筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 561 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
NTT Americas - Microsoft Device ManagementNTT Limited
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementDeployment of Microsoft Unified Endpoint Management Services. Assessment of your resources and business objectives to develop a fresh approach to your security strategy.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
1 out of 60
1ID Platform for EDUTelelink Business Services EAD
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
2 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.
Cloud Security
Identity & Access ManagementThis offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
Applicable to:
Cloud Security
Identity & Access Management
3 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era Technology
Adoption & Change Management
Identity & Access Management
Teamwork DeploymentM&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
4 out of 60
Data Protection Program & Strategy Design - 12 Week ImplementationProtiviti
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceEnd-to-End Data Protection to Identify, Classify, Protect and Optimize Your Data in Microsoft 365
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
5 out of 60
Teams Hosted Direct Routing: 2-week ImplementationQuisitive
Calling for Microsoft Teams
Identity & Access Management
Teams Custom SolutionsQuisitive Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
6 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
Cloud Security
Identity & Access Management
Threat ProtectionWith Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Quadra Entra Permissions ManagementQuadrasystems.net (India) P Ltd
Identity & Access ManagementUnderstand how permissions creep can impact the attack surface risk in your cloud infrastructure
Understand how to manage user and identity risk
Applicable to:
Identity & Access Management
8 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş.
Cloud Security
Identity & Access Management
Threat Protection"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY25CGI Inc.
Cloud Security
Device Deployment & Management
Identity & Access ManagementUtilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
10 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed Canary
Cloud Security
Identity & Access Management
Threat ProtectionGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Red Canary Cloud Security AssessmentRed Canary
Cloud Security
Identity & Access Management
Threat ProtectionAssess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.
Cloud Security
Identity & Access Management
Threat ProtectionWe will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPO
Device Deployment & Management
Identity & Access Management
Threat ProtectionThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
14 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLC
Calling for Microsoft Teams
Cloud Security
Identity & Access ManagementIf you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
15 out of 60
IBM Digital Workforce OfferingIBM Consulting - EA
Adoption & Change Management
Identity & Access Management
Power Platform for TeamsIBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
Applicable to:
Adoption & Change Management
Identity & Access Management
Power Platform for Teams
16 out of 60
Endpoint Management with Security WorkshopMigrate LLC
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementLet us show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
17 out of 60
Wc-PC- Wragby Cloud PCWragby Business Solutions & Technologies Limited
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
18 out of 60
MFA JumpstartSentinel Technologies Inc.
Cloud Security
Identity & Access ManagementMulti-factor authentication is a process in which users are prompted during the sign-in
process for an additional form of identification, such as a code on their cellphone or a
fingerprint scan.
Applicable to:
Cloud Security
Identity & Access Management
19 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionComplimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Cloud-Native Migration Service: 4-Month ImplementationCyclotron Inc.
Cloud Security
Identity & Access ManagementWith Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
Applicable to:
Cloud Security
Identity & Access Management
21 out of 60
Discover Sensitive Data: 3-Wk AssessmentKiZAN Technologies
Identity & Access Management
Information Protection & GovernanceIdentify and assess the security posture, location, and movement patterns of sensitive data in your organization to better understand required solutions.
Applicable to:
Identity & Access Management
Information Protection & Governance
22 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk AssessmentKiZAN Technologies
Identity & Access Management
Mobile Device Management
Threat ProtectionLeverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
23 out of 60
Microsoft 365 Cyber Insurance Review: 2-5 Wk AssessmentKiZAN Technologies
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceMap your business cyber insurance carrier requirements to Microsoft 365 environment controls ranked by priority and impact to your security posture.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
24 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen Systems
Cloud Security
Identity & Access Management
Insider RiskThe Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
25 out of 60
Window 365 Cloud PC: 3-Day Proof-of-ConceptCTGlobal A/S
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementAssess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
26 out of 60
Microsoft Entra Verified ID and Credivera: 3-day Planning WorkshopOxford Computer Group LLC
Identity & Access ManagementThis Planning Workshop is designed to help you get started with a verifiable credentials solution using Credivera and Microsoft Entra Verified ID.
