- Wragby Cloud PCWragby Business Solutions & Technologies Limited
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
45 out of 60
Windows 365 Deployment : 12 month ImplementationPatriot Consulting Technology Group LLC
Cloud Security
Identity & Access Management
Mobile Device ManagementPatriot will design, configure, test and deploy Microsoft Windows 365 for your environment.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
46 out of 60
MFA JumpstartSentinel Technologies Inc.
Cloud Security
Identity & Access ManagementMulti-factor authentication is a process in which users are prompted during the sign-in
process for an additional form of identification, such as a code on their cellphone or a
fingerprint scan.
Applicable to:
Cloud Security
Identity & Access Management
47 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen Systems
Cloud Security
Identity & Access Management
Insider RiskThe Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
48 out of 60
ADFS to Microsoft Entra ID Migration: 4-Wk ImplementationPerformanta
Identity & Access ManagementUndertake a seamless ADFS to Microsoft Entra ID app migration, improving security, offering up new features, and getting your organisation back on track.
Applicable to:
Identity & Access Management
49 out of 60
Windows 365 Standardized PilotMobile Mentor
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
50 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Mobile Device ManagementThe primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
51 out of 60
Office 365 Tenant - Initial Setup: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Identity & Access ManagementThe goal is to efficiently and effectively set up your organization's Office 365 tenant, enabling seamless access to a suite of productivity tools and collaboration services.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
52 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThis service moves key server tasks to a new one for upgrades or system changes.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
53 out of 60
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski Security
Identity & Access Management
Information Protection & Governance
Insider RiskKudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
54 out of 60
Microsoft Copilot Readiness Discovery: 3-Wk AssessmentProServeIT
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceA Microsoft Copilot Readiness Assessment will identify your AI foundational requirements & permission settings to prepare your organization for leading edge efficiency.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
55 out of 60
Implementation of Microsoft Defender for EndpointCDW
Cloud Security
Identity & Access Management
Threat ProtectionCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Cloud App Security Information and Threat Protection: 3-Wk Professional serviceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionProtect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Multi-Factor Authentication - Initial Setup: 3-Professional serviceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThe goal of the service is to make Microsoft 365 accounts safer by adding an extra layer of security, so only authorized users can access them.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
58 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionThe goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60