AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
Onesec.AI
Secure Nextgen Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
It is your ally in artificial intelligence to enhance productivity, innovation and efficiency in organizations.
1 out of 40
Office 365: Setup, Demo Train: 3-Hr Implementation
true org cloud
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Gain a competitive edge and be more productive with a higher growth in your business with the help of True.org Cloud’s Microsoft 365 Business implementation.
2 out of 40
Secure Work from Anywhere Workshop
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Teamwork & collaboration are needed to build resilience for your people, teams, & organization. Empower people to be productive & secure as they adapt to new ways of working with Microsoft365
3 out of 40
Hybrid Identity and Security Expert Consulting Imp
Ravenswood Technology Group, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ravenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
4 out of 40
Device Lifecycle Management: 1-Hour Assessment
WBM Technologies Inc.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
A Holistic Approach to Device Selection, Deployment, and Management
5 out of 40
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
6 out of 40
QC Education- Threat Protection - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #14 and provide high-level recommendations to achieve compliance.
7 out of 40
QC Education- Identity Management- 2Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #4 and provide high-level recommendations to achieve compliance.
8 out of 40
Quebec Education - DLP - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #5 and #6 and provide high-level recommendations to achieve compliance.
9 out of 40
Mobile Device Management - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #1, #2 and #3 and provide high-level recommendations to achieve compliance.
10 out of 40
QC Education Security Directives -1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This one day GAP Analysis will help you assess your current state of compliance for Quebec Ministry of Education Security Directives and provide high-level recommendations to address any shortcomings.
11 out of 40
Secure Workspace: 1 Day Workshop
Watserv Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
12 out of 40
Secure Work from Anywhere Workshop: 1 day-Workshop
Insight Canada Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Discuss the most critical steps for remote work, and how we can rapidly deploy key scenarios. We’ll evaluate your options and leave you with a concrete deployment plan and next steps.
13 out of 40
Teams FastStart: 1-Wk Implementation
Insight Canada Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Teams FastStart is a Teams Enablement and Pilot that will enable your users to start collaborating and communicating using Microsoft's Teams platform.
14 out of 40
Enterprise Identity and Governance -1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Avaleris developed a Capability Maturity Model to help organizations quickly assess the current state of Identity Management and Governance policies, procedures and technology against best practice.
15 out of 40
Information Protection - 1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Avaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Information Protection policies, procedures and technology against best practices.
16 out of 40
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
17 out of 40
Collab Now: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
Collab Now (Microsoft 365) supports worker productivity by delivering and managing a unified and integrated collaboration platform
18 out of 40
Rapid Zero Trust Deployment : 8-WK Implementation
Maureen Data Systems
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
The purpose and objectives of this engagement are to develop a Zero Trust Implementation Strategy
19 out of 40
Fusion AD Carve-In Carve-Out : 3m - implementation
Projetlys
+1
Applicable to:
Identity & Access Management
Dans une logique de forte croissance et une rationalisation des coûts, de vos environnements, vous souhaitez regrouper vos services IT ? Projetlys vous propose une démarche d’accompagnement.
20 out of 40
Security Maturity Assessment: 4 Wks
Lixar IT
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Let BDO help you design your roadmap to increase your security score with cost-effective security tools with our 4 week Security Maturity Assessment
21 out of 40
Microsoft 365 Managed Service (EE): 4wk Implement
Rackspace
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Elastic Engineering for Microsoft 365: On-demand access to a team of email and productivity application experts that work with you to drive outcomes and continuously evolve your environment.
22 out of 40
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
23 out of 40
Endpoint Management: 5-Days Workshop
VNEXT Group
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Learn how to manage users’ devices, apps, and identities from anywhere.
24 out of 40
Identity & Access Management : 6 Wk Implementation
Happiest Minds Technologies Limited
+1
Applicable to:
Identity & Access Management
End to end Microsoft IAM Analysis & License Utilization, Plan- Deploy- Implement & Roll Out Microsoft IAM Suite, followed by ongoing managed services.
25 out of 40
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
26 out of 40
Zero-trust collaboration security 6wk Implement
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
27 out of 40
Zero-Trust Secure Email 6wk Imp
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
28 out of 40
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
29 out of 40
microsoft365_security_identity_protection_1 Day_Workshop_Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Identity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to manage your access quickly and accurately
30 out of 40
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
31 out of 40
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
32 out of 40
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POC
Bitscape
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
33 out of 40
Accelerate Windows 365: 1-mo Proof of Concept
AMTRA Solutions Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Accelerate Windows 365 offers innovative management capabilities for your environment and optimizes your existing investment in cloud solutions.
34 out of 40
Microsoft Defender for Endpoint: 2-Wks Proof of Concept
Lotus Beta Analytics Nigeria Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Experience Threat identification, Triage and Automatic Remediation
35 out of 40
Windows 365 Cloud PC 10-Days PoC
Sonata Information Technology Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Paid Assessment and PoC to deploy and use Windows 365 Cloud PC
36 out of 40
Microsoft 365 E3 12-Months Implementation
Office Depot
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
Connected Workplace for All Users with Microsoft 365 E3 Bundle
37 out of 40
Assessment - Workplace Modernization & Optimization - 1-Month
Zones, LLC
+3
Applicable to:
Calling for Microsoft Teams
Compliance Advisory Services
Identity & Access Management
Analysis of current environment to highlight opportunities to reduce duplicative cost and modernize your workplace
38 out of 40
Information Discovery Week: 1-Week Assesment
Cipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
One of the big problems that all organizations encounter is the classification of information and its discovery. From Cipher we offer a service, which performs this function for a short period.
39 out of 40
Assessment-Implementation Plan for Information Protection: 3-Months Assesment
Cipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
40 out of 40
Previous
1
2
3
4