Applicable to:
Identity & Access Management
27 out of 60
General Data Protection Regulation (GDPR): 4-Wk Data Discovery ServiceIT Partner LLC
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceMulti-step process to discover and scan data sources within the organization for personal data. The outcome: detailed inventory of data sources, together with the data they contain.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
28 out of 60
Windows 365 Standardized PilotMobile Mentor
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
29 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Mobile Device ManagementThe primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
30 out of 60
SmartStart for IntuneMobile Mentor
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
31 out of 60
Office 365 Tenant - Initial Setup: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Identity & Access ManagementThe goal is to efficiently and effectively set up your organization's Office 365 tenant, enabling seamless access to a suite of productivity tools and collaboration services.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
32 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThis service moves key server tasks to a new one for upgrades or system changes.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
33 out of 60
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski Security
Identity & Access Management
Information Protection & Governance
Insider RiskKudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
34 out of 60
Securing Identities WorkshopSynergy Technical, LLC
Cloud Security
Identity & Access Management
Information Protection & GovernanceThe foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
35 out of 60
Implementation of Microsoft Defender for EndpointCDW
Cloud Security
Identity & Access Management
Threat ProtectionCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Cloud App Security Information and Threat Protection: 3-Wk Professional serviceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionProtect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft Secure Score - increase to 200: 3-Days Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThe goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
39 out of 60
Windows 365: 4 Week Readiness AssessmentNetrix Global
Cloud Security
Compliance Advisory Services
Identity & Access ManagementGet an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
40 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEnhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
Identity & Access Management
Insider RiskIdentify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
Applicable to:
Identity & Access Management
Insider Risk
42 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReply
Identity & Access Management
Information Protection & Governance
Threat ProtectionValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
43 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionMulti-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalyst
Cloud Security
Identity & Access Management
Mobile Device ManagementAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
45 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalyst
Cloud Security
Identity & Access Management
Mobile Device ManagementAlithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
46 out of 60
Microsoft 365 Security: 30-Days ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementEstablish a foundational, secure environment for clients by configuring their Microsoft 365 tenant with core security features.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
47 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEstablish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEstablish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementStrengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
50 out of 60
Zero Trust Security 10-Hour AssessmentJourneyTEAM
Cloud Security
Identity & Access Management
Mobile Device ManagementJourneyTeam’s Zero Trust Security Assessment is designed to provide a clear, actionable strategy for strengthening your organization’s Microsoft 365 security posture.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
51 out of 60
Office 365 to Office 365 Migration: 4-Wk ImplementationExodus Integrity Services, Inc.
Adoption & Change Management
Identity & Access ManagementSimplify the complexities of merging, consolidating, or transitioning your Office 365 environments with our specialized Office 365 Migration Service.
Applicable to:
Adoption & Change Management
Identity & Access Management
52 out of 60
BCN Intranet LiteBCN Group Ltd.
Cloud Security
Identity & Access Management
Information Protection & GovernanceWe help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
53 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
Cloud Security
Identity & Access Management
Threat ProtectionSafeguard your entire organization with Managed Security Services on Microsoft Defender
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Cybersecurity Assessment: 5-Wk AssessmentPSM Partners
Cloud Security
Identity & Access Management
Insider RiskThis assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
55 out of 60
Hybrid Office 365 Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Identity & Access ManagementHybrid migration integrates on-premises Exchange with Microsoft 365, facilitating migration or serving as a permanent state for both organizations.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
56 out of 60
Cutover Exchange Online Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceMailbox migration from an Exchange Server hosted and managed by you to Exchange Online. All mailboxes will be migrated at once.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
57 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEnhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
MicroAge ManageWise Microsoft 365 Assessment & ServicesMicroAge
Cloud Security
Identity & Access Management
Knowledge & InsightsComprehensive assessment of our clients Microsoft 365 tenant providing an Executive summary detailed report to reduce vulnerabilities improving Secure Score with 40 hours of Engineer time
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
59 out of 60
Cutover Exchange Online migration from any IMAP email system: 7-Days Professional serviceIT Partner LLC
Cloud Security
Device Deployment & Management
Identity & Access ManagementMigrate users, email data, and email folders from any IMAP system to Microsoft 365 / Exchange Online.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
60 out of 60