AppSource
Poslat zpětnou vazbu
Nápověda a podpora
Uložené položky
Soukromé plány
Počkejte chvilku, přihlásíme vás…
Vše
Aplikace
Kategorie
Obory
Konzultační služby
Partneři
Filtry
Vymazat vše
Vaše poloha
Produkty (1)
Odvětví
Typ služby
Výsledky Konzultační služby
Zobrazují se výsledky v konzultační služby.
Zobrazení
související výsledky v industry clouds
.
Všechny výsledky
Ransomware & Supply Chain Incident Management: 12 Hour Assessment
Maureen Data Systems
+3
Applicable to:
Compliance Advisory Services
Knowledge & Insights
Threat Protection
Identify vulnerabilities within your organization, including those who pose a threat to your supply chain, provide & mature a tailored incident response & management program.
1 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
2 out of 60
Red Canary Defend Against Threats Siem Plus XDR Workshop
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
3 out of 60
Implementation of Microsoft Identity Security
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW's Implementation of Microsoft Identity Security service helps customers strengthen their security posture, reduce the risk of data breaches and improve compliance with industry regulations.
4 out of 60
Microsoft Information Protection Administrator: 3 Days Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Information Protection Administrator course focuses on data governance and information protection within your organization.
5 out of 60
Security für den Einsatz von Microsoft 365 Copilot
novaCapta GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Eine sichere Basis schaffen und technische Hindernisse aus dem Weg räumen für den Einsatz von Copilot for Microsoft 365
6 out of 60
Cyber Insurer Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Uncover gaps and strengthen your position when applying for cyber insurance
7 out of 60
Phishing, Malware & Spam protection- 2 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
8 out of 60
Device as a Service with Windows 11 and Intune: 4 Week Implementation
Cognizant
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Windows 10 has revolutionized how organizations manage operating systems, delivering the features that you have come to know and rely on, while enhancing mobility and agility without losing data.
9 out of 60
Cyber Security Services 9 days Assessment
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
10 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
11 out of 60
SharePoint and Teams Security - 2 week assessment
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Confident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
12 out of 60
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
13 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
14 out of 60
Free Microsoft 365 Defender Suite 4–6-hour Proof of Concept
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
This free, 4–6-hour workshop will provide you with a hands-on experience using Microsoft 365 Defender, Microsoft Defender for Office 365, Microsoft Defender for Endpoint
15 out of 60
Microsoft 365 Information Protection 1-day Workshop
Grant Thornton LLP
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Review your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
16 out of 60
Threat Protection Engagement
The Partner Masters
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
17 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementation
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
18 out of 60
Microsoft 365 Defender - MXDR Service - 1 Year Implementation
CGI Inc.
+1
Applicable to:
Threat Protection
Unleash your Microsoft Defender 365 capabilities. Automatically detect & correlate threat signals across your endpoints, email, cloud applications, identities, cloud and on-premises workloads.
19 out of 60
Threat Protection: 5-Week Workshop
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
An executive deep dive into security strategy, tailored to your organization.
20 out of 60
GDPR Assessment: 6-Week Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
21 out of 60
Defender for Endpoint and Defender for Server Deployment
CISILION LTD
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
22 out of 60
Cyderes Microsoft 365 Incident Response
Cyderes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Cyderes Digital Forensics and Incident Response (DFIR) services encompass the full security motion and emphasize your ability to respond.
23 out of 60
MDR Workshop
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
24 out of 60
Solution Assessment for Security: 30 Day
Concurrency, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
An assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
25 out of 60
BYOD Intune 1-Wk Accelerated Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Bring Your Own Device (BYOD) capability
26 out of 60
Mobile Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Corporate Mobile Devices (iOS, Android and macOS)
27 out of 60
Microsoft 365 Licence Health Check: 1-Day Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
28 out of 60
Cyderes Microsoft Security Adoption Advisory
Cyderes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
The Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
29 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
30 out of 60
Baseline Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Aware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
31 out of 60
Defender for IoT Operational Technology Discovery: 2-Hour Workshop
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT (OT) Discovery Workshop helps you understand the solution, the fit to your OT estate and potential threat posture improvements
32 out of 60
CCPA CPRA: 6 - Wk Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
33 out of 60
"Threat Protection: 3 Day Workshop"
Insentra Pty Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
34 out of 60
Windows as a Service: 4-Wk Implementation
AMTRA Solutions Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Secure your data and devices, identities and your business with Windows 10/11.
35 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
36 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week Project
Virteva LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Get a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
37 out of 60
Advanced Email Security: 4-Day Implementation
FSI Strategies
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Leverage Microsoft Defender for Office 365 to implement best in class email security
38 out of 60
Multifactor Authentication: 4-Day Implementation
FSI Strategies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
39 out of 60
OAAA Advanced Adversary Assesment-1 month assesment
Secure Nextgen Systems
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Learn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
40 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
41 out of 60
Microsoft Intune (Windows): 1-Wk Proof of Concept
Invoke
+2
Applicable to:
Mobile Device Management
Threat Protection
Map the use cases for, and benefits of, Intune all-up for endpoint management, and learn how to modernize your approach to endpoint management at cloud-scale.
42 out of 60
Entra Permission Risk Assessment
adaQuest
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your Multi-Cloud Environment with Microsoft Entra by automating the remediation of Permissions. Get a comprehensive visibility into permissions assigned to all identities on your organization.
43 out of 60
Secure Multi-Cloud Environments: 3-day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Secure Multi-Cloud Environments Workshop helps customers gain insights on active threats and vulnerabilities related to their hybrid and multi-cloud workloads within Microsoft 365.
44 out of 60
Windows Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
45 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefing
SMART business LLC
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
46 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
47 out of 60
HPT Mitigate Compliance and Privacy Risk_1-Day Workshop
HPT Vietnam Corporation
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Understand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
48 out of 60
Defender for IoT Operational Technology: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
49 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage Workshop
CGI Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
50 out of 60
Microsoft Sentinel Proof of Concept: 4 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand how prepared is your Microsoft infrastructure when adversaries attack
51 out of 60
Gestion del Endpoint: Servicio Gestionado
RAN INGENIERÍA DE SISTEMAS SRL
+2
Applicable to:
Information Protection & Governance
Threat Protection
El servicio está diseñado para gestionar la seguridad de las plataformas endpoint de las organizaciones en la protección de los datos y dispositivos tanto corporativos como personales.
52 out of 60
"Exchange in a Box Migration: 1-Month Implementation."
Zones, LLC
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
Zones Exchange in a Box allows businesses to migrate their current platform to Exchange Online. As an add-on to Exchange Migrations, we recommend Zones Backup as a Service (ZBaaS) offering.
53 out of 60
True Managed Security Service- 3 day Workshop
true org cloud
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
You have a vision. We can help you secure it...
54 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
55 out of 60
Microsoft 365 Security: 2-week assessment
Mirai Security Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
56 out of 60
Modern SecOps Discovery Session
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
57 out of 60
Managed Workspace Protection for Microsoft 365 Defender
Orange Business Services - Global
+1
Applicable to:
Threat Protection
Implementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
58 out of 60
Zero Trust Foundation: 6-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Accelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
59 out of 60
Microsoft 365 Protecting Corporate Identities: 5-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your organization from devastating breaches with Microsoft 365 identity solutions.
60 out of 60
Předchozí
2
3
4
5
6
Další