筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 567 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Microsoft 365 Defender: 2-Wk AssessmentAlithya Fullscope Solutions, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAlithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Microsoft Purview Microsoft 365: 4-Week ImplementationSpyglass MTG, LLC
Identity & Access Management
Information Protection & GovernanceThe Microsoft Purview Microsoft 365 offering is a 4-week/$45,000 Minimum Viable Product (MVP) implementation of Microsoft 365 components of Purview to provide a jumpstart to your data governance.
Applicable to:
Identity & Access Management
Information Protection & Governance
2 out of 60
OAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen Systems
Identity & Access Management
Insider Risk
Threat ProtectionLearn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
3 out of 60
The Modern Workplace: 1 hour Briefing SessionAutomize
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device ManagementThis 1 hours briefing session provides a complete overview of our Modern Workplace concept of Endpoint Management, Identity & Access Management and Collaboration Solutions in context to your business.
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device Management
4 out of 60
Solution Assessment for Security: 30 DayConcurrency, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionAn assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk EngagementCloudScale International
Cloud Security
Identity & Access Management
Mobile Device ManagementThis assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
6 out of 60
Mitigate Compliance and Privacy Risks - 3 Day WorkshopProtiviti
Cloud Security
Compliance Advisory Services
Identity & Access ManagementMicrosoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
7 out of 60
Defender for Endpoint: 5-Day ImplementationITC Secure Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionAccelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
8 out of 60
Windows Intune: 1-Wk Accelerated ImplementionITC Secure Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionAccelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
9 out of 60
Security Outcomes SprintAscent Global, Inc.
Cloud Security
Compliance Advisory Services
Identity & Access ManagementUnderstand the Business Value of Your Cybersecurity Investments
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
10 out of 60
cyber security threat analysis workshopU-BTech Solutions
Cloud Security
Identity & Access Management
Threat Protectionthe workshop is design to discover threats and risks
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Exchange Migration to Microsoft 365: 6-Week ImplementationAll Covered, a division of Konica Minolta
Adoption & Change Management
Identity & Access ManagementAll Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
Applicable to:
Adoption & Change Management
Identity & Access Management
12 out of 60
HPT Nextgen Windows Experience_02 days workshopHPT Vietnam Corporation
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementNextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
13 out of 60
NTT Americas - Microsoft Device ManagementNTT Limited
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementDeployment of Microsoft Unified Endpoint Management Services. Assessment of your resources and business objectives to develop a fresh approach to your security strategy.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
14 out of 60
1ID Platform for EDUTelelink Business Services EAD
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
15 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.
Cloud Security
Identity & Access ManagementThis offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
Applicable to:
Cloud Security
Identity & Access Management
16 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era Technology
Adoption & Change Management
Identity & Access Management
Teamwork DeploymentM&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
17 out of 60
Data Protection Program & Strategy Design - 12 Week ImplementationProtiviti
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceEnd-to-End Data Protection to Identify, Classify, Protect and Optimize Your Data in Microsoft 365
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
18 out of 60
Invoke Data Risk AssessmentInvoke
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThis assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
19 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
Cloud Security
Identity & Access Management
Threat ProtectionWith Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Quadra Entra Permissions ManagementQuadrasystems.net (India) P Ltd
Identity & Access ManagementUnderstand how permissions creep can impact the attack surface risk in your cloud infrastructure
Understand how to manage user and identity risk
Applicable to:
Identity & Access Management
21 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş.
Cloud Security
Identity & Access Management
Threat Protection"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY25CGI Inc.
Cloud Security
Device Deployment & Management
Identity & Access ManagementUtilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
23 out of 60
Secure Identities and Access Management AssessmentInvoke
Identity & Access ManagementTo provide enterprise customers with a detailed identity assessment report, a high-level migration plan, and demonstrations of Microsoft Entra Azure AD and Microsoft Entra Identity Governance features
Applicable to:
Identity & Access Management
24 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.
Cloud Security
Identity & Access Management
Threat ProtectionWe will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPO
Device Deployment & Management
Identity & Access Management
Threat ProtectionThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
26 out of 60
Identity and Access Management Quick StartSoftchoice
Identity & Access ManagementPrioritizing security services to combat identity breaches by prioritizing security services, and protecting against mismanaged privileges, and access-related data breaches.
Applicable to:
Identity & Access Management
27 out of 60
Endpoint Management with Security WorkshopMigrate LLC
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementLet us show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
28 out of 60
Wc-PC- Wragby Cloud PCWragby Business Solutions & Technologies Limited
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
29 out of 60
Cloud-Native Migration Service: 4-Month ImplementationCyclotron Inc.
