筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 568 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Microsoft Intune Jumpstart for Endpoints - Mobile & Workstations: 2-Wk ImplementationProServeIT
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementEnable organization-wide management & security for your mobile devices & workstations with a Microsoft Intune jumpstart pilot.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
1 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionWe have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
2 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
Cloud Security
Identity & Access Management
Threat ProtectionSafeguard your entire organization with Managed Security Services on Microsoft Defender
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Copilot Readiness Assessment for Microsoft 365Mint Management Technologies
Adoption & Change Management
Identity & Access Management
Knowledge & InsightsMint Group is thrilled to bring you a consulting service designed to supercharge your Microsoft 365 experience and get you Microsoft 365 Copilot ready.
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
4 out of 60
Hiram MachadoadaQuest
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementProtect, Simplify, Power better experience with Windows 11, Windows 365 and Intune. Unlock hybrid work scenarios!
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
5 out of 60
Microsoft Purview Records Management Assessment & Strategy for Government - 9 Week AssessmentProtiviti
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceProtiviti assists government departments and agencies with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
6 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
Cloud Security
Identity & Access Management
Threat ProtectionInspect events in your network to locate threat indicators and entities
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Microsoft 365 Security Health Check Assessment 3-WkBulletproof Solutions Inc.
Cloud Security
Identity & Access Management
Threat ProtectionReview and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.
Cloud Security
Identity & Access Management
Threat ProtectionProvide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Microsoft 365 Information Protection 1-day WorkshopGrant Thornton LLP
Identity & Access Management
Information Protection & Governance
Threat ProtectionReview your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 60
Cyber Security AssessmentAegis Innovators
Cloud Security
Identity & Access Management
Threat ProtectionUnderstand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Cutover Exchange Online Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLC
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceMailbox migration from an Exchange Server hosted and managed by you to Exchange Online. All mailboxes will be migrated at once.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
12 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionEnhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
MicroAge ManageWise Microsoft 365 Assessment & ServicesMicroAge
Cloud Security
Identity & Access Management
Knowledge & InsightsComprehensive assessment of our clients Microsoft 365 tenant providing an Executive summary detailed report to reduce vulnerabilities improving Secure Score with 40 hours of Engineer time
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
14 out of 60
Cutover Exchange Online migration from any IMAP email system: 7-Days Professional serviceIT Partner LLC
Cloud Security
Device Deployment & Management
Identity & Access ManagementMigrate users, email data, and email folders from any IMAP system to Microsoft 365 / Exchange Online.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
15 out of 60
MDR WorkshopGrant Thornton LLP
Cloud Security
Identity & Access Management
Threat ProtectionMaximize Your Security Posture with Grant Thornton's MDR Program Assessment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionFortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Microsoft Entra in 30: 6-wk ImplementationLong View Systems
Identity & Access ManagementLong View’s Entra in 30 offers a unified identity, access security, and data governance solution to help minimize these cybersecurity risks in 30 days.
Applicable to:
Identity & Access Management
18 out of 60
Healthcare Innovations Strategic Alignment WorkshopSentinel Technologies Inc.
Identity & Access Management
Information Protection & Governance
Knowledge & InsightsAt the start of 2020, the charge of the Healthcare Technology Executive focused on key areas for improvement & alignment with their business along with providing a secure environment that allowed for
Applicable to:
Identity & Access Management
Information Protection & Governance
Knowledge & Insights
19 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionReactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAccording to multiple studies, breaches and ransomware have more than doubled in the past year.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
JourneyTEAM Security Solutions for Higher EducationJourneyTEAM
Identity & Access ManagementUnlock the future of secure access in Higher Education environments using Microsoft 365.
Applicable to:
Identity & Access Management
22 out of 60
Getting Ready for CoPilot with PurviewPatriot Consulting Technology Group LLC
Identity & Access Management
Information Protection & GovernanceThe "Getting Ready for CoPilot with Purview" workshop is crafted to prepare organizations for the eventual adoption of Microsoft's CoPilot, by first implementing Microsoft Purview
Applicable to:
Identity & Access Management
Information Protection & Governance
23 out of 60
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstream
Cloud Security
Identity & Access Management
Threat ProtectionLightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
SharePoint Premium Readiness Assessment & Roadmap - 5 Week AssessmentProtiviti
Cloud Security
Identity & Access Management
Knowledge & InsightsEvaluate and ensure your readiness for implementing SharePoint Premium, considering technical, business case, data lifecycle, and administration perspectives.
