筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 16
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLCCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 16
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLCSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 16
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 16
Neway Security proposition: 3-WK implementationNeWay Technologies LtdThe Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
5 out of 16
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
6 out of 16
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 16
Zero Trust Assessment - 3 WeeksArmis, Sistemas de Informação, LdaSet Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Assessment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 16
Secure Hybrid Identity - Defender for Identity: 6 week ImplementationPerformantaSecure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
+2
Applicable to:
Identity & Access Management
Threat Protection
9 out of 16
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdgeEndpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
10 out of 16
Microsoft Information Protection Administrator: 3 Days WorkshopNETCOM LEARNINGMicrosoft Information Protection Administrator course focuses on data governance and information protection within your organization.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 16
Microsoft 365 Risk 5-Days AssessmentKPCS CZ, s.r.o.Microsoft 365 Risk Assessment provides preventive and comprehensive check of the Customer's Microsoft 365 Environment.
+3
Applicable to:
Compliance Advisory Services
Mobile Device Management
Threat Protection
12 out of 16
Device as a Service with Windows 11 and Intune: 4 Week ImplementationCognizantWindows 10 has revolutionized how organizations manage operating systems, delivering the features that you have come to know and rely on, while enhancing mobility and agility without losing data.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
13 out of 16
Zero Trust Launchpad: 3-Wk AssessmentAscent Global, Inc.Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 16
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLCOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 16
Endpoint Management Advisory Service: 6-Wk ImplementationWragby Business Solutions & Technologies LimitedThis advisory service enables organizations efficiently manage end points leveraging Microsoft Intune & Configuration Manager through assessments, 1-day workshops and six weeks deployment
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
16 out of 16