AppSource
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Aplicaciones
Categorías
Sectores
Servicios de consultoría
Asociados
Filtros
Borrar todo
Su ubicación
Productos (1)
Sectores
Tipo de servicio
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Vista
resultados relacionados en nubes del sector
.
Todos los resultados
Security Assessment - 4-Week Assessment
Coretek Services
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Analysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
1 out of 60
Mailbox Guardian - Security: 2 Week Implementation
ProServeIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cybersecurity review and lockdown of Microsoft 365 environment. Monitor and provide implementation recommendations Protect against phishing and other attacks Review desired state configuration
2 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
3 out of 60
Zero Trust Foundation: 6-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Accelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
4 out of 60
EMS Energize: 1-month proof of concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Interlink Cloud Advisors’ EMS Energize engagement provides you with security experts who can help guide your business into a secure, productive cloud platform.
5 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
6 out of 60
Endpoint Management Advisory Service: 6-Wk Implementation
Wragby Business Solutions & Technologies Limited
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
This advisory service enables organizations efficiently manage end points leveraging Microsoft Intune & Configuration Manager through assessments, 1-day workshops and six weeks deployment
7 out of 60
Virteva Microsoft 365 Defender Ready Deploy
Virteva LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
8 out of 60
Microsoft Sentinel Proof of Concept: 4 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand how prepared is your Microsoft infrastructure when adversaries attack
9 out of 60
Cyber Security Services 9 days Assessment
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
10 out of 60
Windows as a Service: 4-Wk Implementation
AMTRA Solutions Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Secure your data and devices, identities and your business with Windows 10/11.
11 out of 60
Managed Microsoft 365: 12-MO Briefing
Egroup, Inc.
+3
Applicable to:
Calling for Microsoft Teams
Mobile Device Management
Threat Protection
Get the expertise needed to successfully manage Microsoft 365 with eGroup Enabling Technologies, LLC. Managed Microsoft 365.
12 out of 60
Advanced Email Security: 4-Day Implementation
FSI Strategies
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Leverage Microsoft Defender for Office 365 to implement best in class email security
13 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
14 out of 60
MDR for Microsoft Sentinel + XDR-5 Week Implementation
KiZAN Technologies
+2
Applicable to:
Cloud Security
Threat Protection
Implement Managed Threat Detection and Response Services with Microsoft Sentinel and Defender
15 out of 60
OAAA Advanced Adversary Assesment-1 month assesment
Secure Nextgen Systems
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Learn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
16 out of 60
Solution Assessment for Security: 30 Day
Concurrency, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
An assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
17 out of 60
ANECT Security Monitoring and Response 3 Months PoC
ANECT a.s.
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
18 out of 60
Entra Permission Risk Assessment
adaQuest
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your Multi-Cloud Environment with Microsoft Entra by automating the remediation of Permissions. Get a comprehensive visibility into permissions assigned to all identities on your organization.
19 out of 60
BYOD Intune 1-Wk Accelerated Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Bring Your Own Device (BYOD) capability
20 out of 60
Mobile Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Corporate Mobile Devices (iOS, Android and macOS)
21 out of 60
Windows Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
22 out of 60
cyber security threat analysis workshop
U-BTech Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
the workshop is design to discover threats and risks
23 out of 60
HPT_Microsoft Cyber Security Assessment_2 week
HPT Vietnam Corporation
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Strengthen your firm's defenses with our all-in-one cybersecurity platform
24 out of 60
Defender for IoT Enterprise: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understanding risk with unmanaged IoT devices can be difficult. Our Defender for Enterprise IoT Proof of Concept helps you visualise and understand the threats to your environment.
25 out of 60
Defender for IoT Operational Technology Discovery: 2-Hour Workshop
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT (OT) Discovery Workshop helps you understand the solution, the fit to your OT estate and potential threat posture improvements
26 out of 60
Microsoft 365 Security: 2-week assessment
Mirai Security Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
27 out of 60
Cyber Insurer Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Uncover gaps and strengthen your position when applying for cyber insurance
28 out of 60
Microsoft Defender for Office Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
29 out of 60
Defend Against Threats with SIEM Plus XDR usage Workshop
Orange Business Services - Global
+1
Applicable to:
Threat Protection
Our workshop will help you designing and deploying Microsoft security technologies for your unique needs.
