AppSource
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Aplicaciones
Categorías
Sectores
Servicios de consultoría
Asociados
Filtros
Borrar todo
Su ubicación
Productos (1)
Sectores
Tipo de servicio
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Vista
resultados relacionados en nubes del sector
.
Todos los resultados
Microsoft Defender for Cloud Apps: 1-hour briefing
Reply
+2
Applicable to:
Cloud Security
Threat Protection
Free one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Cloud Apps
1 out of 60
Microsoft Threat Protection Value Realisation Assessment: 1-Wk Assessment
Telstra Limited
+1
Applicable to:
Threat Protection
Strengthen your security posture, simplify your security portfolio, and secure your organisation with Microsoft Security solutions and our expert guidance.
2 out of 60
Copilot Data Protection
Cloud Life
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
3 out of 60
UNITE: Exploring E5 Security Workshop_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
UNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
4 out of 60
Data Security Pathfinder
SCC
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Threat Protection
Identify data security risks in your organisational data.
5 out of 60
Audit de sécurité : 5 jours
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Evaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
6 out of 60
POC Securité IT : 2 semaines
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Validation des capacités des solutions de sécurité Microsoft dans votre environnement
7 out of 60
Fitzrovia IT - Defender for Endpoint
Fitzrovia I.T. Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Fitzrovia IT will consult and configure and Defender for Endpoint for your business
8 out of 60
Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
9 out of 60
Email Security Threat Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
10 out of 60
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
11 out of 60
SharePoint and Teams Security - 2 week assessment
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Confident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
12 out of 60
Baseline Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Aware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
13 out of 60
Teams & SharePoint Security Hardening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
14 out of 60
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
15 out of 60
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
16 out of 60
Cyber Maturity Pathfinder
SCC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Strengthen your cybersecurity posture with our Cyber Maturity Pathfinder, assessing your current security stance, identifying vulnerabilities, and offering a roadmap for long-term defence.
17 out of 60
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
18 out of 60
Data Protection and Governance with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
19 out of 60
Phishing, Malware & Spam protection- 2 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
20 out of 60
Microsoft 365 Security: 2-Day Implementation
Cloud Direct
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
21 out of 60
Microsoft 365 Security: 9-Day Implementation
Cloud Direct
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An engagement that will setup Microsoft 365 with enterprise-level security & compliance policies to provide immediate levels of protection
22 out of 60
Microsoft 365 Security: 6-Day Implementation
Cloud Direct
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
23 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
24 out of 60
Microsoft 365 Incident Response - 5 Week Assessment
Protiviti
+2
Applicable to:
Cloud Security
Threat Protection
Assessing the advanced security capabilities of Microsoft 365
25 out of 60
Security Configuration Maintenance 2-Wks Imp
Insight Technology Solutions
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
A monthly Security Configuration Maintenance Service. This service will help to secure end-user devices more effectively based on Insight and Microsoft Security best practices.
26 out of 60
Enablement Support Implementation (Unit Based)
PowerONPlatforms Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
PowerON Enablement Support provides a unit/hour based support agreement for customers seeking increased ROI and expert support on their Microsoft 365 workloads (Unit/Hour Based, Annual Agreement)
27 out of 60
Endpoint Management - 3-Day enablement Workshop
BT Business
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
This workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
28 out of 60
Security Threat Check: 5-Day Assessment & Workshop
Chorus
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our security assessment identifies active and potential security threats and gives you a clear breakdown of which Microsoft 365 security products can be used to remediate active threats.
29 out of 60
Enterprise Mobility + Security - 2 week PoC
PowerONPlatforms Limited
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Proof of Concept designed to provide customers the most flexible way to explore, review and adopt Microsoft Security solutions across the Microsoft Enterprise Mobility + Security suites over 2 weeks
30 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
31 out of 60
Secure & Compliant Modern Workplace: 2 weeks Imp
Insight Technology Solutions
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
Based on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
32 out of 60
Zero-Trust: 3-Day Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
33 out of 60
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
34 out of 60
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
35 out of 60
Security Assessment for Microsoft 365: 5 Days
Chess Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Protect your data with Security Assessment of your Microsoft 365 subscription
36 out of 60
Managed Security Support: 5-days Implementation
Chess Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Managed security support using the latest technology from Microsoft and Chess Data Protect for Microsoft 365.
37 out of 60
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
38 out of 60
Incident Response: 24 Hour Implementation
Bytes Software Services
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Providing help with security incidents when you need it most.
39 out of 60
Security and Compliance Assessment
Agilisys Ltd
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Our Security & Compliance assessment helps you understand the threats you might be facing, reduce the risk of your business being interrupted, and as a result allow you to gain speed and efficiency.
40 out of 60
Managed Defender for Endpoint : 4-wk PoC
Bytes Software Services
+2
Applicable to:
Cloud Security
Threat Protection
Bytes Managed Defender for Endpoints provides proactive management with 24/7 detection and response to ensure appropriate response capabilities.
41 out of 60
Discover Sensitive Data: 5-Week Workshop
Rackspace
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
42 out of 60
Cybersecurity Awareness: 12 month implementation
Prodware Group
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
Cybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
43 out of 60
Mobile Endpoint Mgt: 1-Wk Accelerated Implement'n
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Corporate Mobile Devices (iOS, Android and macOS)
44 out of 60
Windows Endpoint Mgt: 1-Wk Accelerated Implement'n
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
45 out of 60
Microsoft 365 Modern Workplace: 4Wk Implementation
Stripe OLT Consulting Ltd
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Microsoft 365 has been designed to help your organisation excel in a remote working world - Our team of gold certified Microsoft experts are here to support it's implementation.
46 out of 60
Modern Desktop Management Managed service
SIX DEGREES TECHNOLOGY GROUP LTD
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Secure end-to-end device management service from a trusted Microsoft Expert MSP.
47 out of 60
Defender for Office 365: 3-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
48 out of 60
Zero Trust Identity: 5 day Implementation
Corporate Project Solutions
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
CPS' Security, Compliance, & Identity (SCI) team will work with you to identify how Microsoft 365 Zero Trust identity management can be implemented within your Security strategy.
49 out of 60
Endpoint Management: 5 Day Implementation
Corporate Project Solutions
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Our Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Device Management sits within your Security & Compliance strategy.
50 out of 60
Compliance and Identity: 5 day Implementation
Corporate Project Solutions
+2
Applicable to:
Identity & Access Management
Threat Protection
Our Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where SCI sits within your Cyber Security strategy.
51 out of 60
Compliance Microsoft 365: 5 Day Implementation
Corporate Project Solutions
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Our Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Information Protection & Governance sits within your Compliance strategy. They
52 out of 60
Microsoft 365 Risk Management 5 day Implementation
Corporate Project Solutions
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Our Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Risk Management sits within your Compliance strategy.
53 out of 60
Microsoft 365 Threat Protect: 5 Day Implementation
Corporate Project Solutions
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Our Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Threat Protection sits within your Cyber Security strategy.
54 out of 60
Security Accelerator: 5-Day Workshop
Ricoh UK Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Provides insight and rates risk to existing security posture & delivers a roadmap to improvement
55 out of 60
Threat Protection: 5-Week Workshop
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
An executive deep dive into security strategy, tailored to your organization.
56 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
57 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
58 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Nil d.o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
59 out of 60
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
60 out of 60
Anterior
1
2
3
4
5
Siguiente