AppSource
Anna palautetta
Ohje ja tuki
Tallennetut kohteet
Yksityiset palvelupaketit
Odota hetki. Kirjataan sinut sisään...
Kaikki
Sovellukset
Luokat
Toimialat
Konsultointipalvelut
Kumppanit
Suodattimet
Tyhjennä kaikki
Sijaintisi
Tuotteet (1)
Toimialat
Palvelun tyyppi
Konsultointipalvelut tulosta
Näytetään tulosta kohteessa konsultointipalvelut.
Näytä
liittyvää tulosta sovelluksissa toimialakohtaiset pilvipalvelut
.
Kaikki tulokset
Microsoft 365 GCC High Mig from Google (25 Users)
Daymark Solutions
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
White-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Google G Suite
1 out of 60
Microsoft 365 GCC High Mig from Exchange: 6 Week Implementation
Daymark Solutions
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
White-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Microsoft Exchange On-Premises
2 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
3 out of 60
Healthcare Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
4 out of 60
Microsoft Purview Records Management Assessment & Strategy for Government - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists government departments and agencies with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
5 out of 60
Microsoft Purview Records Management Assessment & Strategy for Financial Services - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists Financial Services organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
6 out of 60
Onesec Digital Identity
Secure Nextgen Systems
+2
Applicable to:
Identity & Access Management
Threat Protection
Having a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
7 out of 60
Zero Trust Baseline Pilot 8-Week Implementation
Invoke
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
8 out of 60
Securing Identities Workshop: 4-Wk Workshop
ProArch Technologies, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
9 out of 60
Windows 365: 5-week Proof of Concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
Enhance productivity through flexibility by enabling your team to create secure Cloud PCs and allowing BYOD without increasing risk to your environment
10 out of 60
Windows as a Service: 4-Wk Implementation
AMTRA Solutions Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Secure your data and devices, identities and your business with Windows 10/11.
11 out of 60
MITRE ATT&CK® MasterClass: 2-Hour Workshop
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s MITRE ATT&CK® MasterClass is focused on educating companies on ransomware threats specifically relevant to their environment.
12 out of 60
OENG - Next Generation Endpoints-1 Month Proof of Concept
Secure Nextgen Systems
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Learn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
13 out of 60
Offer Name: Microsoft 365 CrashCourse - 1 week Workshop
Virteva LLC
+3
Applicable to:
Identity & Access Management
Knowledge & Insights
Mobile Device Management
Empower organizations to gain a deeper understanding of Microsoft 365 and its vast array of services, features, and capabilities through Virteva's Microsoft 365 CrashCourse Workshop.
14 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week Project
Virteva LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Get a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
15 out of 60
Secure Remote Workplace: 1-Wk Workshop
FSI Strategies
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
16 out of 60
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
17 out of 60
Protect & Govern Sensitive Data: 3-Day Workshop
Netrix Global
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
A 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
18 out of 60
Managed Endpoint Assessment
FSI Strategies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
This four-week engagement will determine the level of effort required for a migration to a fully modern desktop using Microsoft 365 services.
19 out of 60
Autopilot: 1-Wk Assessment
FSI Strategies
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
FSi Strategies will review the deployment scenarios with the client and deliver a Discovery and Assessment document on Windows Autopilot, and the level of effort to deploy in the environment.
20 out of 60
Modern Managed Endpoints: 4-Wk Proof of Concept
FSI Strategies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Modernize your organization with end-to-end device management and monitoring, FSi Strategies will demonstrate modern device management and security using the latest in Microsoft 365 technology
21 out of 60
Secure Identities and Access: 4-Week Engagement & Workshop
CompuNet
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
4-week engagement and workshop that helps customers design and plan out their optimal identity model to ensure they have a roadmap to enhanced security using Microsoft 365 and Azure Active Directory
22 out of 60
Multifactor Authentication: 4-Day Implementation
FSI Strategies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
23 out of 60
OAAA Advanced Adversary Assesment-1 month assesment
Secure Nextgen Systems
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Learn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
24 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Microsoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
25 out of 60
Modern Work Services Proof of Concept
Crayon US
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Meetings for Microsoft Teams
Crayon Modern Work Services PoC will help you pilot a subset of users with the best of Microsoft 365 prior to implementation. This will allow us to ensure a smooth transition for all users.
