FiltriNotīrīt visu
Konsultāciju pakalpojumi rezultāti šim: Microsoft 365
Tiek rādīti rezultāti šeit: konsultāciju pakalpojumi.
CloudWay Frontier Firm PoCCloudWay ASThe Future‑Ready Organization PoC gives leaders a fast, structured path to realize value from Microsoft 365 and Copilot.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Knowledge & Insights
1 out of 60
GuidePoint Security Microsoft 365 Security Consulting ServicesGuidePoint SecurityMicrosoft 365 security consulting services delivers secure design, deployment, and optimization of Microsoft 365 platform controls and services.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
2 out of 60
Workspace booking solutionSolutions Victrix Inc, lesSimplify the management of workplace attendance and enhance team collaboration with the workspace reservation solution built with Power Apps for Teams.
+1
Applicable to:
Teams Custom Solutions
3 out of 60
Adopt & Extend Microsoft Copilot: Custom Agents Delivered by WitivioWitivioCreate, deploy and adopt custom Copilot agents in Microsoft 365 to automate processes, improve information access and boost employee productivity.
+1
Applicable to:
Teams Custom Solutions
4 out of 60
Modern SharePoint Intranet with Agentic Copilot AgentAFRIBITA modern SharePoint intranet for Microsoft 365, with optional custom SPFx web parts and a Copilot Studio AI agent to help employees find information, complete requests, and reduce support queries.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Teamwork Deployment
5 out of 60
Cybersecurity Incident Response Retainer with Microsoft DefenderCBTS Technology Solutions LLCPartner with CBTS to ensure assistance when you need it most during a significant security event.
+2
Applicable to:
Cloud Security
Threat Protection
6 out of 60
SharePoint Modernization: Your AI-Ready WorkplaceRightpoint Consulting, LLCTransform legacy SharePoint into a modern, intelligent digital hub
+3
Applicable to:
Adoption & Change Management
Frontline Workers
Workplace Analytics
Victrix_Intranet_IASolutions Victrix Inc, lesTransformez votre intranet avec l’IA et offrez une véritable expérience employé moderne !
+1
Applicable to:
Adoption & Change Management
8 out of 60
Microsoft 365 Copilot Rediness Assesment by C-venC-ven TechnologiesAssess your organization’s readiness for Microsoft 365 Copilot and identify high-impact Modern Workplace productivity use cases with a clear, actionable roadmap.
+1
Applicable to:
Adoption & Change Management
9 out of 60
Data Security Envisioning WorkshopPSM PartnersIdentify hidden data risks, assess insider threats, and gain clear, actionable guidance to strengthen security, compliance, and governance with a Microsoft Purview–driven workshop.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
10 out of 60
HubSpot and OneDrive for Business IntegrationIT Partner LLCAutomatically sync HubSpot with OneDrive for Business to embed secure, always-up-to-date marketing assets and eliminate manual file uploads.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
11 out of 60
AI Transformation with CopilotMindWorksTransform your organization into an AI‑powered, high‑performing "Frontier Firm"
+1
Applicable to:
Adoption & Change Management
12 out of 60
Victrix_agent intelligent sur mesureSolutions Victrix Inc, lesTransformez et optimisez la façon dont vos employés accèdent à l’information et interagissent avec les processus en entreprise grâce à un agent intelligent personnalisé.
+1
Applicable to:
Adoption & Change Management
13 out of 60
Victrix_a custom intelligent agentSolutions Victrix Inc, lesA Custom Intelligent Agent, the Microsoft Copilot Studio and Azure OpenAI Experience
+1
Applicable to:
Adoption & Change Management
14 out of 60
Copilot Data Exposure & Oversharing Risk Assessment - 2 WeeksPenthara TechnologiesIdentify and reduce the risk of sensitive data being unintentionally exposed by Microsoft 365 Copilot due to oversharing, weak permissions, and poor data governance.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Workplace Analytics
15 out of 60
Phishing & Impersonation Protection Setup (2 Weeks)Penthara TechnologiesProtect your organization from phishing, spoofing, and impersonation attacks by strengthening Microsoft 365 email security with advanced, targeted protection controls.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Workplace Analytics
16 out of 60
Victrix_modernisation outils Excel et AccessSolutions Victrix Inc, lesModernisez vos outils Excel & Access grâce à Power Platform !
