筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 561 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEstablish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional ServiceIT Partner LLC
Cloud Security
Compliance Advisory Services
Identity & Access ManagementStrengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
2 out of 60
Zero Trust Security 10-Hour AssessmentJourneyTEAM
Cloud Security
Identity & Access Management
Mobile Device ManagementJourneyTeam’s Zero Trust Security Assessment is designed to provide a clear, actionable strategy for strengthening your organization’s Microsoft 365 security posture.
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
3 out of 60
Office 365 to Office 365 Migration: 4-Wk ImplementationExodus Integrity Services, Inc.
Adoption & Change Management
Identity & Access ManagementSimplify the complexities of merging, consolidating, or transitioning your Office 365 environments with our specialized Office 365 Migration Service.
Applicable to:
Adoption & Change Management
Identity & Access Management
4 out of 60
BCN Intranet LiteBCN Group Ltd.
Cloud Security
Identity & Access Management
Information Protection & GovernanceWe help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
5 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
Cloud Security
Identity & Access Management
Threat ProtectionSafeguard your entire organization with Managed Security Services on Microsoft Defender
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Cybersecurity Assessment: 5-Wk AssessmentPSM Partners
Cloud Security
Identity & Access Management
Insider RiskThis assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
7 out of 60
Hybrid Office 365 Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Cloud Security
Identity & Access ManagementHybrid migration integrates on-premises Exchange with Microsoft 365, facilitating migration or serving as a permanent state for both organizations.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
8 out of 60
Cutover Exchange Online Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceMailbox migration from an Exchange Server hosted and managed by you to Exchange Online. All mailboxes will be migrated at once.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
9 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEnhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
MicroAge ManageWise Microsoft 365 Assessment & ServicesMicroAge
Cloud Security
Identity & Access Management
Knowledge & InsightsComprehensive assessment of our clients Microsoft 365 tenant providing an Executive summary detailed report to reduce vulnerabilities improving Secure Score with 40 hours of Engineer time
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
11 out of 60
Cutover Exchange Online migration from any IMAP email system: 7-Days Professional serviceIT Partner LLC
Cloud Security
Device Deployment & Management
Identity & Access ManagementMigrate users, email data, and email folders from any IMAP system to Microsoft 365 / Exchange Online.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
12 out of 60
Cutover Google Workspace to Office 365 migration (IMAP migration). Just email and email folders: 7-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Teamwork DeploymentMigration of email data and email folders from G Suite (Google Apps) to Microsoft 365 / Exchange Online.
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
13 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionFortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Fortis Assessment Microsoft Online SecuritySentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionReduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionA high-level forensics evaluation designed to identify current and past threat activity.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Modern Workplace - Cloud Endpoint ManagementArxus
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementOur Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
17 out of 60
Healthcare Innovations Strategic Alignment WorkshopSentinel Technologies Inc.
Identity & Access Management
Information Protection & Governance
Knowledge & InsightsAt the start of 2020, the charge of the Healthcare Technology Executive focused on key areas for improvement & alignment with their business along with providing a secure environment that allowed for
Applicable to:
Identity & Access Management
Information Protection & Governance
Knowledge & Insights
18 out of 60
Identity WorkshopSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionLeave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionReactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAccording to multiple studies, breaches and ransomware have more than doubled in the past year.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.
Cloud Security
Identity & Access Management
Insider RiskDescubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
22 out of 60
Windows 365: 10-day Pilot ServiceUltima Business
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementUltima Business Solutions offers a 10 day, potentially funded, pilot service to help you explore the benefits of Windows 365, the cloud-based Windows experience that enables hybrid work scenarios.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
23 out of 60
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstream
Cloud Security
Identity & Access Management
Threat ProtectionLightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Eviden Compliance Assessment (CSAT) zur Einhaltung der europäischen NIS-2-RichtlinieEviden International France - SAS
Identity & Access Management
Information Protection & GovernanceUnternehmen stehen vor der Herausforderung, die europäische NIS2-Richtlinie bis zur nationalen Umsetzungsfrist im Oktober 2024 umzusetzen.
Applicable to:
Identity & Access Management
Information Protection & Governance
25 out of 60
Copilot for Microsoft 365 Pilot Launch: 2-Wk Proof of ConceptProServeIT
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceA rapid Copilot for Microsoft 365 pilot/proof of concept with an initial use case will provide quick value from AI and learnings to expand the roll out and more use cases to other groups.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
26 out of 60
SharePoint Premium Readiness Assessment & Roadmap - 5 Week AssessmentProtiviti
Cloud Security
Identity & Access Management
Knowledge & InsightsEvaluate and ensure your readiness for implementing SharePoint Premium, considering technical, business case, data lifecycle, and administration perspectives.
