筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Security and Operations with Expert Microsoft 365 SupportAVASOFTMaximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
1 out of 60
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
2 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP TechnologiesThe SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Tenant to tenant In-Place Archive Migration: 7-Days Consulting ServiceIT Partner LLCService designed to transfer mailbox data from one Office 365 tenant's In-Place Archive to another, preserving metadata and folder structure.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Workplace Analytics
4 out of 60
Implementation of Microsoft Defender for Office 365CDWThe Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Copilot For Microsoft 365 - ImplementationITQAN GLOBAL FOR CLOUD AND DIGITAL COMPUTING SYSTEMS L.L.C.Guided Setup and Customization of Copilot and Copilot Studio for Microsoft 365- Training, Data Selection, Workflow Design Development
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Teamwork Deployment
6 out of 60
CS Data Security 360°: 2-Wk AssessmentCampana & Schott GmbHUtilize Microsoft Purview suite and Copilot for Security to safeguard your content and information.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
7 out of 60
Microsoft 365 Copilot Readiness Assessment: 1-Wk AssessmentPoint Alliance IncEmbark on a transformative journey with our Microsoft Co-Pilot Readiness Assessment, designed to empower teams and organizations in embracing the future of AI collaboration.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Insider Risk
8 out of 60
Microsoft 365 Security Readiness: 4-Wk AssessmentQuadrasystems.net (India) P LtdIdentify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
9 out of 60
Zero Trust Identity and Access Management: 8-16 Weeks Consulting + ImplementationAttosolIn today’s dynamic digital landscape, traditional security models fall short. Embrace Zero Trust with Microsoft and transform your security strategy to protect against evolving threats.
+2
Applicable to:
Compliance Advisory Services
Identity & Access Management
10 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Automate Identity Lifecycle Management: 8-16 Weeks Consulting + ImplementationAttosolIntegrate HRMS with Microsoft Entra ID for an automated, efficient and secure Identity Lifecycle Management.
+1
Applicable to:
Identity & Access Management
12 out of 60
Intune Design and Deployment ServicesTrusted Tech TeamModernize deployment, configuration and management of your Windows devices while
improving your security posture.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
13 out of 60
Fixing vulnerabilities based on Defender with ASR Module: 3-Days Consulting ServiceIT Partner LLCThis service provides a comprehensive approach to identifying and fixing vulnerabilities in organization's devices, helping mitigate the risks of cyber-attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Healthcare & Education Cybersecurity AssessmentPSM PartnersThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
15 out of 60
Microsoft Intune QuickstartEmergent SoftwareDeploy Microsoft Intune via Microsoft 365 with Emergent's Quickstart for enhanced device management and security compliance.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
16 out of 60
Modernize Identities with Entra ID PremiumDaymark SolutionsStrengthen User Security with Advanced Identity Management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
With Windows 365 Access data from anywhereSentinel Technologies Inc.With Windows 365, you can access a desktop computer from anywhere. It is available in Business and Enterprise SKUs and integrates easily with your current Microsoft 365 licensing.
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
18 out of 60
Security Foundations Data: Assessment and ImplementationProServeITData security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
+2
Applicable to:
Identity & Access Management
Threat Protection
19 out of 60
Microsoft 365 Copilot Security and Compliance controlstrue org cloudMicrosoft Copilot for Security: Enhance Your Organization's Security Posture
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
20 out of 60
Microsoft 365 Copilot and AI AssessmentRedapt, Inc. Elevate Your Business with Microsoft 365 Copilot Assessment
+1
Applicable to:
Identity & Access Management
21 out of 60
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITEDOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
22 out of 60
Threat Protection EngagementISA Cybersecurity Inc.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
MDS Managed MXDR EngagementMaureen Data SystemsDesigned to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Active Directory Services: Implementation, Upgrade, and MigrationITX360 (Pvt) Ltd.Boost productivity and security with expert Active Directory services. Integrate seamlessly with Microsoft 365 through our implementation, upgrade, and migration solutions
+1
Applicable to:
Identity & Access Management
25 out of 60
Microsoft 365 Security AssessmentSii Sp. z o.o.We assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Security Foundations Email: Assessment and ImplementationProServeITProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Identity and Access Management SolutionH One (Private) LimitedEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
28 out of 60
Avanade Cyber Portfolio EvaluationAvanade, Inc.The Cyber Portfolio Evaluation maps your tools with Microsoft solutions, cutting costs and enhancing efficiency.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
29 out of 60
Security Foundations IdentityProServeITFortify your online identity and access controls. Evaluate your risks and deploy modern security controls to mitigate against the most common identity-based vulnerabilities and attacks.
