AppSource
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Aplicaciones
Categorías
Sectores
Servicios de consultoría
Asociados
Filtros
Borrar todo
Su ubicación
Productos (1)
Sectores
Tipo de servicio
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Vista
resultados relacionados en nubes del sector
.
Todos los resultados
Conscia Security Assessment: 1-2 Weeks Infra Assessment
Conscia A/S
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
We can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
1 out of 60
Microsoft Security Services:5-Wk Implementation
Energy Time LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Deploy&Configure Microsoft Security Services: Azure AD Premium features, Microsoft Defender Family, Endpoint Management, Information Protection
2 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
3 out of 60
Digital Security:1 Months Assessment
Atos International SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital Security, expertise : Cyber Sécurité Services, Systèmes critiques, IAM, Cloud Security, 6000 personnes dédiées
4 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefing
SMART business LLC
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
5 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
6 out of 60
HPT Mitigate Compliance and Privacy Risk_1-Day Workshop
HPT Vietnam Corporation
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Understand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
7 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage Workshop
CGI Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
8 out of 60
Microsoft Defender for Office 365: 4 days implementation
Centric Netherlands b.v.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deploy it to a group of users.
9 out of 60
Microsoft Defender for Endpoint: 4 days implementation
Centric Netherlands b.v.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Endpoint and deploy it to a group of devices.
10 out of 60
Microsoft Defender for Identity: 4 days implementation
Centric Netherlands b.v.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deployment of identity sensors.
11 out of 60
Microsoft Defender for Cloud Apps: 4 days implementation
Centric Netherlands b.v.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Cloud Apps and discover Cloud Apps
12 out of 60
Windows 365 Cloud PC: 4-weeks Implementation
Elgon S.A.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Windows 365 Cloud PC - Securely stream your Windows experience
13 out of 60
Defend Against Threats with SIEM Plus XDR usage Workshop
Orange Cyberdefense Belgium
+1
Applicable to:
Threat Protection
Our workshop will help you designing and deploying Microsoft security technologies for your unique needs.
14 out of 60
Managed Threat Detection [xdr] for Microsoft 365 Defender: 4 weeks implementation
Orange Cyberdefense Belgium
+1
Applicable to:
Threat Protection
Implementation of Microsoft Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
15 out of 60
Managed Workspace Protection for Microsoft 365 Defender: 4 weeks Implementation
Orange Cyberdefense Belgium
+1
Applicable to:
Threat Protection
Implementation of Microsoft Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
16 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
17 out of 60
Threat Protection - 2 Days Workshop
Mayasoft Bilgi Sistemleri A.S.
+2
Applicable to:
Cloud Security
Threat Protection
We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
18 out of 60
Managed Services: M(x)DR for Microsoft 365 Defender
Cegeka NV
+2
Applicable to:
Identity & Access Management
Threat Protection
Introducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
19 out of 60
Audit de sécurité : 5 jours
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Evaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
20 out of 60
POC Securité IT : 2 semaines
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Validation des capacités des solutions de sécurité Microsoft dans votre environnement
21 out of 60
Solutions de Sécurité Microsoft : 4 semaines
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
22 out of 60
Threat Protection: 2 week Engagement Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you
23 out of 60
Cybersecurity Assessment: Microsoft Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Understand your readiness for common security threats.
24 out of 60
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
25 out of 60
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
26 out of 60
Microsoft Cloud application security Assessment - 2 weeks
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
27 out of 60
Manage Corporate Data on Devices with Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Can you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
28 out of 60
Microsoft Cloud Apps Security Solutions for Custom Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Know your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
29 out of 60
Data Access Control with MCAS
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
30 out of 60
Microsoft Cloud Application for 3rd Party Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
31 out of 60
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
32 out of 60
Microsoft Cloud Apps Security for Microsoft 365 Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
33 out of 60
Shadow IT discovery with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
34 out of 60
Threat Detection with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
35 out of 60
Microsoft 365 Defender for Endpoint Vulnerability Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
36 out of 60
Security Configuration Maintenance 2-Wks Imp
Insight Technology Solutions
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
A monthly Security Configuration Maintenance Service. This service will help to secure end-user devices more effectively based on Insight and Microsoft Security best practices.
