AppSource
تقديم الملاحظات
التعليمات + الدعم
العناصر المحفوظة
خطط خاصة
الرجاء الانتظار قليلا، جار تسجيل دخولك...
الكل
التطبيقات
الفئات
الصناعات
الخدمات الاستشارية
الشركاء
عوامل التصفية
إلغاء تطبيق الكل
موقعك
منتجات (1)
المجالات
نوع الخدمة
نتائج خدمات استشارية
يتم الآن عرض من النتائ ج في خدمات استشارية
عرض
من النتائج ذات الصلة في سُحب المجالات
.
كل النتائج
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and Planning
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Shorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
1 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days Implementation
HCL Technologies Limited.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
2 out of 60
Microsoft 365 Security: 4-hour Assessment
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Microsoft 365 Security Assessment provides an in-depth assessment of your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
3 out of 60
Defender for Endpoint Managed Service
e2e-assure Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
4 out of 60
Endpoint Management with Security Workshop
The Partner Masters
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
The Endpoint Management with Security Workshop enables partners to lead customer conversations around modernizing their endpoint management and security capabilities by leveraging Microsoft 365.
5 out of 60
Microsoft 365 Strategy, guidance and governance workshop by Nexer: 1 Day
Nexer Group AB
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
We will help you go through your Microsoft 365 implementation and make sure that you follow Microsofts Best Practices.
6 out of 60
Incident Response Retainer
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
7 out of 60
Incident Response Tabletop Exercises: 2-Wk Briefing
eGroup Enabling Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Be proactive and prepare your IT team for emergencies with a Disaster Plan
8 out of 60
Virteva Microsoft 365 Defender Ready Deploy
Virteva LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
9 out of 60
Modern Workplace Assessment for Healthcare - 4 wk Assessment
Protiviti
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This assessment for Microsoft 365 helps Healthcare customers obtain insights to what it takes to improve productivity against Cyber Threats for Workforce Productivity.
10 out of 60
Onesec’s Secure Access to Microsoft 365 with Zscaler
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
11 out of 60
Microsoft Security Deployment: 5-day Workshop
Campana & Schott GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand your Microsoft security posture and minimize risks with the right experts
12 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
13 out of 60
Security für den Einsatz von Microsoft 365 Copilot
novaCapta GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Eine sichere Basis schaffen und technische Hindernisse aus dem Weg räumen für den Einsatz von Copilot for Microsoft 365
14 out of 60
Discover Sensitive Data: 6W - Workshop
Exelegent
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
15 out of 60
Microsoft 365 E5 NIST 800-171 -1 Week GAP Assessmt
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
This offer is for a NIST800-171 Gap Assessment for a single Host Unit, scoped to a single contract, single subnet using the Microsoft 365 E5 license
16 out of 60
Managed Security for Compliance: 1 yr Mgd Service
Insight
+2
Applicable to:
Cloud Security
Compliance Advisory Services
Discover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
17 out of 60
Data Classification and Protection 3Weeks Workshop
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
18 out of 60
Vulnerability Management
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+2
Applicable to:
Cloud Security
Threat Protection
Rapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
19 out of 60
Threat Protection: 3-Wk Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
20 out of 60
Modern Management for Endpoints
Ivision, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
21 out of 60
Microsoft Defender for Cloud Apps: 2-Hr Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
22 out of 60
Modern Identity Workshop | 4 Weeks | Workshop
Enterprise It Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Enable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
23 out of 60
Microsoft Purview Insider Risk Management (IRM): 2-Week Implementation
Spyglass MTG, LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Our engagement is designed to accelerate the ability to integrate and consume IRM across your enterprise while better securing data and identities in the environment.
24 out of 60
Windows 11 Assessment: 1-WK
Steeves
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
25 out of 60
Windows 365 Pilot: 5 Days Proof of Concept
Delphi Consulting
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Delphi Consulting will help you get started with Windows 365 Cloud-PC with its Pilot offering with the program running over 5 days.
26 out of 60
ANECT Security Monitoring and Response 3 Months PoC
ANECT a.s.
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
27 out of 60
Infosys Microsoft 365 Security and Compliance: 8 Weeks Assessment
Infosys Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Workplace Analytics
Infosys Microsoft 365 security expert team offers a full spectrum security service for microsoft 365 services facilitated digital workplace.
