筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
FortisX™ Next Generation Cyber Detection & ResponseSentinel Technologies Inc.Today's security landscape is complex, dynamic, and constantly evolving. FortisX™, powered by Cisco XDR, is a security solution that delivers best-in-class cyber protection: the top extended detention
+1
Applicable to:
Identity & Access Management
1 out of 60
Modern Endpoint Design and Planning WorkshopKraft KennedyKraft Kennedy will conduct a Modern Endpoint Design and Planning Workshop to review and discuss both your current management and deployment processes as well as plans for the future-state environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
2 out of 60
Microsoft Purview Migration Accelerator: 1-Day Envisioning WorkshopMAQ SoftwareOur workshop assesses your data landscape, identifies challenges, provides tailored recommendations, and a phased migration strategy to Microsoft Purview in just one day.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
3 out of 60
Identity Health CheckMobile MentorMobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
4 out of 60
Entra ID Governance and Guest AccessMobile MentorEmpower your business with Mobile Mentor’s Microsoft Entra ID Governance and Guest Access service, built on Microsoft’s cutting-edge Entra Identity Governance platform.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
5 out of 60
Unified Access & Protection with Microsoft Entra Global Secure AccessMobile MentorStep confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
6 out of 60
ADFS to Entra ID Migration ServiceMobile MentorMobile Mentor’s ADFS to Entra ID Migration Service offers a secure, cloud-first Single Sign-On experience that eliminates outdated infrastructure and unlocks the full potential of Microsoft Entra ID.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
7 out of 60
Security Foundations for Microsoft 365Cyclotron Inc.Secure and govern Microsoft 365 with best practices for thread detection, compliance & data protection, identity access, device & app management with Microsoft’s security and governance framework.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 60
Cyclotron Beam White Glove IDP MigrationCyclotron Inc.Seamlessly migrate applications from Okta to Microsoft Entra ID with Cyclotron Beam’s automated platform.
+1
Applicable to:
Identity & Access Management
9 out of 60
Secure Productive Workplace: Implement 4-WkNetsuritNetsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
10 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLCThe Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Intune for Windows: 12-week ImplementationMobile MentorIntune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
12 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, IncKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Microsoft Security: 3-Day WorkshopApex Digital SolutionsDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Advania: Intune Get Started: 2 d training and PoCAdvania ABUnderstand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
15 out of 60
Microsoft 365 Identity & Security: 2-Wk AssessmentPSM PartnersCustomized identity and security assessment focused on the Microsoft 365 platform
+2
Applicable to:
Cloud Security
Identity & Access Management
16 out of 60
Google Workspace to Microsoft 365 Migration: 1-Day Proof of concepttrue org cloudProof of concept for migration from Google Workspace to Microsoft 365
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
17 out of 60
Microsoft 365 - Threat Protection: 2-week workshopForteventoWorkshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
18 out of 60
Cloud Security Journey: 2 Hour Proof of Concept360 Visibility Inc.See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Microsoft Intune: 4-Wk ImplementationeGroup Enabling TechnologiesEnable users to be productive on any device, without compromising security.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
20 out of 60
Microsoft 365: 2-Week AssessmentPractical Solutions, IncEstablish a clear roadmap and change management plan for your journey to a modern workplace.
Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
21 out of 60
Life Science 1 Day Compliance AssessmentXantrionA scalable and auditable modern workplace environment for life science companies managed by experts.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
22 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvokeThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
23 out of 60
Security Assessment: 2-Wk AssessmentAscent Global, Inc.Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
EMS Energize: 1-month proof of conceptInterlink Cloud Advisors, Inc.Interlink Cloud Advisors’ EMS Energize engagement provides you with security experts who can help guide your business into a secure, productive cloud platform.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
25 out of 60
Remote Access to On-Prem Apps: 3 Wk ImplementationInvokeSurface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
+2
Applicable to:
Cloud Security
Identity & Access Management
26 out of 60
Financial Services 1 Day Compliance AssessmentXantrionA compliant modern workplace environment for financial service firms managed by experts.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
27 out of 60
Microsoft 365 Secure Score: 4 Week ImplementationRazor Technology, LLCAudit, review, and improve security posture of Microsoft 365 Estate through Secure Score methodology. Receive expert advice for identity, compliance, and threat protection improvements.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
28 out of 60
CMMC Data Enclave Dplymt: 4-Wk ImplementationC3 Integrated SolutionsDeploy Microsoft 365 to meet CMMC Requirements
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
29 out of 60
Microsoft 365 Security Assessment up to 6 weeksACTSACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
30 out of 60
Change Management: 4-week ImplementationMobile MentorChange Management is a proven methodology to deploy technology changes to large groups of diverse Microsoft 365 users.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
31 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Microsoft Windows Autopilot Services: 5-Day Proof of ConcepteGroup Enabling TechnologiesReduce IT complexity and eliminate time-consuming corporate re-imaging by shipping and deploying straight to users with Microsoft Windows Autopilot.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
34 out of 60
Cloud Identity Foundation Workshop (5-day)DexMachGet knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
+2
Applicable to:
Identity & Access Management
Threat Protection
35 out of 60
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) LtdReadiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Secure Workspace: 1 Day WorkshopWatserv Inc.A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
37 out of 60
Microsoft 365 Azure AD 3-wk Implementation RoadmapCyclotron Inc.Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
38 out of 60
Compliance Workshop Data Risk Management: 4 WeeksDiverge ITYou will be guided by our Microsoft 365 experts who are trusted by Pro Sports teams, Hollywood studios, and businesses across America to help protect and govern data to achieve complete compliance.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
39 out of 60
Seguridad Corporativa: Evaluación 4 semanasCIBERIT SRL.Con esta Solución usted podrá gestionar la seguridad en toda su empresa
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
40 out of 60
Mail Airlift: Exchange Online ImplementationSynergy Technical, LLCOur Mail Airlift engagement will get you up and running with Microsoft Exchange online in the fastest, most secure manner.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
41 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeITCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
1-Day Security & Identity WorkshopConvergeOneTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Rapid Zero Trust Deployment : 8-WK ImplementationMaureen Data SystemsThe purpose and objectives of this engagement are to develop a Zero Trust Implementation Strategy
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
44 out of 60
ThreatHunter MXDR: 3-Wk ImplemenationeGroup Enabling TechnologieseGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
45 out of 60
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
46 out of 60
Secure Remote Work: 3 Days Intro and Plan WorkshopLiveRoute FZ-LLCEngagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
47 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
49 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
50 out of 60
Security Assessment: 2 Week AssessmentTallanTallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Enhance IT Security: 1-2-Wk ImplementationFMT ConsultantsFMT offers a smart security solution that protects your business, your employees, and your clients while providing a reliable, scalable, and durable approach to keeping your business up and running.
+2
Applicable to:
Cloud Security
Identity & Access Management
52 out of 60
Retail Kiosk Program Workshop - 5 DaysCB5 SolutionsA secure kiosk management solution built for Zebra, Android and iOS devices in retail and finance services.
+3
Applicable to:
Frontline Workers
Identity & Access Management
Threat Protection
53 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Security Assessment - 4-Week AssessmentCoretek ServicesAnalysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
55 out of 60
Teams Hosted Direct Routing: 2-wk ImplementationCatapult Systems, LLCCatapult Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
56 out of 60
Microsoft 365 Security: 1 Month ImplementationValorem LLCA detailed baseline assessment of your current and desired state followed by a pilot production of Microsoft’s advanced security solutions to accelerate your modern security journey.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
57 out of 60
Zero Trust Foundation: 6 Week ImplementationValorem LLCUsing Azure Active Directory and Microsoft 365 Security, our teams will custom design a zero trust foundation that advances your security posture, reduces risk and makes your environment more secure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
58 out of 60
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
59 out of 60
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
60 out of 60