筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
"Exchange in a Box Migration: 1-Month Implementation."Zones, LLCZones Exchange in a Box allows businesses to migrate their current platform to Exchange Online. As an add-on to Exchange Migrations, we recommend Zones Backup as a Service (ZBaaS) offering.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
1 out of 60
Microsoft Purview Records Management Assessment & Strategy - 9 Week AssessmentProtivitiProtiviti assists organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
2 out of 60
True Managed Security Service- 3 day Workshoptrue org cloudYou have a vision. We can help you secure it...
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
3 out of 60
Purview Microsoft Information Protection (MIP) Getting Started WorkshopPatriot Consulting Technology Group LLCThis workshop focuses on Microsoft Information Protection (MIP) and provides attendees with the knowledge and tools necessary to understand and protect sensitive data within their organization. Partic
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
4 out of 60
Microsoft 365 License Consultancy: 2-Days AssessmentMayasoft Bilgi Sistemleri A.S.Increase your Microsoft 365 license productivity with software inventory and determining Microsoft 365 application and security needs
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Mobile Device Management
5 out of 60
Modern Workplace Optimization - 4 Week AssessmentProtivitiThis assessment for Microsoft 365 helps customers obtain insights to what it takes to improve productivity against Cyber Threats for Workforce Productivity.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 60
Discover Sensitive Data: 3-Wk AssessmentKiZAN TechnologiesIdentify and assess the security posture, location, and movement patterns of sensitive data in your organization to better understand required solutions.
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
7 out of 60
Zero Trust Foundation: 6-Wk ImplementationKiZAN TechnologiesAccelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 60
Exchange Online Migration: 6-Week DeploymentCyclotron Inc.Exchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
+2
Applicable to:
Cloud Security
Information Protection & Governance
9 out of 60
General Data Protection Regulation (GDPR): 4-Wk Data Discovery ServiceIT Partner LLCMulti-step process to discover and scan data sources within the organization for personal data. The outcome: detailed inventory of data sources, together with the data they contain.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
10 out of 60
Slalom's Microsoft Syntex offer: 2-Hr WorkshopSlalom ConsultingDetermine the types of content your organization uses and how you would want to search and refine that content in the future during our Discovery Workshop.
+3
Applicable to:
Information Protection & Governance
Knowledge & Insights
Teamwork Deployment
11 out of 60
SharePoint Online Initial Planning and Setup: 7-Day Design, Plan, Environments Set upIT Partner LLCWe design, plan, and set up both environments and provide post-implementation support. We can also provide educational and training materials for your users to help with internal adoption.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Teamwork Deployment
Lighthouse Microsoft 365 Purview Art of the Possible: 1-Wk WorkshopLighthouse GlobalA custom hands-on workshop to understand the full capabilities and value of the Microsoft Purview suite and how to maximize its benefits in your organization’s compliance framework.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
13 out of 60
Legacy Data Migration and Optimization: 52-Wk MigrationLighthouse GlobalThis engagement delivers defensible migration from legacy on-prem archives to Microsoft 365, mapping to the Microsoft Purview suite of tools.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
14 out of 60
Enable Data Leak Prevention: 5-Day Configure and Enable DLP PoliciesIT Partner LLCProtect your organization from data leaks, block the transfer of confidential information, use our tool for monitoring your daily work of employees to find security weaknesses before the incident.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
15 out of 60
Encrypted Email and Data Loss Prevention: 3-Day Initial SetupIT Partner LLCBy implementing encrypted email and data loss prevention (DLP) measures, we ensure that sensitive information remains safeguarded, minimizing the risk of data breaches and unauthorized access.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Information Protection & Governance
