AppSource
Anna palautetta
Ohje ja tuki
Tallennetut kohteet
Yksityiset palvelupaketit
Odota hetki. Kirjataan sinut sisään...
Kaikki
Sovellukset
Luokat
Toimialat
Konsultointipalvelut
Kumppanit
Suodattimet
Tyhjennä kaikki
Sijaintisi
Tuotteet (1)
Toimialat
Palvelun tyyppi
Konsultointipalvelut tulosta
Näytetään tulosta kohteessa konsultointipalvelut.
Näytä
liittyvää tulosta sovelluksissa toimialakohtaiset pilvipalvelut
.
Kaikki tulokset
Microsoft 365 Licence Health Check: 1-Day Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
1 out of 47
Identity - Entra - Azure iDP
Linktech Australia
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Consolidate all third party and on-premises applications to use Azure AD as the main identity provider for authentication and access.
2 out of 47
Entra User ID Provisioning
QUORUM SYSTEMS PTY LTD
+1
Applicable to:
Identity & Access Management
With Entra ID HR Driven User Provisioning you can remove aging infrastructure like Microsoft Identity Manager or other third party solutions.
3 out of 47
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
4 out of 47
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
5 out of 47
Essential Eight Maturity Assessment
Chamonix IT Consulting
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The culmination of this assessment is the establishment of a robust security foundation to equip you with a solid base upon which you can build and enhance your cybersecurity posture.
6 out of 47
Unified Endpoint Management: 8-Wk Assessment
Zetta Pty Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Zetta’s Assessment and Optimisation engagement will assess the way you currently manage your corporate devices and advise you on how to modernise your endpoint management.
7 out of 47
Cloud Safeguard - 12 Month Implementation
Rapid Circle
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our Cloud Safeguard managed security service enables customers to focus on core business and innovation while we keep your Microsoft 365 platforms safe & secure.
8 out of 47
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
9 out of 47
Identity and Access Management: 4-Wk Assessment
Zetta Pty Ltd
+2
Applicable to:
Cloud Security
Identity & Access Management
Zetta’s Assessment and Optimisation engagement will assess your current identity posture and advise you how to manage and secure your users and access to all your apps.
10 out of 47
HPT_Microsoft Secure Score Assessment - 4 week
HPT Vietnam Corporation
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
Secure Score helps customers quickly figure out what actions they can take to improve your score. They can check their action queue and find the change they can make that most improves their security
11 out of 47
ASD Essential 8 Assessment and Roadmap: 10-day Assessment
QUORUM SYSTEMS PTY LTD
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Quorum’s Essential 8 Assessment & Roadmap guides you to prioritise valuable remediations within a strategic roadmap, enabling quick wins, & developing strategies to tackle more complex use-cases.
12 out of 47
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY24
CGI Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
13 out of 47
Endpoint Management with Security - 4 days - FREE Workshop
OPEN BPO
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
This workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
14 out of 47
Cyber Blueprint: Discovery
Waterstons Limited
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Cyber Maturity Assessment with Risk and Gap Analysis
15 out of 47
Microsoft Intune Deployment
Secure Future Bilgi Tek. ve Hiz. Tic A.S.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
16 out of 47
Assessment of Microsoft Defender for Identity
Eighty20 Solutions Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Our Defender for Identity Assessment is a dependable way to get ready for your Defender for Identity adoption, ensuring that you enhance your environment and evaluate the results before you begin.
17 out of 47
Advania: Intune Get Started: 2 d training and PoC
Advania AB
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Understand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
18 out of 47
Limitless Security 4 week Implementation
Jasco Consulting Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Limitless Security targets securing identities, protecting Office 365, managing Devices and security information that enables continuous security improvement.
19 out of 47
Security Controls Review - 2wk Assessment
The Missing Link Network Integration Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We can help you achieve a more mature, secure IT environment with our comprehensive Security Controls Review powered by Microsoft Security and Compliance.
20 out of 47
IdentityCARE 3-Wk Implementation
SecureCom Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Securing organizations Exchange Online and Multifactor Identity services.
21 out of 47
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
22 out of 47
Data#3 Surface Bundles - 1-week Implementation
Data#3 Limited
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Combining a Surface device, accessories and Microsoft 365 licensing into one predictable monthly cost, Surface Bundles relieve you team from the burden of ownership, maintenance and device upkeep.
