AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
Zero-Trust: 3-Day Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
1 out of 60
Azure AD Implentation in 8 weeks
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Identity & Access Management
Porovide a design and build capability that enables organisations to secure, control and simplify employee access to company data and sensitive resources resources from wherever they are.
2 out of 60
Windows 11 Assessment: 1-WK
Steeves
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
3 out of 60
Capgemini Modern Workspace Portfolio
Capgemini Group
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Capgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
4 out of 60
Collaborative Apps: 3 - W Workshop
Exelegent
+3
Applicable to:
Identity & Access Management
Power Platform for Teams
Teamwork Deployment
Build Solutions for your Customers to drive organizations goals and create collaborative experiences.
5 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
6 out of 60
Journey to Microsoft 365: 4-Wk - Workshops
Econocom Products & Solutions Belux
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Offer composed of Workshops divided in 4 parts : Part 1 : Define your vision Part 2 : Define your roadmap based on your use cases Part 3 : Formalise a project plan Part 4 : Summary for CxO lvl
7 out of 60
CDA as a Service on Microsoft 365: 3 weeks implementation
INDACON S.R.L.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Teams Custom Solutions
CDA as a Service is a Cloud-based platform that allows the management of every Board of Directors phase in a single workspace
8 out of 60
NextGen Workplace 5-day Fit gap Assessment
Spikes NV
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Teamwork Deployment
This fit gap assessment maps the current processes and maps them against the processes that are needed to arrive at the NextGen solution.
9 out of 60
SEIDOR Modern Workplace with Microsoft 365 1-Month Implementation
SEIDOR SA
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
We promote and respond to the current needs of companies in terms of mobility, security, productivity, communication and collaboration through the evolution of their workstations
10 out of 60
Hybrid Workspace - 3 days workshop
CTAC B.V.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Get off to a flying start with Office 365 or Microsoft 365. This product is the starting point for secure and smart digital working using Microsoft 365 in its entirety or Office 365 in particular
11 out of 60
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
12 out of 60
Microsoft 365 Security: 2-Hour Workshop
SNOMANN, UAB
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Free 2-hour workshop assessment to review your Microsoft 365 environment and provide recommendations.
13 out of 60
Microsoft Security Services:5-Wk Implementation
Energy Time LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Deploy&Configure Microsoft Security Services: Azure AD Premium features, Microsoft Defender Family, Endpoint Management, Information Protection
14 out of 60
Digital Security:1 Months Assessment
Atos International SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital Security, expertise : Cyber Sécurité Services, Systèmes critiques, IAM, Cloud Security, 6000 personnes dédiées
15 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
16 out of 60
1ID Platform for EDU
Telelink Business Services EAD
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
17 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage Workshop
CGI Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
18 out of 60
Windows 365 Cloud PC: 4-weeks Implementation
Elgon S.A.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Windows 365 Cloud PC - Securely stream your Windows experience
19 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
20 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY24
CGI Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
21 out of 60
IBM Digital Workforce Offering
IBM Consulting - EA
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Power Platform for Teams
IBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
22 out of 60
Managed Services: M(x)DR for Microsoft 365 Defender
Cegeka NV
+2
Applicable to:
Identity & Access Management
Threat Protection
Introducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
23 out of 60
Intune Secure Score: 1-Week Assessment
WAKERS
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Mesurez en 1 semaine le niveau de sécurité de votre environnement Intune
24 out of 60
Audit de sécurité : 5 jours
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Evaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
25 out of 60
POC Securité IT : 2 semaines
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Validation des capacités des solutions de sécurité Microsoft dans votre environnement
26 out of 60
Solutions de Sécurité Microsoft : 4 semaines
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
27 out of 60
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
28 out of 60
Microsoft Cloud application security Assessment - 2 weeks
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
29 out of 60
Manage Corporate Data on Devices with Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Can you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
30 out of 60
Information Protection with Microsoft Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Boost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
31 out of 60
Microsoft Cloud Apps Security Solutions for Custom Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Know your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
32 out of 60
Data Access Control with MCAS
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
33 out of 60
Microsoft Cloud Application for 3rd Party Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
34 out of 60
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
35 out of 60
Microsoft Cloud Apps Security for Microsoft 365 Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
36 out of 60
Shadow IT discovery with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
37 out of 60
Threat Detection with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
38 out of 60
Microsoft 365 Defender for Endpoint Vulnerability Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
39 out of 60
Identity Security Maturity: 6-day Assessment
Resilient Security
+1
Applicable to:
Identity & Access Management
Identity security maturity assessment to align business, processes and technology in an actionable roadmap and get the maximum out of your Azure Active Directory investment.