26 out of 60
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-Weeks
Invoke
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Invoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
27 out of 60
Entra Permission Risk Assessment
adaQuest
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your Multi-Cloud Environment with Microsoft Entra by automating the remediation of Permissions. Get a comprehensive visibility into permissions assigned to all identities on your organization.
28 out of 60
Defender for Endpoint: 5-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
29 out of 60
Windows Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
30 out of 60
Security Outcomes Sprint
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Understand the Business Value of Your Cybersecurity Investments
31 out of 60
cyber security threat analysis workshop
U-BTech Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
the workshop is design to discover threats and risks
32 out of 60
Exchange Migration to Microsoft 365: 6-Week Implementation
All Covered, a division of Konica Minolta
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
All Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
33 out of 60
Enable Windows 365 Cloud PC
Cofomo
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
With the right endpoint modernization strategy and tools, employees get a secure experience on every mobile device, tablet, or laptop they’re using, all while eliminating major management headaches.
34 out of 60
HPT_Microsoft Secure Score Assessment - 4 week
HPT Vietnam Corporation
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
Secure Score helps customers quickly figure out what actions they can take to improve your score. They can check their action queue and find the change they can make that most improves their security
35 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
36 out of 60
1ID Platform for EDU
Telelink Business Services EAD
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
37 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage Workshop
CGI Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
38 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed Service
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
39 out of 60
Active Assure Attack Assessment - 3 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Breach and Attack Simulations — We Attack to Defend You
40 out of 60
Protect and Govern Healthcare Data Workshop - 3 Day Workshop
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft-Funded Workshop to discuss and understand the hidden privacy and regulatory risks of healthcare data and how to mitigate with actionable next steps
41 out of 60
Teams Hosted Direct Routing: 2-week Implementation
Quisitive
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
Quisitive Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
42 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
43 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY24
CGI Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
44 out of 60
Microsoft 365 Security: 2-week assessment
Mirai Security Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
45 out of 60
IBM Digital Workforce Offering
IBM Consulting - EA
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Power Platform for Teams
IBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
46 out of 60
Endpoint Management with Security Workshop
Migrate LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Let us show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
47 out of 60
Intune Foundation Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM).
48 out of 60
Windows 365 Deployment : 12 month Implementation
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Patriot will design, configure, test and deploy Microsoft Windows 365 for your environment.
49 out of 60
MFA Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan.
50 out of 60
Protect and Govern Sensitive Data for Financial Services - 4 wk workshop
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft-Funded Workshop to discuss and understand the hidden privacy and regulatory risks of dark financial data and how to mitigate with actionable next steps
51 out of 60
Zero Trust Foundation: 6-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Accelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
52 out of 60
Microsoft 365 Protecting Corporate Identities: 5-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your organization from devastating breaches with Microsoft 365 identity solutions.
53 out of 60
Window 365 Cloud PC: 3-Day Proof-of-Concept
CTGlobal A/S
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Assess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
54 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week Program
Windows Management Experts, Inc.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
55 out of 60
Design and Implementation of Microsoft Security Solutions: 12-Week Engagement
Kudelski Security
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
Kudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
56 out of 60
Securing Identities Workshop
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
57 out of 60
Modern Endpoint Management: 2-Hr Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
There’s a reason Microsoft chose us as their Modern Endpoint Management Partner of the Year for 2023. We believe you can reduce your threat risk by modernizing your Endpoint Management Strategy.
58 out of 60
Windows 365: 4 Week Readiness Assessment
Netrix Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Get an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
59 out of 60
Microsoft Defender for Identity Deployment: 1 Week Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
Identity & Access Management
Insider Risk
Identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
60 out of 60
Edellinen
4
5
6
7
8
Seuraava