FiltresEsborra-ho tot
Serveis de consultoria resultats
Es mostren resultats a serveis de consultoria.
Threat Protection Envisioning Workshop Marketplace OfferOlive + GooseA guided security envisioning workshop that helps organizations assess current threat protection capabilities and define a practical roadmap using Microsoft security solutions.
+1
Applicable to:
Cloud Security
1 out of 41
Microsoft 365 Security Confidence AcceleratorReliance InfosystemsA structured Microsoft 365 security posture accelerator that identifies and reduces security risk across identity, devices, applications, and data — delivering clear outcomes.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 41
Microsoft 365 Security Readiness & Assurance AcceleratorReliance Infosystems Inc.A structured Microsoft 365 security readiness engagement that identifies, prioritises, and reduces risk across identity, devices, applications, and data — delivering audit confidence, & Clarity
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
3 out of 41
KPMG Agent 365 Implementation - Adoption & ManagementKPMGEnable organisations to operationalise Microsoft Agent 365 with trusted governance, security, and lifecycle controls so AI agents can scale safely beyond pilots
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 41
Hitachi Solutions – Agent 365 Governance AcceleratorHitachi SolutionsEstablish governance, control, and operating model for AI agents using Microsoft Agent 365 to enable secure, scalable enterprise adoption.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
5 out of 41
Salesforce and Microsoft Defender IntegrationIT Partner LLCSecure Salesforce with Defender to detect compromised accounts, monitor exfiltration, and automate threats. Enforce Conditional Access and Sentinel. Pricing/timeline customized post-scoping.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 41
HCLTech Frontline Worker Digital Experience – Assessment & Implementation support for Empowering Frontline WorkersHCL America Inc_HCLTHCLTech’s solution streamlines frontline communication, digital workflows, and secure device management, powered by HCLTech, Microsoft, and Zebra for a modern, sustainable frontline workplace.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
7 out of 41
Endpoint Management: 3-Day WorkshopApex Digital SolutionsBegin the steps to manage and protect your devices, your apps, and your users
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
8 out of 41
Microsoft 365 Identity & Security: 2-Wk AssessmentPSM PartnersCustomized identity and security assessment focused on the Microsoft 365 platform
+2
Applicable to:
Cloud Security
Identity & Access Management
9 out of 41
Microsoft 365 Value Discovery - Workshop - 1 DayDynTek Inc.OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT
OF MICROSOFT 365 IN YOUR ENVIRONMENT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
10 out of 41
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 41
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLCRavenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
12 out of 41
Big Green IT Security Assessment: 3-WeekBig Green IT - DevSecure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 41
Microsoft 365 Security Assessment up to 6 weeksACTSACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
14 out of 41
Managed Security for Compliance: 1 yr Mgd ServiceInsightDiscover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
+2
Applicable to:
Cloud Security
Compliance Advisory Services
15 out of 41
Microsoft 365 License Optimization:1-hr AssessmentFrontier Technology, LLCReview current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
16 out of 41
Microsoft Managed Security ServicesNetrix GlobalNetrix’s 24x7x365 virtual Security Operations Center (SOC) leverages Microsoft’s enterprise-grade security software to monitor and respond to incidents as well as proactively hunt threats.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
17 out of 41
Office 365 Security: 1-Day AssessmentNetrix GlobalSecurity assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
+1
Applicable to:
Cloud Security
18 out of 41
Document Airlift-OneDrive ImplementationSynergy Technical, LLCOur Document Airlift will enable and configure your organization’s environment to use OneDrive for Business services in your Office 365 tenant.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
19 out of 41
1-Day Security & Identity WorkshopConvergeOneTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 41
Ransomware Protection: 1 Day-WorkshopConvergeOneLearn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 41
Windows 365 Quick Start: 4-Day Proof of ConceptSynergy Technical, LLCThe Windows 365 Quick Start engagement is designed to give you everything you need to deploy Windows 365. Included are a solution overview, planning services, as well as a proof of concept engagement
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
22 out of 41
Office 365 Protection: Design & Pilot 1-Wk POCManaged SolutionProtect Your Employees from External Email Threats with Defender for Office 365 Protection
+2
Applicable to:
Cloud Security
Threat Protection
23 out of 41
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
24 out of 41
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer SolutionsSirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 41
discover-sensitive-data-workshopECF Data LLCECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
26 out of 41
ECF Data Threat Protection: 3-Day WorkshopECF Data LLCThe Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
27 out of 41
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 41
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
29 out of 41
Security Assessment: 2 Week AssessmentTallanTallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 41
Windows 365 QuickStart : 4 Day PoC + Surface GoSynergy Technical, LLCThe Windows 365 Quick Start engagement is designed to show you how Windows 365 + SurfaceGo keeps you productive. Included are a Surface Go, planning services, as well as a proof of concept.engagement
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
31 out of 41
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
32 out of 41
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 41
Compliance Managed ServicesForsyte IT SolutionsOrganizations everywhere are experiencing the benefits of Compliance Managed Services. Work with our Microsoft Gold Partner team to establish governance and manage user access and data security.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
34 out of 41
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLCSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 41
Microsoft Security Assessment: 3-Wk AssessmenteGroup Enabling Technologies, LLCAnalyze your cross platform security posture, with evaluated vulnerabilities and risks identified with a Microsoft Security Assessment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
36 out of 41
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week ImplementationQuisitiveQuisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
37 out of 41
SMB Cloud Evaluation Program: 2-Wk AssessmentMaureen Data SystemsIdentifying ways to modernize & optimize IT assets, mitigate security risks, and reduce cost & complexity. See how the cloud can help, estimated costs, and what to do next.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
38 out of 41
Microsoft Information Protection Administrator: 3 Days WorkshopNETCOM LEARNINGMicrosoft Information Protection Administrator course focuses on data governance and information protection within your organization.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 41
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse GlobalThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
40 out of 41
Modern IT: 2 Hour AssessmentModern ITIdentify areas for business process optimization through Modern IT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
41 out of 41