40 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
41 out of 60
Work - 12-wk Implementation
Wortell
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Work, the modern workplace as a service offering by Wortell on a pay-per-user-per-month basis
42 out of 60
Modern WorkPlace PME:15 days Implementation
Aurera
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Mise en place d’un environnement de travail collaboratif à l’état de l’art pour les PME, comprenant une plate-forme digitale et des outils permettant une facilité de gestion et de déploiement.
43 out of 60
SecWise Assess for Workplace: 5-Day Security Assessment
SecWise
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
An assessment of your modern workplace set-up to make sure it matches cyber security standards and best-practices.
44 out of 60
Microsoft 365 Security Envisioning - 1day workshop
Officeline SA
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Learn how to improve your organization’s security posture with Office Line’s Microsoft 365 Security 1-day Workshop.
45 out of 60
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
46 out of 60
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
47 out of 60
Securing Identities and access Workshop including FastTrack guidance
Xylos
+1
Applicable to:
Identity & Access Management
Our 4-day Identity Security workshop is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
48 out of 60
Microsoft 365 Security Scan: 3d Assessment
Ordina
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The result of the multi-day assessment will be a risk-based advise focusing on recommendations and a roadmap to increase the security posture of your Modern Workplace.
49 out of 60
Portfolio Rationalisation: 10-Wk Implementation
PricewaterhouseCoopers UK
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Manage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
50 out of 60
Secure Digital Workplace: 4 Day Workshop
Devoteam NV/SA
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
An assessment to quickly have an overview of your security posture.
51 out of 60
Identity workshop: 4-days Workshop
Devoteam NV/SA
+1
Applicable to:
Identity & Access Management
Continuously improve the security posture of your Azure AD by using an agile and iterative approach
52 out of 60
Modern Identity Kickstarter Workshop (3 days)
The Collective Consulting BV
+2
Applicable to:
Cloud Security
Identity & Access Management
This workshop helps you to address and modernize your identity and access management strategy, using Microsoft 365 and Azure AD capabilities.
53 out of 60
Security Priority Assessment : 2 day assessment
Inetum-Realdolmen - Modern Work & Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 day assessment to list and prioritization of your security needs resulting in step-by-step overview to tackle security projects
54 out of 60
Get Started with SharePoint 1/2-Day Workshop
ConXioNOne
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
After this 1/2 day-workshop you know whatSharePoint is and how it could help improve your document structure and teamwork within your SMB or enterprise organization.
55 out of 60
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
56 out of 60
License Optimization 4-Hour Workshop
ConXioNOne
+3
Applicable to:
Identity & Access Management
Knowledge & Insights
Teamwork Deployment
During this 4-hour workshop we optimize your Microsoft 365 licenses within your SMB or enterprise organization.
57 out of 60
FastTrack Kick-start Microsoft 365 - 2h - Workshop
Xylos
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Xylos FastTrack envisioning workshop helps organizations accelerate deployment, migration, and adoption of their Microsoft 365 subscriptions at no additional cost.
58 out of 60
Endpoint Rollout Management 4-Hour Implementation
ConXioNOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
During this 4-hour implementation we will implement Microsoft Intune within your SMB or enterprise organization.
59 out of 60
Protection des périphériques - 4-Week Implemention
EXAKIS NELITE
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Assurer la sécurisation des périphériques puisqu’ils sont une porte d’entrée du système d’information pour les attaquants.
60 out of 60
Previous
1
2
3
4
Next