筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 496 个结果。
威胁防护Remove 威胁防护
Microsoft 365Remove Microsoft 365
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 16
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 16
Microsoft 365 Fundamentals: 1 Day WorkshopNETCOM LEARNINGIntroduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
+3
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
3 out of 16
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile ITA 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 16
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLCCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 16
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLCSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 16
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 16
Neway Security proposition: 3-WK implementationNeWay Technologies LtdThe Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
8 out of 16
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 16
Zero Trust Assessment - 3 WeeksArmis, Sistemas de Informação, LdaSet Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Assessment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 16
Secure Hybrid Identity - Defender for Identity: 6 week ImplementationPerformantaSecure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
+2
Applicable to:
Identity & Access Management
Threat Protection
11 out of 16
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdgeEndpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
12 out of 16
Microsoft Information Protection Administrator: 3 Days WorkshopNETCOM LEARNINGMicrosoft Information Protection Administrator course focuses on data governance and information protection within your organization.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 16
Microsoft 365 Risk 5-Days AssessmentKPCS CZ, s.r.o.Microsoft 365 Risk Assessment provides preventive and comprehensive check of the Customer's Microsoft 365 Environment.
+3
Applicable to:
Compliance Advisory Services
Mobile Device Management
Threat Protection
14 out of 16
Zero Trust Launchpad: 3-Wk AssessmentAscent Global, Inc.Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 16
Endpoint Management Advisory Service: 6-Wk ImplementationWragby Business Solutions & Technologies LimitedThis advisory service enables organizations efficiently manage end points leveraging Microsoft Intune & Configuration Manager through assessments, 1-day workshops and six weeks deployment
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
16 out of 16