AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
Defend Against Threats with SIEM Plus XDR: 3-Day Usage Workshop
CGI Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
1 out of 60
Windows 365 Cloud PC: 4-weeks Implementation
Elgon S.A.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Windows 365 Cloud PC - Securely stream your Windows experience
2 out of 60
Sécurisation des identités Entra: 4 semaines Implémentation
Artemys
+1
Applicable to:
Identity & Access Management
Améliorer la s écurité de l’identité Entra (ex Azure Active Directory) et construire les bases du modèle Zero-Trust dans l’environnement Microsoft 365.
3 out of 60
Audit de la sécurité des identités Azure Active Directory: 5 jours
Artemys
+1
Applicable to:
Identity & Access Management
Evaluer votre posture de sécurité Zero Trust, identifier les faiblesses et les recommandations de la plateforme de gestion de l'identité Azure Active Directory
4 out of 60
Microsoft 365 Security - 5-Day Implementation
SCC FRANCE
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Define and Deploy all MIcrosoft 365 features Azure AD Premium, MFA et Accès conditionnel Defender for Office 365 Microsoft Intune Defender for Endpoint Information Protection
5 out of 60
Microsoft 365 Assisto: 12 mois implémentation
Artemys
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Nous vous accompagnons dans l'exploitation, le maintien en condition opérationnel et les évolutions de votre plateforme Microsoft 365
6 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
7 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY24
CGI Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
8 out of 60
IBM Digital Workforce Offering
IBM Consulting - EA
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Power Platform for Teams
IBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
9 out of 60
Managed Services: M(x)DR for Microsoft 365 Defender
Cegeka NV
+2
Applicable to:
Identity & Access Management
Threat Protection
Introducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
10 out of 60
Intune Secure Score: 1-Week Assessment
WAKERS
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Mesurez en 1 semaine le niveau de sécurité de votre environnement Intune
11 out of 60
[Copilot for Microsoft 365: Proof of Value]
Computacenter Plc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Proof of Concept/Proof of Value on Copilot for Microsoft 365 - Duration 15 days - Focus on CIO and IT managers for large companies
12 out of 60
Gestion Unifiée des Terminaux : 2 semaines de Proof of Concept
Econocom Products & Solutions Belux
+2
Applicable to:
Identity & Access Management
Mobile Device Management
Audit fonctionnel et technique de l'environnement de gestions des terminaux (desktop, laptop et mobile).
13 out of 60
Audit de sécurité : 5 jours
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Evaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
14 out of 60
POC Securité IT : 2 semaines
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Validation des capacités des solutions de sécurité Microsoft dans votre environnement
15 out of 60
[Data security for Copilot for Microsoft 365]
Computacenter Plc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Customer Data Security Workshop for Copilot for Microsoft 365 - Duration 15 days - Focus on CIO and IT managers for large companies
16 out of 60
Solutions de Sécurité Microsoft : 4 semaines
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
17 out of 60
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
18 out of 60
Microsoft Cloud application security Assessment - 2 weeks
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
19 out of 60
Manage Corporate Data on Devices with Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Can you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
20 out of 60
Information Protection with Microsoft Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Boost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
21 out of 60
Microsoft Cloud Apps Security Solutions for Custom Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Know your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
22 out of 60
Data Access Control with MCAS
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
23 out of 60
Microsoft Cloud Application for 3rd Party Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
24 out of 60
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
25 out of 60
Microsoft Cloud Apps Security for Microsoft 365 Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
26 out of 60
Shadow IT discovery with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
27 out of 60
Threat Detection with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
28 out of 60
Microsoft 365 Defender for Endpoint Vulnerability Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
29 out of 60
Modern Desktop Management (5 jours) Assessment
Inetum (HO)
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
La prestation consiste à mener un assessment afin de réussir sa transformation vers la gestion moderne du poste de travail. Nous définirons une trajectoire technologique claire ensemble.
