AppSource
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Aplicaciones
Categorías
Sectores
Servicios de consultoría
Asociados
Filtros
Borrar todo
Su ubicación
Productos (1)
Sectores
Tipo de servicio
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Vista
resultados relacionados en nubes del sector
.
Todos los resultados
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
1 out of 60
Endpoint Management Advisory Service: 6-Wk Implementation
Wragby Business Solutions & Technologies Limited
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
This advisory service enables organizations efficiently manage end points leveraging Microsoft Intune & Configuration Manager through assessments, 1-day workshops and six weeks deployment
2 out of 60
ANECT Security Monitoring and Response 3 Months PoC
ANECT a.s.
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
3 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefing
SMART business LLC
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
4 out of 60
BYOD Endpoint Mgt: 1-Wk Accelerated Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Bring Your Own Device (BYOD) capability
5 out of 60
BYOD Intune 1-Wk Accelerated Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Bring Your Own Device (BYOD) capability
6 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
7 out of 60
Red Canary Defend Against Threats Siem Plus XDR Workshop
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
8 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
9 out of 60
Microsoft 365 Risk 5-Days Assessment
KPCS CZ, s.r.o.
+3
Applicable to:
Compliance Advisory Services
Mobile Device Management
Threat Protection
Microsoft 365 Risk Assessment provides preventive and comprehensive check of the Customer's Microsoft 365 Environment.
10 out of 60
Active Directory Security on Demand
Comtrade System Integration
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
11 out of 60
Zero Trust Security Assessment: 10-Day Assessment
Chorus
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our zero trust security assessment reviews your security posture to give you a clear roadmap to adopt Microsoft 365 security solutions to remove vulnerabilities and improve your posture.
12 out of 60
Microsoft 365 Copilot Readiness: 8-Day Maturity and Technical Readiness Assessment
CISILION LTD
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
This engagement is designed to help ensure organisations have the essential, fundamental, intermediate, and advanced building blocks in place to ensure the best Copilot experience upon purchase/pilot.
13 out of 60
Solutions de Sécurité Microsoft : 4 semaines
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
14 out of 60
G Suite to Office 365 migration: 1-Hour Assessment
True.org Cloud
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
Assessment of your current G Suite environment to plan migration to Office 365
15 out of 60
Microsoft 365 Security Audit: 3-Day Assessment
Marathon Managed Services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security Health Check and Report. Analysis of Secure Score and adherence to the NCSC 14 security principles. Presentation of report to customer detailing Microsoft 365 security posture.
16 out of 60
Managed Extended Detection & Response for Workplace - Implementation
DXC
+1
Applicable to:
Threat Protection
Secure your business with Managed XDR for Workplace
17 out of 60
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
18 out of 60
Migrate to Microsoft Defender for Endpoint: 11-Wk Implementation
Computacenter (UK) Ltd - Hatfield HQ
+1
Applicable to:
Threat Protection
This service covers migration from your existing 3rd party end point protection solution to Microsoft Defender for Endpoint. Our approach ensures you have peace of mind with full visibility of the ste
19 out of 60
BUI Cyber MDR - 1 Day Discovery Workshop
BUI (Pty) Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
20 out of 60
Security Maturity Assessment - 4 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
21 out of 60
Zero Trust Baseline Implementation - 4 weeks
BDO Digital, LLC
+1
Applicable to:
Threat Protection
BDO Digital’s Zero Trust Baseline implementation will help your organization apply the Zero Trust framework necessary for addressing threats that arise in the modern workplace.
22 out of 60
Mobile Threat Defence 3 Week Assessment
BT Enterprise
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
MTD risk assessment using Microsoft 365 and Zimperium zIPS
23 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
24 out of 60
Office 365 Migration: 5 Days Workshop
Aeris Teknoloji A.S.
+3
Applicable to:
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Threat Protection
Migration workshop to the Cloud the Collaboration's Benefit for explaining the customers how to migrate their systems from third party products.
25 out of 60
Migrate to Microsoft Defender for Office 365: 11-Wk Implementation
Computacenter (UK) Ltd - Hatfield HQ
+1
Applicable to:
Threat Protection
This service covers the migration from your existing 3rd party email protection solution to Microsoft Defender for Office 365. Our service provides you with an end to end migration path that is flexib
26 out of 60
Ransomware & Supply Chain Incident Management: 12 Hour Assessment
Maureen Data Systems
+3
Applicable to:
Compliance Advisory Services
Knowledge & Insights
Threat Protection
Identify vulnerabilities within your organization, including those who pose a threat to your supply chain, provide & mature a tailored incident response & management program.
