AppSource
Poslat zpětnou vazbu
Nápověda a podpora
Uložené položky
Soukromé plány
Počkejte chvilku, přihlásíme vás…
Vše
Aplikace
Kategorie
Obory
Konzultační služby
Partneři
Filtry
Vymazat vše
Vaše poloha
Produkty (1)
Odvětví
Typ služby
Výsledky Konzultační služby
Zobrazují se výsledky v konzultační služby.
Zobrazení
související výsledky v industry clouds
.
Všechny výsledky
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
1 out of 33
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
2 out of 33
IBM Digital Workforce Offering
IBM Consulting - EA
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Power Platform for Teams
IBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
3 out of 33
Microsoft Intune 1.5ヶ月 ワークショップ
JBサービス株式会社
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
これから Microsoft 365を使い方、活用したい組織におすすめ!Microsoft 365 導入と利活用シナリオ策定
4 out of 33
Microsoft Intune導入支援
JBサービス株式会社
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Microsoft Intune導入支援サービスでは、企業デバイスの一元管理を実現し、運用改善、セキュリティ向上を実現します。
5 out of 33
Entra ID導入支援
JBサービス株式会社
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
Entra ID導入支援サービスでは、IDに対しての管理を一元化し、各ソリューションにセキュアにアクセス行える環境を実現します。
6 out of 33
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
7 out of 33
Microsoft Cloud application security Assessment - 2 weeks
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
8 out of 33
Manage Corporate Data on Devices with Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Can you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
9 out of 33
Microsoft Cloud Apps Security Solutions for Custom Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Know your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
10 out of 33
Data Access Control with MCAS
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
11 out of 33
Microsoft Cloud Application for 3rd Party Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
12 out of 33
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
13 out of 33
Microsoft Cloud Apps Security for Microsoft 365 Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
14 out of 33
Shadow IT discovery with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
15 out of 33
Threat Detection with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
16 out of 33
Microsoft 365 Defender for Endpoint Vulnerability Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
17 out of 33
Microsoft 365 Business 導入サービス:1ヶ月間での実装
SOFTCREATE CORP.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Microsoft 365 Business シリーズをご利用頂くために必要な環境を、設計、構築、運用、保守に至るまでワンストップでご提供致します。 お客様のご要望に応じてパックをご選択頂き、コストを抑えて最適な環境を構築することが可能です。
18 out of 33
EMS導入支援サービス:6週間の実装
株式会社TOSYS
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
お客様のセキュリティ要件をヒアリングし、Enterprise Mobility + Security (EMS)の設計・構築を行います。ID、デバイス、データの管理を最適に運用できるよう導入支援いたします。
19 out of 33
Microsoft365 導入支援サービス:最低4週間から:実装
BIPROGY 株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Microsoft365導入支援サービスは、Microsoft 365の利用を検討しているお客様に対して、導入に必要な要件の確認から設計、構築、テストまでをワンストップで提供するサービスです。
20 out of 33
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
21 out of 33
Secure Remote Work: 3 Days Intro and Plan Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Engagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
22 out of 33
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
23 out of 33
Microsoft365導入:10週間の実装
コムチュア(株)
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Microsoft365またはOffice365の導入(4週間でヒアリングと設計、6週間で実装)
24 out of 33
Microsoft365でのゼロトラスト構築サービス:3ヶ月の実装
AZPower Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Azure ADでの条件付きアクセス設定、Defeder for EndopointでのEDR構築、Intuneでのデバイス管理構築
25 out of 33
Securing Identities: 3 Days Workshop
INOVASYS FOR SYSTEMS
+1
Applicable to:
Identity & Access Management
Microsoft funded Securing Identities is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
26 out of 33
Windows365 PoCサービス:1ヶ月のPoC
SOFTCREATE CORP.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Windows 365 を利用し、目的に適した業務環境をセキュアに実現するべく、Windows 365 の検証をお手伝い致します。
27 out of 33
Azure AD 移行支援サービス:1ヶ月の実装
SOFTCREATE CORP.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
既存環境からAzure ADへのスムーズな移行を可能にするフルマネージドサービスです。「検討」「移行」「運用」すべてのフェーズでお客様の要望に応じ、最適な移行を一気通貫で支援いたします。
28 out of 33
Intune for Android: 2-wk Imp
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Android devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
29 out of 33
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
30 out of 33
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POC
Bitscape
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
31 out of 33
Secure Hybrid Identity - Defender for Identity: 6 week Implementation
Performanta
+2
Applicable to:
Identity & Access Management
Threat Protection
Secure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
32 out of 33
Endpoint Management and Windows Deployment: 2-days Implementation
CC Bilgi Teknolojileri
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
Microsoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises.
33 out of 33
Předchozí
1
2
3