AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
Cybersecurity: 3-Wks Quick-Assessment
Unipartner IT Services, S.A.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
1 out of 29
Microsoft 365 Security Review: 3-Wk Assessment
ProArch Technologies, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Identifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
2 out of 29
Microsoft 365 Security Hardening; 4-Wk Service
ProArch Technologies, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
The Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
3 out of 29
User Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
4 out of 29
Microsoft Threat Protection Workshop: 5-Wk Wrkshop
ProArch Technologies, Inc.
+1
Applicable to:
Threat Protection
Improve your Microsoft 365 security posture with a Microsoft Threat Protection Workshop
5 out of 29
Unified Endpoint Mgmt. - 6 Weeks - Implementation
TCS - Digital Workplace
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
TCS Unified Endpoint Management combines Microsoft Intune, Microsoft Defender for Endpoint and Configuration Manager solutions to provide modern management of endpoints with a Zero Trust strategy.
6 out of 29
Defend Against Threats with SIEM Plus XDR: 8H Workshop
adaQuest
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
7 out of 29
Threat Protection: 5-Week Workshop
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
An executive deep dive into security strategy, tailored to your organization.
8 out of 29
Microsoft 365 Licence Health Check: 1-Day Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
9 out of 29
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
10 out of 29
Zero-trust collaboration security 6wk Implement
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
11 out of 29
Zero-Trust Secure Email 6wk Imp
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
12 out of 29
microsoft365_security_identity_protection_1 Day_Workshop_Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Identity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to manage your access quickly and accurately
13 out of 29
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
14 out of 29
Microsoft 365 Security Device Protection 1 Day Workshop - Canada
CDW
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
As more and more users become mobile and are using a wider variety of devices, applications and documents need to keep up.
15 out of 29
Microsoft365_security_information_protection_1Day_Workshop_Canada
CDW
+2
Applicable to:
Cloud Security
Threat Protection
Information is one of your most valuable assets and can easily be shared, even outside the organization.
16 out of 29
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
17 out of 29
Microsoft 365 Security Identity Protection 1 Day Workshop- Canada
CDW
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Identity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to manage your access quickly and accurately.
18 out of 29
Microsoft 365 Security 1 Day Workshop- Canada
CDW
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Security is at the forefront of every organization’s concerns. A lack of security poses a real threat to your business.
19 out of 29
Microsoft Defender for Endpoint SMC Deployment: 4-Week Implementation
BlueVoyant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our services are designed to maximize your investment with Microsoft with hands-on onboarding & baseline configuration services.
20 out of 29
Microsoft 365 Defender Enterprise Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Manage and Investigate Risk and Threat Protection
21 out of 29
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
22 out of 29
Microsoft 365 Defender SMC Deployment: 4-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Let BlueVoyant take your security and compliance posture to the next level by deploying and optimizing Microsoft 365 Defender.
23 out of 29
Cybersecurity Assessment - 3 Weeks
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Microsoft Security Assessment: detect security problems and take targeted action
24 out of 29
Secure Hybrid Identity - Defender for Identity: 6 week Implementation
Performanta
+2
Applicable to:
Identity & Access Management
Threat Protection
Secure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
25 out of 29
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
26 out of 29
Microsoft Defender for Endpoint: 2-Wks Proof of Concept
Lotus Beta Analytics Nigeria Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Experience Threat identification, Triage and Automatic Remediation
27 out of 29
Device as a Service with Windows 11 and Intune: 4 Week Implementation
Cognizant
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Windows 10 has revolutionized how organizations manage operating systems, delivering the features that you have come to know and rely on, while enhancing mobility and agility without losing data.
28 out of 29
Endpoint Management Advisory Service: 6-Wk Implementation
Wragby Business Solutions & Technologies Limited
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
This advisory service enables organizations efficiently manage end points leveraging Microsoft Intune & Configuration Manager through assessments, 1-day workshops and six weeks deployment
29 out of 29
Previous
1
2
3
4