FiltreRyd alle
Konsulenttjenester resultater
Viser resultater i konsulenttjenester.
XENMDM - Monthly SoC Support for Mobile DevicesXencia Technology Solutions Pvt LtdMicrosoft Intune platform based Managed Services covering device management, control and compliance along with monitoring and remediation of issues, policies, users, devices and threats.
+1
Applicable to:
Cloud Security
1 out of 60
Cybersecurity Assessment Engagement - 4 weeksGrant Thornton LLPEnhance Your Cloud Security Posture with Grant Thornton’s Cybersecurity Assessment
+2
Applicable to:
Cloud Security
Identity & Access Management
2 out of 60
Threat Protection Engagement - 4 weeksGrant Thornton LLPImprove your Security Posture with Grant Thornton's Threat Protection Engagement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Dynapt Advisory Services for Microsoft 365 Copilot 3 Week WorkshopDynapt IncUnleash the potential of AI to transform your business operations with Microsoft 365 Copilot.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
4 out of 60
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
5 out of 60
Implementation of Microsoft Defender for Cloud AppsCDWCDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Implementation of Microsoft Defender for Office 365CDWThe Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Healthcare & Education Cybersecurity AssessmentPSM PartnersThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
8 out of 60
AI Security Readiness: 4 week AssessmentQuisitiveQuisitive's AI Security Readiness Assessment provides organizations with an in-depth understanding of how best to adopt Copilot and Generative AI without putting their organization at risk.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
9 out of 60
Data Security AssessmentPSM PartnersThis assessment is designed to help companies identify their data security, privacy, and compliance goals while accelerating their compliance journey using the latest Microsoft technologies.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
10 out of 60
Copilot Planning WorkshopAhead, IncThis Copilot workshop will prepare your organization to utilize Copilot by identifying key scenarios and gaps in current Microsoft 365 configurations to improve ROI of initial Copilot deployments.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
11 out of 60
Threat Protection EngagementISA Cybersecurity Inc.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Threat Protection EngagementFIS Managed IT SolutionsLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITEDProfessional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
16 out of 60
Modern Endpoint Design and Planning WorkshopKraft KennedyKraft Kennedy will conduct a Modern Endpoint Design and Planning Workshop to review and discuss both your current management and deployment processes as well as plans for the future-state environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
17 out of 60
Threat Protection StrategyTierPointGain a clear roadmap to improve threat detection and response across your Azure environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Zero Trust Assessment: 3-Week WorkshopAccountabilITOur Microsoft Zero Trust Assessment: 3-Week Workshop is designed to evaluate an organization's security posture and provide guidance on implementing a Zero Trust security model.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 60
Microsoft 365 Secure Productivity WorkshopABTechnologiesEnable your team to work securely and productively using Microsoft 365 best practices.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
20 out of 60
Centric Threat Protection EngagementCentric Consulting, LLCLearn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
21 out of 60
Exchange Online MigrationDataVoxMigrating emails to Office 365 includes assessing the environment, choosing a method (Cutover, Staged, Hybrid, or IMAP), migrating data, updating DNS, configuring devices, and user training.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Mobile Device Management
22 out of 60
Security Best Practices AssessmentTechNet UC LLCOur assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 60
Data Security implementation for generative AI: 8-Wk ImpConterraHelp your organization to govern, monitor, and secure the use of generative AI tools like Copilot, ChatGPT, or custom GPT applications
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
24 out of 60
KK_Exchange_Migration Consulting ServicesKraft KennedyMoving to Exchange Online significantly extends the use of Microsoft 365 by modernizing communication infrastructure, enhancing security, and unlocking integrated productivity features.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
25 out of 60
CMMC Secure Enclave with User TrainingPlanet TechnologiesA secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov and including User Training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
26 out of 60
impelSecure Modern SecOps Engagement: Free 4-week workshopimpeltec Pty LtdGain visibility into threats to your Microsoft 365 and Azure clouds and on-premises environments across email, identity, endpoints, and third-party data
+2
Applicable to:
Cloud Security
Threat Protection
27 out of 60
Managed Services ProviderSkyTerra Technologies LLCSkyTerra delivers seamless integration with your existing Microsoft ecosystem, from Azure infrastructure to Microsoft 365 productivity suites.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
28 out of 60
THInc.Ops Managed ServiceTECH HEADS INCPremium managed IT service solution that provides a higher quality of service supporting your staff and stronger protection against cyberattacks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
29 out of 60
THInc Secure Managed Security Service for MicrosoftTECH HEADS INCComprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
30 out of 60
Google Workspace to Microsoft 365 MigrationDataVoxDataVox offers migration services for your company from Google Workspace to Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
31 out of 60
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLCSkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
DSPM for AI - Free 2-Hour AssessmentNetwoven Inc.To help enterprises identify blind spots in Microsoft 365's AI data security, assess DSPM maturity, and establish a governance-first approach to safely accelerate AI innovation with Microsoft Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 60
SkyTerra's Cloud Security AssessmentSkyTerra Technologies LLCStrengthen Microsoft cloud security with a structured assessment, an actionable roadmap, and enablement your team can run with
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 60
InTune AssessmentSkyTerra Technologies LLCSkyTerra helps you configure and align Intune to meet your real business needs, across platforms, policies, and people.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
35 out of 60
Okta to Microsoft Entra ID ConversionSkyTerra Technologies LLCConsolidate identity on Microsoft Entra ID, reduce cost and complexity, and raise your security baseline without disrupting your users.