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Frontline Worker: 3-Wk Proof of ConcepteGroup Enabling Technologies
Adoption & Change Management
Identity & Access Management
Teamwork DeploymentReimagine the frontline worker experience with an eGroup Enabling Technologies, LLC. Frontline Worker Proof of Concept
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
26 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk AssessmentErgoServices
Cloud Security
Identity & Access Management
Information Protection & GovernanceErgo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 60
Microsoft Endpoint Manager BaselineSHI International Corp
Cloud Security
Device Deployment & Management
Identity & Access ManagementExplore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
28 out of 60
Copilot for Security Readiness AssessmentBulletproof Solutions Inc.
Cloud Security
Identity & Access Management
Threat ProtectionGet a Copilot for Security Readiness + a Security Health Check on your Microsoft 365 environment
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Secure Data on Personally-Owned Devices: 2 Week ImplementationCDI LLC
Identity & Access Management
Information Protection & Governance
Mobile Device ManagementDeploy Intune App Protection Policies to secure organization data on employee-owned devices
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
30 out of 60
Microsoft Cloud PC - 4 Day Proof of Concept EngagementSynergy Technical, LLC
Cloud Security
Device Deployment & Management
Identity & Access ManagementOur Microsoft Cloud PC offering is designed to help organizations simplify desktop management, increase security, streamline application delivery and increase end user satisfaction.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
31 out of 60
Teams Collab Rapid DeployIvision, Inc.
Adoption & Change Management
Identity & Access Management
Teamwork Deploymentivision’s Teams Collab Rapid Deploy service leverages a speed-to-market methodology designed to help clients successfully plan and deploy a Microsoft Teams collaboration environment.
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
32 out of 60
Modern Management for EndpointsIvision, Inc.
Cloud Security
Device Deployment & Management
Identity & Access ManagementModern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
33 out of 60
Security Baseline Integrity ManagerAegis Innovators
Identity & Access Management
Information Protection & Governance
Threat ProtectionSingle pane of glass for unified configuration, governance, and lifecycle management of security workloads across Microsoft 365.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
34 out of 60
MXDR ConsultationCBTS Technology Solutions LLC
Cloud Security
Identity & Access Management
Threat ProtectionCBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Cybersecurity Assessment Engagement - 4 weeksGrant Thornton LLP
Cloud Security
Identity & Access ManagementEnhance Your Cloud Security Posture with Grant Thornton’s Cybersecurity Assessment
Applicable to:
Cloud Security
Identity & Access Management
36 out of 60
Threat Protection Engagement - 4 weeksGrant Thornton LLP
Cloud Security
Identity & Access Management
Threat ProtectionImprove your Security Posture with Grant Thornton's Threat Protection Engagement
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense Global
Compliance Advisory Services
Identity & Access Management
Threat ProtectionStop threats with a cloud-native SIEM adapted to your new business needs.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
38 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
39 out of 60
Microsoft 365 complete security HardneningAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
40 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
41 out of 60
AVASecure 360 - Microsoft 365 Security & Governance Solutions by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionAware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
42 out of 60
Microsoft 365 Email Threat Protection AssessmentAVASOFT
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceMicrosoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
43 out of 60
Sensitive data risk assessmentAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
44 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFT
Cloud Security
Identity & Access Management
Information Protection & GovernanceThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
45 out of 60
Data Protection and Governance with Microsoft PurviewAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
46 out of 60
Entra ID Identity and Application Governance Solutions by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionOur solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
47 out of 60
Zero Trust Protect and Govern Sensitive DataKiZAN Technologies
Cloud Security
Identity & Access Management
Information Protection & GovernanceLock down your data and take back control. Our Zero Trust Protect and Govern program empowers you to secure your sensitive information, simplify compliance, and gain peace of mind.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
48 out of 60
Cloud Device Management - 4hours BriefingReply
Adoption & Change Management
Identity & Access Management
Mobile Device ManagementImprove the security, manageability, and efficiency of your corporate devices with Intune. Ideal for businesses looking to move to centralized IT management and reduce operational costs.
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
49 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View Systems
Cloud Security
Identity & Access Management
Threat ProtectionSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Secure & Manage Devices using the Microsoft Intune Suite with AVASOFTAVASOFT
Identity & Access Management
Mobile Device Management
Threat ProtectionSeamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
51 out of 60
Infra & Network Monitoring with Microsoft SentinelAVASOFT
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceBoost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
52 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Information Protection & GovernanceEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
53 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Device Management Migration - On-Premises to Cloud by AVASOFTAVASOFT
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementSeamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
55 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.
Cloud Security
Device Deployment & Management
Identity & Access ManagementThis is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
56 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionUncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
58 out of 60
Microsoft Cloud App Security (MCAS) for Custom Apps by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionKnow your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
59 out of 60
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60