Cloud Security
Identity & Access ManagementWith Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
Applicable to:
Cloud Security
Identity & Access Management
30 out of 60
Microsoft 365 Copilot Data and Security Readiness: 4-Week AssessmentSpyglass MTG, LLC
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceOur Microsoft 365 Copilot Data and Security Readiness Assessment is a scoped engagement that is designed to accelerate the ability to integrate and consume Copilot across your enterprise.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
31 out of 60
Discover Sensitive Data: 3-Wk AssessmentKiZAN Technologies
Identity & Access Management
Information Protection & GovernanceIdentify and assess the security posture, location, and movement patterns of sensitive data in your organization to better understand required solutions.
Applicable to:
Identity & Access Management
Information Protection & Governance
32 out of 60
Advanced Identity and Access Management with KiZANKiZAN Technologies
Identity & Access ManagementSafeguard your organization from devastating breaches with Microsoft 365 identity solutions.
Applicable to:
Identity & Access Management
33 out of 60
Window 365 Cloud PC: 3-Day Proof-of-ConceptCTGlobal A/S
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementAssess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
34 out of 60
Microsoft Entra Verified ID and Credivera: 3-day Planning WorkshopOxford Computer Group LLC
Identity & Access ManagementThis Planning Workshop is designed to help you get started with a verifiable credentials solution using Credivera and Microsoft Entra Verified ID.
Applicable to:
Identity & Access Management
35 out of 60
General Data Protection Regulation (GDPR): 4-Wk Data Discovery ServiceIT Partner LLC
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceMulti-step process to discover and scan data sources within the organization for personal data. The outcome: detailed inventory of data sources, together with the data they contain.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
36 out of 60
Windows 365 Standardized PilotMobile Mentor
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
37 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementShadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
38 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Mobile Device ManagementThe primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
39 out of 60
Office 365 Tenant - Initial Setup: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Identity & Access ManagementThe goal is to efficiently and effectively set up your organization's Office 365 tenant, enabling seamless access to a suite of productivity tools and collaboration services.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
40 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThis service moves key server tasks to a new one for upgrades or system changes.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
41 out of 60
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski Security
Identity & Access Management
Information Protection & Governance
Insider RiskKudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
42 out of 60
Securing Identities WorkshopSynergy Technical, LLC
Cloud Security
Identity & Access Management
Information Protection & GovernanceThe foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
43 out of 60
Cloud App Security Information and Threat Protection: 3-Wk Professional serviceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionProtect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Multi-Factor Authentication - Initial Setup: 3-Professional serviceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThe goal of the service is to make Microsoft 365 accounts safer by adding an extra layer of security, so only authorized users can access them.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
45 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Microsoft Secure Score - increase to 200: 3-Days Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThe goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
47 out of 60
Modern Endpoint Management: 2-Hr AssessmentAscent Global, Inc.
Cloud Security
Device Deployment & Management
Identity & Access ManagementThere’s a reason Microsoft chose us as their Modern Endpoint Management Partner of the Year for 2023. We believe you can reduce your threat risk by modernizing your Endpoint Management Strategy.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
48 out of 60
Windows 365: 4 Week Readiness AssessmentNetrix Global
Cloud Security
Compliance Advisory Services
Identity & Access ManagementGet an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
49 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEnhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Microsoft Yammer Tenant-to-Tenant Migration: 1-Wk Professional ServiceIT Partner LLC
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceFacilitate a smooth transition of your Yammer network and its associated data from one Microsoft 365 tenant to another.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
51 out of 60
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
Identity & Access Management
Insider RiskIdentify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
Applicable to:
Identity & Access Management
Insider Risk
52 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReply
Identity & Access Management
Information Protection & Governance
Threat ProtectionValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
53 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionMulti-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Apply Information Rights Management protection to email: 5-Day Professional ServiceIT Partner LLC
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceEnsure that only authorized individuals can access and use the information. This can be especially useful for sensitive or confidential information that needs to be protected from unauthorized access
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
55 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalyst
Cloud Security
Identity & Access Management
Mobile Device ManagementAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
56 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalyst
Cloud Security
Identity & Access Management
Mobile Device ManagementAlithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
57 out of 60
Microsoft 365 Copilot Deployment and Readiness ServicesInsight
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceInsight can guide you on your Microsoft 365 Copilot journey with help of more than 1,500 dedicated Modern Work professionals who have been working to optimize Microsoft environments for 20 years.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
58 out of 60
Microsoft 365 Security: 30-Days ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementEstablish a foundational, secure environment for clients by configuring their Microsoft 365 tenant with core security features.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
59 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEstablish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60