FiltriPočisti vse
Št. rezultatov: Professional Services
Prikaz toliko rezultatov v aplikaciji professional services:
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POCatQorOur Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
2 out of 60
Cloud App Security – Advanced CASB Solution for Cloud Data ProtectionITX360 (Pvt) Ltd.Secure your cloud apps with real-time monitoring, Shadow IT discovery, and automated data protection. Integrated with Microsoft Information Protection for enhanced compliance and threat detection.
+1
Applicable to:
Cloud Security
3 out of 60
SYSTEX Data Security and Compliance Solution精诚(中国)企业管理有限公司通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
4 out of 60
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLPOffice 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
5 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
6 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
7 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to:
Cloud Security
8 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 60
Microsoft Security Solutions - 4 Week AssessmentProtivitiMicrosoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 60
Security Architecture Design and Implementation Service上海诺未网络科技有限公司NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbHStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Defender for Office 365: 3-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
13 out of 60
Microsoft 365 Governance: 1 month AssessmentCrayonCrayon Microsoft 365 Governance Assessment will assess your configuration and build recommendation report
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
14 out of 60
GDPR Assessment: 6-Week AssessmentHappiest Minds Technologies LimitedEnable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
15 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance IncYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
16 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 60
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom ConsultingThis FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
20 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
22 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCSeamlessly transfer email data and mailboxes between Office 365 tenants during mergers or separations. Ensure continuity for users, minimize disruptions, and enables a smooth transition.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
23 out of 60
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
24 out of 60
Cloud Workplace: 8-Months ImplementationRapid CircleThe implementation of a cloud workplace gives an organization the opportunity to offer employees a workplace that can be used independently of place and time and with the most modern Microsoft tools.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
25 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
26 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLCAdvanced endpoint security and threat protection: detect, investigate, and respond to attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Microsoft 365 Migration 12 Hour Proof-of-ConceptNew Charter Technologies, Inc.Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
29 out of 60
Quadra BluForge Managed XDRQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
30 out of 60
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLCCMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
31 out of 60
impelSecure Threat Protection Engagement: Free 4-week workshopimpeltec Pty LtdDiscover threats and vulnerabilities to your Microsoft cloud and on-premises environments
+2
Applicable to:
Cloud Security
Threat Protection
32 out of 60
Microsoft 365 Backup Readiness AssessmentABTechnologiesEvaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
33 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Microsoft Security Copilot POV & Adoption PlanBDOProve the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
36 out of 60
impelSecure Data Security Engagement: Free 4-week workshopimpeltec Pty LtdIdentify data risks and evaluate user behavior for risky activities
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
37 out of 60
Manage Compliance Obligations & Risks with Microsoft PurviewBDOEnhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
38 out of 60
Microsoft 365 Security Posture 10-days AssessmentFUJITSUSecure Microsoft 365 and maximise your investment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
39 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeksPlain ConceptsThe objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
+2
Applicable to:
Cloud Security
Information Protection & Governance
40 out of 60
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
41 out of 60
impelSecure Modern SecOps Engagement: Free 4-week workshopimpeltec Pty LtdGain visibility into threats to your Microsoft 365 and Azure clouds and on-premises environments across email, identity, endpoints, and third-party data
+2
Applicable to:
Cloud Security
Threat Protection
42 out of 60
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
43 out of 60
Security - CIS - Microsoft 365Linktech AustraliaExisting Microsoft 365 tenants to assess against CIS Benchmarks and remediate any findings identified within the context of the customers business or business looking at a starting point for ISO 27001
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
44 out of 60
Microsoft Purview Data Loss Prevention: 4-Wk Implementation ServiceUNIFY Solutions Pty. Ltd.UNIFY Solutions will implement Microsoft Purview Data Loss Prevention (DLP) to protect your organisation's sensitive information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
45 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLCEstablish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
"Threat Protection: 3 Day Workshop"Insentra Pty LtdOur Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
47 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
48 out of 60
M365-Digital Workspace Consulting-2wk AssessmentOrange Business Services - GlobalTo enhance collaboration work through a complete offer with Microsoft 365 with complete voice capabilities for today's workforce collaboration across multiple locations.
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Teams Custom Solutions
49 out of 60
Data Security with Microsoft Purview SolutionsBDOEnhance data security control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
50 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
51 out of 60
Copilot Preparation Workshop 1Generation-e Productivity Solutions Pty LtdThe Copilot Preparation Workshop is a crucial step in ensuring your organisation is ready to utilise the full potential of Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
52 out of 60
Microsoft 365 Secure Productivity WorkshopABTechnologiesEnable your team to work securely and productively using Microsoft 365 best practices.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
53 out of 60
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
+1
Applicable to:
Cloud Security
54 out of 60
Cloud Safeguard - 12 Month ImplementationRapid CircleOur Cloud Safeguard managed security service enables customers to focus on core business and innovation while we keep your Microsoft 365 platforms safe & secure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Microsoft 365 Secure Score: 2 Week AssessmentInsightAlign your security priorities with best practice management and protection of your devices, apps and users.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
56 out of 60
Identity and Access Management: 4-Wk AssessmentZetta Pty LtdZetta’s Assessment and Optimisation engagement will assess your current identity posture and advise you how to manage and secure your users and access to all your apps.
+2
Applicable to:
Cloud Security
Identity & Access Management
57 out of 60
Security - Essential 8 - Microsoft 365Linktech AustraliaExisting Microsoft 365 tenants to assess against Essential 8 and remediate any findings identified within the context of the customers business or business looking at a starting point for ISO 27001
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
58 out of 60
Security - Defender for EndpointLinktech AustraliaA cloud centric approach that symbiotically targets architectural building blocks to alleviate issues and enhance the overall Defender for Endpoint experience for Endpoints being managed remotely
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
59 out of 60
Zero Trust: 3-Day AssessmentQUORUM SYSTEMS PTY LTDThe assessment has been designed and scoped to focus on Microsoft 365 or Azure security elements as these relate to inform a robust zero trust strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60