СүзгілерБарлығын тазалау
Консалтинг қызметтері нәтиже
консалтинг қызметтері ішіндегі нәтиже көрсетіліп тұр.
Office 365 Protection: Design & Pilot 1-Wk POCManaged SolutionProtect Your Employees from External Email Threats with Defender for Office 365 Protection
+2
Applicable to:
Cloud Security
Threat Protection
1 out of 16
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
2 out of 16
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer SolutionsSirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 16
discover-sensitive-data-workshopECF Data LLCECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
4 out of 16
ECF Data Threat Protection: 3-Day WorkshopECF Data LLCThe Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
5 out of 16
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 16
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
7 out of 16
Security Assessment: 2 Week AssessmentTallanTallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 16
Windows 365 QuickStart : 4 Day PoC + Surface GoSynergy Technical, LLCThe Windows 365 Quick Start engagement is designed to show you how Windows 365 + SurfaceGo keeps you productive. Included are a Surface Go, planning services, as well as a proof of concept.engagement
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
9 out of 16
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
10 out of 16
CMMC Compliance: 4 week WorkshopSirius Computer SolutionsThe U.S. Department of Defense (DoD) is implementing the Cybersecurity Maturity Model Certification (CMMC) to verify the cybersecurity of its supply chain, our Workshop will help you ensure compliance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
11 out of 16
Microsoft 365 Inter-Tenant Migration: 2 days AssessmentPreeminent Solutions, Inc.Preeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
12 out of 16
Microsoft Security Assessment: 3-Wk AssessmenteGroup Enabling Technologies, LLCAnalyze your cross platform security posture, with evaluated vulnerabilities and risks identified with a Microsoft Security Assessment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
13 out of 16
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week ImplementationQuisitiveQuisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
14 out of 16
Microsoft Information Protection Administrator: 3 Days WorkshopNETCOM LEARNINGMicrosoft Information Protection Administrator course focuses on data governance and information protection within your organization.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 16
Modern IT: 2 Hour AssessmentModern ITIdentify areas for business process optimization through Modern IT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
16 out of 16