筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Microsoft 365 Security Assessment up to 6 weeksACTSACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
1 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
CMMC Data Enclave Dplymt: 4-Wk ImplementationC3 Integrated SolutionsDeploy Microsoft 365 to meet CMMC Requirements
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
3 out of 60
Centric Endpoint Management with Security WorkshopCentric Consulting, LLCHelping organizations modernize their endpoint management and security capabilities using Microsoft 365
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
4 out of 60
Microsoft 365 FastTrack: 1-Day BriefingeGroup Enabling Technologies, LLCMicrosoft's FastTrack benefit provides guidance to help you to deploy Microsoft 365 Cloud Solutions at no additional cost.
+3
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device Management
5 out of 60
Microsoft Secure Score - increase to 200: 3-Days Professional ServiceIT Partner LLCThe goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
6 out of 60
Armor Defender XDR Foundational AssessmentArmorTailored consulting engagement designed to evaluate your current security environment and establish a baseline for implementing Microsoft Defender XDR.
+2
Applicable to:
Identity & Access Management
Threat Protection
7 out of 60
Journey to Microsoft 365 Copilot: 4-hours WorkshopPROJECT INFORMATICA SRLMicrosoft 365 Copilot workshop bring to you the opportunity to create awareness about holistic to Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
8 out of 60
Microsoft 365 Copilot Readiness Assessment: 1-Wk AssessmentPoint Alliance IncEmbark on a transformative journey with our Microsoft Co-Pilot Readiness Assessment, designed to empower teams and organizations in embracing the future of AI collaboration.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Insider Risk
9 out of 60
Entra ID: 5-day AssessmentCDI LLCProtect identities in Microsoft 365 by hardening your Entra ID configuration as a result of this 5-day identity and authentication assessment
+1
Applicable to:
Identity & Access Management
10 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
+2
Applicable to:
Cloud Security
Identity & Access Management
12 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Frontline Worker: 3-Wk Proof of ConcepteGroup Enabling TechnologiesReimagine the frontline worker experience with an eGroup Enabling Technologies, LLC. Frontline Worker Proof of Concept
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
14 out of 60
Modern EndPoint: 3 Day WorkshopInsentra Pty LtdAn executive deep dive into remote deployment, management, and the security of corporate and BYOD devices in your organization
+2
Applicable to:
Identity & Access Management
Mobile Device Management
15 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Enable Windows 365 Cloud PCCofomoWith the right endpoint modernization strategy and tools, employees get a secure experience on every mobile device, tablet, or laptop they’re using, all while eliminating major management headaches.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
17 out of 60
Intune Design and Deployment ServicesTrusted Tech TeamModernize deployment, configuration and management of your Windows devices while
improving your security posture.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
18 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional ServiceIT Partner LLCThe goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Microsoft 365 AssessmentTechNet UC LLCOur assessment provides a thorough analysis of your current Microsoft 365 environment, identifying areas for improvement and offering actionable recommendations to enhance performance and security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
20 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCShadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
21 out of 60
Security Foundations Email: Assessment and ImplementationProServeITProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLCThe Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
1-Day Security & Identity WorkshopConvergeOneTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Cutover Exchange Online Migration from a Third-Party Hosted Exchange Server: 7-Days Professional ServiceIT Partner LLCA flexible and quick way to migrate all emails, contacts, tasks, and other data from a third-party hosted and managed Exchange Server to Microsoft 365 Exchange Online.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
26 out of 60
Compliance Manager: 8 Week ImplementationRazor Technology, LLCComprehensive orientation, deployment, training, support, administration, updates, documentation and testing services to get started quickly and expand with Compliance Manager and Compliance Score
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
27 out of 60
Identity WorkshopSentinel Technologies Inc.Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLCMulti-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week ProgramWindows Management Experts, Inc.Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
30 out of 60
