筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 648 个结果。
云安全Remove 云安全
Microsoft 365Remove Microsoft 365
Managed XDR Shield: 4-Week ImplementationLong View Systems
Cloud Security
Threat ProtectionAddress all your proactive security needs, engage the Managed XDR Shield plan to monitor, alert, and respond to threats effectively.
Applicable to:
Cloud Security
Threat Protection
1 out of 60
Implementation of Microsoft Defender for Office 365CDW
Cloud Security
Identity & Access Management
Threat ProtectionThe Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Workshop for Microsoft 365 Threat ProtectionCDW
Cloud Security
Identity & Access Management
Threat ProtectionThe Workshop for Microsoft 365 Threat Protection provides the following objectives to ensure thorough enablement of crucial Microsoft products for a more secure environment.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance Inc
Cloud Security
Insider Risk
Threat ProtectionYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
4 out of 60
Microsoft 365 Data oversharing report: 5-D Implementation and consultingReply
Cloud Security
Information Protection & Governance
Teamwork DeploymentComprehensive Insights: Get a holistic overview of your environment and uncover overshared sites, documents, and items without the need for expensive Microsoft 365 E5 licenses.
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
5 out of 60
Microsoft 365 Security Readiness: 4-Wk AssessmentQuadrasystems.net (India) P Ltd
Cloud Security
Identity & Access Management
Information Protection & GovernanceIdentify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
6 out of 60
Data Security & Protection: 8 weeks - ImplementationMazzy Technologies Corp.
Cloud Security
Device Deployment & Management
Information Protection & GovernanceMazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
7 out of 60
Threat Protection EngagementNeway Technologies
Cloud Security
Information Protection & Governance
Threat ProtectionEnhance your organization's security stance with a Neway Threat Protection Engagement.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 60
Fixing vulnerabilities based on Defender with ASR Module: 3-Days Consulting ServiceIT Partner LLC
Cloud Security
Identity & Access Management
Threat ProtectionThis service provides a comprehensive approach to identifying and fixing vulnerabilities in organization's devices, helping mitigate the risks of cyber-attacks.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Copilot for Security Accelerator: 2-week ImplementationNeway Technologies
Cloud Security
Threat ProtectionNeway’s Microsoft Copilot for Security Accelerator empowers security teams with enhanced protection and streamlined operations through eight key steps.
Applicable to:
Cloud Security
Threat Protection
10 out of 60
Tenant to Tenant Migration for AAD, EXO and OD4B Services Only: 1-Week ImplementationIT Partner LLC
Adoption & Change Management
Cloud SecurityMicrosoft 365 Tenant-to-Tenant Migration Including Azure AD, Exchange Online and OneDrive for Business services and data
Applicable to:
Adoption & Change Management
Cloud Security
11 out of 60
Implementation of Microsoft Security CopilotAlfa Connections Pte Ltd
Cloud Security
Information Protection & Governance
Threat ProtectionTo assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 60
Copilot Business Value DiscoveryNetwoven
Adoption & Change Management
Cloud Security
Information Protection & GovernanceReady to embrace AI? Join our Microsoft 365 Copilot Value Discovery Workshop and learn how to maximize its potential for your business
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
13 out of 60
Healthcare & Education Cybersecurity AssessmentPSM Partners
Cloud Security
Identity & Access Management
Insider RiskThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
14 out of 60
Microsoft Security Solutions - 4 Week AssessmentProtiviti
Cloud Security
Information Protection & Governance
Threat ProtectionMicrosoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 60
Copilot for Microsoft 365: La Evaluación De Preparación De Datos Y SeguridadAwara IT
Adoption & Change Management
Cloud Security
Information Protection & GovernanceAwara IT puede apoyar tu negocio con Copilot for Microsoft 365, aprovechando un equipo de más de 200 profesionales dedicados con más de 16 años de experiencia en la optimización de entornos de Microso
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
16 out of 60
Data Security: 2-Weeks WorkshopConterra
Cloud Security
Information Protection & Governance
Insider RiskIdentify data security risks in your organizational data
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
17 out of 60
Copilot for Microsoft 365: Taller De Seguridad Y Datos De 1 DíaAwara IT
Adoption & Change Management
Cloud Security
Information Protection & GovernanceDesbloquea el máximo potencial de Copilot for Microsoft 365 mientras refuerzas la seguridad y protección de tus datos con un taller intensivo de un día dirigido por los expertos de Awara IT.