28 out of 60
Protect 365 App - 1 hour implementation
Cloud Life
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
29 out of 60
Microsoft 365 E5 Cyber Range 2 Week Implementation
KAMIND IT, Inc
+2
Applicable to:
Cloud Security
Threat Protection
KAMIND's cybersecurity immersive learning deployment utilizing Project Ares Cyber Range for Microsoft 365 Security Suites.
30 out of 60
Microsoft 365 Migration: 10-Wk Implementation
Neway Technologies
+2
Applicable to:
Cloud Security
Power Platform for Teams
Successfully migrate your Microsoft 365 environment to a managed services model.
31 out of 60
Microsoft 365 Security Assessment - 4wk Assessment
Protiviti
+1
Applicable to:
Cloud Security
Effective Analysis of CIS & NIST Benchmarking, Active Directory to Azure and Microsoft 365 Configurations
32 out of 60
Microsoft Information Protection Administrator: 3 Days Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Information Protection Administrator course focuses on data governance and information protection within your organization.
33 out of 60
Endpoint Security Advanced Quick Start 14-wk Implementation
Edgile, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats.
34 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week Implementation
Options Technology Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
35 out of 60
Microsoft 365 Security and Compliance Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Microsoft 365 Security and Compliance Assessment evaluates your current security posture, identifies vulnerabilities, and offers tailored solutions to enhance your data security and compliance.
36 out of 60
Sensitive Data Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Sensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
37 out of 60
Cyderes Microsoft Security Adoption Advisory
Cyderes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
The Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
38 out of 60
Data Security with Microsoft Purview-4h Assessment
Reply
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
The Microsoft Purview Assessment offers advanced data security, integrating discovery, classification, and governance with Microsoft’s suite to enhance compliance and protection.
39 out of 60
Microsoft 365 Security 4 Weeks Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
40 out of 60
Threat Protection Engagement
The Partner Masters
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
41 out of 60
Zones SOCaaS - XDR with Threat Protection
Zones, LLC
+2
Applicable to:
Cloud Security
Threat Protection
Zones SOCaaS powered by Microsoft Sentinel, offers top-tier cybersecurity solutions. Leveraging advanced MDR and XDR capabilities to ensure comprehensive protection against evolving threats.
42 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
43 out of 60
Microsoft 365 Security Assessment: 3-Week Assessment
CompuNet
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
This engagement provides a comprehensive review of an organization's Microsoft 365 security controls, policies, and configurations to identify potential security risks and vulnerabilities.
44 out of 60
Licensing Optimization: 2-Wk Workshop
eGroup Enabling Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Gain confidence in your level of control with your Microsoft 365 licensing.
45 out of 60
Microsoft 365 Passwordless Authentication: 3-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Unlock a new era of robust authentication with Microsoft's Passwordless Authentication solutions.
46 out of 60
Office 365 Migration 3-Month Implementation
RKON TECHNOLOGIES
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
Leverage RKON's consulting expertise for a smooth and seamless migration to Microsoft's Office 365 suite of products including SharePoint, OneDrive, and Teams
47 out of 60
Microsoft 365 Security Briefing
CDI LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
48 out of 60
Endpoint Management: 3-Day Workshop
CompuNet
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Three-day engagement that provides customers with an executive deep dive into remote deployment, management, and security of personal and organization-owned devices.
49 out of 60
Get AI Ready: 5-Day Assessment
PSM Partners
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
AI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
50 out of 60
cyber security threat analysis workshop
U-BTech Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
the workshop is design to discover threats and risks
51 out of 60
Finchloom+ for Microsoft 365 Email Security
Finchloom
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your employees with our tailored email security managed service. Easily spots phishing attempts, responds swiftly with human-powered detection, and halts business email compromise.
52 out of 60
Windows 365 Rapid Deploy
Ivision, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
The ivision Windows 365 Rapid Deployment approach will accelerates the adoption and use case development of Windows 365 virtual desktops.
53 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
54 out of 60
MITRE ATT&CK® MasterClass: 2-Hour Workshop
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s MITRE ATT&CK® MasterClass is focused on educating companies on ransomware threats specifically relevant to their environment.
55 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
56 out of 60
CASB (MCAS) Advisory: 2-week Workshop Series
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
57 out of 60
Zero Trust Launchpad: 3-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
58 out of 60
Microsoft Defender for Office Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
59 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
60 out of 60
السابق
2
3
4
5
6
التالي