AppSource
Изпращане на обратна връзка
Помощ и поддръжка
Записани елементи
Частни планове
Един момент, обработва се влизането ви...
Всички
Приложения
Категории
Индустрии
Консултантски услуги
Партньори
Филтри
Изчистване на всички
Вашето местоположение
Продукти (1)
Отрасли
Тип услуга
Консултантски услуги резултата
Показват се резултати след консултантски услуги.
Преглед
свързани резултати в облаци за отрасли
.
Всички резултати
Cy:lent Pursuit Threat Hunt: 6-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ascent’s intel-based approach to cybersecurity threat hunting helps identify threat actors faster and more accurately than other, more traditional methodologies.
1 out of 60
MDR Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
“MDR Shield” is Long View’s cyber security managed detection and response service.
2 out of 60
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
3 out of 60
Endpoint Management: 3-Day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Get an executive deep dive into remote deployment, management, and the security of corporate and BYOD devices in your organization with ECF Data’s Endpoint Management Workshop
4 out of 60
Cyber Security Health Check: 4-Hr Assessment
Enabling Technologies Corporation
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Cyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
5 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day Workshop
Egroup, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
With Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
6 out of 60
Windows 365 Pilot: 5 Days Proof of Concept
Delphi Consulting
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Delphi Consulting will help you get started with Windows 365 Cloud-PC with its Pilot offering with the program running over 5 days.
7 out of 60
Microsoft Data Compliance Consulting Services - 2 Weeks Assessment
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
The Microsoft 365 Compliance assessment helps organizations implement a compliance strategy that accelerates and streamlines data security and governance while reducing risk.
8 out of 60
M365 Compliance Assessment: 4-Wk Assessment
KiZAN Technologies
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Manage and Improve your organizations compliance
9 out of 60
Microsoft Endpoint Management: 3- W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
10 out of 60
Windows 365: 4 Week Readiness Assessment
Netrix Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Get an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
11 out of 60
Microsoft 365 Security: 4-hour Assessment
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Microsoft 365 Security Assessment provides an in-depth assessment of your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
12 out of 60
1-Tages Update Workshop: Cloud Security & Compliance mit Microsoft 365
AppSphere AG
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Knowledge & Insights
Entdecken Sie das Fundament der Cloud-Sicherheit für eine Compliance konforme Nutzung von Microsoft 365
13 out of 60
Endpoint Management: 3-Day Workshop
CompuNet
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Three-day engagement that provides customers with an executive deep dive into remote deployment, management, and security of personal and organization-owned devices.
14 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
15 out of 60
"Threat Protection: 3 Day Workshop"
Insentra Pty Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
16 out of 60
Cyber Security Assessment
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
17 out of 60
Data Protection and Compliance Quick Start
Softchoice
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
The Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
18 out of 60
MFA Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan.
19 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
20 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
21 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week Implementation
Options Technology Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
22 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk Worshops
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
23 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free Briefing
Netwoven
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Netwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
24 out of 60
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
25 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5
Collective Insights
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Upgrade to Microsoft 365 E5 for Advanced Productivity and Security
26 out of 60
Windows 365 Assessment - 1 day
CC Bilgi Teknolojileri
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Hybrid Windows for a hybrid world Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
27 out of 60
Microsoft 365 Licence Health Check: 1-Day Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
28 out of 60
Microsoft 365 CISO Security Workshop with Sentinel
CDW
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Microsoft 365 CISO Security Workshop with Sentinel is designed as a day engagement for Business Decision Makers (BDM) to help showcase the value proposition of Microsoft Security.
29 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk Engagement
CloudScale International
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
30 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
31 out of 60
Threat Protection: 5-Week Workshop
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
An executive deep dive into security strategy, tailored to your organization.
32 out of 60
GDPR Assessment: 6-Week Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
33 out of 60
MDR for Microsoft Sentinel + XDR-5 Week Implementation
KiZAN Technologies
+2
Applicable to:
Cloud Security
Threat Protection
Implement Managed Threat Detection and Response Services with Microsoft Sentinel and Defender
34 out of 60
Data Security and Governance: 3 Day Workshop
Netwoven
+2
Applicable to:
Cloud Security
Information Protection & Governance
Netwoven Data Security and Governance workshop will get you started on the path to discover, protect, and govern your sensitive corporate data
35 out of 60
Microsoft 365 Security Program - 10 Weeks
Trace3
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
36 out of 60
Defender for Endpoint and Defender for Server Deployment
CISILION LTD
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
37 out of 60
Licensing Microsoft 365: 1-day Assessment
Informatika a.d.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
38 out of 60
Microsoft Defender for Endpoint: 4-Week Implementation
Invoke
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understand your current use cases for antimalware / endpoint detection and response, map those use cases to Defender, and execute on a migration and rollout to Defender for Endpoint.
39 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
40 out of 60
Defender for IoT Operational Technology Discovery: 2-Hour Workshop
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT (OT) Discovery Workshop helps you understand the solution, the fit to your OT estate and potential threat posture improvements
41 out of 60
Microsoft 365 Passwordless Authentication: 3-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Unlock a new era of robust authentication with Microsoft's Passwordless Authentication solutions.
42 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
43 out of 60
Zero Trust Implementation
JourneyTEAM
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Unlock the potential of your Microsoft 365 cybersecurity with JourneyTEAM's comprehensive Zero Trust Implementation.
44 out of 60
SecureBlu MDR Service for Microsoft 365 Defender
New Era Technology
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
45 out of 60
Microsoft Defender for End Points Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
46 out of 60
Exchange Online Migration: 6-Week Deployment
Cyclotron Inc.
+2
Applicable to:
Cloud Security
Information Protection & Governance
Exchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
47 out of 60
Vulnerability Management
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+2
Applicable to:
Cloud Security
Threat Protection
Rapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
48 out of 60
Managed Detection and Response [Threat Hunting]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Inspect events in your network to locate threat indicators and entities
49 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
50 out of 60
Compliance Managed Services
Forsyte IT Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Organizations everywhere are experiencing the benefits of Compliance Managed Services. Work with our Microsoft Gold Partner team to establish governance and manage user access and data security.
51 out of 60
Conditional Access Penetration Test: 4 Days Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
52 out of 60
Microsoft 365 Inter-Tenant Migration: 2 days Assessment
Preeminent Solutions, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Preeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
53 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Microsoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
54 out of 60
Cyber Insurer Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Uncover gaps and strengthen your position when applying for cyber insurance
55 out of 60
Multi Cloud Security: Secure Multi & Hybrid Cloud Environments Workshop
CompuNet
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
Five week engagement that helps customers gain insights on active threats and vulnerabilities related to their hybrid and multi-cloud workloads within Microsoft 365.
56 out of 60
Microsoft Priva Assessment: 2 Wk
Lighthouse Global
+2
Applicable to:
Cloud Security
Information Protection & Governance
Empowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
57 out of 60
Active Assure Attack Assessment - 3 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Breach and Attack Simulations — We Attack to Defend You
58 out of 60
AgileAscend Microsoft 365 GCC and GCC High: 1 Hour Assessment
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
59 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
60 out of 60
Назад
2
3
4
5
6
Напред