AppSource
Poslat zpětnou vazbu
Nápověda a podpora
Uložené položky
Soukromé plány
Počkejte chvilku, přihlásíme vás…
Vše
Aplikace
Kategorie
Obory
Konzultační služby
Partneři
Filtry
Vymazat vše
Vaše poloha
Produkty (1)
Odvětví
Typ služby
Výsledky Konzultační služby
Zobrazují se výsledky v konzultační služby.
Zobrazení
související výsledky v industry clouds
.
Všechny výsledky
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
1 out of 34
Secure Live Workspace - 8 Weeks Assessment
LTIMindtree Limited
+3
Applicable to:
Cloud Security
Power Platform for Teams
Teams Custom Solutions
Our Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
2 out of 34
SecureBlu MDR Service for Microsoft 365 Defender
New Era Technology
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
3 out of 34
Microsoft 365 Copilot: 1-Day Assessment
Data Market Bilgi Hizmetleri A.S
+3
Applicable to:
Adoption & Change Management
Cloud Security
Power Platform for Teams
How Microsoft 365 Copilot can transform your business and the overall concepts you must understand to better daily business life.
4 out of 34
"Threat Protection: 3 Day Workshop"
Insentra Pty Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
5 out of 34
MDM Health Check (All OS): 2-week Assessment
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
6 out of 34
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
7 out of 34
Cloud Safeguard - 12 Month Implementation
Rapid Circle
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our Cloud Safeguard managed security service enables customers to focus on core business and innovation while we keep your Microsoft 365 platforms safe & secure.
8 out of 34
Spark MDR for Microsoft Defender for Endpoint Implementation
Spark New Zealand
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Endpoint security design, implementation and 24x7 management offering from Spark New Zealand
9 out of 34
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
10 out of 34
Defender for IoT Enterprise: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understanding risk with unmanaged IoT devices can be difficult. Our Defender for Enterprise IoT Proof of Concept helps you visualise and understand the threats to your environment.
11 out of 34
Defender for IoT Operational Technology: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
12 out of 34
Zero Trust: 3-Day Assessment
QUORUM SYSTEMS PTY LTD
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The assessment has been designed and scoped to focus on Microsoft 365 or Azure security elements as these relate to inform a robust zero trust strategy.
13 out of 34
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
14 out of 34
Microsoft Defender for Cloud Apps: 2-Hr Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
15 out of 34
Assessment of Microsoft Defender for Identity
Eighty20 Solutions Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Our Defender for Identity Assessment is a dependable way to get ready for your Defender for Identity adoption, ensuring that you enhance your environment and evaluate the results before you begin.
16 out of 34
Secure Modern Workplace with Microsoft and Ergo: 1-Wk Assessment
ErgoServices
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ergo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
17 out of 34
Microsoft 365 Copilot Readiness Assessment
Theta Systems Limited
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Prepare for Microsoft 365 Copilot with our readiness assessment
18 out of 34
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
19 out of 34
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
20 out of 34
Data Access Control with MCAS
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
21 out of 34
Shadow IT discovery with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
22 out of 34
EM+S Consulting Services: 4-Weeks Implementation
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
We will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
23 out of 34
Cloud Security Assessment: 2 Week Assessment
Byte Information Technology Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Identify real threats to your cloud environment and develop plans and next steps for your security journey.
24 out of 34
IdentityCARE 3-Wk Implementation
SecureCom Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Securing organizations Exchange Online and Multifactor Identity services.
25 out of 34
Microsoft Defender for Server:5-day Implementation
Delphi Consulting
+2
Applicable to:
Cloud Security
Threat Protection
Delphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
26 out of 34
Secure Remote Work: 4-Hours Workshop
Professional Advantage Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enable your people to work from anywhere, securely with Microsoft 365.
27 out of 34
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
28 out of 34
Modern Frontline Work Acceleration 2 days Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
LiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
29 out of 34
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
30 out of 34
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
31 out of 34
Licensing Microsoft 365: 1-day Assessment
Informatika a.d.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
32 out of 34
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POC
Bitscape
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
33 out of 34
Microsoft Cloud App Security: 2 Week Implementation
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Cloud Security
Keep your employees productive and secure on their favorite apps and devices with Cloud App Security. Bring the security of your on-premises systems to your cloud applications.
34 out of 34
Předchozí
1
2
3