AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
IdentityCARE 3-Wk Implementation
SecureCom Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Securing organizations Exchange Online and Multifactor Identity services.
1 out of 19
Secure Remote Work: 4-Hours Workshop
Professional Advantage Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enable your people to work from anywhere, securely with Microsoft 365.
2 out of 19
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
3 out of 19
Security Assessment - 5-Day Assessment
QUORUM SYSTEMS PTY LTD
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
The outcome of this assessment is a documented security assessment work plan with steps, tools and procedures used to conduct the assessment.
4 out of 19
Discover Sensitive Data: 5-Week Workshop
Rackspace
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
5 out of 19
Conditional Access & MFA 5d Proof of Concept
Generation-e Productivity Solutions Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conditional Access and Multi Factor Authentication deployed without negatively impacting users. We setup the environment then deploy 5 devices plus train you how to do the rest.
6 out of 19
Data#3 Defend against threats: - 8-weeks Implementation
Data#3 Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats using Microsoft Defender, Azure Defender and Azure Sentinel provides you with an integrated solution to protect your organisation.
7 out of 19
Mobile Endpoint Mgt: 1-Wk Accelerated Implement'n
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Corporate Mobile Devices (iOS, Android and macOS)
8 out of 19
Windows Endpoint Mgt: 1-Wk Accelerated Implement'n
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
9 out of 19
Defender for Office 365: 3-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
10 out of 19
iTop MDR 5-Week Implementation
登豐數位科技股份有限公司
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
協助您的企業快速的偵測惡意活動、使用者行為及各項由端點發起的惡意活動,即時探索弱點和錯誤的設定,以進行補救。
11 out of 19
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
12 out of 19
Threat Protection: 5-Week Workshop
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
An executive deep dive into security strategy, tailored to your organization.
13 out of 19
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
14 out of 19
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
15 out of 19
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
16 out of 19
Microsoft 365 Defender Enterprise Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Manage and Investigate Risk and Threat Protection
17 out of 19
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
18 out of 19
RFFR/ISO 27001 Risk & Compliance Assessment: 6-12 Months
eStorm Australia
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Become Right Fit for Risk (RFFR) & ISO 27001 accredited, address compliance risks, and secure your endpoint devices/users in Microsoft 365 with eStorm’s RFFR & ISO 27001 Risk & Compliance Assessment
19 out of 19
Previous
1
2
3