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
18 out of 60
ALFA Managed SOC with Microsoft Defender XDR and SentinelAlfa Connections Pte Ltd
Cloud Security
Information Protection & Governance
Threat ProtectionALFA Managed Security Operations Center (SOC) leverages the powerful capabilities of Microsoft Defender Extended Detection and Response (XDR) and Microsoft Sentinel (SIEM & SOAR) to provide a robust,
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 60
JAMF to Intune MigrationMobile Mentor
Adoption & Change Management
Cloud Security
Device Deployment & ManagementMobile Mentor’s JAMF to Intune migration planning services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration to Intune.
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
20 out of 60
Data Security Engagement: 4-Wk WorkshopExelegent
Cloud Security
Information Protection & Governance
Insider RiskThe Data Security Engagement provides a summary of an organization’s data protection and compliance stature with actionable recommendations.
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
21 out of 60
MDS - Modern Security Operations EngagementMaureen Data Systems
Cloud Security
Information Protection & Governance
Threat ProtectionA 2-day engagement to demonstrate how intelligent security analytics and threat intelligence can detect and stop active threats, encouraging organizations to deploy and adopt Modern SecOps solutions.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 60
AI Security Readiness: 4 week AssessmentQuisitive
Cloud Security
Information Protection & Governance
Teamwork DeploymentQuisitive's AI Security Readiness Assessment provides organizations with an in-depth understanding of how best to adopt Copilot and Generative AI without putting their organization at risk.
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
23 out of 60
MDS - Threat Protection EngagementMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionA 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Intune Security Reviewmnemonic
Cloud Security
Mobile Device ManagementEnhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
Applicable to:
Cloud Security
Mobile Device Management
25 out of 60
Data Security AssessmentPSM Partners
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceThis assessment is designed to help companies identify their data security, privacy, and compliance goals while accelerating their compliance journey using the latest Microsoft technologies.
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
26 out of 60
MDS - Cybersecurity AssessmentMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Data Security: Free WorkshopLong View Systems
Cloud Security
Threat ProtectionEnhance your data security with Microsoft Purview by beginning with a complimentary workshop.
Applicable to:
Cloud Security
Threat Protection
28 out of 60
Copilot Planning WorkshopAhead, Inc
Adoption & Change Management
Cloud Security
Information Protection & GovernanceThis Copilot workshop will prepare your organization to utilize Copilot by identifying key scenarios and gaps in current Microsoft 365 configurations to improve ROI of initial Copilot deployments.
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
29 out of 60
Citrix Endpoint Management to Microsoft Intune Migration PlanMobile Mentor
Adoption & Change Management
Cloud Security
Device Deployment & ManagementMobile Mentor’s Citrix Endpoint Management to Microsoft Intune services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
30 out of 60
Ivanti (MobileIron) to Microsoft Intune Migration PlanMobile Mentor
Adoption & Change Management
Cloud Security
Device Deployment & ManagementMobile Mentor’s Ivanti to Microsoft Intune migration services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration to Intune.
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
31 out of 60
ManageEngine to Microsoft Intune Migration PlanMobile Mentor
Adoption & Change Management
Cloud Security
Device Deployment & ManagementMobile Mentor’s ManageEngine to Microsoft Intune migration services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
32 out of 60
Microsoft Purview & Generative AI Synergy: Data Governance for the FutureBlack Cell Magyarország Korlatolt Felelossegu Tarsasag
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceUsage of generative AI increases day by day in enterprise environments, in some cases without control. Act in time and prevent data breaches and exfiltration activities.
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
33 out of 60
Microsoft 365 Secure Score AssessmentDaymark Solutions
Cloud Security
Compliance Advisory Services
Threat ProtectionImprove your environment’s security posture using Microsoft Secure Score.
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
34 out of 60
Spyglass Managed Security Services: 2-week ImplementationQuisitive
Cloud Security
Information Protection & Governance
Threat ProtectionSpyglass is a security and compliance program for cloud and on-premises organizations that aligns security and compliance with current requirements of best-in-class technology and expert deployment.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionAssess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Microsoft 365 GCC High Rapid DeploymentDaymark Solutions
Adoption & Change Management
Cloud Security
Compliance Advisory ServicesDeploy Microsoft 365 GCC High services in days, not weeks, while leveraging Daymark’s enhanced security baseline.
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
37 out of 60
Deploy Microsoft Intune for Mobile Device ManagementDaymark Solutions
Cloud Security
Device Deployment & Management
Mobile Device ManagementOptimize Mobile Device Management and Security with Microsoft Intune.
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
38 out of 60
Microsoft 365 Tenant Security AssessmentDaymark Solutions
Cloud Security
Compliance Advisory Services
Threat ProtectionStrengthen the Security of Your Microsoft 365 Environment.
