AppSource
Andke tagasisidet
Spikker ja tugi
Salvestatud üksused
Privaatsed lepingud
Oodake hetk, logime teid sisse...
Kõik
Rakendused
Kategooriad
Valdkonnad
Nõustamisteenused
Partnerid
Filtrid
Tühjenda kõik
Teie asukoht
Tooted (1)
Valdkonnad
Teenuse tüüp
Nõustamisteenused tulemust
Kuvatud on tulemust asukohas nõustamisteenused.
Kuva
seotud tulemit asukohas valdkonnapilved
.
Kõik tulemid
Copilot Data Protection
Cloud Life
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
1 out of 53
Audit de sécurité : 5 jours
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Evaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'am élioration
2 out of 53
POC Securité IT : 2 semaines
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Validation des capacités des solutions de sécurité Microsoft dans votre environnement
3 out of 53
Solutions de Sécurité Microsoft : 4 semaines
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
4 out of 53
Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
5 out of 53
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
6 out of 53
SharePoint and Teams Security - 2 week assessment
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Confident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
7 out of 53
Teams & SharePoint Security Hardening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
8 out of 53
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
9 out of 53
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
10 out of 53
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
11 out of 53
Copilot - 2 Days Adoption Workshop
INSOMEA COMPUTER SOLUTIONS TUNISIE SARL
+2
Applicable to:
Frontline Workers
Threat Protection
INSOMEA will help users in adopting copilot within companies from different sectors and sizes
12 out of 53
G Suite to Office 365 migration: 1-Hour Assessment
True.org Cloud
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
Assessment of your current G Suite environment to plan migration to Office 365
13 out of 53
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
14 out of 53
4-Day Security Assesment
HSO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
15 out of 53
Security Configuration Maintenance 2-Wks Imp
Insight Technology Solutions
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
A monthly Security Configuration Maintenance Service. This service will help to secure end-user devices more effectively based on Insight and Microsoft Security best practices.
16 out of 53
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
17 out of 53
SecWise Assess for Workplace: 5-Day Security Assessment
SecWise
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
An assessment of your modern workplace set-up to make sure it matches cyber security standards and best-practices.
18 out of 53
SecWise Protect (XDR): Microsoft 365 Defender Activation
SecWise
+1
Applicable to:
Threat Protection
Identify your Microsoft Threat Protection jump-start configuration based on our security maturity predefined Microsoft 365 Defender best-practice configurations.
19 out of 53
Secure & Compliant Modern Workplace: 2 weeks Imp
Insight Technology Solutions
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
Based on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
20 out of 53
Threat Protection - 4 Week Security Implementation
OBVUS
+1
Applicable to:
Threat Protection
Accelerate your implementation of Threat Protection with the Microsoft 365 Security Accelerator onboarding Services that are designed to get you up and running fast to maximize your investment.
21 out of 53
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
22 out of 53
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
23 out of 53
Microsoft 365 Security Scan: 3d Assessment
Ordina
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The result of the multi-day assessment will be a risk-based advise focusing on recommendations and a roadmap to increase the security posture of your Modern Workplace.
24 out of 53
Security Priority Assessment : 2 day assessment
Inetum-Realdolmen - Modern Work & Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 day assessment to list and prioritization of your security needs resulting in step-by-step overview to tackle security projects
25 out of 53
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
26 out of 53
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
27 out of 53
Defend against threats with SIEM plus XDR Workshop including FastTrack guidance
Xylos
+2
Applicable to:
Cloud Security
Threat Protection
Our 3-day Security workshop is meant to get an overview of the Security landscape, we use the Microsoft 365 security products and features to gain visibility into threats to your Microsoft 365.
28 out of 53
Endpoint Rollout Management 4-Hour Implementation
ConXioNOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
During this 4-hour implementation we will implement Microsoft Intune within your SMB or enterprise organization.
29 out of 53
Protection des périphériques - 4-Week Implemention
EXAKIS NELITE
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Assurer la sécurisation des périphériques puisqu’ils sont une porte d’entrée du système d’information pour les attaquants.
30 out of 53
Discover Sensitive Data: 5-Week Workshop
Rackspace
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
31 out of 53
Sécurisation des identités - 3-Week Implementation
EXAKIS NELITE
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
32 out of 53
Protection des applications -4-Week Implementation
EXAKIS NELITE
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Une vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
33 out of 53
Cybersecurity Awareness: 12 month implementation
Prodware Group
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
Cybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
34 out of 53
Managed service : EDR with Defender for Endpoint
Cegeka NV
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Our EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
35 out of 53
Microsoft 365 Secure Score: 1-Week Assessment
WAKERS
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Mesurez en 1 semaine le niveau de sécurité de votre environnement Microsoft 365
36 out of 53
Répondre aux attaques - 3-Week Implementation
EXAKIS NELITE
+1
Applicable to:
Threat Protection
Cadrer les différentes attaques et risques afin d’en découler des solutions de sécurité et des chantiers.
37 out of 53
Defend against threats with SIEM + XDR Expert-as-a-service 1 y, Mgd svc
Xylos
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Xylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your Threat Protection environment based on Microsoft 365 technology.
38 out of 53
Secure Identities and Access Assessment, 3 days
Xylos
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our Identity Security Assessment is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
39 out of 53
Protection de l'identité : Implémentation 1 mois
ROXYS
+2
Applicable to:
Cloud Security
Threat Protection
Vous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
40 out of 53
Workplace Security Maturity: 6-day assessment
Resilient Security
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workplace security maturity assessment to get the most out of your Microsoft 365 security platform
41 out of 53
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
42 out of 53
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Nil d.o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
43 out of 53
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
44 out of 53
Microsoft 365 Defender Enterprise Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Manage and Investigate Risk and Threat Protection
45 out of 53
Roadmap to Zero Trust: 4-Wk Assessment
Devoteam NV/SA
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
A pragmatic approach to a better security posture with Microsoft 365
46 out of 53
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
47 out of 53
[Threat Management: 5-Days Assessment]
Computacenter Plc
+1
Applicable to:
Threat Protection
Customer security assessment in regards of Threat management: 5 day offer
48 out of 53
Insight Discover Sensitive Data 5 Day Workshop
Insight Technology Solutions
+2
Applicable to:
Information Protection & Governance
Threat Protection
Insight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
49 out of 53
Insight Security Mini Audit: 1 Day Workshop
Insight Technology Solutions
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Insight will work with you to evaluate your Microsoft 365 environment to make sure that it is in line with industry security best practices.
50 out of 53
Smart Services - Security - 12 months Implementation
Elgon S.A.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Smart Services, mise en place des bonne pratique sécurité pour vos service Microsoft 365 et Azure
51 out of 53
Threat Protection 3 Day Workshop
Insight Technology Solutions
+1
Applicable to:
Threat Protection
Insight's Threat Protection Workshop identifies real-time threats in an organisation’s environment and helps define clear next steps to mitigate risks with Microsoft 365
52 out of 53
Microsoft Defender for Endpoint deployment service 2 months Implementation (elapsed time)
NETWORK RESEARCH BELGIUM
+1
Applicable to:
Threat Protection
Increase the security on your laptops with Microsoft Defender for EndPoint using NRB deployment services
53 out of 53
Eelmine
1
2
3