AppSource
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Aplicaciones
Categorías
Sectores
Servicios de consultoría
Asociados
Filtros
Borrar todo
Su ubicación
Productos (1)
Sectores
Tipo de servicio
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Vista
resultados relacionados en nubes del sector
.
Todos los resultados
Windows Autopilot 5 Day POC
Enabling Technologies Corporation
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Enabling Tech walks customers through the process of provisioning Intune/Autopilot settings to distribute PCs directly from OEMs to end-users, and to reduce the effort with building new machines.
1 out of 60
Modern Device Management Implementation
DXC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Improve the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
2 out of 60
The Modern IT Enterprise Security Five Day POC
Enabling Technologies Corporation
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
The Modern IT Enterprise Security 5 Day Proof-of-Concept provides a path to becoming a secure modern enterprise through strategic investments in both digital transformation and security enhancements
3 out of 60
Microsoft 365 License Optimization:1-hr Assessment
Frontier Technology, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Review current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
4 out of 60
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
5 out of 60
Aseguramiento de ciberseguridad: taller 4 semanas
Sofistic Colombia SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
6 out of 60
Endpoint Management: 8h Workshop
adaQuest
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Manage and protect your devices, your apps, and your users.
7 out of 60
BUI Cyber MDR - 1 Day Discovery Workshop
BUI (Pty) Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
8 out of 60
Threat Check: 4-Hr Workshop
Netrix Global
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
9 out of 60
Identity: 8H-Workshop Secure Identities & Devices
adaQuest
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure user identities and devices.
10 out of 60
Mergers and Acquisitions: 1-month implementation
Interlink Cloud Advisors, Inc.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Mergers and acquisitions are messy. Interlink will build the foundation for a smooth infrastructure consolidation process.
11 out of 60
Secure Workspace: 1 Day Workshop
Watserv Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
12 out of 60
Microsoft 365 Azure AD 3-wk Implementation Roadmap
Cyclotron Inc.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
13 out of 60
App Identity Evaluation: 8H Workshop
adaQuest
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure & manage your entire application estate.
14 out of 60
Okta Migration to Azure AD: 3-Week Assessment
Invoke
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
The Okta Migration to Azure AD Assessment offering is designed to assess & plan your migration efforts to your existing investments in Azure AD.
15 out of 60
Microsoft 365 Defender 10-week Implementation
Cyclotron Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender for enterprises, resulting in improved detection rates, threat coverage, and organizational security posture.
16 out of 60
Microsoft Endpoint Manager 10-wks Implementation
Cyclotron Inc.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Cyclotron's Endpoint Manager provides an introduction, education, and production-ready framework for IT teams to revolutionize their device management strategy and enhance their end user security.
17 out of 60
CSE Security Baseline 3 days implementation
Computer Solutions East
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
18 out of 60
Compliance Workshop Data Risk Management: 4 Weeks
Diverge IT
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
You will be guided by our Microsoft 365 experts who are trusted by Pro Sports teams, Hollywood studios, and businesses across America to help protect and govern data to achieve complete compliance.
19 out of 60
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
20 out of 60
Microsoft Security Immersion: 1 Day Briefing
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Knowing that your time is valuable, we have developed a true to life, hands-on, interactive session designed to give you a deep understanding of the Microsoft 365 Security suite of products.
21 out of 60
Mail Airlift: Exchange Online Implementation
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Our Mail Airlift engagement will get you up and running with Microsoft Exchange online in the fastest, most secure manner.
22 out of 60
Mailbox Guardian - Security: 2 Week Implementation
ProServeIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cybersecurity review and lockdown of Microsoft 365 environment. Monitor and provide implementation recommendations Protect against phishing and other attacks Review desired state configuration
23 out of 60
1-Day Security & Identity Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Tailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
24 out of 60
Ransomware Protection: 1 Day-Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
25 out of 60
Managed Services - Microsoft 365
ConvergeOne
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Fully utilize your Microsoft 365 Solution with all the Identity, Security, and Collaboration portions available to you
26 out of 60
Security Maturity Assessment - 4 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
27 out of 60
Collab Now: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
Collab Now (Microsoft 365) supports worker productivity by delivering and managing a unified and integrated collaboration platform
28 out of 60
Rapid Zero Trust Deployment : 8-WK Implementation
Maureen Data Systems
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
The purpose and objectives of this engagement are to develop a Zero Trust Implementation Strategy
29 out of 60
ThreatHunter Implementation 3 weeks
Enabling Technologies Corporation
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Microsoft Gold Partner Enabling Technologies provides ThreatHunter: consulting, configuration, and training services to help organizations protect, detect, and respond to risks.
30 out of 60
Microsoft 365: 4-Wk Zero Trust Assessment
Centric Consulting, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
An assessment of an organization's current state security posture for Microsoft 365.
