AppSource
Poslat zpětnou vazbu
Nápověda a podpora
Uložené položky
Soukromé plány
Počkejte chvilku, přihlásíme vás…
Vše
Aplikace
Kategorie
Obory
Konzultační služby
Partneři
Filtry
Vymazat vše
Vaše poloha
Produkty (1)
Odvětví
Typ služby
Výsledky Konzultační služby
Zobrazují se výsledky v konzultační služby.
Zobrazení
související výsledky v industry clouds
.
Všechny výsledky
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
1 out of 60
Zero Trust Defend Against Threats: 7-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Accelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
2 out of 60
Defend Against Threats with SIEM Plus XDR
Netrix Global
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
3 out of 60
Microsoft 365 Security: 1 Month Implementation
Valorem LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
A detailed baseline assessment of your current and desired state followed by a pilot production of Microsoft’s advanced security solutions to accelerate your modern security journey.
4 out of 60
Security Assessment: 2-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
5 out of 60
Microsoft Defender for Endpoint: 2-wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Defender for Endpoint assessment will help the customers review the current state, evaluate existing AV and EDR solutions and expectations, deploy MDE, and plan for ongoing management.
6 out of 60
Microsoft 365 Defender 10-week Implementation
Cyclotron Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender for enterprises, resulting in improved detection rates, threat coverage, and organizational security posture.
7 out of 60
Security Maturity Assessment - 4 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
8 out of 60
UNITE: Exploring E5 Security Workshop_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
UNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
9 out of 60
Zero Trust Workplace Solution: 3-Wk Implementation
Softchoice
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Solution for organizations wanting to improve their overall security posture by implementing key security features for protecting user identity, devices, and data.
10 out of 60
Windows 365 Cloud PC: 4-Wk Proof of Concept
Signal Alliance
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Discover how Signal Alliance Consulting helps you get started with Windows 365, the worlds first cloud PC that helps you access your data from anywhere, anytime from any device.
11 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
12 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
13 out of 60
Windows 365 Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
14 out of 60
Accelerate Windows 365: 1-mo Proof of Concept
AMTRA Solutions Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Accelerate Windows 365 offers innovative management capabilities for your environment and optimizes your existing investment in cloud solutions.
15 out of 60
Microsoft Security: 3-Day Workshop
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
16 out of 60
Exchange Migration to Microsoft 365: 6-Week Implementation
All Covered, a division of Konica Minolta
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
All Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
17 out of 60
Window 365 Cloud PC: 3-Day Proof-of-Concept
CTGlobal A/S
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Assess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
18 out of 60
Aseguramiento de ciberseguridad: taller 4 semanas
Sofistic Colombia SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
19 out of 60
Solution Assessment for Security: 30 Day
Concurrency, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
An assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
20 out of 60
Microsoft Intune Endpoint Mgmt Level Up: 1-Mo Implementation
ProServeIT
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Enable organization-wide management & security for your endpoints (mobile devices, workstations, etc.) with a Microsoft Intune Endpoint Management implementation.
21 out of 60
Windows 365 Cloud PC 10-Days PoC
Sonata Information Technology Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Paid Assessment and PoC to deploy and use Windows 365 Cloud PC
22 out of 60
Windows 365 Assessment - 1 day
CC Bilgi Teknolojileri
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Hybrid Windows for a hybrid world Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
23 out of 60
Microsoft 365 Email Threat Protection Assessment
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
24 out of 60
Ransomware Protection: 1 Day-Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
25 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
26 out of 60
Ongoing Managed Services for Microsoft Intune
Finchloom
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Optimize your organization’s device management with Finchloom+ for Microsoft Intune. Tailored monthly managed service ensures streamlined, cloud-based endpoint management for company and BYOD devices.
27 out of 60
Baseline Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Aware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
28 out of 60
Modern Work Services Proof of Concept
Crayon US
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Meetings for Microsoft Teams
Crayon Modern Work Services PoC will help you pilot a subset of users with the best of Microsoft 365 prior to implementation. This will allow us to ensure a smooth transition for all users.
29 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementation
Cloudshift
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
30 out of 60
The Modern Workplace: 1 hour Briefing Session
Automize
+3
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device Management
This 1 hours briefing session provides a complete overview of our Modern Workplace concept of Endpoint Management, Identity & Access Management and Collaboration Solutions in context to your business.
