Envoyer des commentaires
Help & support
Éléments enregistrés
Plans privés
Juste un moment, connexion en cours...
FiltresTout effacer

  • Votre position
  • Produits (1)
    • Dynamics 365
    • Microsoft 365 (1)
      • Gestion de l'adoption et des modifications
      • Appel pour Microsoft Teams
      • Cloud Security
      • Services de conseil pour la conformité
      • Déploiement et gestion de l’appareil
      • Employés de première ligne
      • Gestion des identités et des accès
      • Protection des informations et gouvernance
      • Risque d’initié
      • Connaissances et insights
      • Meeting Rooms pour Microsoft Teams
      • Meetings pour Microsoft Teams
      • Microsoft 365 Live Events
      • Gestion des périphériques mobiles
      • Power Platform for Teams
      • Solutions personnalisées Teams
      • Déploiement de travail d'équipe
      • Protection contre les menaces
      • Analyse du temps de travail
    • Power Platform
  • Secteurs d'activité (1)
    • Défense et renseignement
    • Distribution
    • Éducation
    • Énergie et ressources
    • Services financiers
    • Gouvernement
      • Opérations et infrastructures gouvernementales
      • Finances publiques
      • Santé publique et services sociaux
      • Sécurité publique & justice
    • Santé
    • Tourisme et voyages
    • Fabrication et mobilité
    • Organisme à but non lucratif
    • Services professionnels
    • Distribution et biens de consommation
    • Durabilité
    • Télécommunications et médias
  • Type de service