31 out of 60
Modern Workplace Strategy: 12-Day Assessment
Perficient Inc
+2
Applicable to:
Identity & Access Management
Workplace Analytics
Together we assess your current environment and business goals, to provide best practices and recommendations that maximize your investment in Microsoft 365.
32 out of 60
Modern Identity Workshop | 4 Weeks | Workshop
Enterprise It Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Enable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
33 out of 60
Secure Remote Work: 3 Days Intro and Plan Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Engagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
34 out of 60
Securing Identities and Access: 3-day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
35 out of 60
Insight Managed Endpoint: Managed Service
Insight
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Insight’s Managed Endpoint service offers a modern and cost-effective approach to the administration and support of your new or existing endpoint management solution.
36 out of 60
Microsoft 365 Managed Services
Netrix Global
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
Netrix’s 24x7x365 managed services for Microsoft 365 combines a reactive service desk with proactive strategic planning to ensure your team is productive and secure.
37 out of 60
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
38 out of 60
Microsoft 365 Plan for Success:3-d Assessment
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
39 out of 60
Non-Profit Security Essentials : 1 Day Workshop
true org cloud
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
True.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
40 out of 60
Security Assessment: 2 Week Assessment
Tallan
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
41 out of 60
Avanade Hybrid Windows Endpoint Solutions FY24
Avanade, Inc.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Avanade has developed the next generation of endpoint solutions for the modern workforce, with integrated physical, virtual and hybrid solutions
42 out of 60
Accenture Modern Workplace Services
Accenture
+3
Applicable to:
Frontline Workers
Identity & Access Management
Meetings for Microsoft Teams
Accenture Modern Workplace Services
43 out of 60
GoDaddy Office 365 Defederation:1-D Implementation
Finchloom
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Convert your GoDaddy Office 365 tenant into a standard Microsoft Office 365 Tenant
44 out of 60
Enhance IT Security: 1-2-Wk Implementation
FMT Consultants
+2
Applicable to:
Cloud Security
Identity & Access Management
FMT offers a smart security solution that protects your business, your employees, and your clients while providing a reliable, scalable, and durable approach to keeping your business up and running.
45 out of 60
Secure Identities and Access: 8H Workshop
adaQuest
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An executive deep dive into foundational identity strategy, tailored to your customers’ organization.
46 out of 60
Retail Kiosk Program Workshop - 5 Days
CB5 Solutions
+3
Applicable to:
Frontline Workers
Identity & Access Management
Threat Protection
A secure kiosk management solution built for Zebra, Android and iOS devices in retail and finance services.
47 out of 60
Microsoft 365 Managed Service (EE): 4wk Implement
Rackspace
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Elastic Engineering for Microsoft 365: On-demand access to a team of email and productivity application experts that work with you to drive outcomes and continuously evolve your environment.
48 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
49 out of 60
Threat Protection: 2-Week Workshop
Forsyte IT Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
50 out of 60
Endpoint Modernization Quickstart Service
Dell Technologies Services
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Dell Quick Start service helps customers configure their environment and prepare it for Modern Device Management and Modern Provisioning.
51 out of 60
Guardian 365 Managed Security Services (Microsoft MXDR Verified)
Forsyte IT Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Protection is key to the security of your organization. Defend against threats with Guardian 365, your key to better managed security.
52 out of 60
Modern Device Management: 1 Month Implementation
HTG
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
HTG’s Device Management Configuration Pack rapidly deploys Microsoft Endpoint Manager to enable modern device management that keeps data secure on-premises and in the cloud.
53 out of 60
Security Assessment - 4-Week Assessment
Coretek Services
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Analysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
54 out of 60
Modern Workplace Assessment
HTG
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
This assessment supports businesses in their cloud journey to quickly develop or migrate into a modern cloud-based organisation by implementing a Software as a Service Strategy with Microsoft 365.
55 out of 60
Collaboration & Data Governance 4Wk Implementation
HTG
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
HTG’s Collaboration & Data Governance pack can help companies achieve the right balance of user freedom while ensuring compliance with corporate policies.
56 out of 60
Teams Hosted Direct Routing: 2-wk Implementation
Catapult Systems, LLC
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
Catapult Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
57 out of 60
Microsoft 365 Security: 1 Month Implementation
Valorem LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
A detailed baseline assessment of your current and desired state followed by a pilot production of Microsoft’s advanced security solutions to accelerate your modern security journey.
58 out of 60
Microsoft 365 Security: 3 Week Exec Workshop
Valorem LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
A strategic deep dive for security decision-makers to better understand, prioritize, and mitigate real-time threats in your environment.
59 out of 60
Zero Trust Foundation: 6 Week Implementation
Valorem LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Using Azure Active Directory and Microsoft 365 Security, our teams will custom design a zero trust foundation that advances your security posture, reduces risk and makes your environment more secure.
60 out of 60
Anterior
2
3
4
5
6
Siguiente