23 out of 47
Modern Device Management Implementation
DXC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Improve the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
24 out of 47
Secure Remote Work: 4-Hours Workshop
Professional Advantage Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enable your people to work from anywhere, securely with Microsoft 365.
25 out of 47
Security Assessment - 5-Day Assessment
QUORUM SYSTEMS PTY LTD
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
The outcome of this assessment is a documented security assessment work plan with steps, tools and procedures used to conduct the assessment.
26 out of 47
Managed Modern Workplace Half Day Workshop
Experteq
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Power Platform for Teams
Half day FREE Adoption and Implementation Workshop designed to maximise your benefits. Covers from Authentication, Teams Integration, One Drive, SharePoint, Security, Training and Adoptions metrics.
27 out of 47
Conditional Access & MFA 5d Proof of Concept
Generation-e Productivity Solutions Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conditional Access and Multi Factor Authentication deployed without negatively impacting users. We setup the environment then deploy 5 devices plus train you how to do the rest.
28 out of 47
Autopilot & End Point Manager - 1wk implementation
Generation-e Productivity Solutions Pty Ltd
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Windows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use.
29 out of 47
Microsoft Viva: 1 week - Assessment
Generation-e Productivity Solutions Pty Ltd
+3
Applicable to:
Identity & Access Management
Teamwork Deployment
Workplace Analytics
Gain data-driven visibility into how work patterns affect wellbeing, productivity, and business performance.
30 out of 47
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
31 out of 47
Microsoft 365 E5 Business Value: 2-Hr Workshop
Datacom Systems (AU) Pty Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Take an in depth look at getting the most business value from adopting the Microsoft 365 E5 suite.
32 out of 47
G Suite to Microsoft 365 Migration 2-Hr Assessment
Eighty20 Solutions Pty Ltd
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Eighty20 Solutions are offering a free workshop to help you plan your migration from G-Suite to Microsoft 365
33 out of 47
iTop MDR 5-Week Implementation
登豐數位科技股份有限公司
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
協助您的企業快速的偵測惡意活動、使用者行為及各項由端點發起的惡意活動,即時探索弱點和錯誤的設定,以進行補救。
34 out of 47
Microsoft 365-UC Performance Monitoring-2wk Assmt
Orange Business Services - Global
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teams Custom Solutions
Get simplified, integrated communications and easier collaboration between the Genesys Cloud™, contact center solution and the Microsoft Teams collaboration platform.
35 out of 47
Next Gen Endpoints 3-Day Workshop
FUJITSU
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Provide your employees with access to a secure desktop experience from virtually anywhere.
36 out of 47
Securing Identities: 3 Days Workshop
InovaSys
+1
Applicable to:
Identity & Access Management
Securing Identities is a Microsoft Funded Workshop to help Microsoft customers realize the full value of their Microsoft services investment.
37 out of 47
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
38 out of 47
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
39 out of 47
Modern Workplace - Enterprise-Grade for SMB: 4-Wk Implementation
Atarix
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Build all the foundations needed to create a flexible and scalable Modern workplace in just 30 days!
40 out of 47
Modern EndPoint: 3 Day Workshop
Insentra Pty Ltd
+2
Applicable to:
Identity & Access Management
Mobile Device Management
An executive deep dive into remote deployment, management, and the security of corporate and BYOD devices in your organization
41 out of 47
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POC
Bitscape
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
42 out of 47
Windows 365: 2-Wk Proof of Concept
The Missing Link Network Integration Pty Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Test your applications and see if Windows 365 is the right fit for your business
43 out of 47
Windows 365 Cloud PC 10-Days PoC
Sonata Information Technology Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Paid Assessment and PoC to deploy and use Windows 365 Cloud PC
44 out of 47
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week Implementation
Options Technology Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
45 out of 47
Microsoft 365 Security Assessment: 6-day Assessment
Performanta
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Performanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
46 out of 47
Endpoint Management and Windows Deployment: 2-days Implementation
CC Bilgi Teknolojileri
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
Microsoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises.
47 out of 47
Edellinen
1
2
3