FiltriCancella tutto
Servizi di consulenza risultati
Visualizzazione di risultati in servizi di consulenza.
Cloud Security Review: 4-Day AssessmentRISUAL LTDWe can assess the security configuration of Microsoft Office 365, Microsoft Azure IaaS and PaaS and Dynamics 365 together or we can review them individually if you have particular concerns.
+2
Applicable to:
Cloud Security
Compliance Advisory Services
1 out of 26
Microsoft 365 Security Audit: 3-Day AssessmentMarathon Managed ServicesMicrosoft 365 Security Health Check and Report. Analysis of Secure Score and adherence to the NCSC 14 security principles. Presentation of report to customer detailing Microsoft 365 security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 26
Modern Work Strategy: 3-hour Briefing SessionRISUAL LTDThis engagement is a 3 hour briefing session with an Enterprise Architect to go through two primary elements of Microsoft 365, our Modern Work Strategy & out Modern Work assessments.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
3 out of 26
Security Assessment for Microsoft 365: 5 DaysChess LtdProtect your data with Security Assessment of your Microsoft 365 subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 26
SOC as a Service_1 day ImplementationTarsus On Demand (Pty) LtdSOC is a managed service that leverages a bespoke Threat Monitoring Platform. This platform detects malicious and suspicious activity across 3 critical attack vectors: Endpoint, Network & Cloud.
+2
Applicable to:
Cloud Security
Threat Protection
5 out of 26
Azure AD: Cloud Authentication 1-Day AssessmentTransparity Solutions LtdAn assessment to provide you with an overview of Cloud Identity and the capabilities within Azure AD to help you better serve and engage with your employees, including transition away from AD and ADFS
+2
Applicable to:
Cloud Security
Identity & Access Management
6 out of 26
Zero Trust Adoption: 6-Day AssessmentPowerONPlatforms LimitedThe Solution Alignment is designed to support your understanding and plan your Secure Organisations future with Microsoft services. Looking across Data, Apps, Infra, Network, Identities and Endpoints.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
7 out of 26
Windows 365 - 3 Day Proof of Concept DeploymentCISILION LTDWindows 365 - 3-day Proof of Concept inclusive of demo, design, deployment, configuration, testing and handover.
+2
Applicable to:
Cloud Security
Device Deployment & Management
8 out of 26
Security and Compliance AssessmentAgilisys LtdOur Security & Compliance assessment helps you understand the threats you might be facing, reduce the risk of your business being interrupted, and as a result allow you to gain speed and efficiency.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
9 out of 26
Secure Microsoft 365 Managed ServiceCWSICWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 26
IAM Health Check: 5-10 Day AssessmentMarathon Managed ServicesA stepping-stone towards a blueprint for change in your organisation, this assessment and report ensures that you benefit from a health check and assessment of your existing IAM infrastructure
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
11 out of 26
Microsoft 365 Adoption : 3-6 Day Adoption WorkshopMarathon Managed ServicesGain knowledge around current Microsoft 365 feature sets and capabilities, and understanding of how the benefits of modern working can benefit your business. Assess readiness and plan adoption roadmap
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
12 out of 26
Microsoft365 Security Gap Analysis: 2Wk AssessmentStripe OLT Consulting LtdOur Microsoft 365 Gap Analysis will help you determine the difference or ‘GAP’ between your organisation’s current and ideal state of security technology.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
13 out of 26
Microsoft 365 Modern Workplace: 4Wk ImplementationStripe OLT Consulting LtdMicrosoft 365 has been designed to help your organisation excel in a remote working world - Our team of gold certified Microsoft experts are here to support it's implementation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
14 out of 26
Cybersecurity Assessment Service: 2-Day AssessmentHTGThe Cyber Security Assessment Tool (CSAT) is a software product developed by security experts to quickly assess the status of an organisation’s security with recommended improvements based on fact.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 26
Cloud Security Assesment - 4 Wks AssessmentYouCC Technologies LTD.YouCC Technology a leader in the Israeli Cloud Security consulting provider will assess your current cloud security situation and recommend key Microsoft 365 suite deployment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
16 out of 26
Email and Threat Protection 4 Week ImplementationHTGHTG’s Advanced Email Threat Protection pack ensures your Microsoft products such as Outlook, SharePoint, OneDrive & Microsoft Teams are hardened to best practice standards.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
17 out of 26
Collaboration & Data Governance 4-Week ImplementationHTGHTG’s Collaboration & Data Governance pack can help companies achieve the right balance of user freedom while ensuring compliance with corporate policies.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
18 out of 26
Microsoft 365 Security Workshop: 3-day WorkshopPHOENIX SOFTWARE LTDEnable organisations to understand how Identity & Access Management, Threat Protection and Secure Management can help to secure their organisation in comparison to their existing Security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 26
Information Protection Workshop: 3day WorkshopPHOENIX SOFTWARE LTDEnabling you to use the capabilities built into Microsoft 365 to mange and secure your organisation's digital information in the cloud with products such as Information Protection
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
20 out of 26
Data Classification and labelling: 6-Months Impl.Toreon CVBAData classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
21 out of 26
Endpoint Manager: 5-Day Proof of ConceptTransparity Solutions LtdModernise device management with an expert-led POC deployment of Microsoft Endpoint Manager
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
22 out of 26
Security Accelerator: 5-Day WorkshopRicoh UK LimitedProvides insight and rates risk to existing security posture & delivers a roadmap to improvement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 26
Microsoft 365 Manage and Investigate Risk: 3-Day WorkshopComms-care Group LtdMicrosoft Funded Manage and Investigate Risk Consultancy Workshop
+2
Applicable to:
Cloud Security
Insider Risk
24 out of 26
Microsoft 365 Security Assessment: 6-day AssessmentPerformantaPerformanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 26
Secure Score Review: 2-Hour WorkshopCloud DirectEnhance your security posture with an expert-led consultancy workshop. This workshop is a 'get started' guide for those who don't have the luxury of employing security architects.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 26