+1
Applicable to:
Adoption & Change Management
17 out of 60
Data Security WorkshopEmergent SoftwareSecurity workshop leveraging Microsoft's security products such as Purview to uncover data risks across Microsoft 365, assess exposure, and deliver actionable recommendations for IT leaders.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
18 out of 60
Threat Protection Envisioning WorkshopCitrin Cooperman Advisors, LLCUncover real security threats in your environment and build a roadmap for stronger protection leveraging Microsoft Defender’s unified security incident platform powered by AI.
+1
Applicable to:
Threat Protection
19 out of 60
S4B_XDR_Recuperacion_Automatica_RecursosS4BSILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 60
Microsoft 365 Security Assessment and License RationalizationRavanty Tech Consulting, Inc.Provide assessment and strategic guidance to strengthen security across Microsoft 365 environment and optimize Microsoft 365 licensing.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
21 out of 60
HubSpot and Microsoft Exchange Online IntegrationIT Partner LLCAutomatically sync HubSpot with Microsoft Exchange to log emails, track communications, and sync calendars—eliminating manual data entry between platforms.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Teamwork Deployment
22 out of 60
Victrix_Modernization of Excel and Access toolsSolutions Victrix Inc, lesSecure Migration from Microsoft Excel and Access to Power Platform, Modernize Your In House Tools
+1
Applicable to:
Adoption & Change Management
23 out of 60
S4B Email Attack Simulation TrainingS4BAttack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
24 out of 60
Victrix_Dynamics 365 CRMSolutions Victrix Inc, lesDéployez votre CRM intelligent et boostez votre croissance dès aujourd’hui !
+1
Applicable to:
Adoption & Change Management
25 out of 60
Intune for Windows: 6-week ImplementationPractical Solutions, IncIntune for Windows is a configuration service that enables you to manage Windows 10 devices in Intune.
+2
Applicable to:
Device Deployment & Management
Mobile Device Management
26 out of 60
Victrix_Intranet_IASolutions Victrix Inc, lesTransform your intranet with AI and deliver a truly modern employee experience!
+1
Applicable to:
Adoption & Change Management
27 out of 60
Threat Investigation and Analysis Service with Microsoft Defender XDRS4BSILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
+2
Applicable to:
Cloud Security
Threat Protection
28 out of 60
Server Endpoint Protection Implementation Service using Microsoft Defender for EndpointS4BProvides comprehensive protection for physical and virtual servers with Microsoft Defender for Server, combined with continuous security monitoring to detect, investigate, and respond to threats.
+2
Applicable to:
Cloud Security
Threat Protection
29 out of 60
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDRS4BProtección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
+2
Applicable to:
Cloud Security
Threat Protection
30 out of 60
Credentials and access protection , unauthorized logins, and suspicious behavior with Microsoft IdentityS4BCloud Identity Protection detects and mitigates credential and access risks using Microsoft Entra ID Protection. It leverages analytics, adaptive MFA, and condicional access to enhance security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
31 out of 60
Protección Identidades en ambiente Híbrido con Microsoft IdentityS4BIntegra seguridad en nube y on-premise con Defender for Identity y Entra ID Protection, unificando detección, investigación y respuesta frente a amenazas.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
32 out of 60
Advanced Hybrid Identity Security with Microsoft IdentityS4BHybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Implementation of security for Endpoint with Microsoft EDRS4BAdvanced defense for on-premises devices with Microsoft Defender for Endpoint, automated detection and response.
+2
Applicable to:
Cloud Security
Threat Protection
34 out of 60
Entrenamiento de Phishing con Microsoft Office 365S4BOfrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
35 out of 60
On-premise enviroment Identity Protection service with Microsoft IdentityS4BOn-Premises Identity Protection service detects and mitigates threats in Active Directory using Microsoft Defender for Identity.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4BSeguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
+2
Applicable to:
Cloud Security
Threat Protection
37 out of 60
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4BInvestiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
38 out of 60
Accelerate Microsoft 365 Copilot ROI with our 3-week readiness AssessmentNewWave Computing Pvt LtdUnlock Faster ROI on Microsoft 365 Copilot with a 3-Week Readiness Program
+1
Applicable to:
Adoption & Change Management
39 out of 60
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4BProtects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
+2
Applicable to:
Cloud Security
Threat Protection
40 out of 60
Servicio de Implementación de Protección de Identidades Locales con Microsoft Defender for IdentityS4BRefuerza Active Directory local con Microsoft Defender for Identity, detectando ataques, credenciales comprometidas y movimientos laterales en controladores de dominio.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
41 out of 60
Securing & Protecting Microsoft 365 Copilot SolutionsProtivitiComprehensive solutions for ensuring a secure foundation for Microsoft 365 Copilot and Copilot Studio Agents.
