AppSource
Poslat zpětnou vazbu
Nápověda a podpora
Uložené položky
Soukromé plány
Počkejte chvilku, přihlásíme vás…
Vše
Aplikace
Kategorie
Obory
Konzultační služby
Partneři
Filtry
Vymazat vše
Vaše poloha
Produkty (1)
Odvětví
Typ služby
Výsledky Konzultační služby
Zobrazují se výsledky v konzultační služby.
Zobrazení
související výsledky v industry clouds
.
Všechny výsledky
Fortis Assessment SOC2
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
1 out of 60
Endpoint Security Advanced Quick Start 14-wk Implementation
Edgile, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats.
2 out of 60
MITRE ATT&CK® MasterClass: 2-Hour Workshop
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s MITRE ATT&CK® MasterClass is focused on educating companies on ransomware threats specifically relevant to their environment.
3 out of 60
Windows 365 Pilot: 5 Days Proof of Concept
Delphi Consulting
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Delphi Consulting will help you get started with Windows 365 Cloud-PC with its Pilot offering with the program running over 5 days.
4 out of 60
Defender Pilot
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
The Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
5 out of 60
Microsoft Defender for Endpoint: 4-Week Implementation
Invoke
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understand your current use cases for antimalware / endpoint detection and response, map those use cases to Defender, and execute on a migration and rollout to Defender for Endpoint.
6 out of 60
Deploying Purview Data Security - Labels and DLP
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
A dependable approach to deployment of Data Security workloads led by governance and following our standard framework for Microsoft 365 customers
7 out of 60
Microsoft 365 Security Health Check Assessment 3-Wk
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
8 out of 60
Microsoft Defender for Office Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
9 out of 60
Onesec Identity Governance Lifecycle Assessment
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
10 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
11 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-Weeks
myCloudDoor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Assess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
12 out of 60
Hybrid Identity Security Quick Start 12-wk Implementation
Edgile, Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
13 out of 60
Microsoft Copilot for Security: 2-Day Workshop
Planet Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
This 2-day workshop covers the essential aspects you need to effectively and efficiently leverage Microsoft Copilot for Security for your organization's security operations and needs.
14 out of 60
Microsoft Defender for Cloud Apps: 2-Hr Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
15 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
16 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
17 out of 60
Microsoft 365 Endpoint Manager Deployment Roadmap Assessment - 4 Week Assessment
Protiviti
+1
Applicable to:
Cloud Security
Actionable plan and high-level view to move towards a successful Microsoft Endpoint Manager (MEM) deployment and migration
18 out of 60
Data Security and Governance: 3 Day Workshop
Netwoven
+2
Applicable to:
Cloud Security
Information Protection & Governance
Netwoven Data Security and Governance workshop will get you started on the path to discover, protect, and govern your sensitive corporate data
19 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security Services
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
20 out of 60
Virteva Microsoft 365 Defender Ready Deploy
Virteva LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
21 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
22 out of 60
Windows 365 Standardized Pilot
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
23 out of 60
Microsoft Endpoint Manager Baseline
SHI International Corp
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Explore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
24 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk Assessment
ErgoServices
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ergo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
25 out of 60
Cyderes Managed Security Services for Microsoft Sentinel
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
26 out of 60
Threat Protection and Cloud Security: 3 Day Workshop
Netwoven
+2
Applicable to:
Cloud Security
Threat Protection
Improve your security posture with a Microsoft Threat Protection Assessment Workshop
27 out of 60
Office 365 Teamwork Security - Managed Service
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Teamwork Security provides a comprehensive security management service for Office 365 platforms
28 out of 60
Windows 365: 4 Week Readiness Assessment
Netrix Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Get an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
29 out of 60
Microsoft Data Compliance Consulting Services - 2 Weeks Assessment
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
The Microsoft 365 Compliance assessment helps organizations implement a compliance strategy that accelerates and streamlines data security and governance while reducing risk.
30 out of 60
Microsoft 365 Fundamentals: 1 Day Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
Introduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
31 out of 60
Free Microsoft 365 Defender Suite 4–6-hour Proof of Concept
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
This free, 4–6-hour workshop will provide you with a hands-on experience using Microsoft 365 Defender, Microsoft Defender for Office 365, Microsoft Defender for Endpoint
32 out of 60
Information Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Our approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
33 out of 60
Threat Protection Engagement
The Partner Masters
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
34 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementation
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
35 out of 60
Microsoft Defender for End Points Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
36 out of 60
Exchange Online Migration: 6-Week Deployment
Cyclotron Inc.
+2
Applicable to:
Cloud Security
Information Protection & Governance
Exchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
37 out of 60
Microsoft 365 Security Assessment - 4wk Assessment
Protiviti
+1
Applicable to:
Cloud Security
Effective Analysis of CIS & NIST Benchmarking, Active Directory to Azure and Microsoft 365 Configurations
38 out of 60
Managed Detection and Response [Threat Hunting]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Inspect events in your network to locate threat indicators and entities
39 out of 60
Cyber Security Services 9 days Assessment
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
40 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
41 out of 60
Hybrid Cloud Security Workshop - 1-Day
Zones, LLC
+1
Applicable to:
Cloud Security
Identify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
42 out of 60
User Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
43 out of 60
Microsoft 365 Security and Compliance Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Microsoft 365 Security and Compliance Assessment evaluates your current security posture, identifies vulnerabilities, and offers tailored solutions to enhance your data security and compliance.
44 out of 60
Enhance IT Security: 1-2-Wk Implementation
FMT Consultants
+2
Applicable to:
Cloud Security
Identity & Access Management
FMT offers a smart security solution that protects your business, your employees, and your clients while providing a reliable, scalable, and durable approach to keeping your business up and running.
45 out of 60
Security Modernization: 3 Day Workshop
Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Safeguard your business with a three-step security modernization solution from Netwoven
46 out of 60
Adopción de Copilot chat Enterprise - Bing Chat Enterprise: 3-Wk
ENCAMINA S.L.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Adopta Copilot Chat Enterptise para multiplicar la productividad de tus empleados protegiendo los datos en tu empresa
47 out of 60
Microsoft 365 Copilot Adoption: 2-3 Week Assessment
Coretek Services
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Evaluate the current customer Microsoft investments adoption of Microsoft Cloud Services and overall Security posture in an effort to develop a "Art of the Possible" to Adopt Microsoft 365 Copilot.
48 out of 60
Windows 365 Assessment - 1 day
CC Bilgi Teknolojileri
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Hybrid Windows for a hybrid world Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
49 out of 60
Cyderes Microsoft Security Adoption Advisory
Cyderes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
The Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
50 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
51 out of 60
Defender for IoT Operational Technology Discovery: 2-Hour Workshop
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT (OT) Discovery Workshop helps you understand the solution, the fit to your OT estate and potential threat posture improvements
52 out of 60
Windows 365 QuickStart : 4 Day PoC + Surface Go
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
The Windows 365 Quick Start engagement is designed to show you how Windows 365 + SurfaceGo keeps you productive. Included are a Surface Go, planning services, as well as a proof of concept.engagement
53 out of 60
Defender for Endpoint and Defender for Server Deployment
CISILION LTD
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
54 out of 60
MDR Workshop
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
55 out of 60
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
56 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
57 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
58 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
59 out of 60
Microsoft 365 Security 4 Weeks Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
60 out of 60
Předchozí
2
3
4
5
6
Další