30 out of 60
Managed Threat Detection [xdr] for Microsoft 365 Defender
Orange Business Services - Global
+1
Applicable to:
Threat Protection
Implementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
31 out of 60
Zero Trust Defend Against Threats: 7-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Accelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
32 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk Assessment
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Leverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
33 out of 60
Microsoft 365 Protecting Corporate Identities: 5-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your organization from devastating breaches with Microsoft 365 identity solutions.
34 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week Program
Windows Management Experts, Inc.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
35 out of 60
Onesec’s Secure Access to Microsoft 365 with Zscaler
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
36 out of 60
Free Microsoft 365 Defender Suite 4–6-hour Proof of Concept
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
This free, 4–6-hour workshop will provide you with a hands-on experience using Microsoft 365 Defender, Microsoft Defender for Office 365, Microsoft Defender for Endpoint
37 out of 60
Intune Proof of Concept
Levacloud LLC
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
This free, 4–6-hour workshop will provide you with a hands-on experience using Microsoft Intune.
38 out of 60
Threat Protection - 2 Days Workshop
Mayasoft Bilgi Sistemleri A.S.
+2
Applicable to:
Cloud Security
Threat Protection
We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
39 out of 60
Defender for Office 365 Professional Security Services | Customized Deployment in as Little as 6-Weeks
Difenda
+2
Applicable to:
Information Protection & Governance
Threat Protection
Take the next step in your Defender for Office 365 journey with Difenda, the 2023 Microsoft Security Impact Award Winner.
40 out of 60
Defender for Identity Professional Security Services | Customized Deployment in as Little As 6-Weeks
Difenda
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure Azure Active Directory with Difenda, the 2023 Microsoft Security Impact Award Winner.
41 out of 60
SecureBlu MDR Service for Microsoft 365 Defender
New Era Technology
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
42 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5
Collective Insights
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Upgrade to Microsoft 365 E5 for Advanced Productivity and Security
43 out of 60
Microsoft Intune Deployment
Secure Future Bilgi Tek. ve Hiz. Tic A.S.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
44 out of 60
iT1's Security Assessment
It1 Source LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Improve your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
45 out of 60
Managed Detection and Response [Security Monitoring]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
46 out of 60
Managed Detection and Response [Threat Hunting]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Inspect events in your network to locate threat indicators and entities
47 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
48 out of 60
MDR Workshop
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
49 out of 60
Fortis Assessment Microsoft Online Security
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
50 out of 60
Fortis IR Compromise Assessment
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A high-level forensics evaluation designed to identify current and past threat activity.
51 out of 60
Identity Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
52 out of 60
Fortis IR Active Recovery
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
53 out of 60
Fortis IR Readiness Assessment
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
54 out of 60
Microsoft Cybersecurity: 1 Month Assessment
Big Cloud Consultants
+2
Applicable to:
Cloud Security
Threat Protection
Our expert team will work with you to assess your current security posture and develop recommendations for appropriate improvements.
55 out of 60
Defender Implementation, Tuning, and Testing
Security Risk Advisors Intl, LLC
+1
Applicable to:
Threat Protection
Implement Windows Defender for Endpoint on Windows OS.
56 out of 60
UNITE: Exploring E5 Security Workshop_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
UNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
57 out of 60
Finchloom+ for Microsoft 365 Email Security
Finchloom
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your employees with our tailored email security managed service. Easily spots phishing attempts, responds swiftly with human-powered detection, and halts business email compromise.
58 out of 60
KAMIND CMMC L1 DIY
KAMIND IT, Inc
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Consulting on how to utilize the Microsoft 365 Licenses on your path to CMMC L1 Compliance.
59 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
60 out of 60
Anterior
2
3
4
5
6
Siguiente