30 out of 60
Rackspace Security & Compliance 10-hr Assessment
Rackspace EMEA
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Rackspace helps you to identify potential risks in your current Microsoft 365 environment. Recommendations and improvement measures will be provided after the assessment.
31 out of 60
Intune for Windows: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
32 out of 60
MDM Health Check (Mobile OS Only): 2-week Assessment
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
33 out of 60
BYOD 365: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
The BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
34 out of 60
Zero Touch Provisioning: 3-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Zero-Touch Provisioning sets you up to ship devices straight to users, with auto-configuration occurring over the air on initial sign in.
35 out of 60
Advania: Intune Get Started: 2 d training and PoC
Advania AB
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Understand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
36 out of 60
Windows AutoPilot (5 jours) POC
Inetum (HO)
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Inetum accompagne ses clients dans leur transformation digitale et notamment sur la partie Modern Workplace en intégrant les services Cloud Azure et notamment Windows Autopilot
37 out of 60
G Suite to M365 Migration: 1-Day Proof of concept
true org cloud
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Proof of concept for migration from G Suite to Microsoft 365
38 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
39 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
40 out of 60
Microsoft Intune: 4-Wk Implementation Services
TechNet UC LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Microsoft Intune Design and Deployment Services
41 out of 60
Microsoft 365: 2-Week Assessment
Practical Solutions, Inc
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
42 out of 60
Modern Workplace Security 10-Wk Implementation
Wipro Ltd
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
43 out of 60
Intune & Configuration Manager - Co-Management (5 jours) POC
Inetum (HO)
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Inetum accompagne ses clients dans leur transformation digitale et notamment sur la partie Modern Workplace en intégrant les services Cloud Azure et notamment le Co-Management Intune
44 out of 60
Work - 12-wk Implementation
Wortell
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Work, the modern workplace as a service offering by Wortell on a pay-per-user-per-month basis
45 out of 60
Modern WorkPlace PME:15 days Implementation
Aurera
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Mise en place d’un environnement de travail collaboratif à l’état de l’art pour les PME, comprenant une plate-forme digitale et des outils permettant une facilité de gestion et de déploiement.
46 out of 60
Microsoft 365 Defender - 2Wk Assessment
METSYS
+2
Applicable to:
Identity & Access Management
Threat Protection
Audit et recommandations pour la sécurisation de vos environnements collaboratifs avec Microsoft 365 Defender
47 out of 60
Plan stratégique de sécurisation Workshop 1 day
GLOBAL INFO
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Construire ma réponse aux menaces avec Microsoft 365
48 out of 60
Azure AD Implentation in 8 weeks
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Identity & Access Management
Porovide a design and build capability that enables organisations to secure, control and simplify employee access to company data and sensitive resources resources from wherever they are.
49 out of 60
Modern Management: 4 week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Modern Management is a Microsoft 365 focused managed service that reduces cost, improves security and delights employees!
50 out of 60
Security Assessment Microsoft 365: 2day assessment
Prodware Group
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
A service for Office 365 and Microsoft 365 protection
51 out of 60
Office 365 GCC High Migration +Tenant Imp 4Wk
Summit 7 Systems, Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Companies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
52 out of 60
Microsoft 365 Security Envisioning - 1day workshop
Officeline SA
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Learn how to improve your organization’s security posture with Office Line’s Microsoft 365 Security 1-day Workshop.
53 out of 60
Change Management: 1-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Change Management is a proven methodology to deploy technology changes to large groups of diverse Microsoft 365 users.
54 out of 60
Modern Workplace - 1-Day Workshop
Synapsys
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Modern Workplace : 1-Day Workshop gives you access to a modern management of your workplace and identity management into an adaptable and cost-effective user-centric tool.
55 out of 60
Zero-Trust: 3-Day Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
56 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
57 out of 60
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
58 out of 60
Modern Device Management Implementation
DXC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Improve the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
59 out of 60
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
60 out of 60
Previous
1
2
3
4
Next