Office 365 Tenant - Initial Setup: 7-Days Professional ServiceIT Partner LLCThe goal is to efficiently and effectively set up your organization's Office 365 tenant, enabling seamless access to a suite of productivity tools and collaboration services.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
31 out of 60
Threat Protection Engagement: 3-Day AssessmentPSM PartnersDo more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional ServiceIT Partner LLCStrengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
33 out of 60
Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
34 out of 60
Security Foundations for Microsoft 365Cyclotron Inc.Secure and govern Microsoft 365 with best practices for thread detection, compliance & data protection, identity access, device & app management with Microsoft’s security and governance framework.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
35 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data SystemsAssess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Security Foundations Data: Assessment and ImplementationProServeITData security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
+2
Applicable to:
Identity & Access Management
Threat Protection
37 out of 60
Microsoft 365 Information Protection 1-day WorkshopGrant Thornton LLPReview your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
38 out of 60
Cloud-Native Migration Service: 4-Month ImplementationCyclotron Inc.With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
+2
Applicable to:
Cloud Security
Identity & Access Management
39 out of 60
Microsoft Defender Secure Score Optimization + Licensing & Skills Review - 1-Week AssessmentBlue Cycle LLCMaximize your Secure Score and ROI with a 1-week audit of config, licensing, and security team readiness
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
40 out of 60
MXDR ConsultationCBTS Technology Solutions LLCCBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Unified Access & Protection with Microsoft Entra Global Secure AccessMobile MentorStep confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
42 out of 60
Implementation of Microsoft Defender for EndpointCDWCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
CMMC Secure Enclave with User TrainingPlanet TechnologiesA secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov and including User Training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
44 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Microsoft 365 Secure Score: 4 Week ImplementationRazor Technology, LLCAudit, review, and improve security posture of Microsoft 365 Estate through Secure Score methodology. Receive expert advice for identity, compliance, and threat protection improvements.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
46 out of 60
Microsoft 365 Security: 30-Days ServiceIT Partner LLCEstablish a foundational, secure environment for clients by configuring their Microsoft 365 tenant with core security features.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
47 out of 60
FortisX™ Next Generation Cyber Detection & ResponseSentinel Technologies Inc.Today's security landscape is complex, dynamic, and constantly evolving. FortisX™, powered by Cisco XDR, is a security solution that delivers best-in-class cyber protection: the top extended detention
+1
Applicable to:
Identity & Access Management
48 out of 60
Deployment of Copilot for Microsoft 365Windows Management Experts, Inc.Enhance the productivity of Microsoft 365 with our premium Deployment service for Copilot for Microsoft 365.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
49 out of 60
Passwordless Authentication: 2 Week ImplementationCDI LLCImplement passwordless authentication solutions for up to twenty pilot users
+1
Applicable to:
Identity & Access Management
50 out of 60
Microsoft 365 License Optimization:1-hr AssessmentFrontier Technology, LLCReview current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
51 out of 60
Retail Kiosk Program Workshop - 5 DaysCB5 SolutionsA secure kiosk management solution built for Zebra, Android and iOS devices in retail and finance services.
+3
Applicable to:
Frontline Workers
Identity & Access Management
Threat Protection
52 out of 60
Zero Trust as a Service (ZTaaS)Aegis InnovatorsDigital transformation and adopting AI starts with building a secure foundation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Compliance Workshop Data Risk Management: 4 WeeksDiverge ITYou will be guided by our Microsoft 365 experts who are trusted by Pro Sports teams, Hollywood studios, and businesses across America to help protect and govern data to achieve complete compliance.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
54 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
55 out of 60
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFTIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
56 out of 60
Office 365 Managment: 1 Day AssessmentEze Castle IntegrationECI will review your Office 365 Tennant Configuration and suggest on-going managment needs
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
57 out of 60
Threat Protection EngagementTierPointLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Secure Productive Workplace: Implement 4-WkNetsuritNetsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
59 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
60 out of 60