ตัวกรองล้างทั้งหมด
ผลลัพธ์ Professional Services รายการ
กำลังแสดงผลลัพธ์ รายการใน professional services
Cybersecurity Assessment Engagement - 4 weeksGrant Thornton LLPEnhance Your Cloud Security Posture with Grant Thornton’s Cybersecurity Assessment
+2
Applicable to:
Cloud Security
Identity & Access Management
1 out of 60
Threat Protection Engagement - 4 weeksGrant Thornton LLPImprove your Security Posture with Grant Thornton's Threat Protection Engagement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
3 out of 60
Security and Operations with Expert Microsoft 365 SupportAVASOFTMaximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
4 out of 60
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
5 out of 60
Copilot Advanced Services: 1 Day 3 WorkshopsNess IsraelUnlock the full potential of Microsoft Copilot with our tailored AI services, enhancing security, development and productivity across Microsoft 365 applications through flexible, expert-led sessions.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Workplace Analytics
6 out of 60
Intune Security ReviewmnemonicEnhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
+2
Applicable to:
Cloud Security
Mobile Device Management
7 out of 60
Data Security AssessmentPSM PartnersThis assessment is designed to help companies identify their data security, privacy, and compliance goals while accelerating their compliance journey using the latest Microsoft technologies.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
8 out of 60
Spyglass Managed Security Services: 2-week ImplementationQuisitiveSpyglass is a security and compliance program for cloud and on-premises organizations that aligns security and compliance with current requirements of best-in-class technology and expert deployment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
10 out of 60
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
11 out of 60
Threat Protection Engagement FY25The Tech MavericksLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Threat Protection EngagementISA Cybersecurity Inc.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Data Security & Threat Protection WorkshopITVTIdentify data security risks in your organizational data & discover vulnerabilities in your environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 60
Threat Protection EngagementFIS Managed IT SolutionsLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
17 out of 60
Modern Endpoint Design and Planning WorkshopKraft KennedyKraft Kennedy will conduct a Modern Endpoint Design and Planning Workshop to review and discuss both your current management and deployment processes as well as plans for the future-state environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
18 out of 60
Threat Protection EngagementTierPointLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Microsoft 365 Copilot Readiness Assessment - CRATechPlus TalentThrough this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
20 out of 60
KK_Intune ImplementationKraft KennedyKraft Kennedy's Implementation service for Migration to Microsoft Intune is designed to assist customers in an Intune Deployment Architecture Scenario
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
21 out of 60
Microsoft 365 Backup Readiness AssessmentABTechnologiesEvaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
22 out of 60
Microsoft 365 Secure Productivity WorkshopABTechnologiesEnable your team to work securely and productively using Microsoft 365 best practices.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
23 out of 60
Centric Threat Protection EngagementCentric Consulting, LLCLearn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
24 out of 60
Exchange Online MigrationDataVoxMigrating emails to Office 365 includes assessing the environment, choosing a method (Cutover, Staged, Hybrid, or IMAP), migrating data, updating DNS, configuring devices, and user training.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Mobile Device Management
25 out of 60
Security Best Practices AssessmentTechNet UC LLCOur assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
Comprehensive Exchange Online Security ConfigurationTechNet UC LLCUnmatched Security and Compliance for Your Exchange Online Environment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
27 out of 60
Data Security implementation for generative AI: 8-Wk ImpConterraHelp your organization to govern, monitor, and secure the use of generative AI tools like Copilot, ChatGPT, or custom GPT applications
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
28 out of 60
KK_Exchange_Migration Consulting ServicesKraft KennedyMoving to Exchange Online significantly extends the use of Microsoft 365 by modernizing communication infrastructure, enhancing security, and unlocking integrated productivity features.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
29 out of 60
CMMC Secure Enclave with User TrainingPlanet TechnologiesA secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov and including User Training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
30 out of 60
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLPOffice 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
31 out of 60
THInc.Ops Managed ServiceTECH HEADS INCPremium managed IT service solution that provides a higher quality of service supporting your staff and stronger protection against cyberattacks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 60
THInc Secure Managed Security Service for MicrosoftTECH HEADS INCComprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
33 out of 60
