AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
1 out of 60
Windows 365 Standardized Pilot
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
2 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
3 out of 60
HPT_Microsoft Cyber Security Assessment_2 week
HPT Vietnam Corporation
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Strengthen your firm's defenses with our all-in-one cybersecurity platform
4 out of 60
Endpoint Ecosystem Technical Support: 12-month Support Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Provide support and advice to IT administrators on Microsoft Endpoint Manager
5 out of 60
Microsoft 365 Security Assessment: 2 Week Assessment
Kontex Security Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
6 out of 60
HPT Nextgen Windows Experience_02 days workshop
HPT Vietnam Corporation
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
NextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
7 out of 60
Adoption as a Service: 12 months Microsoft 365 support
SNOMANN, UAB
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Benefit from long-term collaboration. We'll act as a trusted advisor on your Microsoft 365 infrastructure consulting, recommending, solving issues, supporting and developing.
8 out of 60
Microsoft 365: 2-Week Assessment
Practical Solutions, Inc
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
9 out of 60
SVA Boarding Check Copilot for Microsoft 365 - 2d Workshop
SVA System Vertrieb Alexander GmbH
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
Der Boarding Check dient in erster Linie dazu, gemeinsam mit Ihnen die allgemeine Bereitschaft ihres Unternehmens für die Einführung von Copilot for Microsoft 365 festzustellen.
10 out of 60
Security Assessment: 1-D Workshop
atwork
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The Security Assessment Workshop will support you in focusing on your priorities and security strategy, discovering current threats, learning about Microsoft's security tools and planning next steps.
11 out of 60
BYOD 365: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
The BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
12 out of 60
Azure AD Implentation in 8 weeks
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Identity & Access Management
Porovide a design and build capability that enables organisations to secure, control and simplify employee access to company data and sensitive resources resources from wherever they are.
13 out of 60
Magenta Security Services for Microsoft DACH:3 months Implementation
Telekom Deutschland GmbH Main Account
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Magenta Security for Microsoft provides the management and the integration in as well as the continuous monitoring of your Microsoft Security by the SOC of Deutsche Telekom
14 out of 60
Windows 11 Assessment: 1-WK
Steeves
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
15 out of 60
Capgemini Modern Workspace Portfolio
Capgemini Group
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Capgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
16 out of 60
Collaborative Apps: 3 - W Workshop
Exelegent
+3
Applicable to:
Identity & Access Management
Power Platform for Teams
Teamwork Deployment
Build Solutions for your Customers to drive organizations goals and create collaborative experiences.
17 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
18 out of 60
CDA as a Service on Microsoft 365: 3 weeks implementation
INDACON S.R.L.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Teams Custom Solutions
CDA as a Service is a Cloud-based platform that allows the management of every Board of Directors phase in a single workspace
19 out of 60
Managed Security Operations Center: 1 Month Implementation
novaCapta GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Wir bieten einen professionellen 24/7-Sicherheitsbetrieb Ihrer Umgebung mit unserem zertifizierten deutschen SOC-Team
20 out of 60
Microsoft 365 Vision Scope Advisory: 5-Days Workshop
SoftwareONE Deutschland GmbH
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Wir zeigen Ihnen, wie Sie sich mit Microsoft 365 auf Basis neuester Cloud-Technologien mit SharePoint, Teams und Exchange neue Möglichkeiten für die Zusammenarbeit und Kommunikation eröffnen.
21 out of 60
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
22 out of 60
Microsoft Security Services:5-Wk Implementation
Energy Time LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Deploy&Configure Microsoft Security Services: Azure AD Premium features, Microsoft Defender Family, Endpoint Management, Information Protection
23 out of 60
Intranet & Data Optimization for SharePoint: 1 Day Assessment
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Assessment rivolto alle aziende che vogliono ottimizzare i processi interni con l'uso di SharePoint e Microsoft 365
24 out of 60
Intranet & Data Migration SharePoint: 3 Days Implementation
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Implementazione di SharePoint come intranet aziendale e migrazione dei dati online su Microsoft 365
25 out of 60
SharePoint Intranet: 2 Hours Briefing
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Briefing di presentazione della soluzione SharePoint e prima analisi delle esigenze e conoscenze di Microsoft 365
26 out of 60
Intranet & Data Optimization: 4 Hours Workshop
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Workshop di introduzione pratica alle potenzialità della soluzione SharePoint di Microsoft 365
27 out of 60
Intranet & Data Optimization: 1 Day Proof of Concept
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Proof of Concept (POC) per provare in modo pratico la soluzione SharePoint nella propria infrastruttura
28 out of 60
ADVIA Service Implementierung & Migration
ADVIA GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Die Cloud ist das Ziel, der Weg ist klar, doch was ist mit Ihren Daten?
