AppSource
Anna palautetta
Ohje ja tuki
Tallennetut kohteet
Yksityiset palvelupaketit
Odota hetki. Kirjataan sinut sisään...
Kaikki
Sovellukset
Luokat
Toimialat
Konsultointipalvelut
Kumppanit
Suodattimet
Tyhjennä kaikki
Sijaintisi
Tuotteet (1)
Toimialat
Palvelun tyyppi
Konsultointipalvelut tulosta
Näytetään tulosta kohteessa konsultointipalvelut.
Näytä
liittyvää tulosta sovelluksissa toimialakohtaiset pilvipalvelut
.
Kaikki tulokset
Ctelecoms Protect and Govern Sensitive Data Workshop
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Protect & Govern Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
1 out of 60
Ctelecoms Mitigate Compliance and Privacy Risks Workshop
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
The Mitigate Compliance & Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organization.
2 out of 60
Ctelecoms Secure Identities and Access Workshop
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure Identities and Access Workshop helps you find and mitigate identity risks and safeguard their organizations with a seamless identity solution.
3 out of 60
Protect and Govern your Data in Microsoft 365 1 day workshop
CloudWay AS
+2
Applicable to:
Cloud Security
Information Protection & Governance
With data growing exponentially over time, it’s more important than ever for organisations to implement the right tools and processes to ensure data protection and governance
4 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
5 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage Workshop
CGI Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
6 out of 60
Microsoft Defender for Office 365: 4 days implementation
Centric Netherlands b.v.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deploy it to a group of users.
7 out of 60
Microsoft Defender for Identity: 4 days implementation
Centric Netherlands b.v.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deployment of identity sensors.
8 out of 60
Microsoft Defender for Cloud Apps: 4 days implementation
Centric Netherlands b.v.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Cloud Apps and discover Cloud Apps
9 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
10 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY24
CGI Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
11 out of 60
Defend Against Threats with SIEM Plus XDR
Netox Oy
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Improve your security posture with a Defend Against Threats with SIEM Plus XDR Workshop
12 out of 60
AddPro SOC with XDR
AddPro AB
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Implementation of AddPro SOC with Microsoft Sentinel
13 out of 60
Threat Protection - 2 Days Workshop
Mayasoft Bilgi Sistemleri A.S.
+2
Applicable to:
Cloud Security
Threat Protection
We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
14 out of 60
Secure path to Microsoft 365 and Azure
ATEA SWEDEN AB
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
With "Secure Path to Microsoft 365 and Azure" an experienced information security consultant systematically guides the client's management through the process.
15 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
16 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process Adoption
Vitalyst
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
17 out of 60
SecureBlu MDR Service for Microsoft 365 Defender
New Era Technology
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
18 out of 60
Innofactor Copilot Data Readiness Kit, 3-week workshop
Innofactor Finland
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Innofactor's Copilot Data Readiness Kit ensures secure and efficient use of Microsoft Copilot by mitigating risks and effectively protecting sensitive business information and data.
19 out of 60
Exobe Windows 365 Pilot
Exobe AB
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
We are pleased to offer a Microsoft Windows 365 pilot that shows how to accomplish more with all the resources available in Windows 365.
20 out of 60
Unifying Microsoft Sentinel with Cloud Services
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
21 out of 60
Security Operations Center with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Monitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
22 out of 60
Integrating Microsoft Sentinel with External EDR Service
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
23 out of 60
Integrating Microsoft Sentinel with Carbon Black EDR
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Improve endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
24 out of 60
Device Monitoring with Microsoft Defender for Endpoint
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
25 out of 60
Application Monitoring Solution with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
26 out of 60
Dell Implementation Services for Copilot Security
Dell Technologies Services
+1
Applicable to:
Cloud Security
Readiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
27 out of 60
Microsoft 365 Copilot workshop: 1-wk consulting services
Uni Systems S.M.S.A.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
28 out of 60
Innofactor Intune foundation: 2 wk implementation
Innofactor Norway
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Microsoft 365 - Intune Foundation is an established framework for basic configuration and acceleration of Microsoft Endpoint Manager MEM based on best practises from Innofactor.
29 out of 60
EM+S Consulting Services: 4-Weeks Implementation
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
We will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
30 out of 60
Zerotrust Starterkit with Onevinn, 2 days!
Onevinn AB
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Introduction to Zerotrust with Passwordless and YubiKeys – Get an understanding of what the Passwordless technology is and what you can achieve with YubiKeys
31 out of 60
AddPro SecureIT Workshop 4 hour
itm8 Sverige AB
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Workshop SecureIT – EM+S är en introduktion till Microsofts svit av produkter för säkerhet och mobilitet (EM+S).
