筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 648 个结果。
云安全Remove 云安全
Microsoft 365Remove Microsoft 365
Fortis IR Readiness AssessmentSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAn in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Identity and Access Management SolutionH One (Private) Limited
Cloud Security
Identity & Access Management
Insider RiskEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
2 out of 60
Endpoint Security Advanced Quick Start 14-wk ImplementationEdgile, Inc.
Cloud Security
Device Deployment & Management
Mobile Device ManagementPilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats.
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
3 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementLeverage your Microsoft investment to create a strong Zero Trust security environment.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
4 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.
Cloud Security
Identity & Access Management
Threat ProtectionThis Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Office 365 Teamwork Security - Managed ServiceCognizant
Cloud Security
Information Protection & Governance
Threat ProtectionTeamwork Security provides a comprehensive security management service for Office 365 platforms
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 60
Microsoft Defender for Business Managed Service: Monthly MDRe2e-assure Ltd
Cloud Security
Information Protection & Governance
Threat ProtectionMaximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson Group
Cloud Security
Insider Risk
Threat ProtectionHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
8 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONS
Cloud Security
Identity & Access Management
Threat ProtectionUNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Lightstream Data Security AssessmentLightstream
Cloud Security
Identity & Access Management
Information Protection & GovernanceLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
10 out of 60
1-Tages KI Praxis Update Workshop (inkl. Copilot): Ihr Kompass durch die Welt der Künstlichen IntelligenzAppSphere AG
Adoption & Change Management
Cloud Security
Knowledge & InsightsMit dem KI Praxis Update Workshop statten wir Ihr Team mit dem neuesten Wissen über KI aus. Lernen Sie, wie Sie KI zielgerichtet und profitabel in Ihrer Organisation nutzen können.
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
11 out of 60
Endpoint Security Foundations 50 users: 1-YrRed River Technology LLC
Cloud Security
Threat ProtectionEndpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
Applicable to:
Cloud Security
Threat Protection
12 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.
Cloud Security
Identity & Access Management
Threat ProtectionThis offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Microsoft 365 Tenant Security AssessmentDaymark Solutions
Cloud Security
Compliance Advisory Services
Threat ProtectionStrengthen the Security of Your Microsoft 365 Environment.
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
18 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLC
Cloud Security
Identity & Access Management
Threat ProtectionGet a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Microsoft 365 Copilot Adoption: 2-3 Week AssessmentCoretek Services
Cloud Security
Information Protection & Governance
Knowledge & InsightsEvaluate the current customer Microsoft investments adoption of Microsoft Cloud Services and overall Security posture in an effort to develop a "Art of the Possible" to Adopt Microsoft 365 Copilot.
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
20 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-WeeksmyCloudDoor
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceAssess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
21 out of 60
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Copilot Security Assessment: 4-Wk AssessmentManaged Solution
Cloud Security
Device Deployment & Management
Knowledge & InsightsUnlock the full potential of AI with a comprehensive Microsoft Copilot Security Assessment, fully integrated with Microsoft 365
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
23 out of 60
Hybrid Cloud Security Workshop - 1-DayZones, LLC
Cloud SecurityIdentify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
Applicable to:
Cloud Security
24 out of 60
Windows 365 Assessment - 1 dayCC Bilgi Teknolojileri
Cloud Security
Device Deployment & Management
Identity & Access ManagementHybrid Windows for a hybrid world
Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
25 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies Ltd
Cloud Security
Identity & Access Management
Threat ProtectionMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Microsoft 365: 3 Week Solution AssessmentFirst National Technology Solutions, Inc.
Cloud Security
Meetings for Microsoft Teams
Teamwork DeploymentPartner with FNTS to conduct a 3 week workplace modernization solution assessment to build a TOC analysis & evaluate current purchasing structure to make recommendations for adoption of Microsoft 365.
Applicable to:
Cloud Security
Meetings for Microsoft Teams
Teamwork Deployment
27 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro Ltd
Cloud Security
Identity & Access Management
Threat ProtectionWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 WeeksNetrix Global
Cloud Security
Insider Risk
Threat ProtectionUnderstand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
29 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServus
Cloud Security
Identity & Access Management
Information Protection & GovernanceGain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
30 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeksPlain Concepts
Cloud Security
Information Protection & GovernanceThe objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
Applicable to:
Cloud Security
Information Protection & Governance
31 out of 60
Office 365 Migration 3-Month ImplementationRKON TECHNOLOGIES
Cloud Security
Device Deployment & Management
Teamwork DeploymentLeverage RKON's consulting expertise for a smooth and seamless migration to Microsoft's Office 365 suite of products including SharePoint, OneDrive, and Teams
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
32 out of 60
Microsoft Priva Assessment: 2 WkLighthouse Global
Cloud Security
Information Protection & GovernanceEmpowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
Applicable to:
Cloud Security
Information Protection & Governance
33 out of 60
Virtual Desktop - Health and Configuration 1 Week AssessmentCDI LLC
Cloud Security
Device Deployment & Management
Knowledge & InsightsCDI provides a review of a customer's Virtual Desktop environment and identify opportunities to improve the performance, stability, security and manageability.
