FiltriCancella tutto
Professional Services risultati
Visualizzazione di risultati in professional services.
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
1 out of 13
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
2 out of 13
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
3 out of 13
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 13
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 13
Microsoft Purview Data Loss Prevention: 4-Wk Implementation ServiceUNIFY Solutions Pty. Ltd.UNIFY Solutions will implement Microsoft Purview Data Loss Prevention (DLP) to protect your organisation's sensitive information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 13
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
7 out of 13
Security Assessment: 15 days assessment for Microsoft 365Max Solution (M) Sdn BhdA Microsoft security assessment workshop and implementation for your organization (suitable for company >50 users & above)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
8 out of 13
KPMG Microsoft 365 Copilot: 3-Wk Readiness AssessmentKPMG SERVICES PTE. LTD.Assessment of data protection and identity & access processes and controls to ensure security measures are in place for a secured adoption Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
9 out of 13
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
10 out of 13
Adoption and Governance of Copilot for Microsoft 365KloudyNet Technologies SDN BHDMicrosoft 365 Copilot Adoption and Governance is a comprehensive solution designed to help businesses streamline the adoption of Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
11 out of 13
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
12 out of 13
Windows 365 Rapid Deployment 5 Day ImplementationTelstra LimitedTelstra's Windows 365 Rapid Deployment will help your organization understand how the scalability and security of the cloud and the familiarity of a PC can be combined into one seamless experience.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
13 out of 13