29 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
30 out of 60
Quick Security Assessment für die Microsoft Cloud: 2 Wochen
IT-Improvement Deutschland GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Standortbestimmung im Security Bereich der Microsoft Cloud Umgebung und Entwicklung von Handlungsempfehlungen.
31 out of 60
1ID Platform for EDU
Telelink Business Services EAD
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
32 out of 60
Secure identities and access - 4 day workshop
aConTech GmbH
+1
Applicable to:
Identity & Access Management
Get an overview of identity and access management with Microsoft 365 and create a personalized plan to improve and maintain security posture with aConTech, German's leading Microsoft Cloud Partner.
33 out of 60
10-WK Sustainability-Net-Zero-IT
PHAT CONSULTING GmbH
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
NET ZERO IT - den Fußabdruck der IT reduzieren
34 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
35 out of 60
IBM Digital Workforce Offering
IBM Consulting - EA
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Power Platform for Teams
IBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
36 out of 60
Managed Services: M(x)DR for Microsoft 365 Defender
Cegeka NV
+2
Applicable to:
Identity & Access Management
Threat Protection
Introducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
37 out of 60
Microsoft 365 Copilot: 12-Wk Implementation
PHAT CONSULTING GmbH
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Copilot Readiness by PHAT helps you to prepare your organization for a successful Microsoft 365 Copilot implementation
38 out of 60
Copilot für Microsoft 365 Technical Delivery (ab 5 Tagen)
CANCOM GmbH
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Workplace Analytics
Nahtlose Integration und technische Umsetzung von Copilot für Microsoft 365 in Ihre IT-Umgebung
39 out of 60
Net at Work Security Assessment für Microsoft 365
Net at Work GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Mit dem Microsoft 365 Security Assessment ermitteln wir den Security Reifegrades Ihres Unternehmens und geben Ihnen Maßnahmen zur Verbesserung an die Hand.
40 out of 60
base-IT Pentesting
BaseIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Mit base-IT Pentesting stärken wir Ihre IT-Sicherheit und decken Schwachstellen auf. Durch die Integration von Microsoft 365 (Cloud Security, etc.) entsteht eine umfassende Sicherheitsarchitektur.
41 out of 60
Copilot Discovery Workshop für Microsoft 365
aConTech GmbH
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Identifiziert Eure individuellen Ziele, Herausforderungen sowie Eure Roadmap für die Einführung von Copilot. Wir begleiten Euch ganzheitlich vom sanften Einstieg bis hin zur sicheren Implementierung.
42 out of 60
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
43 out of 60
Microsoft Cloud application security Assessment - 2 weeks
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
44 out of 60
Manage Corporate Data on Devices with Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Can you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
45 out of 60
Information Protection with Microsoft Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Boost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
46 out of 60
Microsoft Cloud Apps Security Solutions for Custom Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Know your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
47 out of 60
Data Access Control with MCAS
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
48 out of 60
Microsoft Cloud Application for 3rd Party Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
49 out of 60
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
50 out of 60
Microsoft Cloud Apps Security for Microsoft 365 Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
51 out of 60
Shadow IT discovery with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
52 out of 60
Threat Detection with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
53 out of 60
Microsoft 365 Defender for Endpoint Vulnerability Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
54 out of 60
Hybrid Identity Workshop: 1-day
novaCapta GmbH
+1
Applicable to:
Identity & Access Management
Der Hybrid Identity Workshop hilft Ihnen, eine Strategie für Identity und Access für die Zukunft einzuführen und die Microsoft 365 Suite zu nutzen. Wir unterstützen Sie bei der Umsetzung.
55 out of 60
Secure Remote Work 360° by acontech - 1 wk implem
aConTech GmbH
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Sie erhalten folgende Leistungen: Die Implementierung von Identity & Access Management, Device Deployment Management, Mobile Device Management, Modern Workplace und Teamwork Deployment
56 out of 60
Security 360° by aConTech - 1 wk implementation
aConTech GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sie erhalten folgende Leistungen: Die Implementierung von Identity and Access Management, Threat Protection, Conditional Access, Microsoft 365 Defender sowie Security Monitoring.
57 out of 60
Work - 12-wk Implementation
Wortell
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Work, the modern workplace as a service offering by Wortell on a pay-per-user-per-month basis
58 out of 60
Whatsapp Secure by aConTech - 3 Tage Implement.
aConTech GmbH
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Dank WhatsApp Secure und Microsoft Intune können Sie WhatsApp jetzt datenschutzkonform auf Ihren mobilen Endgeräten einsetzen.
59 out of 60
10WK-Implementation Cloud Migration/MW
PHAT CONSULTING GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Teams Custom Solutions
Mit der Implementierung von Cloud-Lösungen nutzen Sie die Potenziale von Microsoft 365 ideal für den Modern Workplace. PHAT steht für Pairing Humans and Technology – sicher & compliant!
60 out of 60
Previous
1
2
3
4
Next