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Microsoft Copilot for Security: 6-Wk EnablementCyclotron Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionCopilot for Security empowers security teams investigations and operations, harnessing real-time data across digital security estates to improve response time, intelligence, and investigation quality.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
28 out of 60
Frontline Worker: 3-Wk Proof of ConcepteGroup Enabling Technologies
Adoption & Change Management
Identity & Access Management
Teamwork DeploymentReimagine the frontline worker experience with an eGroup Enabling Technologies, LLC. Frontline Worker Proof of Concept
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
29 out of 60
Microsoft Endpoint Manager BaselineSHI International Corp
Cloud Security
Device Deployment & Management
Identity & Access ManagementExplore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
30 out of 60
Passwordless Authentication: 2 Week ImplementationCDI LLC
Identity & Access ManagementImplement passwordless authentication solutions for up to twenty pilot users
Applicable to:
Identity & Access Management
31 out of 60
Secure Data on Personally-Owned Devices: 2 Week ImplementationCDI LLC
Identity & Access Management
Information Protection & Governance
Mobile Device ManagementDeploy Intune App Protection Policies to secure organization data on employee-owned devices
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
32 out of 60
Microsoft Cloud PC - 4 Day Proof of Concept EngagementSynergy Technical, LLC
Cloud Security
Device Deployment & Management
Identity & Access ManagementOur Microsoft Cloud PC offering is designed to help organizations simplify desktop management, increase security, streamline application delivery and increase end user satisfaction.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
33 out of 60
Teams Collab Rapid DeployIvision, Inc.
Adoption & Change Management
Identity & Access Management
Teamwork Deploymentivision’s Teams Collab Rapid Deploy service leverages a speed-to-market methodology designed to help clients successfully plan and deploy a Microsoft Teams collaboration environment.
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
34 out of 60
Microsoft Cybersecurity AssessmentAkins IT
Cloud Security
Identity & Access Management
Threat ProtectionDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Windows 365 PilotCDW
Cloud Security
Identity & Access Management
Threat ProtectionWith the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
MXDR ConsultationCBTS Technology Solutions LLC
Cloud Security
Identity & Access Management
Threat ProtectionCBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
R3 Unified Device Management SuiteR3 LLC
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementThe R3 Unified Device Management Suite revolutionizes how businesses manage their digital ecosystem. Devices-Apps-Conditional Access-Compliance-Productivity
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
38 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense Global
Compliance Advisory Services
Identity & Access Management
Threat ProtectionStop threats with a cloud-native SIEM adapted to your new business needs.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
39 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
40 out of 60
Microsoft 365 complete security HardneningAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
41 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
42 out of 60
AVASecure 360 - Microsoft 365 Security & Governance Solutions by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionAware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
43 out of 60
Teams & SharePoint Security HardeningAVASOFT
Identity & Access Management
Teams Custom Solutions
Threat ProtectionTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Microsoft 365 Email Threat Protection AssessmentAVASOFT
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceMicrosoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
45 out of 60
Secure Data Management with Microsoft PurviewAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Sensitive data risk assessmentAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
47 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Information Protection & GovernanceOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
48 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFT
Cloud Security
Identity & Access Management
Information Protection & GovernanceThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
49 out of 60
Entra ID Identity and Application Governance Solutions by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionOur solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
50 out of 60
Zero Trust Protect and Govern Sensitive DataKiZAN Technologies
Cloud Security
Identity & Access Management
Information Protection & GovernanceLock down your data and take back control. Our Zero Trust Protect and Govern program empowers you to secure your sensitive information, simplify compliance, and gain peace of mind.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
51 out of 60
Cloud Device Management - 4hours BriefingReply
Adoption & Change Management
Identity & Access Management
Mobile Device ManagementImprove the security, manageability, and efficiency of your corporate devices with Intune. Ideal for businesses looking to move to centralized IT management and reduce operational costs.
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
52 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View Systems
Cloud Security
Identity & Access Management
Threat ProtectionSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Secure & Manage Devices using the Microsoft Intune Suite with AVASOFTAVASOFT
Identity & Access Management
Mobile Device Management
Threat ProtectionSeamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
54 out of 60
Infra & Network Monitoring with Microsoft SentinelAVASOFT
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceBoost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
55 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Information Protection & GovernanceEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
56 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Device Management Migration - On-Premises to Cloud by AVASOFTAVASOFT
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementSeamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
58 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
60 out of 60