AppSource
Изпращане на обратна връзка
Помощ и поддръжка
Записани елементи
Частни планове
Един момент, обработва се влизането ви...
Всички
Приложения
Категории
Индустрии
Консултантски услуги
Партньори
Филтри
Изчистване на всички
Вашето местоположение
Продукти (1)
Отрасли
Тип услуга
Консултантски услуги резултата
Показват се резултати след консултантски услуги.
Преглед
свързани резултати в облаци за отрасли
.
Всички резултати
Copilot for Microsoft 365 Pilot Launch: 2-Wk Proof of Concept
ProServeIT
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
A rapid Copilot for Microsoft 365 pilot/proof of concept with an initial use case will provide quick value from AI and learnings to expand the roll out and more use cases to other groups.
1 out of 60
Microsoft 365 Cyber Insurance Review: 2-5 Wk Assessment
KiZAN Technologies
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Map your business cyber insurance carrier requirements to Microsoft 365 environment controls ranked by priority and impact to your security posture.
2 out of 60
Microsoft 365 Security Assurance Service: Assessment
Performanta
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
3 out of 60
Office 365 Migration from Exchange: 15-Day Implementation
ProServeIT
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Migrate on-premise Microsoft Exchange email infrastructure to Office 365 in Microsoft's cloud infrastructure
4 out of 60
Microsoft Endpoint Manager: 8-Hours Workshop
Onex Group
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Learn how to secure Windows 11 environments with Microsoft Endpoint Manager
5 out of 60
Start your GenAI journey with NTT DATA: Boost Copilot for Microsoft 365 adoption with our Adoption Accelerator
NTT DATA Inc.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
Discover the Power of NTT DATA's Copilot for Microsoft 365 Implementation and Adoption Services, Engineered to Unlock the Full Potential of Generative AI Technology for Your Business
6 out of 60
Inviso KickStarter - Microsoft 365 E3 Adoption
Inviso Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Helping customers KickStart features in Microsoft 365 E3 Subscription
7 out of 60
Microsoft Intune Endpoint Manager Discovery: 1-Mo Assessment
ProServeIT
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Enable organization-wide management & security for your endpoints (mobile devices, workstations, etc.) with a Microsoft Intune Endpoint Manager Discovery.
8 out of 60
Microsoft 365 Security Workshop
Collective Insights
+2
Applicable to:
Identity & Access Management
Threat Protection
Equip your organization with insights, strategies, and tools to fortify defenses, mitigate threats, and enhance overall security readiness across your digital estate.
9 out of 60
Microsoft 365 Copilot Everyday AI Adoption: 2wks
Insight
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Insight’s Everyday AI Adoption for Microsoft 365 Copilot Program is designed to help organizations bring this technology to users in a way that promotes responsible adoption and drives productivity.
10 out of 60
Ongoing Managed Services for Microsoft 365 Administration
Finchloom
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Teamwork Deployment
Standardized management of your Microsoft 365 Tenant. Free up internal resources from regular administration tasks, firefighting issues, and escalating to Microsoft Support.
11 out of 60
Microsoft 365 Copilot Readiness: 2 week Assessment
TOKIOTA
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
We help our clients to integrate Microsoft 365 Copilot in their organization in the most secure and efficent way
12 out of 60
Difenda - Information Protection and Governance - 4-week Implementation
Difenda
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Use Microsoft Purview to Implement an Information (Data) Protection and Governance solution to improve Security.
13 out of 60
Zero Trust as a Service (ZTaaS)
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital transformation and adopting AI starts with building a secure foundation.
14 out of 60
Copilot for Security Readiness Assessment
Invoke
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Invoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
15 out of 60
Varonis Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
16 out of 60
Microsoft Defender for Endpoint Implementation
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
17 out of 60
Data Protection Program & Strategy Design - 12 Week Implementation
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
End-to-End Data Protection to Identify, Classify, Protect and Optimize Your Data in Microsoft 365
18 out of 60
Pentest-4wks Assessment
adaQuest
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Gain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
19 out of 60
Capgemini Modern Workspace Portfolio
Capgemini Group
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Capgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
20 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
21 out of 60
SharePoint Premium Readiness Assessment & Roadmap - 5 Week Assessment
Protiviti
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Evaluate and ensure your readiness for implementing SharePoint Premium, considering technical, business case, data lifecycle, and administration perspectives.
22 out of 60
Active Directory Security on Demand
Comtrade System Integration
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
23 out of 60
Invoke Data Risk Assessment
Invoke
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
This assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
24 out of 60
Data Protection and Governance with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
25 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 Wks
Wipro Ltd
+2
Applicable to:
Identity & Access Management
Threat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
26 out of 60
Sogeti SmartWorkspace: 4 Week Implementation
Capgemini Group
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Sogeti provides a one-stop shop set of offerings around the SharePoint solutions. Our offer comprises consultancy, discovery of the existing landscape, Solution Architecture, SharePoint migration etc.
