FiltersClear all
Professional Services results
Showing results in professional services.
Data Protection and Governance with Microsoft PurviewAVASOFTConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 60
Implementation on Microsoft IntuneITX360 (Pvt) Ltd.Enhance security and efficiency with Microsoft Intune Implementation. Manage and secure devices across Windows, Android, iOS, and macOS with a seamless cloud-based solution.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
2 out of 60
Active Directory Services: Implementation, Upgrade, and MigrationITX360 (Pvt) Ltd.Boost productivity and security with expert Active Directory services. Integrate seamlessly with Microsoft 365 through our implementation, upgrade, and migration solutions
+1
Applicable to:
Identity & Access Management
3 out of 60
Endpoint Management and Windows Deployment: 2-days ImplementationCC Bilgi TeknolojileriMicrosoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises.
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
4 out of 60
Microsoft 365 Managed ServiceRackspace TechnologyOn-demand access to a team of email and productivity application experts that work with you to drive outcomes and continuously evolve your environment.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
5 out of 60
Microsoft 365 Security Health Check: 3 day AssessmentISCG SP Z O OMicrosoft 365 is a multi-layer solution with the right security policies you can block over 99.9 percent of account compromise attacks!
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
6 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Modern Workplace - Cloud Endpoint ManagementArxusOur Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
8 out of 60
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFTAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFTEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 60
Device Management Migration - On-Premises to Cloud by AVASOFTAVASOFTSeamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
11 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPOThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
12 out of 60
Secure & Manage Devices using the Microsoft Intune Suite with AVASOFTAVASOFTSeamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
13 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
14 out of 60
1ID Platform for EDUTelelink Business Services EAD1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
15 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFTManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Seguridad Corporativa: Evaluación 4 semanasCIBERIT SRL.Con esta Solución usted podrá gestionar la seguridad en toda su empresa
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
17 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Neway Security proposition: 3-WK implementationNeWay Technologies LtdThe Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
19 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
20 out of 60
Microsoft 365 Security: 2-Week ImplementationTelelink Business Services EADCreate and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
+2
Applicable to:
Identity & Access Management
Threat Protection
21 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies LtdMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Pently Microsoft 365 - AssessmentPently GmbHStructured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
24 out of 60
Sovereign Cloud-Go China上海南洋万邦软件技术有限公司将原部署在全球版 Microsoft 365 的数据迁移至由世纪互联运营的中国版 Microsoft 365(21Vianet)环境中,以满足监管要求。To comply with regulatory requirements, data originally hosted in the global version of Microsoft 365 is being migrated to t
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
25 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Windows 11 Assessment: 1-WKSteeves Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
27 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
28 out of 60
Microsoft 365 service - 4 weeks ImplementationSPAN d.d.With implementation of Microsoft 365 services support everyday activities, help build hybrid or cloud IT environments and streamline organizational availability to adapt to new future.
+3
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Teamwork Deployment
29 out of 60
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
30 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
31 out of 60
Microsoft 365 Copilot Risk Assessment: 1-Week Strategic WorkshopAtmoseraUncover data risks and prepare for secure Copilot adoption with a Microsoft 365 risk assessment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
32 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementationCloudshift3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
34 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş."Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
36 out of 60
Identity Health CheckMobile MentorMobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
37 out of 60
Infra & Network Monitoring with Microsoft SentinelAVASOFTBoost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
38 out of 60
Microsoft 365 Email Threat Protection AssessmentAVASOFTMicrosoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
39 out of 60
Advania: Intune Get Started: 2 d training and PoCAdvania ABUnderstand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
40 out of 60
Unified Access & Protection with Microsoft Entra Global Secure AccessMobile MentorStep confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
41 out of 60
Copilot Readiness Assessment for Microsoft 365Mint Management TechnologiesMint Group is thrilled to bring you a consulting service designed to supercharge your Microsoft 365 experience and get you Microsoft 365 Copilot ready.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
42 out of 60
Modern Workplace Security 10-Wk ImplementationWipro LtdWipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
43 out of 60
Microsoft Cloud App Security (MCAS) Solutions for Native Apps by AVASOFTAVASOFTEnhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
44 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFTBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
45 out of 60
Security Architecture Design and Implementation Service上海诺未网络科技有限公司NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Windows 365 Standardized PilotMobile MentorThe Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
47 out of 60
Microsoft Purview Migration Accelerator: 1-Day Envisioning WorkshopMAQ SoftwareOur workshop assesses your data landscape, identifies challenges, provides tailored recommendations, and a phased migration strategy to Microsoft Purview in just one day.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
48 out of 60
Microsoft Security Services:5-Wk ImplementationEnergy Time LLCDeploy&Configure Microsoft Security Services: Azure AD Premium features, Microsoft Defender Family, Endpoint Management, Information Protection
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
49 out of 60
Entra ID Governance and Guest AccessMobile MentorEmpower your business with Mobile Mentor’s Microsoft Entra ID Governance and Guest Access service, built on Microsoft’s cutting-edge Entra Identity Governance platform.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
50 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
51 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalystAlithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
52 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFTConfident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
53 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
54 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
ADFS to Entra ID Migration ServiceMobile MentorMobile Mentor’s ADFS to Entra ID Migration Service offers a secure, cloud-first Single Sign-On experience that eliminates outdated infrastructure and unlocks the full potential of Microsoft Entra ID.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
57 out of 60
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
58 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFTIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
59 out of 60
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITEDOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
60 out of 60