Services de conseil résultats

Affichage des résultats dans services de conseil.
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology Holding
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Our goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
1 out of 31
Active Directory Security on DemandComtrade System Integration
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
2 out of 31
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Conditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
3 out of 31
Wc-PC- Wragby Cloud PCWragby Business Solutions & Technologies Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
The Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
4 out of 31
Secure Remote Work: 3 Days Intro and Plan WorkshopLiveRoute FZ-LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Engagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
5 out of 31
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data Ltd
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Whether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
6 out of 31
Microsoft 365: 2-Week AssessmentPractical Solutions, Inc
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
7 out of 31
Eviden Compliance Assessment (CSAT) zur Einhaltung der europäischen NIS-2-RichtlinieEviden International France - SAS
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Unternehmen stehen vor der Herausforderung, die europäische NIS2-Richtlinie bis zur nationalen Umsetzungsfrist im Oktober 2024 umzusetzen.
8 out of 31
Microsoft 365 - Threat Protection: 2-week workshopFortevento
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
9 out of 31
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Evaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
10 out of 31
Identity Foundation Implementation Services with Microsoft Entra in 70 DaysArmis, Sistemas de Informação, Lda
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Leverage the full suite of Microsoft 365 products - Secure internal and external Identities with Microsoft Entra
11 out of 31
Identity Foundation Proof Of Concept with Microsoft Entra in 4 WeeksArmis, Sistemas de Informação, Lda
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Leverage the full suite of Microsoft 365 products - Secure internal and external Identities with Microsoft Entra
12 out of 31
Identity Governance Proof Of Concept with Microsoft Entra ID Governance in 4 WeeksArmis, Sistemas de Informação, Lda
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Leverage Microsoft Entra ID Governance to ensure seamless and secure access to Microsoft 365 resources
13 out of 31
Modern Device Management ImplementationDXC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Improve the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
14 out of 31
IGA Roadmap - 4 Weeks AssessmentArmis, Sistemas de Informação, Lda
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Develop an outcome-based, design-led IGA strategy to secure access to your resources with Microsoft identity governance solutions
15 out of 31
Avanade Entra Verified ID Consulting ServicesAvanade, Inc.
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Microsoft Entra Verified ID is a Decentralized Identity implementation that streamlines any identity related process, simplifies it, reduce costs and increases convenience.
16 out of 31
MDS - Threat Protection EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
17 out of 31
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
18 out of 31
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
19 out of 31
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
20 out of 31
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-workplace-analytics product iconWorkplace Analytics
Helping customers KickStart features in Microsoft 365 E3 Subscription
21 out of 31
Microsoft Defender for Endpoint QuickStartPresidio
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Presidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
22 out of 31
Microsoft Entra Verified ID and Credivera: 3-day Planning WorkshopOxford Computer Group LLC
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
This Planning Workshop is designed to help you get started with a verifiable credentials solution using Credivera and Microsoft Entra Verified ID.
23 out of 31
Mergers and Acquisitions- Identity and Migration to Microsoft 365 GCC High for CMMC/ITAR: 6-Wk Assessment and PlanningAgile IT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Shorten the time to value from an M&A activity which includes partial or all going to Microsoft 365 GCC High by starting with an assessment and plan to rationalize identities, tenants, and costs.
24 out of 31
Risk/Compliance/SecurityR3 LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Provide Compliance as a service (CaaS) to assist our customers with obtaining certification in the frameworks they are targeting such as CMMC, ISO, NIST, CMMI, HIPAA, SOC 2
25 out of 31
Modern Workplace AssessmentHTG
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This assessment supports businesses in their cloud journey to quickly develop or migrate into a modern cloud-based organisation by implementing a Software as a Service Strategy with Microsoft 365.
26 out of 31
Copilot For Microsoft 365 - ImplementationITQAN GLOBAL FOR CLOUD AND DIGITAL COMPUTING SYSTEMS L.L.C.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-teamwork-deployment product iconTeamwork Deployment
Guided Setup and Customization of Copilot and Copilot Studio for Microsoft 365- Training, Data Selection, Workflow Design Development
27 out of 31
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile IT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Agile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
28 out of 31
CSE CMMC L1 & L2 Assessment & ImplementationComputer Solutions East
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Achieve CMMC 1 & 2 Compliance, Secure Your Cloud with Microsoft 365 & Expert Guidance.
29 out of 31
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile IT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
30 out of 31
Enable Windows 365 Cloud PCCofomo
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
With the right endpoint modernization strategy and tools, employees get a secure experience on every mobile device, tablet, or laptop they’re using, all while eliminating major management headaches.
31 out of 31
Nouveautés
  • Surface Pro
  • Surface Laptop
  • Surface Laptop Studio 2
  • Copilot pour les organisations
  • Copilot pour un usage personnel
  • L’IA dans Windows
  • Découvrez les produits Microsoft
  • Applications Windows 11
Microsoft Store
  • Profil du compte
  • Centre de téléchargement
  • Soutien Microsoft Store
  • Retours
  • Suivi des commandes
  • Formations et ateliers virtuels
  • La promesse du Microsoft Store
Éducation
  • Microsoft Éducation
  • Appareils pour l’éducation
  • Microsoft Teams pour l’éducation
  • Microsoft 365 Éducation
  • Office Éducation
  • Formation et perfectionnement des éducateurs
  • Aubaines pour étudiants et parents
  • Azure pour les étudiants
Entreprise
  • Microsoft Cloud
  • Sécurité Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Développeurs et TI
  • Développeur Microsoft
  • Microsoft Learn
  • Prise en charge des applications de la place de marché de l’IA
  • Communauté technique de Microsoft
  • Microsoft Marketplace
  • Microsoft Power Platform
  • Visual Studio
Entreprise
  • Carrières
  • À propos de Microsoft
  • La confidentialité chez Microsoft
  • Investisseurs
  • Accessibilité
  • Durabilité
Français (Canada) Vos choix en matière de confidentialité – Icône Désactiver Vos choix de confidentialité Confidentialité de l’intégrité des consommateurs
  • Sitemap
  • Contactez-nous
  • Énoncé de confidentialité
  • Conditions d'utilisation
  • Marques
  • À propos de nos annonces
  • Manage cookies
  • © Microsoft 2025