32 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
33 out of 60
Passwordless Starterkit 25 Yubikeys, 4h Workshop
Onevinn AB
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Introduction to Passwordless with 25 YubiKeys – get an understanding of what the Passwordless technology is and what you can achieve with Yubikeys
34 out of 60
Portfolio Rationalisation: 10-Wk Implementation
PricewaterhouseCoopers UK
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Manage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
35 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
36 out of 60
Cyber Security Lifecycle: 12 Months Implementation
Exobe AB
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The goal and objective of the service is that your company should always have the best possible security posture for your Microsoft 365 environment.
37 out of 60
Onevinn Information Protection: 5 day Workshop
Onevinn AB
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Onevinn Information Protection workshop that helps the customer utilize their investment in Microsoft 365.
38 out of 60
Onevinn Threat Protection: 5 day Workshop
Onevinn AB
+2
Applicable to:
Cloud Security
Threat Protection
Onevinn Threat Protection workshop that helps the customer utilize their investment in Microsoft 365.
39 out of 60
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
40 out of 60
Microsoft 365 Plan for Success:3-d Assessment
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
41 out of 60
Non-Profit Security Essentials : 1 Day Workshop
true org cloud
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
True.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
42 out of 60
Identity & Access Management: 1-Mth Implementation
Officeline SA
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Microsoft 365 Identity & Access Management to improve and streamline security on cloud and applications
43 out of 60
Information Protection - 1Month Implementation
Officeline SA
+2
Applicable to:
Cloud Security
Information Protection & Governance
An offering of Microsoft Information Protection implementation to improve and streamline compliance across all environments.
44 out of 60
Threat Protection: 2-Month Implementation
Officeline SA
+2
Applicable to:
Cloud Security
Threat Protection
Threat protection with Microsoft Defender products. We deliver a solution that improves and streamlines threat protection for every organization.
45 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
46 out of 60
Microsoft 365 Security: 1-Wk Assessment
Innofactor Norway
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Innofactor’s Microsoft 365 Security assessment secures organizations business operation by providing insights and recommendations to help minimizing security risks.
47 out of 60
Office 365 Teamwork Security - Managed Service
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Teamwork Security provides a comprehensive security management service for Office 365 platforms
48 out of 60
Microsoft Cloud Accelerator Workshops 2-Days
SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Improve NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
49 out of 60
AvePoint Policies & Insights: 10-Days Assesments
IT-Dev sp. z o.o.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Assesment's outcomes: • Enable centralized reporting on Microsoft 365 security. • Discover potential risks and exposed content. • Enforce policies and automatically remediate security breaches!
50 out of 60
Microsoft OT/IOT Security : 2-Wks Assessment
Wipro Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Identify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
51 out of 60
Microsoft 365 Strategic Security Workshop (1day)
Edgeguide AB
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
To establish an organization specific plan and in addition a better understanding of actual customer needs as it relates to the security, identity, and compliance portfolio in Microsoft 365.
52 out of 60
Microsoft 365 Backup: 3 wks implementation
Xenit AB
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
A complete backup plan with unlimited storage, unlimited rentention, GDPR modul and protection for malware and ransomware.
53 out of 60
Microsoft 365 Security: 2-WK Assessment Essentials
Dustin AB
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
An executive assessment into essential security capabilities, map against normal/high risk scenario and security hygiene
54 out of 60
Compliance Manager Training: 1/2 day Workshop
Cloud Essentials
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Compliance Manager Training - a 1/2 day training session about Microsoft 365 Compliance Manager facilitated by an experienced member of our team
55 out of 60
Manage and Investigate Risk: 2 weeks Workshop
Cloud Essentials
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
A risk check followed by advisory workshop to build a sustainable strategy around insider risk within Microsoft 365 and further accelerate your compliance journey.
56 out of 60
Discover Sensitive Data: 2 weeks Workshop
Cloud Essentials
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Discover Sensitive Data Workshop - an automated data risk check to uncover dark data risks with analysis and recommendations
57 out of 60
Microsoft 365 Defender: 10-Day Assessment
Venzo A/S
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Let VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
58 out of 60
Modern Frontline Work Acceleration 2 days Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
LiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
59 out of 60
Microsoft 365 Security Assessment and Roadmap: 1 Day Workshop
Cloud Essentials
+1
Applicable to:
Cloud Security
Accelerating your Zero Trust strategy through a readiness assessment, workshop and roadmap
60 out of 60
Edellinen
1
2
3
4
Seuraava