27 out of 60
Microsoft 365 Security Health Check: 3 day Assessment
ISCG SP Z O O
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft 365 is a multi-layer solution with the right security policies you can block over 99.9 percent of account compromise attacks!
28 out of 60
Red Canary Defend Against Threats Siem Plus XDR Workshop
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
29 out of 60
Google to Microsoft 365 Migration
Managed Solution
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Empowering digital transformation through a Google to Microsoft 365 migration with world-class support, so you can focus on what matters most—your business.
30 out of 60
Modern EndPoint Management - Jumpstart: 1-Wk Proof of Concept
Logicalis, Inc.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune Jumpstart will help showcase the value of Microsoft Intune, to show you how to more effectively manage endpoints within Intune. Proof of Concept deployment included!
31 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POC
Long View Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure and manage your cloud environments by fortifying your infrastructure against emerging threats.
32 out of 60
Microsoft Defender for Endpoint SMC Deployment: 4-Week Implementation
BlueVoyant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our services are designed to maximize your investment with Microsoft with hands-on onboarding & baseline configuration services.
33 out of 60
Microsoft 365 Security Assessment: 3-Week Assessment
Spyglass MTG, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
34 out of 60
Microsoft Purview Records Management Assessment & Strategy - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
35 out of 60
Onesec Digital Identity
Secure Nextgen Systems
+2
Applicable to:
Identity & Access Management
Threat Protection
Having a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
36 out of 60
Conditional Access Penetration Test: 4 Days Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
37 out of 60
Defender for Endpoint Professional Security Services | Customized Deployment in as Little as 6-Weeks
Difenda
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize your Microsoft Security investment with our Defender for Endpoint Design & Implementation.
38 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk Assessment
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
39 out of 60
Getting Ready for CoPilot with Purview
Patriot Consulting Technology Group LLC
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
The "Getting Ready for CoPilot with Purview" workshop is crafted to prepare organizations for the eventual adoption of Microsoft's CoPilot, by first implementing Microsoft Purview
40 out of 60
Cybersecurity Assessment Engagement - 4 weeks
Grant Thornton LLP
+2
Applicable to:
Cloud Security
Identity & Access Management
Enhance Your Cloud Security Posture with Grant Thornton’s Cybersecurity Assessment
41 out of 60
Security Baseline Integrity Manager
Aegis Innovators
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Single pane of glass for unified configuration, governance, and lifecycle management of security workloads across Microsoft 365.
42 out of 60
Microsoft Sentinel Workshop and Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
43 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week Implementation
Beyondsoft Brasil
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
44 out of 60
Endpoint Management and Windows Deployment Services: 4-Wk Implementation
Data Market Bilgi Hizmetleri A.S
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Endpoint Management and Windows Deployment Services Consultancy is a professional consultancy service for modernization of device and application management infrastructure .
45 out of 60
Managed Detection and Response [Security Monitoring]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
46 out of 60
Cyber Security Assessment
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
47 out of 60
Zero Trust Workplace Solution: 3-Wk Implementation
Softchoice
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Solution for organizations wanting to improve their overall security posture by implementing key security features for protecting user identity, devices, and data.
48 out of 60
Windows 365 Jumpstart: 3 Week Implementation
Steeves
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
We'll discuss the value of Windows 365 and its key functionalities, followed by a workshop to expose key areas and document decisions that drive implementation to ensure a successful adoption.
49 out of 60
Teams & SharePoint Security Hardening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
50 out of 60
Windows 365: 10-day Pilot Service
Ultima Business Solutions
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Ultima Business Solutions offers a 10 day, potentially funded, pilot service to help you explore the benefits of Windows 365, the cloud-based Windows experience that enables hybrid work scenarios.
51 out of 60
Cloud Security Assessment - 2 Week Assessment and Roadmap
CloudServus
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Gain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
52 out of 60
Microsoft Intune Deployment
Secure Future Bilgi Tek. ve Hiz. Tic A.S.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
53 out of 60
Cloud Device Management - 4hours Briefing
Reply
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
Improve the security, manageability, and efficiency of your corporate devices with Intune. Ideal for businesses looking to move to centralized IT management and reduce operational costs.
54 out of 60
Microsoft Endpoint Management: 3- W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
55 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementation
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
56 out of 60
Mergers and Acquisitions Playbook
Ivision, Inc.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
ivision leverages an approach and methodology designed to help clients successfully plan and design for a M/A&D migrations to achieve successful mergers, consolidation or a separation outcome.
57 out of 60
Office 365 to Office 365 Migration: 4-Wk Implementation
Exodus Integrity Services, Inc.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Simplify the complexities of merging, consolidating, or transitioning your Office 365 environments with our specialized Office 365 Migration Service.
58 out of 60
Zero Trust Protect and Govern Sensitive Data
KiZAN Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Lock down your data and take back control. Our Zero Trust Protect and Govern program empowers you to secure your sensitive information, simplify compliance, and gain peace of mind.
59 out of 60
Windows 365 Standardized Pilot
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
60 out of 60
Назад
1
2
3
4
5
Напред