AppSource
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Aplicaciones
Categorías
Sectores
Servicios de consultoría
Asociados
Filtros
Borrar todo
Su ubicación
Productos (1)
Sectores
Tipo de servicio
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Vista
resultados relacionados en nubes del sector
.
Todos los resultados
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days Implementation
HCL Technologies Limited.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
1 out of 60
Defender for Endpoint Managed Service
e2e-assure Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
2 out of 60
Manufacturing Ind., Modern Workplace: 2-Days Workshop
Cloudica
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
This workshop will cover how Microsoft 365 technologies can be used to meet Manufacturing company objectives such as increased efficiency and productivity, increased employee collaboration, and others
3 out of 60
Copilot for Microsoft 365: 3-Day Workshop
Quadrasystems.net (India) P Ltd
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Knowledge & Insights
We help businesses to harness the power of AI in a purposeful and outcome-oriented way. Our workshop helps organizations to prepare, plan, deploy, and adopt AI for tangible business outcomes.
4 out of 60
IN - Crayon's SharePoint Assessment Service
Crayon
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Knowledge & Insights
Crayon's SharePoint Assessment enhances architecture, performance, security, usability, and migration readiness, delivering expert insights for optimization.
5 out of 60
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
6 out of 60
Sensitive Data Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Sensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
7 out of 60
Phishing, Malware & Spam protection- 2 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
8 out of 60
Microsoft 365 Security 4 Weeks Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
9 out of 60
Microsoft 365 Security and Compliance Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Microsoft 365 Security and Compliance Assessment evaluates your current security posture, identifies vulnerabilities, and offers tailored solutions to enhance your data security and compliance.
10 out of 60
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
11 out of 60
Securing Copilot for Microsoft 365 in Microsoft 365 for Business 1hour Implementation
true org cloud
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
The security, compliance, and privacy policies that you have in place are adopted by Copilot for Microsoft 365.
12 out of 60
Microsoft 365 Security Assessment: 2 Week Assessment
Kontex Security Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
13 out of 60
Healthcare Ind., Modern Workplace: 2-Days Workshop
Cloudica
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
This workshop will cover how Microsoft 365 technologies can be used to meet Healthcare company objectives such as increased efficiency and productivity, increased employee collaboration, and others.
14 out of 60
Modern Workplace Security: 8 Wks Implementation
Noventiq
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
Noventiq's Microsoft 365 cybersecurity team can provide full cycle of services: implementation support, penetration testing and security awareness.
15 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
16 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security Services
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
17 out of 60
Microsoft 365 Copilot services - 3 days Workshop
Hitachi Systems India Private Limited
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Knowledge & Insights
Assessment Workshop as a Service, crafted to ready your organization for the Microsoft 365 Copilot. This service covers all ensuring your organization is geared up for Microsoft 365 Copilot
18 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und Ausarbeitung
AppSphere AG
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Vom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
19 out of 60
Copilot Data Protection
Cloud Life
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
20 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
21 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk Worshops
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
22 out of 60
True Managed Security Service- 3 day Workshop
true org cloud
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
You have a vision. We can help you secure it...
23 out of 60
Modern Workplace Security: 8 Wks Implementation
JSC Softline Trade
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Softline Microsoft 365 cybersecurity team can provide full cycle of services: implementation, support, penetration testing and security awareness
24 out of 60
GoDaddy to Direct Microsoft 365 Migration 2 Hrs Proof of Concept
true org cloud
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Remove GoDaddy and other third-party entities from your tenant, reclaiming internal control over your systems.
25 out of 60
Security and compliance assessment with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Fortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
26 out of 60
Microsoft 365 Email Threat Protection Assessment
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
27 out of 60
SharePoint and Teams Security - 2 week assessment
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Confident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
28 out of 60
Quorum Cyber - Data Loss Prevention Managed Service using Microsoft Purview
Quorum Cyber
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
Quorum Cyber's Data Loss Prevention Managed Service leveraging the power of Microsoft Purview
29 out of 60
Information Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Our approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
30 out of 60
Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
31 out of 60
Energy Ind., Modern Workplace: 1-Day Assessment
Cloudica
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
The Modern Workplace Assessment dedicate for Energy Industry assists customers in simplifying cloud adoption and mitigating risk.
32 out of 60
Healthcare Ind., Modern Workplace: 1-day Assessment
Cloudica
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
The Modern Workplace Assessment dedicate for Healthcare Industry assists customers in simplifying cloud adoption and mitigating risk.