27 out of 60
Conscia Security Assessment: 1-2 Weeks Infra Assessment
Conscia A/S
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
We can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
28 out of 60
Microsoft Security Services:5-Wk Implementation
Energy Time LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Deploy&Configure Microsoft Security Services: Azure AD Premium features, Microsoft Defender Family, Endpoint Management, Information Protection
29 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
30 out of 60
OAAA Advanced Adversary Assesment-1 month assesment
Secure Nextgen Systems
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Learn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
31 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Conscia A/S
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
32 out of 60
Mobile Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Corporate Mobile Devices (iOS, Android and macOS)
33 out of 60
Windows Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
34 out of 60
Microsoft 365: 1 Day Secure Score and Tenant Review
Cobweb Solutions Ltd.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cobweb’s Secure Score and Tenant Review offers to help you gain visibility of your existing tenant configuration and outstanding security recommendations.
35 out of 60
MDR for Microsoft Defender
ADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.
+2
Applicable to:
Cloud Security
Threat Protection
Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
36 out of 60
Defender for IoT Operational Technology Discovery: 2-Hour Workshop
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT (OT) Discovery Workshop helps you understand the solution, the fit to your OT estate and potential threat posture improvements
37 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage Workshop
CGI Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
38 out of 60
Overwatch for Microsoft 365 Security: 12 Month Implementation
THREATSCAPE
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Overwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
39 out of 60
365SecurityREADY for Mid-Size Business: 6-8 Weeks Implementation
The Cloud Factory EMEA Ltd.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enabling a Secured & Connected Modern Workplace with Microsoft 365
40 out of 60
Microsoft 365 Security Essentials Implementation Service
Softcat
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Kick-starting your Microsoft 365 security position, aligning with industry best practice standards.
41 out of 60
365SecurityREADY for ISO 27001: 12-16 Weeks Implementation
The Cloud Factory EMEA Ltd.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get ISO 27001 Ready with Microsoft 365
42 out of 60
365SecurityREADY for Enterprise: 8-12 Weeks Implementation
The Cloud Factory EMEA Ltd.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Elevating Your Cloud Security with Microsoft 365
43 out of 60
True Managed Security Service- 3 day Workshop
true org cloud
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
You have a vision. We can help you secure it...
44 out of 60
Endpoint management with security: 4-day workshop
e-Plenish Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Demonstrating the value of Microsoft Intune, Microsoft Defender for Endpoint and the Azure AD Premium P1 features that come with Microsoft 365 E3 licensing
45 out of 60
Defend Against Threats with SIEM Plus XDR usage Workshop
Orange Cyberdefense UK Limited
+1
Applicable to:
Threat Protection
Our workshop will help you designing and deploying Microsoft security technologies for your unique needs.
46 out of 60
Managed Threat Detection [xdr] for Microsoft 365 Defender
Orange Cyberdefense UK Limited
+1
Applicable to:
Threat Protection
Implementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
47 out of 60
UK Managed Workspace Protection for Microsoft 365 Defender
Orange Cyberdefense UK Limited
+1
Applicable to:
Threat Protection
Implementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
48 out of 60
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
49 out of 60
Microsoft Defender for Endpoint Implementation
SIX DEGREES TECHNOLOGY GROUP LTD
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
Strengthen cyber security defences through advanced endpoint detection and response.
50 out of 60
Onesec’s Secure Access to Microsoft 365 with Zscaler
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
51 out of 60
Threat Protection - 2 Days Workshop
Mayasoft Bilgi Sistemleri A.S.
+2
Applicable to:
Cloud Security
Threat Protection
We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
52 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
53 out of 60
Atech Microsoft 365 Security Assessment
Atech Support
+2
Applicable to:
Cloud Security
Threat Protection
With 10 years+ experience Atech have developed an assessment which provides us with a benchmark to design and deliver your secure journey to maximising the potential of Microsoft 365
54 out of 60
Atech Microsoft Data Security Engagement
Atech Support
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Data Security Engagement, delivered by Atech, gives you the insights you need to understand data security, privacy and compliance risks in your organization.
55 out of 60
Atech Microsoft Threat Protection Engagement
Atech Support
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement will provide the help organisations need to achieve achieve security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR workshop
56 out of 60
Managed Detection and Response [Threat Hunting]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Inspect events in your network to locate threat indicators and entities
57 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for Endpoint
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
58 out of 60
Microsoft Value Realisation Assessment – Security: 2-Wk Assessment
Telstra Limited
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your IT estate with Microsoft. Identify the gaps and overlaps in your security solutions, strengthen your protection and cut your costs.
59 out of 60
Microsoft Defender for Office 365: 1-hour briefing
Reply
+2
Applicable to:
Cloud Security
Threat Protection
Free one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Office 365
60 out of 60
Anterior
1
2
3
4
5
Siguiente