AppSource
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Aplicaciones
Categorías
Sectores
Servicios de consultoría
Asociados
Filtros
Borrar todo
Su ubicación
Productos (1)
Sectores (1)
Tipo de servicio
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Todos los resultados
Avanade Entra Verified ID Consulting Services FY24
Avanade, Inc.
+1
Applicable to:
Identity & Access Management
Microsoft Entra Verified ID is a Decentralized Identity implementation that streamlines any identity related process, simplifies it, reduce costs and increases convenience.
1 out of 18
Crayon Cloud Security Assessment: 3-Wk Assessment
Crayon
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Evaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
2 out of 18
Eviden Compliance Assessment (CSAT) zur Einhaltung der europäischen NIS-2-Richtlinie
Eviden International France - SAS
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
Unternehmen stehen vor der Herausforderung, die europäische NIS2-Richtlinie bis zur nationalen Umsetzungsfrist im Oktober 2024 umzusetzen.
3 out of 18
Office 365 GCC High Migration +Tenant Imp 4Wk
Summit 7 Systems, Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Companies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
4 out of 18
Active Directory Security on Demand
Comtrade System Integration
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
5 out of 18
Modern Device Management Implementation
DXC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Improve the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
6 out of 18
Azure AD Implentation in 8 weeks
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Identity & Access Management
Porovide a design and build capability that enables organisations to secure, control and simplify employee access to company data and sensitive resources resources from wherever they are.
7 out of 18
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
8 out of 18
Microsoft 365: 2-Week Assessment
Practical Solutions, Inc
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
9 out of 18
Protect Identity : 4 days assessment
Sopra Steria France
+1
Applicable to:
Identity & Access Management
4 days of assessment focused on identity protection in Azure & Microsoft 365
10 out of 18
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
11 out of 18
Microsoft 365 Security - 5-Day Implementation
SCC FRANCE
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Define and Deploy all MIcrosoft 365 features Azure AD Premium, MFA et Accès conditionnel Defender for Office 365 Microsoft Intune Defender for Endpoint Information Protection
12 out of 18
Azure AD Premium - 5-day - Implementation
SCC FRANCE
+2
Applicable to:
Cloud Security
Identity & Access Management
Configuration et sécurisation d'un Tenant Azure AD. Mise en place des bonnes pratiques de synchronisation, d'authentification et de sécurisation via Azure AD Premium.
13 out of 18
Plan stratégique de sécurisation Workshop 1 day
GLOBAL INFO
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Construire ma réponse aux menaces avec Microsoft 365
14 out of 18
Migration MSG vers Office 365,10J d'implémentation
BSD
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Vous souhaitez migrer depuis Lotus Domino/Gmail/Exchange vers Office 365
15 out of 18
Secure Remote Work: 3 Days Intro and Plan Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Engagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
16 out of 18
FONDATION ZERO TRUST - 2 Days Atelier
GLOBAL INFO
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Construire les fondations du modèle de sécurité « Zero Trust » avec la sécurité des identités
17 out of 18
CLOUD PC - 3 Days - Atelier
GLOBAL INFO
+2
Applicable to:
Cloud Security
Identity & Access Management
Offrez à vos employés l'accès à une expérience de bureau sécurisée, où qu'ils soient
18 out of 18