筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 559 个结果。
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Security and Operations with Expert Microsoft 365 SupportAVASOFT
Cloud Security
Identity & Access Management
Workplace AnalyticsMaximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
1 out of 60
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM Partners
Cloud Security
Identity & Access Management
Insider RiskThis assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
2 out of 60
Tenant to tenant In-Place Archive Migration: 7-Days Consulting ServiceIT Partner LLC
Adoption & Change Management
Identity & Access Management
Workplace AnalyticsService designed to transfer mailbox data from one Office 365 tenant's In-Place Archive to another, preserving metadata and folder structure.
Applicable to:
Adoption & Change Management
Identity & Access Management
Workplace Analytics
3 out of 60
Implementation of Microsoft Defender for Cloud AppsCDW
Cloud Security
Identity & Access Management
Threat ProtectionCDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Implementation of Microsoft Defender for Office 365CDW
Cloud Security
Identity & Access Management
Threat ProtectionThe Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Copilot For Microsoft 365 - ImplementationITQAN GLOBAL FOR CLOUD AND DIGITAL COMPUTING SYSTEMS L.L.C.
Identity & Access Management
Information Protection & Governance
Teamwork DeploymentGuided Setup and Customization of Copilot and Copilot Studio for Microsoft 365- Training, Data Selection, Workflow Design Development
Applicable to:
Identity & Access Management
Information Protection & Governance
Teamwork Deployment
6 out of 60
CS Data Security 360°: 2-Wk AssessmentCampana & Schott GmbH
Identity & Access Management
Information Protection & Governance
Insider RiskUtilize Microsoft Purview suite and Copilot for Security to safeguard your content and information.
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
7 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.
Cloud Security
Identity & Access Management
Information Protection & GovernanceUNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
8 out of 60
Microsoft 365 Security Readiness: 4-Wk AssessmentQuadrasystems.net (India) P Ltd
Cloud Security
Identity & Access Management
Information Protection & GovernanceIdentify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
9 out of 60
Automate Identity Lifecycle Management: 8-16 Weeks Consulting + ImplementationAttosol
Identity & Access ManagementIntegrate HRMS with Microsoft Entra ID for an automated, efficient and secure Identity Lifecycle Management.
Applicable to:
Identity & Access Management
10 out of 60
Intune Design and Deployment ServicesTrusted Tech Team
Identity & Access Management
Mobile Device Management
Threat ProtectionModernize deployment, configuration and management of your Windows devices while
improving your security posture.
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
11 out of 60
Fixing vulnerabilities based on Defender with ASR Module: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionThis service provides a comprehensive approach to identifying and fixing vulnerabilities in organization's devices, helping mitigate the risks of cyber-attacks.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Microsoft 365 Copilot Success FrameworkInsight
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceInsight’s Microsoft 365 Copilot Success Framework service is designed to enable your organization to securely drive ROI and take advantage of all that Microsoft 365 Copilot has to offer.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
13 out of 60
Healthcare & Education Cybersecurity AssessmentPSM Partners
Cloud Security
Identity & Access Management
Insider RiskThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
14 out of 60
MDS - Data Security EngagementMaureen Data Systems
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceA 3-day engagement to help customers identify security risks in organizational data, understand how to mitigate them & prevent data security risks using Microsoft Purview (E5 Compliance) technologies.
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
15 out of 60
MDS - Threat Protection EngagementMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionA 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Microsoft Defender Secure Score, Security Licensing and Security Skill OptimizationBlue Cycle LLC
Identity & Access Management
Information Protection & Governance
Threat ProtectionService to optimize organizational security posture and increase your Microsoft Defender Secure Score.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
17 out of 60
Microsoft Intune QuickstartEmergent Software
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementDeploy Microsoft Intune via Microsoft 365 with Emergent's Quickstart for enhanced device management and security compliance.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
18 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionAssess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Copilot for Microsoft 365: 4 weeks Proof of ConceptReliance Infosystems Inc.
Adoption & Change Management
Compliance Advisory Services
Identity & Access ManagementWe are thrilled to present our Copilot Seed Investment Offer, crafted to help organizations validate and achieve their AI objectives using Microsoft 365.
