FiltreRyd alle
Professional Services resultater
Viser resultater i professional services.
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
1 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT LimitedCybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 60
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, LdaThe engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
3 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
4 out of 60
Microsoft 365 E5 NIST 800-171 -1 Week GAP AssessmtKAMIND IT, IncThis offer is for a NIST800-171 Gap Assessment for a single Host Unit, scoped to a single contract, single subnet using the Microsoft 365 E5 license
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
5 out of 60
Intelligent Shield: 1d AssessmentCorporate SoftwareAn Audit for your Microsoft 365 tenant based on Best Practices
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
6 out of 60
Endpoint Management WorkshopAvalerisThis Cloud Accelerator Workshop will demonstrate how Microsoft Endpoint Manager can help your organization protect endpoint devices, secure user identities, and increase user productivity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
7 out of 60
Compliance Workshop: Data Risk ManagementAvalerisA structured approach to discover risks related to organizational data and mapping these risks to solutions that will help manage and protect data and mitigate the associated risks
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
8 out of 60
Secure Work from Anywhere WorkshopAvalerisTeamwork & collaboration are needed to build resilience for your people, teams, & organization. Empower people to be productive & secure as they adapt to new ways of working with Microsoft365
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
9 out of 60
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLCRavenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
10 out of 60
Microsoft 365 Security Assessment up to 6 weeksACTSACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
11 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
QC Education- Threat Protection - 2 Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #14 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
14 out of 60
QC Education- Identity Management- 2Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #4 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
15 out of 60
Quebec Education - DLP - 2 Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #5 and #6 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
16 out of 60
Mobile Device Management - 2 Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #1, #2 and #3 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
17 out of 60
QC Education Security Directives -1 Day BriefingAvalerisThis one day GAP Analysis will help you assess your current state of compliance for Quebec Ministry of Education Security Directives and provide high-level recommendations to address any shortcomings.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
18 out of 60
Office 365 Security: 1-Day AssessmentNetrix GlobalSecurity assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
+1
Applicable to:
Cloud Security
19 out of 60
Defend Against Threats with SIEM Plus XDRNetrix GlobalAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Endpoint Management WorkshopYork Telecom Corp3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
21 out of 60
Hybrid Return to Work Enablement: 4 Wk-AssessmentInsight Canada IncThis offer helps enable your hybrid return to work strategy and ensure your organization is ready for this transition.
+3
Applicable to:
Cloud Security
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
22 out of 60
Secure Workspace: 1 Day WorkshopWatserv Inc.A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
23 out of 60
Virtual CISO (vCISO) Managed ServicesNetrix GlobalOur virtual CISO offering provides organizations a senior level security executive for ongoing security program management and governance.
+1
Applicable to:
Cloud Security
24 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 60
Enterprise Mobility - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Enterprise Mobility policies, procedures and technology against best practices.
+2
Applicable to:
Cloud Security
Mobile Device Management
26 out of 60
Threat Protection - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Threat Protection policies, procedures and technology against best practices.
+2
Applicable to:
Cloud Security
Threat Protection
27 out of 60
Enterprise Identity and Governance -1 Day BriefingAvalerisAvaleris developed a Capability Maturity Model to help organizations quickly assess the current state of Identity Management and Governance policies, procedures and technology against best practice.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
28 out of 60
Information Protection - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Information Protection policies, procedures and technology against best practices.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
29 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLCIntroducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM Systems• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeITCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Secure Live Workspace - 8 Weeks AssessmentLTIMindtree LimitedOur Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
+3
Applicable to:
Cloud Security
Power Platform for Teams
Teams Custom Solutions
33 out of 60
Sauvegarde Microsoft 365 : 2Wk - implementationProjetlysEnsemble de service permettant de mettre en place facilement une solution de backup Veeam pour Microsoft 365 ?
+2
Applicable to:
Cloud Security
Information Protection & Governance
34 out of 60
Microsoft Advisory Services ManagedSoftwareOneDrive Value and Cost Savings Throughout the Microsoft Cloud Investment Lifecycle
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
35 out of 60
Adoptez Microsoft Edge : 2-Wk ImplementationProjetlysNotre approche pour la mise en place et l'adoption de Microsoft Edge.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
36 out of 60
Device Mgm and Protection - 12 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
37 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
38 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
39 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
40 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
41 out of 60
Security Maturity Assessment: 4 WksLixar ITLet BDO help you design your roadmap to increase your security score with cost-effective security tools with our 4 week Security Maturity Assessment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
42 out of 60
BDO eDiscovery: 4 Wk AssessmentLixar ITCentralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
43 out of 60
Insider Risk Management Assessment: 4 WksLixar ITBDO's Insider Risk Management Assessment can help you identify insider data risks and establish a plan to reduce data leakage using Microsoft 365 to ensure compliance and security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
44 out of 60
Defender for Office 365: 3-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
45 out of 60
Microsoft 365 Digital Workforce WorkshopVNEXT GroupLearn how to empower people to be more productive and secure as they adapt to new ways of working with Microsoft 365.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Teams Custom Solutions
46 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareOneImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
48 out of 60
AvePoint Policies & Insights: 10-Days AssesmentsIT-Dev sp. z o.o.Assesment's outcomes:
• Enable centralized reporting on Microsoft 365 security.
• Discover potential risks and exposed content.
• Enforce policies and automatically remediate security breaches!
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
49 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
50 out of 60
User Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
51 out of 60
Endpoint Management: 5-Days WorkshopVNEXT GroupLearn how to manage users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
52 out of 60
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, IncWe will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
53 out of 60
Microsoft 365 Migration 12 Hour Proof-of-ConceptNew Charter Technologies, Inc.Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
54 out of 60
Microsoft 365 Implementation for Financial ServiceNew Charter Technologies, Inc.Paid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
55 out of 60
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
56 out of 60
Microsoft 365 HIPAA/HITECH 20 Hour ImplementationNew Charter Technologies, Inc.Implementation of Microsoft 365 to include compliance policies and templates for health care.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
57 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
58 out of 60
Modern Frontline Work Acceleration 2 days WorkshopLiveRoute FZ-LLCLiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
59 out of 60
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLCCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60