31 out of 60
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
32 out of 60
Microsoft 365 Passwordless Authentication: 3-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Unlock a new era of robust authentication with Microsoft's Passwordless Authentication solutions.
33 out of 60
MDR Workshop
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
34 out of 60
Design and Implementation of Microsoft Security Solutions: 12-Week Engagement
Kudelski Security
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
Kudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
35 out of 60
On-Prem Exchange to Office 365 Migration: 4-Wk Migration
Exodus Integrity Services, Inc.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Simplify your email migration process to Office 365 with ease and efficiency.
36 out of 60
Microsoft Entra Private Access and Entra Internet Access
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Transform your organization's security landscape with our latest jumpstart, designed to fortify managed applications for your remote workforce and ensure secure access to Microsoft 365.
37 out of 60
Data Security and Governance Assessment and Roadmap
Centric Consulting, LLC
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
Provide customers with a clear path forward in addressing data security needs
38 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk Assessment
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Leverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
39 out of 60
GoDaddy to Office 365 Migration
SkyTerra Technologies LLC
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
If you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
40 out of 60
Implementation of Microsoft Identity Security
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW's Implementation of Microsoft Identity Security service helps customers strengthen their security posture, reduce the risk of data breaches and improve compliance with industry regulations.
41 out of 60
Active Assure Attack Assessment - 3 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Breach and Attack Simulations — We Attack to Defend You
42 out of 60
Conditional Access Penetration Test: 4 Days Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
43 out of 60
Protect and Govern Healthcare Data Workshop - 3 Day Workshop
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft-Funded Workshop to discuss and understand the hidden privacy and regulatory risks of healthcare data and how to mitigate with actionable next steps
44 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Microsoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
45 out of 60
Identity and Access Management Quick Start
Softchoice
+1
Applicable to:
Identity & Access Management
Prioritizing security services to combat identity breaches by prioritizing security services, and protecting against mismanaged privileges, and access-related data breaches.
46 out of 60
Windows 365 Accelerator: 4 Week Implementation
KiZAN Technologies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
During this 4-week engagement, KiZAN will assist with the design and implementation of Windows 365, including education, planning, documentation, and pilot for up to 50 users.
47 out of 60
Microsoft 365 Licence Health Check: 1-Day Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
48 out of 60
Autopilot: 2-Wk Proof of Concept
FSI Strategies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
FSi Strategies will review the deployment scenarios with the client and execute a proof of concept up to 25 devices in order to demonstrate the capabilities of Windows Autopilot
49 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
50 out of 60
CIS Top 20 Control Gap Analysis: 3-Day Assmt
CompuNet
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
By leveraging CompuNet, armed with CIS top 20 controls and its team of experts, they can advise on what controls to leverage inside the Microsoft suite as well as when to leverage 3rd party solutions.
51 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
52 out of 60
Red Canary Defend Against Threats Siem Plus XDR Workshop
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
53 out of 60
Modern Identity Workshop | 4 Weeks | Workshop
Enterprise It Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Enable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
54 out of 60
Windows as a Service: 4-Wk Implementation
AMTRA Solutions Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Secure your data and devices, identities and your business with Windows 10/11.
55 out of 60
Microsoft 365 Digital Workforce: 2-Day Workshop
CompuNet
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Two-day engagement to envision agile work scenarios and how to enable people to be productive and secure from anywhere with Microsoft 365
56 out of 60
Cloud Security Assessment - 2 Week Assessment and Roadmap
CloudServus
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Gain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
57 out of 60
OENG - Next Generation Endpoints-1 Month Proof of Concept
Secure Nextgen Systems
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Learn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
58 out of 60
Zero Trust Security: 3-day Workshop
Oxford Computer Group LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
59 out of 60
Offer Name: Microsoft 365 CrashCourse - 1 week Workshop
Virteva LLC
+3
Applicable to:
Identity & Access Management
Knowledge & Insights
Mobile Device Management
Empower organizations to gain a deeper understanding of Microsoft 365 and its vast array of services, features, and capabilities through Virteva's Microsoft 365 CrashCourse Workshop.
60 out of 60
Předchozí
3
4
5
6
7
Další