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
20 out of 60
Modernize Identities with Entra ID PremiumDaymark Solutions
Adoption & Change Management
Cloud Security
Identity & Access ManagementStrengthen User Security with Advanced Identity Management.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
With Windows 365 Access data from anywhereSentinel Technologies Inc.
Device Deployment & Management
Identity & Access ManagementWith Windows 365, you can access a desktop computer from anywhere. It is available in Business and Enterprise SKUs and integrates easily with your current Microsoft 365 licensing.
Applicable to:
Device Deployment & Management
Identity & Access Management
22 out of 60
Security Foundations Data: Assessment and ImplementationProServeIT
Identity & Access Management
Threat ProtectionData security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
Applicable to:
Identity & Access Management
Threat Protection
23 out of 60
Microsoft 365 Copilot and AI AssessmentRedapt, Inc.
Identity & Access ManagementElevate Your Business with Microsoft 365 Copilot Assessment
Applicable to:
Identity & Access Management
24 out of 60
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITED
Identity & Access Management
Insider Risk
Threat ProtectionOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
25 out of 60
Identity and Access Management SolutionH One (Private) Limited
Cloud Security
Identity & Access Management
Insider RiskEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
26 out of 60
Security Foundations IdentityProServeIT
Identity & Access Management
Threat ProtectionFortify your online identity and access controls. Evaluate your risks and deploy modern security controls to mitigate against the most common identity-based vulnerabilities and attacks.
Applicable to:
Identity & Access Management
Threat Protection
27 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo Software
Cloud Security
Identity & Access Management
Threat ProtectionEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Managed IT Services for DentalOlive + Goose
Cloud Security
Device Deployment & Management
Identity & Access ManagementComprehensive managed IT services for dental offices, ensuring security, compliance, and continuity.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
29 out of 60
FastTrack for Microsoft 365Olive + Goose
Cloud Security
Device Deployment & Management
Identity & Access ManagementOur offer provides expert guidance as a FastTrack Ready Partner to help businesses deploy, secure, and optimize Microsoft 365 solutions seamlessly—ensuring a smooth transition with no extra cost.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
30 out of 60
4Migrate – Google Workspace to Microsoft 365 Migration by 4Sight4Sight Holdings
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceSeamlessly Transition to Microsoft 365 with Zero Data Loss, Minimal Disruption, and Maximum Security
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
31 out of 60
PlanB. Acceleration Workshops for Microsoft CopilotPlanB. GmbH
Adoption & Change Management
Identity & Access Management
Information Protection & GovernanceThe PlanB. Copilot Accelerator - Workshop Series helps organizations seamlessly integrate AI, ensure compliance, and maximize the benefits of Microsoft Copilot.
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
32 out of 60
Google Drive To OneDrive Migration JumpstartSentinel Technologies Inc.
Identity & Access ManagementSentinel Technologies offers a structured and secure migration service for transitioning from Google Drive to Microsoft OneDrive. Our process minimizes disruptions while maintaining productivity.
Applicable to:
Identity & Access Management
33 out of 60
Gmail to Exchange JumpstartSentinel Technologies Inc.
Identity & Access ManagementSentinel Technologies offers a comprehensive Exchange Online Setup & Migration Jumpstart to streamline your organization's transition from Google Workspace to Microsoft 365.
Applicable to:
Identity & Access Management
34 out of 60
Identity as a Service | Assure 365CyberOne
Cloud Security
Identity & Access Management
Information Protection & GovernanceFully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
35 out of 60
Zero Trust: Microsoft Security BriefingRavanty Tech Consulting, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionLearn and Embrace Modern Work Zero Trust Pillars across Identity, Devices, Apps, and Data
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
Risk/Compliance/SecurityR3 LLC
Compliance Advisory Services
Identity & Access Management
Information Protection & GovernanceProvide Compliance as a service (CaaS) to assist our customers with obtaining certification in the frameworks they are targeting such as CMMC, ISO, NIST, CMMI, HIPAA, SOC 2
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
37 out of 60
C1st End-user Device Security Zero TrustC1st Technologies LLC
Cloud Security
Identity & Access Management
Threat ProtectionC1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITED
Cloud Security
Identity & Access Management
Threat ProtectionProfessional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Microsoft Entra - Global Secure Access | Pilot DeploymentITC Secure Ltd
Identity & Access Management
Information Protection & Governance
Threat ProtectionMicrosoft Entra Global Secure Access pilot deployment for improved security posture, streamlined access management & regulatory compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
40 out of 60
Identity Foundation Proof Of Concept with Microsoft Entra in 4 WeeksArmis, Sistemas de Informação, Lda
Identity & Access ManagementLeverage the full suite of Microsoft 365 products - Secure internal and external Identities with Microsoft Entra
Applicable to:
Identity & Access Management
41 out of 60
Identity Governance Proof Of Concept with Microsoft Entra ID Governance in 4 WeeksArmis, Sistemas de Informação, Lda
Identity & Access ManagementLeverage Microsoft Entra ID Governance to ensure seamless and secure access to Microsoft 365 resources
Applicable to:
Identity & Access Management
42 out of 60
FortisX on Microsoft Defender: ProofofConcepSentinel Technologies Inc.