16 out of 60
Microsoft 365 Protect and Govern Sensitive Data Workshop: 2 DaysCDI LLCProtecting information—wherever it goes—is critical to ensuring trust and meeting compliance requirements. But first, you need to know what data you have, where it is and how its used.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Information Protection & Governance
17 out of 60
Advanced Threat Analytics: 7-Day InstallationIT Partner LLCAdvanced Threat Analytics (ATA) is a complex system that allows you to protect your IT infrastructure from a variety of information threats and cyberattacks.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
18 out of 60
Intune PilotLevacloud LLCThis Pilot aims to elevate your capabilities in managing and securing endpoints at the enterprise level with the power of Microsoft Intune and optional MECM Co-Management
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Mobile Device Management
19 out of 60
Security Audit and Recommendations: 3-Days Consulting ServiceIT Partner LLCGoal: help organizations review their security settings, configurations, and policies to identify any potential vulnerabilities and ensure that the tenant is properly secured against external threats.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
20 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCConfigure and customize transport rules in Microsoft Exchange Online, ensuring efficient email routing, improved security, and compliance for your organization.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 60
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski SecurityKudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
22 out of 60
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom ConsultingThis FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 60
GoDaddy to Direct Microsoft 365 Migration 2 Hrs Proof of Concepttrue org cloudRemove GoDaddy and other third-party entities from your tenant, reclaiming internal control over your systems.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
24 out of 60
Securing Identities WorkshopSynergy Technical, LLCThe foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
25 out of 60
Endpoint Security AssessmentJourneyTEAMUnlock the untapped potential of your device management strategy and enlist Microsoft 365's proactive threat mitigation with JourneyTEAM's comprehensive Endpoint Security Assessment.
+1
Applicable to:
Information Protection & Governance
26 out of 60
Abacode Data Governance and Protection of Sensitive Data (DLP) in Government Powered by Microsoft 365Abacode Inc.Assess data gaps and implement remediation actions to prevent sensitive data leaks of Government entities leveraging Microsoft 365 Stack.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
27 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLCThe goal of the service is to securely remove your previous Exchange Server, ensuring it doesn't disrupt your operations and enabling a smooth transition to Exchange Online.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
28 out of 60
Ctelecoms Threat Protection EngagementConsolidated Telecoms (Ctelecoms)Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
29 out of 60
DLP Implementation and Tuning ServicesINFOTECHTIONReduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
30 out of 60
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTIONLearn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
31 out of 60
Additional Spam and Email Protection: 3-Days Professional ServiceIT Partner LLCAdditional protection for organizations experiencing problems with emails.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
32 out of 60
Microsoft Purview Information Protection Deployment: 4 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVSecure data wherever it is and support the protection of sensitive data in clouds, apps, and devices.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
33 out of 60
IN - Crayon's SharePoint Assessment ServiceCrayonCrayon's SharePoint Assessment enhances architecture, performance, security, usability, and migration readiness, delivering expert insights for optimization.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Knowledge & Insights
Epiq Compliance Cloud Migration with Microsoft PurviewEpiq GlobalEpiq provides a seamless and compliant transition of valuable archive data off legacy technology, while mitigating risks and maintaining regulatory compliance harnessing Microsoft Purview.
