FiltreRyd alle
Professional Services resultater
Viser resultater i professional services.
Lenovo Cyber Resiliency as a Service RemediationLenovo SoftwareThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 41
SYSTEX Data Security and Compliance Solution精诚(中国)企业管理有限公司通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 41
Microsoft 365 Copilot for Executives WorkshopSMART business LLCJoin our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
3 out of 41
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
4 out of 41
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 41
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
6 out of 41
Microsoft 365 Manage Service–12 mth ImplementationAlfa Connections Pte LtdAlfa Connections providing Microsoft 365 Managed service is designed to enhance your workforce experience by supporting your organization on planning, enablement, implementation, and adoption.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
7 out of 41
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to:
Cloud Security
8 out of 41
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
9 out of 41
Cloud Workplace: 8-Months ImplementationRapid CircleThe implementation of a cloud workplace gives an organization the opportunity to offer employees a workplace that can be used independently of place and time and with the most modern Microsoft tools.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
10 out of 41
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 41
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 41
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLCCMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
13 out of 41
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
14 out of 41
Quadra BluForge Managed XDRQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 41
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 41
Modernize Endpoints (Microsoft Intune): 1 Day WorkshopCrayonThe Endpoint Management Workshop is a one-day engagement that will help you showcase the value of Microsoft Endpoint Manager and how to manage users’ devices and apps from anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
17 out of 41
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
18 out of 41
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
19 out of 41
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
20 out of 41
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 41
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
22 out of 41
XENMDM - Monthly SoC Support for Mobile DevicesXencia Technology Solutions Pvt LtdMicrosoft Intune platform based Managed Services covering device management, control and compliance along with monitoring and remediation of issues, policies, users, devices and threats.
+1
Applicable to:
Cloud Security
23 out of 41
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
24 out of 41
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
25 out of 41
Microsoft Purview Data Loss Prevention: 4-Wk Implementation ServiceUNIFY Solutions Pty. Ltd.UNIFY Solutions will implement Microsoft Purview Data Loss Prevention (DLP) to protect your organisation's sensitive information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 41
Microsoft 365 Secure Score: 2 Week AssessmentInsightAlign your security priorities with best practice management and protection of your devices, apps and users.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
27 out of 41
NCS Copilot Offer: Readiness AssessmentNCS PTE LTDMaximize Your Copilot Investment with NCS Consultancy & Advisory Services
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
28 out of 41
KPMG Microsoft 365 Copilot: 3-Wk Readiness AssessmentKPMG SERVICES PTE. LTD.Assessment of data protection and identity & access processes and controls to ensure security measures are in place for a secured adoption Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
29 out of 41
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
30 out of 41
Security Assessment伊登软件伊登Microsoft 365 Security Service,是在Microsoft 365 Security的基础应用之上,结合网络安全、访问安全、架构安全、数据安全等的全方位一站式安全解决方案。
伊登Microsoft 365 Security安全解决方案立足于客户信息安全,提供多个维度的安全策略,伊登从客户的需求出发,通过对企业IT基础架构评估分析,提出合理的Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
31 out of 41
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
32 out of 41
神州数码安全解决方案神州数码(中国)有限公司Empower organizations with end-to-end cloud security, zero trust architecture, and compliance using Microsoft technologies for robust protection and management.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
33 out of 41
Edensoft Threat Protection - Microsoft Defender XDR 3 Weeks Implementation伊登软件Accelerate Microsoft Defender XDR implementation for unified enterprise threat protection.
+2
Applicable to:
Cloud Security
Threat Protection
34 out of 41
Inspira Microsoft Threat Protection Envisioning WorkshopInspira Enterprise Inc.Learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 41
Inspira Microsoft Data Security Envisioning WorkshopInspira Enterprise Inc.Identify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
36 out of 41
Frontier Firm LiveSulava OyFrontier Firm Live is Sulava MEA’s flagship subscription service designed to help organisations transition into AI-native enterprises.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
37 out of 41
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
38 out of 41
M365-Digital Workspace Consulting-2wk AssessmentOrange Business Services - GlobalTo enhance collaboration work through a complete offer with Microsoft 365 with complete voice capabilities for today's workforce collaboration across multiple locations.
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Teams Custom Solutions
39 out of 41
Windows 365 Rapid Deployment 5 Day ImplementationTelstra LimitedTelstra's Windows 365 Rapid Deployment will help your organization understand how the scalability and security of the cloud and the familiarity of a PC can be combined into one seamless experience.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
40 out of 41
Windows 365 Cloud PC - 3-Day Workshop Proof of ValueSoftwareONE Thailand Co., Ltd.Deep dive into Microsoft cloud solutions for end-user computing and proof of value to your organization and your employees for to a secure and productive desktop experience from virtually anywhere
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
41 out of 41