+2
Applicable to:
Cloud Security
Identity & Access Management
36 out of 60
Redapt Data Security EngagementRedapt, Inc. Safeguard Your Enterprise Data with Confidence
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
37 out of 60
Threat Protection Envisioning Engagement SentinelSentinel Technologies Inc.Organizations today are managing a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Get help achieving your broader security objectives.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
38 out of 60
Modern SecOps Envisioning WorkshopTierPointUnlock unmatched security with TierPoint’s Microsoft cloud-native security solutions with our Modern SecOps Envisioning Workshop
+2
Applicable to:
Cloud Security
Identity & Access Management
39 out of 60
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
40 out of 60
Microsoft Security AssessmentDataVoxThis assessment provides a comprehensive review of the Microsoft 365 environment, focusing on configuration, security posture, identity management, and data governance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
41 out of 60
Microsoft Security ImplementationDataVoxImplement the best Microsoft security practices throughout the customer environment by implementing Defender for Office 365 to Entra ID P1, Entra ID P2, and Entra ID Suite feature deployments.
+2
Applicable to:
Cloud Security
Identity & Access Management
42 out of 60
Zero Trust Deployment and Optimization ServiceSoftchoiceDeploy zero trust with confidence, optimize it to deliver lasting outcomes.
+2
Applicable to:
Cloud Security
Threat Protection
43 out of 60
Microsoft 365 E5 Shield Deployment: 8 Week Imp.KAMIND IT, IncKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack
+2
Applicable to:
Cloud Security
Threat Protection
44 out of 60
Security AssessmentSoteria, LLCGain deep insights into your Secure Score, user and device health, application vulnerabilities, and data security with our security assessment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
45 out of 60
Copilot and AI Readiness AssessmentCloudServusRun an AI Readiness Assessment to pinpoint gaps using Copilot adoption; align next steps to Copilot & Agents at Work.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
46 out of 60
Microsoft Purview QuickStart: ImplementationKraft KennedyKraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
47 out of 60
Mergers & Acquisitions Integration Services in 90: Three (3) Month TransitionLong View SystemsSupport a seamless user experience and align business operations from Day One of any merger, acquisition, or system migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
48 out of 60
Microsoft 365 Copilot Readiness Assessment (Security, Data, Governance)BlueAlly Technology SolutionsAssess your Microsoft 365 environment for secure Copilot adoption. Identify risks from oversharing, legacy auth, and data gaps, and get a roadmap to strengthen security and compliance readiness.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
49 out of 60
Data Pros AMG - Copilot Readiness AssessmentData ProsEmpowering SMBs to confidently begin their AI journey with a tailored Microsoft Copilot readiness assessment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
50 out of 60
Microsoft 365 Security Best PracticesTechNet UC LLCSecure your Microsoft 365 environment by aligning with Microsoft’s latest security standards—enhancing threat protection, data governance, and compliance across Exchange, Teams, and SharePoint.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
AI-Powered Zero Trust Identity Workshop for Microsoft 365Netwoven Inc.Strengthen Zero Trust security by optimizing Microsoft 365 identity and access controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
52 out of 60
Free Data Security & Threat Protection Immersion BriefingIT Partner LLCDiscover how to strengthen your Microsoft 365 environment with real-time insights, proactive threat detection, and intelligent data protection — guided by certified experts from IT Partner LLC.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
53 out of 60
Microsoft 365 Health & Security DiagnosticPSM PartnersAchieve stronger security, reduce costs, and simplify management with a targeted assessment built on best practices to maximize your Microsoft 365 investment.
+2
Applicable to:
Cloud Security
Threat Protection
54 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
55 out of 60
神州数码安全解决方案神州数码(中国)有限公司Empower organizations with end-to-end cloud security, zero trust architecture, and compliance using Microsoft technologies for robust protection and management.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
56 out of 60
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLCCMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
57 out of 60
Zoho CRM and OneDrive for Business IntegrationIT Partner LLCSecurely link OneDrive documents to Zoho CRM records to ensure sales teams always access the latest approved assets with automated version control and alerts.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
58 out of 60
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
59 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60