AppSource
Изпращане на обратна връзка
Помощ и поддръжка
Записани елементи
Частни планове
Един момент, обработва се влизането ви...
Всички
Приложения
Категории
Индустрии
Консултантски услуги
Партньори
Филтри
Изчистване на всички
Вашето местоположение
Продукти (1)
Отрасли
Тип услуга
Консултантски услуги резултата
Показват се резултати след консултантски услуги.
Преглед
свързани резултати в облаци за отрасли
.
Всички резултати
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
1 out of 60
Microsoft 365 Security: 2-week assessment
Mirai Security Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
2 out of 60
OneSec Defender for Endpoint – Migration offer
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
The OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
3 out of 60
Onesec’s Secure Access to Microsoft 365 with Zscaler
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
4 out of 60
Free Microsoft 365 Defender Suite 4–6-hour Proof of Concept
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
This free, 4–6-hour workshop will provide you with a hands-on experience using Microsoft 365 Defender, Microsoft Defender for Office 365, Microsoft Defender for Endpoint
5 out of 60
Threat Protection - 2 Days Workshop
Mayasoft Bilgi Sistemleri A.S.
+2
Applicable to:
Cloud Security
Threat Protection
We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
6 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
7 out of 60
Avanade Security Business Value 4-Wk Assessment FY24
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
8 out of 60
Avanade Security Risk Assessment
Avanade, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Avanade's 5-day Risk Assessment offers security leaders a comprehensive view of risk posture across their enterprise and proactive ways to protect their organizations from growing cyber threats.
9 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for Endpoint
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
10 out of 60
Viva Insights Workshop
CDW
+3
Applicable to:
Cloud Security
Microsoft 365 Live Events
Teams Custom Solutions
The Enablement Workshop for Microsoft Viva from CDW focuses on finding your organization’s pain points, and it identifies how the Viva platform can help
11 out of 60
Microsoft 365 Defender Rapid Deployment - Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
12 out of 60
Security - Managed Defender - One-Pager - Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
13 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
14 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-Weeks
myCloudDoor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Assess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
15 out of 60
Sentinel Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
16 out of 60
Sensitive Data Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Sensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
17 out of 60
Microsoft 365 Security and Compliance Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Microsoft 365 Security and Compliance Assessment evaluates your current security posture, identifies vulnerabilities, and offers tailored solutions to enhance your data security and compliance.
18 out of 60
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
19 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
20 out of 60
Microsoft 365 Incident Response - 5 Week Assessment
Protiviti
+2
Applicable to:
Cloud Security
Threat Protection
Assessing the advanced security capabilities of Microsoft 365
21 out of 60
Microsoft 365 OnDemand - 2 Week Implementation
Protiviti
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Microsoft 365 On Demand Support - providing you with dedicated experts to support and maintain your Microsoft 365 environment
22 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
23 out of 60
Compliance Workshop: Data Risk Management
Avaleris
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
A structured approach to discover risks related to organizational data and mapping these risks to solutions that will help manage and protect data and mitigate the associated risks
24 out of 60
Secure Work from Anywhere Workshop
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Teamwork & collaboration are needed to build resilience for your people, teams, & organization. Empower people to be productive & secure as they adapt to new ways of working with Microsoft365
25 out of 60
Hybrid Identity and Security Expert Consulting Imp
Ravenswood Technology Group, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ravenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
26 out of 60
EM+S Consulting Services: 4-Weeks Implementation
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
We will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
27 out of 60
Cybersecurity - 3-Wk Assessment
adaQuest
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
With the Cybersecurity Assessment we take a four-phased approach to set your path forward to the cloud.
28 out of 60
QC Education- Threat Protection - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #14 and provide high-level recommendations to achieve compliance.
29 out of 60
QC Education- Identity Management- 2Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #4 and provide high-level recommendations to achieve compliance.
30 out of 60
Quebec Education - DLP - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #5 and #6 and provide high-level recommendations to achieve compliance.
31 out of 60
Mobile Device Management - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #1, #2 and #3 and provide high-level recommendations to achieve compliance.