+2
Applicable to:
Identity & Access Management
Threat Protection
30 out of 60
Implementation of Microsoft Entra ID GovernanceSpyglass MTG, LLCFor any business interested in securing internal and external Identities with Entra ID
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
31 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo SoftwareCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo SoftwareThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Microsoft Data Security EngagementRackspace TechnologyThe Data Security Engagement is designed to help organizations identify and mitigate data security risks, especially in the context of the increasing deployment of generative AI applications.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
36 out of 60
Microsoft 365 Tenant-to-Tenant MigrationOlive + GooseThis offering provides assessment, migration, and post-migration support for transitioning Microsoft 365 workloads and endpoint management from a source Microsoft 365 tenant to a target tenant.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
37 out of 60
Managed IT Services for DentalOlive + GooseComprehensive managed IT services for dental offices, ensuring security, compliance, and continuity.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
38 out of 60
FastTrack for Microsoft 365Olive + GooseOur offer provides expert guidance as a FastTrack Ready Partner to help businesses deploy, secure, and optimize Microsoft 365 solutions seamlessly—ensuring a smooth transition with no extra cost.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
39 out of 60
Empowering Digital Transformation with AI Microsoft Copilot SolutionsSonata Software Ltd.Our tailored Microsoft Copilot solutions blend human expertise with intelligent automation, delivering efficiency, productivity, and personalization across industries.
+3
Applicable to:
Frontline Workers
Identity & Access Management
Meetings for Microsoft Teams
40 out of 60
Implementation of Microsoft Purview QuickStartPresidioEnhance security posture, data protection, and governance with Microsoft Purview QuickStart: implementation by Presidio offering.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
41 out of 60
4Migrate – Google Workspace to Microsoft 365 Migration by 4Sight4Sight HoldingsSeamlessly Transition to Microsoft 365 with Zero Data Loss, Minimal Disruption, and Maximum Security
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
42 out of 60
4migrate: Tenant to Tenant Microsoft 3654Sight HoldingsAre you planning a Microsoft 365 tenant-to-tenant migration? 4Sight offers expertly crafted migration packages!
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
43 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight HoldingsStrengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
PlanB. Acceleration Workshops for Microsoft CopilotPlanB. GmbHThe PlanB. Copilot Accelerator - Workshop Series helps organizations seamlessly integrate AI, ensure compliance, and maximize the benefits of Microsoft Copilot.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
45 out of 60
Google Drive To OneDrive Migration JumpstartSentinel Technologies Inc.Sentinel Technologies offers a structured and secure migration service for transitioning from Google Drive to Microsoft OneDrive. Our process minimizes disruptions while maintaining productivity.
+1
Applicable to:
Identity & Access Management
46 out of 60
Gmail to Exchange JumpstartSentinel Technologies Inc.Sentinel Technologies offers a comprehensive Exchange Online Setup & Migration Jumpstart to streamline your organization's transition from Google Workspace to Microsoft 365.
+1
Applicable to:
Identity & Access Management
47 out of 60
Threat Protection EngagementFIS Managed IT SolutionsLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Identity as a Service | Assure 365CyberOneFully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
49 out of 60
Copilot Pak365: Microsoft Purview & Copilot ImplementationRavanty Tech Consulting, Inc.Empower your enterprise Data protection and Compliance requirements across your Microsoft 365 data estate and confidently rollout Microsoft 365 Copilot.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
50 out of 60
Zero Trust: Microsoft Security BriefingRavanty Tech Consulting, Inc.Learn and Embrace Modern Work Zero Trust Pillars across Identity, Devices, Apps, and Data
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
51 out of 60
Risk/Compliance/SecurityR3 LLCProvide Compliance as a service (CaaS) to assist our customers with obtaining certification in the frameworks they are targeting such as CMMC, ISO, NIST, CMMI, HIPAA, SOC 2
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
52 out of 60
Nasstar's Managed Services for Microsoft 365, Teams, Intune & Entra ID (FY25)NasstarNasstar’s Managed Services optimises & secures Microsoft 365, Teams, Intune and Entra ID, enhancing productivity, collaboration & security. Benefit from cost certainty & strategic consulting with
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
53 out of 60
C1st End-user Device Security Zero TrustC1st Technologies LLCC1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Threat Protection Assessment & Zero Trust ArchitectureBDO Digital, LLCSet Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Architecture and Threat Protection Assessment
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
55 out of 60
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology HoldingOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
56 out of 60
Prompt-a-Thon on Microsoft 365 Copilot: Proof of ConceptWragby Business Solutions & Technologies LimitedUnlock the full potential of Microsoft 365 Copilot with our exclusive Prompt-a-Thon: Proof of Concept and transform your business with state-of-the-art AI solutions.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
57 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoiceThe Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data LtdWhether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
59 out of 60
Managed IT for Financial Services- Microsoft 365FIS Managed IT SolutionsEnhance your organization's collaboration, productivity, and security with Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
60 out of 60