筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 647 个结果。
云安全Remove 云安全
Microsoft 365Remove Microsoft 365
Digital Workplace Program: 4-week AssessmentQuisitive
Adoption & Change Management
Cloud Security
Teamwork DeploymentThe Digital Workplace Foundations Assessment helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tool
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
1 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
Cloud Security
Identity & Access Management
Threat ProtectionWith Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş.
Cloud Security
Identity & Access Management
Threat Protection"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY25CGI Inc.
Cloud Security
Device Deployment & Management
Identity & Access ManagementUtilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
4 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTD
Cloud Security
Threat ProtectionMicrosoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
Applicable to:
Cloud Security
Threat Protection
5 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.
Cloud Security
Identity & Access Management
Threat ProtectionWe will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Managed Extended Detection & Response (MXDR) for Workplace: 2 Hr WorkshopNetwoven
Cloud Security
Threat ProtectionLearn how to put next generation Microsoft security tools to work for you.
Applicable to:
Cloud Security
Threat Protection
7 out of 60
Cyber Insurer Readiness WorkshopSentinel Technologies Inc.
Cloud Security
Compliance Advisory Services
Threat ProtectionUncover gaps and strengthen your position when applying for cyber insurance
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
8 out of 60
Wc-PC- Wragby Cloud PCWragby Business Solutions & Technologies Limited
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
9 out of 60
Modern Workplace Optimization - 4 Week AssessmentProtiviti
Cloud Security
Information Protection & Governance
Threat ProtectionThis assessment for Microsoft 365 helps customers obtain insights to what it takes to improve productivity against Cyber Threats for Workforce Productivity.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 60
Microsoft Defender for Cloud Apps JumpstartSentinel Technologies Inc.
Cloud Security
Information Protection & Governance
Insider RiskMicrosoft Defender for Cloud Apps address security gaps in an organization's environment.
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
11 out of 60
Microsoft Defender for Office JumpstartSentinel Technologies Inc.
Cloud Security
Threat ProtectionMicrosoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
Applicable to:
Cloud Security
Threat Protection
12 out of 60
Cloud-Native Migration Service: 4-Month ImplementationCyclotron Inc.
Cloud Security
Identity & Access ManagementWith Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
Applicable to:
Cloud Security
Identity & Access Management
13 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Device Deployment & ManagementSeamlessly transfer email data and mailboxes between Office 365 tenants during mergers or separations. Ensure continuity for users, minimize disruptions, and enables a smooth transition.
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
14 out of 60
M365 Compliance Assessment: 4-Wk AssessmentKiZAN Technologies
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceManage and Improve your organizations compliance
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
15 out of 60
Exchange Online Migration: 6-Week DeploymentCyclotron Inc.
Cloud Security
Information Protection & GovernanceExchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
Applicable to:
Cloud Security
Information Protection & Governance
16 out of 60
Threat Protection - 2 Days WorkshopMayasoft Bilgi Sistemleri A.S.
Cloud Security
Threat ProtectionWe can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
Applicable to:
Cloud Security
Threat Protection
17 out of 60
IN - Microsoft 365 Barracuda Cloud to Cloud BackupCrayon
Cloud SecuritySecure, easy-to-use SaaS backup for your Microsoft 365 data
Applicable to:
Cloud Security
18 out of 60
Enable Data Leak Prevention: 5-Day Configure and Enable DLP PoliciesIT Partner LLC
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceProtect your organization from data leaks, block the transfer of confidential information, use our tool for monitoring your daily work of employees to find security weaknesses before the incident.
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
19 out of 60
Windows 365 Standardized PilotMobile Mentor
Cloud Security
Device Deployment & Management
Identity & Access ManagementThe Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
20 out of 60
Advanced Threat Analytics: 7-Day InstallationIT Partner LLC
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceAdvanced Threat Analytics (ATA) is a complex system that allows you to protect your IT infrastructure from a variety of information threats and cyberattacks.
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
21 out of 60
Defender PilotLevacloud LLC
Cloud Security
Threat ProtectionThe Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
Applicable to:
Cloud Security
Threat Protection
22 out of 60
Security Audit and Recommendations: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceGoal: help organizations review their security settings, configurations, and policies to identify any potential vulnerabilities and ensure that the tenant is properly secured against external threats.
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
23 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementShadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
24 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Mobile Device ManagementThe primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
25 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Information Protection & Governance
Threat ProtectionConfigure and customize transport rules in Microsoft Exchange Online, ensuring efficient email routing, improved security, and compliance for your organization.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
Office 365 Tenant - Initial Setup: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Identity & Access ManagementThe goal is to efficiently and effectively set up your organization's Office 365 tenant, enabling seamless access to a suite of productivity tools and collaboration services.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
27 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThis service moves key server tasks to a new one for upgrades or system changes.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
28 out of 60
Automatic In-Place Upgrade to Windows 10 or 11: 3-Wk Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Device Deployment & ManagementSeamlessly upgrade PCs from Windows 7, 8, or 8.1 to Windows 10 or 11, ensuring compatibility and minimal user disruption, particularly suited for organizations with more than 25 PCs.