32 out of 60
QC Education Security Directives -1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This one day GAP Analysis will help you assess your current state of compliance for Quebec Ministry of Education Security Directives and provide high-level recommendations to address any shortcomings.
33 out of 60
Microsoft Security Workshop: 3-day
Oxford Computer Group LLC
+2
Applicable to:
Cloud Security
Threat Protection
This 3-day workshop shows you how to put Microsoft’s security capabilities to work. Learn how secure your organization is now and how to mitigate and protect against threats in the future.
34 out of 60
Office 365 Security: 1-Day Assessment
Netrix Global
+1
Applicable to:
Cloud Security
Security assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
35 out of 60
Hybrid Return to Work Enablement: 4 Wk-Assessment
Insight Canada Inc
+3
Applicable to:
Cloud Security
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
This offer helps enable your hybrid return to work strategy and ensure your organization is ready for this transition.
36 out of 60
Secure Workspace: 1 Day Workshop
Watserv Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
37 out of 60
Microsoft 365 Security: 1-Day Briefing
Netrix Global
+1
Applicable to:
Cloud Security
A tailored planning engagement targeted at ensuring your Microsoft cloud solutions are aligned with your needs.
38 out of 60
Enterprise Mobility - 1 Day Briefing
Avaleris
+2
Applicable to:
Cloud Security
Mobile Device Management
Avaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Enterprise Mobility policies, procedures and technology against best practices.
39 out of 60
Threat Protection - 1 Day Briefing
Avaleris
+2
Applicable to:
Cloud Security
Threat Protection
Avaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Threat Protection policies, procedures and technology against best practices.
40 out of 60
Enterprise Identity and Governance -1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Avaleris developed a Capability Maturity Model to help organizations quickly assess the current state of Identity Management and Governance policies, procedures and technology against best practice.
41 out of 60
Information Protection - 1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Avaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Information Protection policies, procedures and technology against best practices.
42 out of 60
Sauvegarde Microsoft 365 : 2Wk - implementation
Projetlys
+2
Applicable to:
Cloud Security
Information Protection & Governance
Ensemble de service permettant de mettre en place facilement une solution de backup Veeam pour Microsoft 365 ?
43 out of 60
Adoptez Microsoft Edge : 2-Wk Implementation
Projetlys
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Notre approche pour la mise en place et l'adoption de Microsoft Edge.
44 out of 60
Security Maturity Assessment: 4 Wks
Lixar IT
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Let BDO help you design your roadmap to increase your security score with cost-effective security tools with our 4 week Security Maturity Assessment
45 out of 60
Insider Risk Management Assessment: 4 Wks
Lixar IT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
BDO's Insider Risk Management Assessment can help you identify insider data risks and establish a plan to reduce data leakage using Microsoft 365 to ensure compliance and security.
46 out of 60
Defender for Office 365: 3-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
47 out of 60
Microsoft 365 Digital Workforce Workshop
VNEXT Group
+3
Applicable to:
Cloud Security
Knowledge & Insights
Teams Custom Solutions
Learn how to empower people to be more productive and secure as they adapt to new ways of working with Microsoft 365.
48 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
49 out of 60
User Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
50 out of 60
Endpoint Management: 5-Days Workshop
VNEXT Group
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Learn how to manage users’ devices, apps, and identities from anywhere.
51 out of 60
Defend Against Threats with SIEM Plus XDR: 8H Workshop
adaQuest
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
52 out of 60
Microsoft 365 HIPAA/HITECH 20 Hour Implementation
New Charter Technologies, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Implementation of Microsoft 365 to include compliance policies and templates for health care.
53 out of 60
Threat Protection: 5-Week Workshop
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
An executive deep dive into security strategy, tailored to your organization.
54 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
55 out of 60
Zero-trust collaboration security 6wk Implement
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
56 out of 60
Zero-Trust Secure Email 6wk Imp
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
57 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
58 out of 60
microsoft365_security_identity_protection_1 Day_Workshop_Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Identity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to manage your access quickly and accurately
59 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
60 out of 60
Назад
1
2
3
4
5
Напред