Identity & Access ManagementToday's security landscape is complex, dynamic, and constantly evolving.
Applicable to:
Identity & Access Management
43 out of 60
Threat Landscape AssessmentProServeIT
Identity & Access Management
Information Protection & Governance
Threat ProtectionGet critical cybersecurity insights with a global visualization of login attempts, dark web scan, & expert recommendations. We help secure your Microsoft 365 environment to protect your business.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
44 out of 60
FortisX™ Next Generation Cyber Detection & ResponseSentinel Technologies Inc.
Identity & Access ManagementToday's security landscape is complex, dynamic, and constantly evolving. FortisX™, powered by Cisco XDR, is a security solution that delivers best-in-class cyber protection: the top extended detention
Applicable to:
Identity & Access Management
45 out of 60
Microsoft Security Copilot Readiness AssessmentSoftchoice
Cloud Security
Identity & Access Management
Threat ProtectionAims to ensure organizations can securely utilize Microsoft’s Copilot for Security and identifying gaps in signal data from core Microsoft security products
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Modern Endpoint Design and Planning WorkshopKraft Kennedy
Cloud Security
Device Deployment & Management
Identity & Access ManagementKraft Kennedy will conduct a Modern Endpoint Design and Planning Workshop to review and discuss both your current management and deployment processes as well as plans for the future-state environment.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
47 out of 60
Threat Protection EngagementTierPoint
Cloud Security
Identity & Access Management
Threat ProtectionLearn how to put next-generation Microsoft Security tools to work for you.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Microsoft 365 Copilot Readiness Assessment - CRATechPlus Talent
Cloud Security
Identity & Access Management
Information Protection & GovernanceThrough this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
49 out of 60
Microsoft Defender for Endpoint QuickStartPresidio
Cloud Security
Identity & Access Management
Threat ProtectionPresidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Secure Productive Workplace: Implement 4-WkNetsurit
Device Deployment & Management
Identity & Access Management
Threat ProtectionNetsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
51 out of 60
Office 365: Setup, Demo Train: 3-Hr Implementationtrue org cloud
Device Deployment & Management
Identity & Access Management
Information Protection & GovernanceGain a competitive edge and be more productive with a higher growth in your business with the help of True.org Cloud’s Microsoft 365 Business implementation.
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
52 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLC
Cloud Security
Identity & Access Management
Threat ProtectionThe Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
MDM Health Check (Mobile OS Only): 2-week AssessmentMobile Mentor
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementOur certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
54 out of 60
BYOD 365: 6-week ImplementationMobile Mentor
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementThe BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
55 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, Inc
Cloud Security
Identity & Access Management
Threat ProtectionKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Microsoft Security: 3-Day WorkshopApex Digital Solutions
Cloud Security
Identity & Access Management
Threat ProtectionDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Advania: Intune Get Started: 2 d training and PoCAdvania AB
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementUnderstand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
58 out of 60
Microsoft 365 Identity & Security: 2-Wk AssessmentPSM Partners
Cloud Security
Identity & Access ManagementCustomized identity and security assessment focused on the Microsoft 365 platform
Applicable to:
Cloud Security
Identity & Access Management
59 out of 60
G Suite to M365 Migration: 1-Day Proof of concepttrue org cloud
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft TeamsProof of concept for migration from G Suite to Microsoft 365
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
60 out of 60