FiltresEsborra-ho tot
Professional Services resultats
Es mostren resultats a professional services.
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
2 out of 60
Modern Endpoint Design and Planning WorkshopKraft KennedyKraft Kennedy will conduct a Modern Endpoint Design and Planning Workshop to review and discuss both your current management and deployment processes as well as plans for the future-state environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
3 out of 60
Threat Protection EngagementTierPointLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Microsoft 365 Copilot Readiness Assessment - CRATechPlus TalentThrough this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
5 out of 60
KK_Intune ImplementationKraft KennedyKraft Kennedy's Implementation service for Migration to Microsoft Intune is designed to assist customers in an Intune Deployment Architecture Scenario
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
6 out of 60
Microsoft 365 Backup Readiness AssessmentABTechnologiesEvaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
7 out of 60
Microsoft 365 Secure Productivity WorkshopABTechnologiesEnable your team to work securely and productively using Microsoft 365 best practices.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
8 out of 60
Centric Threat Protection EngagementCentric Consulting, LLCLearn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
9 out of 60
Exchange Online MigrationDataVoxMigrating emails to Office 365 includes assessing the environment, choosing a method (Cutover, Staged, Hybrid, or IMAP), migrating data, updating DNS, configuring devices, and user training.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Mobile Device Management
10 out of 60
Security Best Practices AssessmentTechNet UC LLCOur assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 60
Comprehensive Exchange Online Security ConfigurationTechNet UC LLCUnmatched Security and Compliance for Your Exchange Online Environment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
12 out of 60
Data Security implementation for generative AI: 8-Wk ImpConterraHelp your organization to govern, monitor, and secure the use of generative AI tools like Copilot, ChatGPT, or custom GPT applications
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
13 out of 60
KK_Exchange_Migration Consulting ServicesKraft KennedyMoving to Exchange Online significantly extends the use of Microsoft 365 by modernizing communication infrastructure, enhancing security, and unlocking integrated productivity features.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
14 out of 60
CMMC Secure Enclave with User TrainingPlanet TechnologiesA secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov and including User Training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
15 out of 60
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLPOffice 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
16 out of 60
THInc.Ops Managed ServiceTECH HEADS INCPremium managed IT service solution that provides a higher quality of service supporting your staff and stronger protection against cyberattacks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 60
THInc Secure Managed Security Service for MicrosoftTECH HEADS INCComprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
18 out of 60
Google Workspace to Microsoft 365 MigrationDataVoxDataVox offers migration services for your company from Google Workspace to Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
19 out of 60
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLCSkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Modern SecOps Envisioning WorkshopPSM PartnersThis engagement is for security teams and IT leaders seeking to boost threat detection with experience in Microsoft Sentinel and Defender XDR, automating operations and mitigating cyber risks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
21 out of 60
DSPM for AI - Free 2-Hour AssessmentNetwoven Inc.To help enterprises identify blind spots in Microsoft 365's AI data security, assess DSPM maturity, and establish a governance-first approach to safely accelerate AI innovation with Microsoft Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 60
Threat Protection Envisioning WorkshopTECH HEADS INCLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Manage Compliance Obligations & Risks with Microsoft PurviewBDOEnhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
24 out of 60
Data Security with Microsoft Purview SolutionsBDOEnhance data security control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
25 out of 60
SkyTerra's Cloud Security AssessmentSkyTerra Technologies LLCStrengthen Microsoft cloud security with a structured assessment, an actionable roadmap, and enablement your team can run with
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
InTune AssessmentSkyTerra Technologies LLCSkyTerra helps you configure and align Intune to meet your real business needs, across platforms, policies, and people.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
27 out of 60
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
28 out of 60
Unified Identity & Secure Edge Modernization with Entra SuiteBDOModernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Okta to Microsoft Entra ID ConversionSkyTerra Technologies LLCConsolidate identity on Microsoft Entra ID, reduce cost and complexity, and raise your security baseline without disrupting your users.
+2
Applicable to:
Cloud Security
Identity & Access Management
30 out of 60
Redapt Data Security EngagementRedapt, Inc. Safeguard Your Enterprise Data with Confidence
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
31 out of 60
Threat Protection Envisioning Engagement SentinelSentinel Technologies Inc.Organizations today are managing a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Get help achieving your broader security objectives.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 60
Modern SecOps Envisioning WorkshopTierPointUnlock unmatched security with TierPoint’s Microsoft cloud-native security solutions with our Modern SecOps Envisioning Workshop
+2
Applicable to:
Cloud Security
Identity & Access Management
33 out of 60
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 60
Microsoft Security AssessmentDataVoxThis assessment provides a comprehensive review of the Microsoft 365 environment, focusing on configuration, security posture, identity management, and data governance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
35 out of 60
Microsoft Security ImplementationDataVoxImplement the best Microsoft security practices throughout the customer environment by implementing Defender for Office 365 to Entra ID P1, Entra ID P2, and Entra ID Suite feature deployments.