+2
Applicable to:
Compliance Advisory Services
Information Protection & Governance
42 out of 60
CYBERWELL Microsoft Security AuditCYBERWELL Canada Inc.Identify risks and misconfigurations with prioritized remediation guidance across Microsoft 365 environments.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
43 out of 60
Seguridad avanzada de identidad en la nube con Microsoft IdentityS4BProtege credenciales y accesos en la nube con Microsoft Entra ID Protection, aplicando MFA adaptativo y acceso condicional para mitigar riesgos de identidad.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
44 out of 60
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4BDefensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
45 out of 60
Enterprise Automated Endpoint Recovery with Microsoft Defender XDRS4BSILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
46 out of 60
External Sharing Risk Assessment - 2 WeeksPenthara TechnologiesIdentify and reduce data exposure risks by reviewing guest access and external sharing settings across Microsoft Teams and SharePoint.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Workplace Analytics
47 out of 60
Insider Risk Management Setup - 2 WeeksPenthara TechnologiesDetect and reduce insider data risks by configuring Microsoft Purview to monitor risky user behavior and prevent internal data loss before it impacts your organization.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Workplace Analytics
48 out of 60
Email Encryption & Sensitivity Configuration Setup - 2 WeeksPenthara TechnologiesStandardize email encryption, sensitivity labels, and access controls in Microsoft 365 to protect confidential communication and reduce data leakage risks.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Workplace Analytics
49 out of 60
Secure AI Productivity Accelerator - UnlimitechUnlimitech Consultorias y Capacitaciones SpAUnlock secure, AI‑powered productivity with a fast, five‑day Microsoft 365 Copilot readiness accelerator.
+1
Applicable to:
Adoption & Change Management
50 out of 60
Microsoft Intune Advisory and Optimization ServicesTeam VentiAchieve secure, scalable Microsoft Intune success by optimizing your Microsoft Intune & Entra ID across Windows/iOS/macOS/Android. Get rapid cloud-first readiness through collaborative sessions.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Teamwork Deployment
51 out of 60
Implementation on Defender for Office 365Mobile MentorOur Defender for Office 365 service provides end-to-end protection against email-based threats
+1
Applicable to:
Threat Protection
52 out of 60
Zero Trust Identity Security Implementation with EntraID by ReplyReplyReply’s security approach with Microsoft Entra ID helps organizations reduce identity-driven risk, support compliance requirements, and accelerate secure adoption of Microsoft cloud services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Zones Microsoft Threat Protection WorkshopZones Inc.Detect real threats, assess vulnerabilities, and get a tailored Microsoft security roadmap, delivered by Zones’ certified cybersecurity experts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Microsoft Intune Deployment & Endpoint Management Implementation ServicesRISHABH SOFTWARE PRIVATE LIMITEDThis professional service delivers end-to-end implementation of Microsoft Intune to help organizations securely deploy, manage, and protect corporate devices through centralized enrollment, compliance
+2
Applicable to:
Adoption & Change Management
Device Deployment & Management
55 out of 60
Microsoft 365 Tenant Setup & HardeningRISHABH SOFTWARE PRIVATE LIMITEDThis professional service delivers structured Microsoft 365 tenant setup and security hardening implementation to help organizations.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Knowledge & Insights
56 out of 60
Microsoft 365 Health Check: 3-Week AssessmentGuidePoint SecurityReveal hidden risks in Microsoft 365, validate security controls, and deliver prioritized, actionable recommendations that improve identity, data, device, and threat protection across your environment
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
57 out of 60
MDS - Microsoft 365 Security Rapid Deployment for Financial ServicesMaureen Data SystemsHelp financial services organizations establish a regulator-ready Microsoft 365 security and compliance baseline in 6–8 weeks using Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
58 out of 60
Microsoft 365 Security Assessment - 4 DaysMatrix3D Infocom Private Ltd.This Assessment is a comprehensive evaluation of your Microsoft 365 environment, designed to identify misconfigurations, security gaps, compliance risks, and underutilized Microsoft security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
59 out of 60
M3TC Teams Phone MigrationM3 Technology Consultants IncTransform your organization ’s communications and collaboration with M3 Technology Consultants’ (M3TC) Microsoft Teams Phone Migration solution.
+3
Applicable to:
Device Deployment & Management
Meetings for Microsoft Teams
Teams Custom Solutions
60 out of 60