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
29 out of 60
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom Consulting
Cloud Security
Information Protection & Governance
Threat ProtectionThis FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 60
Assessment and Roadmap: Microsoft Security (Azure, Microsoft 365, Active Directory, Entra ID) 6-Week EngagementKudelski Security
Cloud Security
Compliance Advisory ServicesThis assessment defines and recommends steps to achieve your desired security state using your existing security solutions and capabilities.
Applicable to:
Cloud Security
Compliance Advisory Services
31 out of 60
Securing Identities WorkshopSynergy Technical, LLC
Cloud Security
Identity & Access Management
Information Protection & GovernanceThe foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
32 out of 60
Microsoft 365 / Office 365 / Azure / Dynamics 365 Knowledge Transfer: 3-Hours Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Knowledge & InsightsUnlock the true potential of your Microsoft 365 environment with our specialized "Knowledge Transfer" consulting service – a roadmap to maximize your organization's capabilities.
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
33 out of 60
Cloud App Security Information and Threat Protection: 3-Wk Professional serviceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionProtect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Multi-Factor Authentication - Initial Setup: 3-Professional serviceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThe goal of the service is to make Microsoft 365 accounts safer by adding an extra layer of security, so only authorized users can access them.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
35 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Information Protection & GovernanceThe goal of the service is to securely remove your previous Exchange Server, ensuring it doesn't disrupt your operations and enabling a smooth transition to Exchange Online.
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
36 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Microsoft Secure Score - increase to 200: 3-Days Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementThe goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
38 out of 60
Ctelecoms Threat Protection EngagementConsolidated Telecoms (Ctelecoms)
Cloud Security
Information Protection & Governance
Threat ProtectionCtelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 60
Modern Endpoint Management: 2-Hr AssessmentAscent Global, Inc.
Cloud Security
Device Deployment & Management
Identity & Access ManagementThere’s a reason Microsoft chose us as their Modern Endpoint Management Partner of the Year for 2023. We believe you can reduce your threat risk by modernizing your Endpoint Management Strategy.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
40 out of 60
Windows 365: 4 Week Readiness AssessmentNetrix Global
Cloud Security
Compliance Advisory Services
Identity & Access ManagementGet an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
41 out of 60
DLP Implementation and Tuning ServicesINFOTECHTION
Cloud Security
Information Protection & Governance
Insider RiskReduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
42 out of 60
BCN Cloud Readiness Assessment and ReportBCN Group Ltd.
Adoption & Change Management
Cloud Security
Meetings for Microsoft TeamsThis assessment will help you decide whether you are ready to migrate IT systems and services to the cloud.
Applicable to:
Adoption & Change Management
Cloud Security
Meetings for Microsoft Teams
43 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEnhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Digital Transformation Calls: 1-Day Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Knowledge & InsightsQualified assistance in resolving any issues after migration to the Microsoft 365 cloud services.
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
45 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionMulti-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Company Document Migration to SharePoint Online or Teams: 7-Days Consulting ServiceIT Partner LLC
Cloud Security
Teamwork DeploymentMigration of file shares, folders and documents from your file server or a third-party service like Box, Dropbox, or Google Drive to SharePoint Online or Teams.
Applicable to:
Cloud Security
Teamwork Deployment
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalyst
Cloud Security
Identity & Access Management
Mobile Device ManagementAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
48 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalyst
Cloud Security
Identity & Access Management
Mobile Device ManagementAlithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
49 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process AdoptionVitalyst
Adoption & Change Management
Cloud Security
Information Protection & GovernanceAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
50 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5Collective Insights
Cloud Security
Device Deployment & Management
Threat ProtectionUpgrade to Microsoft 365 E5 for Advanced Productivity and Security
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
51 out of 60
Microsoft 365 Security: 30-Days ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementEstablish a foundational, secure environment for clients by configuring their Microsoft 365 tenant with core security features.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
52 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEstablish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEstablish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Windows Virtual Desktop Implementation: 5-Days Professional ServiceIT Partner LLC
Cloud Security
Device Deployment & Management
Identity & Access ManagementProvide a streamlined solution using Windows Virtual Desktop (WVD) on Microsoft Azure, offering efficient remote workstations, cost-effective licensing, and Windows 365 in a terminal server format.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
55 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementStrengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
56 out of 60
Zero Trust Security 10-Hour AssessmentJourneyTEAM
Cloud Security
Identity & Access Management
Mobile Device ManagementJourneyTeam’s Zero Trust Security Assessment is designed to provide a clear, actionable strategy for strengthening your organization’s Microsoft 365 security posture.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
57 out of 60
Enterprise Mobility + Security Quickstart for NonprofitSoftwareOne
Cloud Security
Device Deployment & Management
Mobile Device ManagementSecure, compliant, and adaptable productivity for mission-driven work
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
58 out of 60
BCN Intranet LiteBCN Group Ltd.
Cloud Security
Identity & Access Management
Information Protection & GovernanceWe help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
59 out of 60
Foundational Identity AnalysisJourneyTEAM
Cloud SecurityEnsure a Secure Foundation for Microsoft Cloud Services using our Foundational Identity Analysis.
Applicable to:
Cloud Security
60 out of 60