AppSource
Andke tagasisidet
Spikker ja tugi
Salvestatud üksused
Privaatsed lepingud
Oodake hetk, logime teid sisse...
Kõik
Rakendused
Kategooriad
Valdkonnad
Nõustamisteenused
Partnerid
Filtrid
Tühjenda kõik
Teie asukoht
Tooted (1)
Valdkonnad
Teenuse tüüp
Nõustamisteenused tulemust
Kuvatud on tulemust asukohas nõustamisteenused.
Kuva
seotud tulemit asukohas valdkonnapilved
.
Kõik tulemid
Managed Defender for Identity
Swiss IT Security Deutschland GmbH
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Swiss IT Security Advanced Threat Management: Intelligenter, mehrstufiger Schutz vor Angriffen On-Premise bzw. in der Cloud
1 out of 41
Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
2 out of 41
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
3 out of 41
SharePoint and Teams Security - 2 week assessment
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Confident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
4 out of 41
Teams & SharePoint Security Hardening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
5 out of 41
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
6 out of 41
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
7 out of 41
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
8 out of 41
Data Protection and Governance with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
9 out of 41
Copilot - 2 Days Adoption Workshop
INSOMEA COMPUTER SOLUTIONS TUNISIE SARL
+2
Applicable to:
Frontline Workers
Threat Protection
INSOMEA will help users in adopting copilot within companies from different sectors and sizes
10 out of 41
G Suite to Office 365 migration: 1-Hour Assessment
True.org Cloud
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
Assessment of your current G Suite environment to plan migration to Office 365
11 out of 41
Microsoft 365 Security: 5 Tage Assessment
Controlware GmbH
+2
Applicable to:
Cloud Security
Threat Protection
Erkennung von potentiellen Sicherheitsmängeln, Dokumentation sicherheitsrelevanter Einstellungen und Reduktion des Risikos durch Schadsoftware innerhalb von Microsoft Office 365.
12 out of 41
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
13 out of 41
4-Day Security Assesment
HSO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
14 out of 41
Security Configuration Maintenance 2-Wks Imp
Insight Technology Solutions
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
A monthly Security Configuration Maintenance Service. This service will help to secure end-user devices more effectively based on Insight and Microsoft Security best practices.
15 out of 41
Security 360° by aConTech - 1 wk implementation
aConTech GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sie erhalten folgende Leistungen: Die Implementierung von Identity and Access Management, Threat Protection, Conditional Access, Microsoft 365 Defender sowie Security Monitoring.
16 out of 41
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
17 out of 41
Secure & Compliant Modern Workplace: 2 weeks Imp
Insight Technology Solutions
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
Based on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
18 out of 41
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
19 out of 41
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
20 out of 41
Security365 by CyberCare: 3 Wochen Implementierung
Arvato Systems
+2
Applicable to:
Cloud Security
Threat Protection
Consulting Service for Microsoft 365 Defender - Tool Configuration and Secure Score Management
21 out of 41
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
22 out of 41
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
23 out of 41
1-Day Envisioning Workshop - Microsoft XDR
water IT Security GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
In product dedicated sessions we will explain the different pieces of Microsoft XDR product families and show the unique value add as solution but also as security platform in the bigger picture.
24 out of 41
sepago adapt:impl Microsoft 365 processes in 9 wks
sepago GmbH
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Threat Protection
sepago adapt ensures that your security team can follow processes fitting your organization at each point in time. This makes sure that Microsoft 365 solutions can unfold their full potential.
25 out of 41
Discover Sensitive Data: 5-Week Workshop
Rackspace
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
26 out of 41
Cybersecurity Awareness: 12 month implementation
Prodware Group
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
Cybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
27 out of 41
Bechtle Microsoft 365 E5 Security - 2d Workshop
Bechtle AG
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
In this workshop we will talk about today's cyber security risks and show you how you can use the Microsoft 365 E5 Security Suite to initiate a zero trust approach.
28 out of 41
1-Tag Microsoft 365 Health & Security Assessment
Comma Soft AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assessment Ihrer bestehenden Microsoft 365 Umgebung hinsichtlich Best-Practices und Betreibbarkeit
29 out of 41
Microsoft Endpoint Manager: 90 minütiger Workshop
novaCapta GmbH
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Client Management: Zentralisiert und kostenoptimiert. Der Workshop zur Bewältigung des Balanceaktes zwischen Usability und IT-Security.
30 out of 41
Zero Touch Provisioning: 5-tägiger Workshop
novaCapta GmbH
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Client Management optimieren: Lernen Sie in unserem 5-tägigen Workshop den Windows Autopiloten kennen, erfassen Sie seine Vorteile und machen Sie die ersten Schritte mit uns
31 out of 41
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
32 out of 41
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Nil d.o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
33 out of 41
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
34 out of 41
Microsoft 365 Defender Enterprise Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Manage and Investigate Risk and Threat Protection
35 out of 41
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
36 out of 41
[Threat Management: 5-Days Assessment]
Computacenter Plc
+1
Applicable to:
Threat Protection
Customer security assessment in regards of Threat management: 5 day offer
37 out of 41
Insight Discover Sensitive Data 5 Day Workshop
Insight Technology Solutions
+2
Applicable to:
Information Protection & Governance
Threat Protection
Insight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
38 out of 41
Insight Security Mini Audit: 1 Day Workshop
Insight Technology Solutions
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Insight will work with you to evaluate your Microsoft 365 environment to make sure that it is in line with industry security best practices.
39 out of 41
Managed Security Services for Microsoft Defender for Endpoint DACH: 12 Mon Implementation
Telekom Deutschland GmbH Main Account
+2
Applicable to:
Information Protection & Governance
Threat Protection
Configuration and operation of customer specific solution based on Microsoft Defender for Endpoint incl. integration into the Security Operation Center of Deutsche Telekom Security
40 out of 41
Threat Protection 3 Day Workshop
Insight Technology Solutions
+1
Applicable to:
Threat Protection
Insight's Threat Protection Workshop identifies real-time threats in an organisation’s environment and helps define clear next steps to mitigate risks with Microsoft 365
41 out of 41
Eelmine
1
2
3