AppSource
Poslat zpětnou vazbu
Nápověda a podpora
Uložené položky
Soukromé plány
Počkejte chvilku, přihlásíme vás…
Vše
Aplikace
Kategorie
Obory
Konzultační služby
Partneři
Filtry
Vymazat vše
Vaše poloha
Produkty (1)
Odvětví
Typ služby
Výsledky Konzultační služby
Zobrazují se výsledky v konzultační služby.
Zobrazení
související výsledky v industry clouds
.
Všechny výsledky
Cyber Maturity Pathfinder
SCC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Strengthen your cybersecurity posture with our Cyber Maturity Pathfinder, assessing your current security stance, identifying vulnerabilities, and offering a roadmap for long-term defence.
1 out of 60
Microsoft 365 Security Assessment: 2 Week Assessment
Kontex Security Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
2 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk Assessment
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
3 out of 60
Avanade Security Business Value 4-Wk Assessment FY24
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
4 out of 60
Microsoft Cloud App Security (MCAS) Workshop
Advania
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This MCAS workshop guides an organisation through the high level design considerations applicate to Cloud Discovery, Connect App and session proxy policy capabilities and related integrations.
5 out of 60
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
6 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week Implementation
Options Technology Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
7 out of 60
Atech Microsoft Threat Protection Engagement
Atech Support
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement will provide the help organisations need to achieve achieve security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR workshop
8 out of 60
365SecurityREADY for ISO 27001: 12-16 Weeks Implementation
The Cloud Factory EMEA Ltd.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get ISO 27001 Ready with Microsoft 365
9 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
10 out of 60
Managed Detection and Response [Threat Hunting]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Inspect events in your network to locate threat indicators and entities
11 out of 60
Microsoft Data Compliance Consulting Services - 2 Weeks Assessment
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
The Microsoft 365 Compliance assessment helps organizations implement a compliance strategy that accelerates and streamlines data security and governance while reducing risk.
12 out of 60
Protect and Govern Sensitive Data: 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
13 out of 60
Microsoft Copilot Zero Trust Workshop: 3 Day Workshop
Bytes Software Services
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Bytes will help customers deploy Copilot in the most secure manner
14 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
15 out of 60
Managed Detection and Response [Security Monitoring]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
16 out of 60
Collaboration & Data Governance 4-Week Implementation
HTG
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
HTG’s Collaboration & Data Governance pack can help companies achieve the right balance of user freedom while ensuring compliance with corporate policies.
17 out of 60
Microsoft Cloud Accelerator Workshops 2-Days
SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Improve NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
18 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
19 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process Adoption
Vitalyst
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
20 out of 60
Microsoft Managed Security Service 4-Week Implementation
Atech Support
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enterprise-grade security implementation, configuration and monitoring with proactive threat detection and incident response in a 24/7/365 SOC across applications, endpoints and infrastructure
21 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
22 out of 60
Security Posture Assessment Service
Kocho
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Security Posture Service, assesses an organisation’s cloud environment against recognised security benchmarks and makes recommendations to uplift security posture.
23 out of 60
Wc-PC- Wragby Cloud PC
Wragby Business Solutions & Technologies Limited
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
24 out of 60
Adopción de Copilot chat Enterprise - Bing Chat Enterprise: 3-Wk
ENCAMINA S.L.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Adopta Copilot Chat Enterptise para multiplicar la productividad de tus empleados protegiendo los datos en tu empresa
25 out of 60
1-Tages Update Workshop: Cloud Security & Compliance mit Microsoft 365
AppSphere AG
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Knowledge & Insights
Entdecken Sie das Fundament der Cloud-Sicherheit für eine Compliance konforme Nutzung von Microsoft 365
26 out of 60
Microsoft 365 Plan for Success:3-d Assessment
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
27 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und Ausarbeitung
AppSphere AG
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Vom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
28 out of 60
BCN Intranet Lite
BCN Group Ltd.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
29 out of 60
Guest Lifecycle for Azure AD
Swiss IT Security AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Guest Lifecycle for Azure AD (GL4AAD) handles maintenance and hygiene tasks for you.
30 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
31 out of 60
Microsoft 365: 1 Day Secure Score and Tenant Review
Cobweb Solutions Ltd.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cobweb’s Secure Score and Tenant Review offers to help you gain visibility of your existing tenant configuration and outstanding security recommendations.
32 out of 60
Microsoft 365 Security: 6-Day Implementation
Cloud Direct
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
33 out of 60
Enterprise Mobility + Security Quickstart for Nonprofit
SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Secure, compliant, and adaptable productivity for mission-driven work
34 out of 60
Secure Microsoft 365 Managed Service
CW Systems Integration Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
35 out of 60
Device Mgm and Protection - 12 days Implementation
SPAN d.d.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
36 out of 60
PwC Digital Identity: 4-Wk Assessment
PricewaterhouseCoopers UK
+2
Applicable to:
Cloud Security
Identity & Access Management
PwC provides leading class Identity and Access Management advisory, assurance and delivery services that offer distinctive value and enable clients to optimise their digital services and processes.
37 out of 60
Windows 365 Standardized Pilot
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
38 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Conscia A/S
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
39 out of 60
Microsoft 365 Copilot workshop: 1-week consulting services
Uni Systems S.M.S.A.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
40 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
41 out of 60
Unifying Microsoft Sentinel with Cloud Services
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
42 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
43 out of 60
Microsoft 365 Security Design and Deployment: 1 Hour Briefing
Cloud Essentials
+1
Applicable to:
Cloud Security
An initial briefing to understand business requirements in advance of a design workshop and deployment of advanced Microsoft 365 cloud security features
44 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
45 out of 60
Endpoint Management Workshop
York Telecom Corp
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
46 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk Worshops
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
47 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
48 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
49 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
50 out of 60
GoDaddy to Direct Microsoft 365 Migration 2 Hrs Proof of Concept
true org cloud
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Remove GoDaddy and other third-party entities from your tenant, reclaiming internal control over your systems.
51 out of 60
Data Classification and Protection 3Weeks Workshop
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
52 out of 60
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
53 out of 60
SEIDOR Modern Workplace with Microsoft 365 1-Month Implementation
SEIDOR SA
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
We promote and respond to the current needs of companies in terms of mobility, security, productivity, communication and collaboration through the evolution of their workstations
54 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Microsoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
55 out of 60
Copilot for Microsoft 365 Data and Security Readiness Assessment
Awara IT Kazakhstan LLP
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Elevate Your Data and Security with Copilot for Microsoft 365 Readiness Assessment by Awara IT's experts.
56 out of 60
Copilot for Microsoft 365 - Readiness Engagement: 2 Week-Implementation
HTG
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
After assessing data availability and quality, we will provide and implement a robust set of recommendations for enhancing your security posture ahead of a Copilot deployment.
57 out of 60
Zero Trust Security Assessment: 10-Day Assessment
Chorus
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our zero trust security assessment reviews your security posture to give you a clear roadmap to adopt Microsoft 365 security solutions to remove vulnerabilities and improve your posture.
58 out of 60
Egyptian Data Protection Law: 2 Days Workshop
GLOBAL BRANDS
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
59 out of 60
Fitzrovia IT - Defender for Endpoint
Fitzrovia I.T. Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Fitzrovia IT will consult and configure and Defender for Endpoint for your business
60 out of 60
Předchozí
1
2
3
4
5
Další