37 out of 60
SecWise Assess for Workplace: 5-Day Security Assessment
SecWise
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
An assessment of your modern workplace set-up to make sure it matches cyber security standards and best-practices.
38 out of 60
SecWise Protect (XDR): Microsoft 365 Defender Activation
SecWise
+1
Applicable to:
Threat Protection
Identify your Microsoft Threat Protection jump-start configuration based on our security maturity predefined Microsoft 365 Defender best-practice configurations.
39 out of 60
Secure & Compliant Modern Workplace: 2 weeks Imp
Insight Technology Solutions
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
Based on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
40 out of 60
Threat Protection - 4 Week Security Implementation
OBVUS
+1
Applicable to:
Threat Protection
Accelerate your implementation of Threat Protection with the Microsoft 365 Security Accelerator onboarding Services that are designed to get you up and running fast to maximize your investment.
41 out of 60
Microsoft 365 Security Envisioning - 1day workshop
Officeline SA
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Learn how to improve your organization’s security posture with Office Line’s Microsoft 365 Security 1-day Workshop.
42 out of 60
Microsoft Defender for Server:5-day Implementation
Delphi Consulting
+2
Applicable to:
Cloud Security
Threat Protection
Delphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
43 out of 60
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
44 out of 60
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
45 out of 60
Microsoft 365 Security Scan: 3d Assessment
Ordina
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The result of the multi-day assessment will be a risk-based advise focusing on recommendations and a roadmap to increase the security posture of your Modern Workplace.
46 out of 60
Security Priority Assessment : 2 day assessment
Inetum-Realdolmen - Modern Work & Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 day assessment to list and prioritization of your security needs resulting in step-by-step overview to tackle security projects
47 out of 60
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
48 out of 60
Defend against threats with SIEM plus XDR Workshop including FastTrack guidance
Xylos
+2
Applicable to:
Cloud Security
Threat Protection
Our 3-day Security workshop is meant to get an overview of the Security landscape, we use the Microsoft 365 security products and features to gain visibility into threats to your Microsoft 365.
49 out of 60
Endpoint Rollout Management 4-Hour Implementation
ConXioNOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
During this 4-hour implementation we will implement Microsoft Intune within your SMB or enterprise organization.
50 out of 60
Protection des périphériques - 4-Week Implemention
EXAKIS NELITE
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Assurer la sécurisation des périphériques puisqu’ils sont une porte d’entrée du système d’information pour les attaquants.
51 out of 60
Proximus Microsoft 365 Security Assessment
PROXIMUS NV/SA
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
With the Microsoft 365 Security Assessment, Proximus gives you a comprehensive insight offering you consistent information across different security risks.
52 out of 60
Discover Sensitive Data: 5-Week Workshop
Rackspace
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
53 out of 60
Sécurisation des identités - 3-Week Implementation
EXAKIS NELITE
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
54 out of 60
Protection des applications -4-Week Implementation
EXAKIS NELITE
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Une vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
55 out of 60
Cybersecurity Awareness: 12 month implementation
Prodware Group
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
Cybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
56 out of 60
Threat Protection: 2-Month Implementation
Officeline SA
+2
Applicable to:
Cloud Security
Threat Protection
Threat protection with Microsoft Defender products. We deliver a solution that improves and streamlines threat protection for every organization.
57 out of 60
Microsoft 365 Secure Score: 1-Week Assessment
WAKERS
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Mesurez en 1 semaine le niveau de sécurité de votre environnement Microsoft 365
58 out of 60
Répondre aux attaques - 3-Week Implementation
EXAKIS NELITE
+1
Applicable to:
Threat Protection
Cadrer les différentes attaques et risques afin d’en découler des solutions de sécurité et des chantiers.
59 out of 60
Defend against threats with SIEM + XDR Expert-as-a-service 1 y, Mgd svc
Xylos
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Xylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your Threat Protection environment based on Microsoft 365 technology.
60 out of 60
Anterior
1
2
3
4
Siguiente