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
34 out of 60
Secure Remote Workplace: 1-Wk WorkshopFSI Strategies
Cloud Security
Device Deployment & Management
Identity & Access Management5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
35 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
Cloud Security
Identity & Access ManagementPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
Applicable to:
Cloud Security
Identity & Access Management
36 out of 60
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDS
Cloud Security
Compliance Advisory Services
Insider RiskEgyptian Data Protection Law offer aims to give you a brief description of the following:
Data Privacy Basics
The Egyptian Data Protection Law main highlights
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
37 out of 60
Content Security and Data Loss Prevention: 3-Day WorkshopFSI Strategies
Adoption & Change Management
Cloud Security
Information Protection & GovernanceFSi Strategies will demonstrate how an organization can protect it's most important asset, at the source. Ensuring that documents are protected no matter where they live.
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
38 out of 60
Advanced Email Security: 4-Day ImplementationFSI Strategies
Cloud Security
Threat Protection
Workplace AnalyticsLeverage Microsoft Defender for Office 365 to implement best in class email security
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
39 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbH
Cloud Security
Identity & Access Management
Threat ProtectionStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementationInterlink Cloud Advisors, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionLearn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Multifactor Authentication: 4-Day ImplementationFSI Strategies
Cloud Security
Identity & Access Management
Threat ProtectionImplementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Microsoft Defender for Endpoint: 4-Week ImplementationInvoke
Cloud Security
Device Deployment & Management
Threat ProtectionUnderstand your current use cases for antimalware / endpoint detection and response, map those use cases to Defender, and execute on a migration and rollout to Defender for Endpoint.
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
43 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.
Cloud Security
Threat Protection
Workplace AnalyticsPaid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
44 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk EngagementCloudScale International
Cloud Security
Identity & Access Management
Mobile Device ManagementThis assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
45 out of 60
Mitigate Compliance and Privacy Risks - 3 Day WorkshopProtiviti
Cloud Security
Compliance Advisory Services
Identity & Access ManagementMicrosoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
46 out of 60
Secure Multi-Cloud Environments: 3-day WorkshopECF Data LLC
Cloud Security
Information Protection & Governance
Threat ProtectionThe Secure Multi-Cloud Environments Workshop helps customers gain insights on active threats and vulnerabilities related to their hybrid and multi-cloud workloads within Microsoft 365.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
47 out of 60
Security Outcomes SprintAscent Global, Inc.
Cloud Security
Compliance Advisory Services
Identity & Access ManagementUnderstand the Business Value of Your Cybersecurity Investments
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
48 out of 60
Microsoft Sentinel Quick StartEdgile, Inc.
Cloud SecurityProduction pilot, which is expected to provide centralized log collection, detection of previously undetected threats, investigation with artificial intelligence, and Rapid Response to incidents.
Applicable to:
Cloud Security
49 out of 60
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.
Cloud Security
Information Protection & Governance
Insider RiskMicrosoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
50 out of 60
Endpoint Security Basic Quick Start 12-wk ImplementationEdgile, Inc.
Cloud Security
Device Deployment & Management
Mobile Device ManagementAchieve a Microsoft pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
51 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.
Cloud Security
Identity & Access ManagementThis offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
Applicable to:
Cloud Security
Identity & Access Management
52 out of 60
Microsoft Intune ServiceSii Sp. z o.o.
Cloud Security
Device Deployment & Management
Insider RiskMicrosoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
Applicable to:
Cloud Security
Device Deployment & Management
Insider Risk
53 out of 60
Microsoft Sentinel Proof of Concept: 4 WeeksNetrix Global
Cloud Security
Information Protection & Governance
Threat ProtectionUnderstand how prepared is your Microsoft infrastructure when adversaries attack
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
54 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayon
Cloud Security
Identity & Access Management
Information Protection & GovernanceEvaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
55 out of 60
MDR Shield: 4-Wk ImplementationLong View Systems
Cloud Security
Device Deployment & Management
Mobile Device Management“MDR Shield” is Long View’s cyber security managed detection and response service.
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
56 out of 60
Mitigate Compliance and Privacy Risks - 3 Day WorkshopCGI Inc.
Cloud SecurityHelp customers detect, investigate, and take action to mitigate risk and ensure compliance in their modern workplace.
Applicable to:
Cloud Security
57 out of 60
Virteva Microsoft 365 Defender Ready DeployVirteva LLC
Cloud Security
Information Protection & Governance
Threat ProtectionGet immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
58 out of 60
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.
Cloud SecurityHelp customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
Applicable to:
Cloud Security
59 out of 60
Digital Workplace Program: 4-week AssessmentQuisitive
Adoption & Change Management
Cloud Security
Teamwork DeploymentThe Digital Workplace Foundations Assessment helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tool
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
60 out of 60