Google Workspace to Microsoft 365 MigrationDataVoxDataVox offers migration services for your company from Google Workspace to Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
34 out of 60
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLCSkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Modern SecOps Envisioning WorkshopPSM PartnersThis engagement is for security teams and IT leaders seeking to boost threat detection with experience in Microsoft Sentinel and Defender XDR, automating operations and mitigating cyber risks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
36 out of 60
DSPM for AI - Free 2-Hour AssessmentNetwoven Inc.To help enterprises identify blind spots in Microsoft 365's AI data security, assess DSPM maturity, and establish a governance-first approach to safely accelerate AI innovation with Microsoft Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 60
Threat Protection Envisioning WorkshopTECH HEADS INCLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Manage Compliance Obligations & Risks with Microsoft PurviewBDOEnhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
39 out of 60
Data Security with Microsoft Purview SolutionsBDOEnhance data security control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
40 out of 60
SkyTerra's Cloud Security AssessmentSkyTerra Technologies LLCStrengthen Microsoft cloud security with a structured assessment, an actionable roadmap, and enablement your team can run with
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
41 out of 60
InTune AssessmentSkyTerra Technologies LLCSkyTerra helps you configure and align Intune to meet your real business needs, across platforms, policies, and people.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
42 out of 60
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
43 out of 60
Unified Identity & Secure Edge Modernization with Entra SuiteBDOModernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Okta to Microsoft Entra ID ConversionSkyTerra Technologies LLCConsolidate identity on Microsoft Entra ID, reduce cost and complexity, and raise your security baseline without disrupting your users.
+2
Applicable to:
Cloud Security
Identity & Access Management
45 out of 60
Redapt Data Security EngagementRedapt, Inc. Safeguard Your Enterprise Data with Confidence
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
46 out of 60
Threat Protection Envisioning Engagement SentinelSentinel Technologies Inc.Organizations today are managing a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Get help achieving your broader security objectives.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
47 out of 60
Modern SecOps Envisioning WorkshopTierPointUnlock unmatched security with TierPoint’s Microsoft cloud-native security solutions with our Modern SecOps Envisioning Workshop
+2
Applicable to:
Cloud Security
Identity & Access Management
48 out of 60
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
49 out of 60
Microsoft Security AssessmentDataVoxThis assessment provides a comprehensive review of the Microsoft 365 environment, focusing on configuration, security posture, identity management, and data governance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
50 out of 60
Microsoft Security ImplementationDataVoxImplement the best Microsoft security practices throughout the customer environment by implementing Defender for Office 365 to Entra ID P1, Entra ID P2, and Entra ID Suite feature deployments.
+2
Applicable to:
Cloud Security
Identity & Access Management
51 out of 60
Microsoft 365 Modern Endpoint Service Powered by IntuneAll Covered, a division of Konica MinoltaMicrosoft 365 Modern Endpoint is a cloud-native, fully managed service powered by Microsoft Intune. It is designed to simplify endpoint hardening, configuration, and application management.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
52 out of 60
Zero Trust Deployment and Optimization ServiceSoftchoiceDeploy zero trust with confidence, optimize it to deliver lasting outcomes.
+2
Applicable to:
Cloud Security
Threat Protection
53 out of 60
Security AssessmentSoteria, LLCGain deep insights into your Secure Score, user and device health, application vulnerabilities, and data security with our security assessment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
54 out of 60
Cloud Security Envisioning WorkshopTierPointThe Cloud Security Envisioning engagement helps you explore how to detect threats, understand your security posture, and identify risks and opportunities across all your cloud environments.
+2
Applicable to:
Cloud Security
Insider Risk
55 out of 60
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Copilot and AI Readiness AssessmentCloudServusRun an AI Readiness Assessment to pinpoint gaps using Copilot adoption; align next steps to Copilot & Agents at Work.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
57 out of 60
Microsoft Purview QuickStart: ImplementationKraft KennedyKraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
58 out of 60
Mergers & Acquisitions Integration Services in 90: Three (3) Month TransitionLong View SystemsSupport a seamless user experience and align business operations from Day One of any merger, acquisition, or system migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
59 out of 60
Microsoft 365 Copilot Readiness Assessment (Security, Data, Governance)BlueAlly Technology SolutionsAssess your Microsoft 365 environment for secure Copilot adoption. Identify risks from oversharing, legacy auth, and data gaps, and get a roadmap to strengthen security and compliance readiness.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
60 out of 60