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
39 out of 60
impelSecure Data Security Engagement: Free 4-week workshopimpeltec Pty Ltd
Cloud Security
Information Protection & Governance
Insider RiskIdentify data risks and evaluate user behavior for risky activities
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
40 out of 60
impelSecure Threat Protection Engagement: Free 4-week workshopimpeltec Pty Ltd
Cloud Security
Threat ProtectionDiscover threats and vulnerabilities to your Microsoft cloud and on-premises environments
Applicable to:
Cloud Security
Threat Protection
41 out of 60
C1st Office 365 Tenant Migration AssessmentC1st Technologies LLC
Adoption & Change Management
Cloud Security
Threat ProtectionEnsure a smooth Office 365 tenant-to-tenant migration for businesses. We provide comprehensive consulting services to facilitate seamless transitions during mergers, acquisitions, and other scenarios.
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
42 out of 60
Purview Information Protection: setup and adoptionDev4Side
Adoption & Change Management
Cloud Security
Information Protection & GovernanceProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
43 out of 60
Implementation of Copilot readiness assessmentDev4Side
Adoption & Change Management
Cloud Security
Teamwork DeploymentPrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
44 out of 60
Modernize Identities with Entra ID PremiumDaymark Solutions
Adoption & Change Management
Cloud Security
Identity & Access ManagementStrengthen User Security with Advanced Identity Management.
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
Cloud Security
Insider Risk
Threat ProtectionOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
Applicable to:
Cloud Security
Insider Risk
Threat Protection
46 out of 60
Zones Implementation of Microsoft DefenderZones, LLC
Cloud SecurityEnhance cybersecurity with Zones' Microsoft Defender suite, offering expert implementation, comprehensive coverage, and continuous support.
Applicable to:
Cloud Security
47 out of 60
Threat Protection EngagementISA Cybersecurity Inc.
Cloud Security
Identity & Access Management
Threat ProtectionLearn how to put next-generation Microsoft Security tools to work for you
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
MDS Managed MXDR EngagementMaureen Data Systems
Cloud Security
Identity & Access Management
Threat ProtectionDesigned to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Neudesic's Knowledge Governance WorkshopNeudesic
Cloud Security
Information Protection & Governance
Knowledge & InsightsThe Neudesic Knowledge Governance Workshop is a 4–6-week session that is designed to assist customers in safeguarding their sensitive information.
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
50 out of 60
Endpoint Management WorkshopCitrin Cooperman Advisors, LLC
Cloud Security
Threat ProtectionEmpower secure endpoint management with Microsoft Intune through streamlined operations.
Applicable to:
Cloud Security
Threat Protection
51 out of 60
Security Foundations Email: Assessment and ImplementationProServeIT
Cloud Security
Identity & Access Management
Threat ProtectionProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Comprehensive Threat Protection: Free WorkshopLong View Systems
Cloud Security
Information Protection & Governance
Threat ProtectionProtect against advanced threats with Long View’s Threat Protection, leveraging Microsoft Defender for full security.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
53 out of 60
KMicro Rapid Incident Response & Readiness ServiceKMicro Tech, Inc.
Cloud Security
Compliance Advisory Services
Threat ProtectionKMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
54 out of 60
Managed IT Services for DentalOlive + Goose
Cloud Security
Device Deployment & Management
Identity & Access ManagementComprehensive managed IT services for dental offices, ensuring security, compliance, and continuity.
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
55 out of 60
Data Security Engagement with Microsoft PurviewInviso Corporation
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceOur Data Security engagement will look over your data estate and establish areas of Security Risk. We will show you the benefits to Microsoft Purview to help protect your environment from risks.
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
56 out of 60
Data Security & Threat Protection WorkshopITVT
Cloud Security
Information Protection & Governance
Threat ProtectionIdentify data security risks in your organizational data & discover vulnerabilities in your environment
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
57 out of 60
Threat Protection EngagementFIS Managed IT Solutions
Cloud Security
Identity & Access Management
Threat ProtectionLearn how to put next-generation Microsoft Security tools to work for you.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Data Security as a Service | Assure 365CyberOne
Cloud Security
Information Protection & Governance
Threat ProtectionFully Managed Data Security, governance and compliance with 24x7 monitoring—Powered by Microsoft Purview.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
59 out of 60
Endpoint as a Service | Assure 365CyberOne
Cloud Security
Device Deployment & Management
Mobile Device ManagementFully Managed Endpoint Security with 24x7 monitoring, compliance and Zero Trust enforcement—powered by Microsoft Intune.
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
60 out of 60