33 out of 60
Finance Ind., Modern Workplace: 1-day Assessment
Cloudica
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
The Modern Workplace Assessment dedicate for Finance Industry assists customers in simplifying cloud adoption and mitigating risk.
34 out of 60
Manufacturing Ind., Modern Workplace: 1-day Assessment
Cloudica
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
The Modern Workplace Assessment dedicate for Energy Industry assists customers in simplifying cloud adoption and mitigating risk.
35 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefing
SMART business LLC
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
36 out of 60
Energy Ind., Modern Workplace: 2-Days Workshop
Cloudica
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Workplace Analytics
This workshop will cover how Microsoft 365 technologies can be used to meet Energy company objectives such as increased efficiency and productivity, increased employee collaboration, and others.
37 out of 60
HPT Mitigate Compliance and Privacy Risk_1-Day Workshop
HPT Vietnam Corporation
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Understand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
38 out of 60
SMART Workplace: 8-Day Information Architecture Design
Spanish Point Technologies
+3
Applicable to:
Information Protection & Governance
Knowledge & Insights
Teamwork Deployment
Design your organisations Information Architecture to improve communication and collaboration between employees, creating a sustainable workforce with high levels of talent retention.
39 out of 60
Google Workspace to Microsoft 365 Migration: 2 weeks
Tech Data Advanced Solutions (India) Private Limit
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Service deployment and configuration.
40 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process Adoption
Vitalyst
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
41 out of 60
Copilot for Microsoft 365 Readiness Engagement; 4-Wk Consultation
ProArch Technologies, Inc.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Information Protection & Governance
The 4-week Microsoft 365 Copilot Readiness Engagement includes a thorough evaluation of the organization’s readiness, licensing needs, use case alignment, and crafting an efficient roadmap.
42 out of 60
Teams & SharePoint Security Implementation
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Teams Custom Solutions
Workplace Analytics
Confident in your Teams and SharePoint security? Our solutions offer tailored protocols, threat detection, and monitoring to secure data, mitigate risks, and ensure compliance.
43 out of 60
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
44 out of 60
Microsoft 365 threat protection assessment
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Identify vulnerabilities and threats in Microsoft 365. Use advanced protection, intelligence, detection, and response to safeguard data. Enhance security with real-time insights and monitoring.
45 out of 60
Infra & Network Monitoring with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Boost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
46 out of 60
Unifying Microsoft Sentinel with Cloud Services
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
47 out of 60
Security Operations Center with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Monitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
48 out of 60
Integrating Microsoft Sentinel with External EDR Service
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
49 out of 60
Integrating Microsoft Sentinel with Carbon Black EDR
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Improve endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
50 out of 60
Application Monitoring Solution with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
51 out of 60
Protect and Manage data in personal devices using Intune
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
Leverage Microsoft Intune for tailored security measures, advanced threat detection, and real-time monitoring to safeguard sensitive data, mitigate risks, and ensure compliance.
52 out of 60
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
53 out of 60
Microsoft365 Adoption Services: 10-Wk Implementation
Bitscape
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Information Protection & Governance
Change adopt leveraging Microsoft 365 offerings by migrating and managing your existing productivity environment and Devices and achieve modernization.
54 out of 60
EM+S Consulting Services: 4-Weeks Implementation
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
We will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
55 out of 60
Endpoint Management Service: 3-hours Workshop
PEAKUP
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Mobile Device Management
Enterprise Mobility Workshop showcase value of secure remote work capabilties including device management, security and compliance standards.
56 out of 60
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
57 out of 60
Advanced eDiscovery : 10-Wks Implementation
Wipro Ltd
+2
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Wipro's Microsoft Advanced eDiscovery offering enable organizations to rapidly implement Microsoft 365 Advanced eDiscovery solutions to create and manage legal investigations seamlessly.
58 out of 60
Microsoft Purview Info Protection & Gov: 12 Weeks Implementation
Wipro Ltd
+1
Applicable to:
Information Protection & Governance
Discover your sensitive data in a hybrid environment to identify potential risks and implement adequate controls to safe guard your data leveraging Microsoft Purview Unified data governance.
59 out of 60
Discover Sensitive Data: 5-Week Workshop
Rackspace
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
60 out of 60
Anterior
1
2
3
Siguiente