+2
Applicable to:
Cloud Security
Identity & Access Management
36 out of 60
Microsoft 365 Modern Endpoint Service Powered by IntuneAll Covered, a division of Konica MinoltaMicrosoft 365 Modern Endpoint is a cloud-native, fully managed service powered by Microsoft Intune. It is designed to simplify endpoint hardening, configuration, and application management.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
37 out of 60
Zero Trust Deployment and Optimization ServiceSoftchoiceDeploy zero trust with confidence, optimize it to deliver lasting outcomes.
+2
Applicable to:
Cloud Security
Threat Protection
38 out of 60
Security AssessmentSoteria, LLCGain deep insights into your Secure Score, user and device health, application vulnerabilities, and data security with our security assessment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
39 out of 60
Cloud Security Envisioning WorkshopTierPointThe Cloud Security Envisioning engagement helps you explore how to detect threats, understand your security posture, and identify risks and opportunities across all your cloud environments.
+2
Applicable to:
Cloud Security
Insider Risk
40 out of 60
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Copilot and AI Readiness AssessmentCloudServusRun an AI Readiness Assessment to pinpoint gaps using Copilot adoption; align next steps to Copilot & Agents at Work.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
42 out of 60
Microsoft Purview QuickStart: ImplementationKraft KennedyKraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
43 out of 60
Mergers & Acquisitions Integration Services in 90: Three (3) Month TransitionLong View SystemsSupport a seamless user experience and align business operations from Day One of any merger, acquisition, or system migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
44 out of 60
Microsoft 365 Copilot Readiness Assessment (Security, Data, Governance)BlueAlly Technology SolutionsAssess your Microsoft 365 environment for secure Copilot adoption. Identify risks from oversharing, legacy auth, and data gaps, and get a roadmap to strengthen security and compliance readiness.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
45 out of 60
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
46 out of 60
Data Pros AMG - Copilot Readiness AssessmentData ProsEmpowering SMBs to confidently begin their AI journey with a tailored Microsoft Copilot readiness assessment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
47 out of 60
Microsoft 365 Security Best PracticesTechNet UC LLCSecure your Microsoft 365 environment by aligning with Microsoft’s latest security standards—enhancing threat protection, data governance, and compliance across Exchange, Teams, and SharePoint.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
AI-Powered Zero Trust Identity Workshop for Microsoft 365Netwoven Inc.Strengthen Zero Trust security by optimizing Microsoft 365 identity and access controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
49 out of 60
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
50 out of 60
Free Data Security & Threat Protection Immersion BriefingIT Partner LLCDiscover how to strengthen your Microsoft 365 environment with real-time insights, proactive threat detection, and intelligent data protection — guided by certified experts from IT Partner LLC.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
51 out of 60
Microsoft 365 Health & Security DiagnosticPSM PartnersAchieve stronger security, reduce costs, and simplify management with a targeted assessment built on best practices to maximize your Microsoft 365 investment.
+2
Applicable to:
Cloud Security
Threat Protection
52 out of 60
Secure AI Quickstart: 3-week Assessment and Proof of ConceptQuisitiveSecure AI Quick Start is a fundable, Microsoft-aligned security engagement that rapidly analyzes organizational AI readiness and identifies critical security & governance improvements
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
53 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
54 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
55 out of 60
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
56 out of 60
神州数码安全解决方案神州数码(中国)有限公司Empower organizations with end-to-end cloud security, zero trust architecture, and compliance using Microsoft technologies for robust protection and management.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
57 out of 60
Zoho CRM and OneDrive for Business IntegrationIT Partner LLCSecurely link OneDrive documents to Zoho CRM records to ensure sales teams always access the latest approved assets with automated version control and alerts.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
58 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Microsoft 365 Security AssessmentTechPlus TalentThis Microsoft 365 Security Assessment evaluates your entire Microsoft 365 environment to identify security gaps and misconfigurations, delivering risk-rated findings and prioritized recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
60 out of 60