+2
Applicable to:
Information Protection & Governance
Insider Risk
35 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReplyValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
Apply Information Rights Management protection to email: 5-Day Professional ServiceIT Partner LLCEnsure that only authorized individuals can access and use the information. This can be especially useful for sensitive or confidential information that needs to be protected from unauthorized access
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
37 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process AdoptionVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
38 out of 60
Epiq Mergers and Acquisitions Risk ReductionEpiq GlobalIdentify and exclude sensitive information from being migrated during mergers and acquisitions (M&A) data discovery and migration projects.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
39 out of 60
Microsoft 365 Copilot Deployment and Readiness ServicesInsightInsight can guide you on your Microsoft 365 Copilot journey with help of more than 1,500 dedicated Modern Work professionals who have been working to optimize Microsoft environments for 20 years.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
40 out of 60
Epiq Microsoft Purview Separated Employee DefensibilityEpiq GlobalMitigate the potential risks associated with departing employees, ensuring a secure and legally compliant transition while safeguarding sensitive Microsoft 365 data with Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
41 out of 60
Microsoft 365 Copilot Quickstart ServiceHCL America Inc_HCLTGet started quickly with Microsoft 365 Copilot. We work closely with customer teams to prepare, introduce, promote, manage and support Microsoft 365 Copilot in the customer organization
+2
Applicable to:
Adoption & Change Management
Information Protection & Governance
42 out of 60
Epiq Flex IG Talent for Microsoft PurviewEpiq GlobalEpiq Flex IG Talent is here to provide it clients with flexible talent surrounding Microsoft Purview eDiscovery, Information Governance, Compliance and Archiving.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
43 out of 60
On-Prem Exchange to Office 365 Migration: 4-Wk MigrationExodus Integrity Services, Inc.Simplify your email migration process to Office 365 with ease and efficiency.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
44 out of 60
Avanade Security Business Value 4-Wk AssessmentAvanade, Inc.Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
45 out of 60
Sentinel-AI-Readiness-Workshop-M365-CopilotSentinel Technologies Inc.Microsoft 365 Copilot is poised to provide some of the most significant productivity gains we’ve ever seen in the workplace.
+1
Applicable to:
Information Protection & Governance
46 out of 60
Defender for Office365Suri Services SCSuri Services y Office 365: La alianza impenetrable en ciberseguridad.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
47 out of 60
Security Modernization: 3 Day WorkshopNetwovenSafeguard your business with a three-step security modernization solution from Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
48 out of 60
Avanade Modern Sec OpsAvanade, Inc.To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
49 out of 60
Microsoft 365 Copilot ReadinessPT Alfa Koneksi IndonesiaWe help you to understand and realize the business value of Generative AI capabilities within your workplace environment.
+2
Applicable to:
Adoption & Change Management
Information Protection & Governance
50 out of 60
Microsoft 365 Information Protection 1-day WorkshopGrant Thornton LLPReview your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
51 out of 60
Office 365 Encrypted Email - Initial Setup: 1-Day Professional ServiceIT Partner LLCBoost Microsoft 365 security with default encryption. Elevate messaging protection and implement email encryption and rights protection for sensitive data.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
52 out of 60
Cutover Exchange Online Migration from a Third-Party Hosted Exchange Server: 7-Days Professional ServiceIT Partner LLCA flexible and quick way to migrate all emails, contacts, tasks, and other data from a third-party hosted and managed Exchange Server to Microsoft 365 Exchange Online.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
53 out of 60
User Home Folder Migration to One Drive for Business: 7-Days Professional ServiceIT Partner LLCWe will migrate files and documents stored in a user drive or folder on a file server(s) to user’s folder on OneDrive for Business.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
54 out of 60
Cutover Exchange Online Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLCMailbox migration from an Exchange Server hosted and managed by you to Exchange Online. All mailboxes will be migrated at once.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
55 out of 60
GoDaddy Office 365 to Microsoft Office 365 Tenant-to-Tenant Cutover Email Migration: 7-Days Professional ServiceIT Partner LLCSeamless, short-term-downtime migration of email service from GoDaddy Office 365 to Microsoft Office 365, ensuring user access and Exchange Online functionality.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
56 out of 60
Strategic Advisory Services: 1-Wk BriefingeGroup Enabling TechnologieseGroup Enabling Technologies, LLC. Strategic Advisory Services will help your organization down the path of digital transformation.
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Information Protection & Governance
57 out of 60
Healthcare Innovations Strategic Alignment WorkshopSentinel Technologies Inc.At the start of 2020, the charge of the Healthcare Technology Executive focused on key areas for improvement & alignment with their business along with providing a secure environment that allowed for
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Knowledge & Insights
58 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
59 out of 60
Microsoft 365 Data Control ServiceCrayonIn the realm of Microsoft 365, especially today with Microsoft Copilot, ensuring robust governance and safeguarding sensitive content is paramount.
+2
Applicable to:
Compliance Advisory Services
Information Protection & Governance
60 out of 60