AppSource
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Aplicaciones
Categorías
Sectores
Servicios de consultoría
Asociados
Filtros
Borrar todo
Su ubicación
Productos (1)
Sectores (1)
Tipo de servicio
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Todos los resultados
Avanade Entra Verified ID Consulting Services FY24
Avanade, Inc.
+1
Applicable to:
Identity & Access Management
Microsoft Entra Verified ID is a Decentralized Identity implementation that streamlines any identity related process, simplifies it, reduce costs and increases convenience.
1 out of 21
IAM Roadmap - 4 Weeks Assessment
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Identity & Access Management
Develop an outcome-based, design-led IAM strategy to secure access to your resources with Azure identity and access management solutions.
2 out of 21
Crayon Cloud Security Assessment: 3-Wk Assessment
Crayon
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Evaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
3 out of 21
Eviden Compliance Assessment (CSAT) zur Einhaltung der europäischen NIS-2-Richtlinie
Eviden International France - SAS
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
Unternehmen stehen vor der Herausforderung, die europäische NIS2-Richtlinie bis zur nationalen Umsetzungsfrist im Oktober 2024 umzusetzen.
4 out of 21
Office 365 GCC High Migration +Tenant Imp 4Wk
Summit 7 Systems, Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Companies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
5 out of 21
Windows 365 Kickstarter: 2 WK Implementation
VNEXT Group
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Windows 365 Kickstarter – Hybrid Windows for a Hybrid World. An innovative solution that allows users to stream their apps, data, and settings to any device.
6 out of 21
Inviso KickStarter - Microsoft 365 E3 Adoption
Inviso Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Helping customers KickStart features in Microsoft 365 E3 Subscription
7 out of 21
Active Directory Security on Demand
Comtrade System Integration
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
8 out of 21
Modern Device Management Implementation
DXC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Improve the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
9 out of 21
Azure AD Implentation in 8 weeks
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Identity & Access Management
Porovide a design and build capability that enables organisations to secure, control and simplify employee access to company data and sensitive resources resources from wherever they are.
10 out of 21
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
11 out of 21
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
12 out of 21
Microsoft Entra Verified ID and Credivera: 3-day Planning Workshop
Oxford Computer Group LLC
+1
Applicable to:
Identity & Access Management
This Planning Workshop is designed to help you get started with a verifiable credentials solution using Credivera and Microsoft Entra Verified ID.
13 out of 21
Microsoft 365: 2-Week Assessment
Practical Solutions, Inc
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
14 out of 21
Microsoft Purview Records Management Assessment & Strategy for Government - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists government departments and agencies with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
15 out of 21
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
16 out of 21
Microsoft 365 Cybersecurity Jumpstart: 1Wk Implementation
BDO Canada
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ensure the right safeguards are in place. Secure your Microsoft 365 tenant through BDO Lixar’s security configuration services and the cloud provisioning expertise
17 out of 21
Enable Windows 365 Cloud PC
Cofomo
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
With the right endpoint modernization strategy and tools, employees get a secure experience on every mobile device, tablet, or laptop they’re using, all while eliminating major management headaches.
18 out of 21
Microsoft Defender for Identity Deployment: 1 Week Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
Identity & Access Management
Insider Risk
Identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
19 out of 21
Device Lifecycle Management: 1-Hour Assessment
WBM Technologies Inc.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
A Holistic Approach to Device Selection, Deployment, and Management
20 out of 21
Secure Remote Work: 3 Days Intro and Plan Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Engagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
21 out of 21