AppSource
Envoyer des commentaires
Aide et assistance
Éléments enregistrés
Plans privés
Juste un moment, connexion en cours...
Tout
Applications
Catégories
Secteurs d’activité
Services de conseil
Partenaires
Filtres
Tout effacer
Votre position
Produits (1)
Secteurs d'activité
Type de service
Services de conseil résultats
Affichage des résultats dans services de conseil.
Vue
résultats associés dans clouds du secteur d’activité
.
Tous les résultats
Change Management: 1-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Change Management is a proven methodology to deploy technology changes to large groups of diverse Microsoft 365 users.
1 out of 60
Intune for macOS: 2Weeks Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Manage your macOS devices from Microsoft Intune with zero-touch provisioning, OS and app updates, and more.
2 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementation
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
3 out of 60
Finchloom+ for Microsoft 365 Administration
Finchloom
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Standardized management of your Microsoft 365 Tenant. Free up internal resources from regular administration tasks, firefighting issues, and escalating to Microsoft Support.
4 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 Wks
Wipro Ltd
+2
Applicable to:
Identity & Access Management
Threat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
5 out of 60
Intune for Windows: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
6 out of 60
MITRE ATT&CK® MasterClass: 2-Hour Workshop
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s MITRE ATT&CK® MasterClass is focused on educating companies on ransomware threats specifically relevant to their environment.
7 out of 60
Managed Services - Microsoft 365
ConvergeOne
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Fully utilize your Microsoft 365 Solution with all the Identity, Security, and Collaboration portions available to you
8 out of 60
Intune for Android: 2-wk Imp
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Android devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
9 out of 60
Microsoft Purview Microsoft 365: 4-Week Implementation
Spyglass MTG, LLC
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
The Microsoft Purview Microsoft 365 offering is a 4-week/$45,000 Minimum Viable Product (MVP) implementation of Microsoft 365 components of Purview to provide a jumpstart to your data governance.
10 out of 60
UNITE: Secure Core_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
UNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
11 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
12 out of 60
IBM Digital Workforce Offering
IBM Consulting - EA
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Power Platform for Teams
IBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
13 out of 60
Modern Management for Endpoints
Ivision, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
14 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC Compliance
Agile IT
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Agile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
15 out of 60
Getting Ready for CoPilot with Purview
Patriot Consulting Technology Group LLC
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
The "Getting Ready for CoPilot with Purview" workshop is crafted to prepare organizations for the eventual adoption of Microsoft's CoPilot, by first implementing Microsoft Purview
16 out of 60
Secure Data on Personally-Owned Devices: 2 Week Implementation
CDI LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
Deploy Intune App Protection Policies to secure organization data on employee-owned devices
17 out of 60
Cloud Managed Windows Endpoint Migration: 5 Week Pilot Implementation
CDI LLC
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
Deploy a working model for cloud-managed Windows endpoints leveraging Microsoft Entra ID and Microsoft Intune
18 out of 60
MXDR Consultation
CBTS Technology Solutions LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
19 out of 60
Implementation of Microsoft Identity Security
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW's Implementation of Microsoft Identity Security service helps customers strengthen their security posture, reduce the risk of data breaches and improve compliance with industry regulations.
20 out of 60
Microsoft Cybersecurity Assessment
Akins IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
21 out of 60
NTT Americas - Microsoft Device Management
NTT Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Deployment of Microsoft Unified Endpoint Management Services. Assessment of your resources and business objectives to develop a fresh approach to your security strategy.
22 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
23 out of 60
Cloud-Native Migration Service: 4-Month Implementation
Cyclotron Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
24 out of 60
G Suite to M365 Migration: 1-Day Proof of concept
true org cloud
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Proof of concept for migration from G Suite to Microsoft 365
25 out of 60
Microsoft Purview Records Management Assessment & Strategy for Financial Services - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists Financial Services organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
26 out of 60
Securing Identities: 3 Days Workshop
INOVASYS FOR SYSTEMS
+1
Applicable to:
Identity & Access Management
Microsoft funded Securing Identities is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
27 out of 60
Windows 11 Assessment: 1-WK
Steeves
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
28 out of 60
Microsoft Purview Records Management Assessment & Strategy - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
29 out of 60
Defender for Endpoint: 5-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
30 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
31 out of 60
Zero Trust as a Service (ZTaaS)
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital transformation and adopting AI starts with building a secure foundation.
32 out of 60
Multifactor Authentication: 4-Day Implementation
FSI Strategies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
33 out of 60
Cyber Security Services 9 days Assessment
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
34 out of 60
Microsoft 365 Copilot: 2-Wk Readiness Assessment
Invoke
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Invoke's Microsoft 365 Copilot Readiness Assessment is a service that helps customers prepare for using Copilot 365, a solution that leverages data to enhance creativity, productivity, and skills.
35 out of 60
MDR Workshop
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
36 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week Implementation
Beyondsoft Brasil
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
37 out of 60
Eviden Compliance Assessment (CSAT) zur Einhaltung der europäischen NIS-2-Richtlinie
Eviden International France - SAS
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
Unternehmen stehen vor der Herausforderung, die europäische NIS2-Richtlinie bis zur nationalen Umsetzungsfrist im Oktober 2024 umzusetzen.
38 out of 60
Google to Microsoft 365 Migration
Managed Solution
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Empowering digital transformation through a Google to Microsoft 365 migration with world-class support, so you can focus on what matters most—your business.
39 out of 60
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week Implementation
Quisitive
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Quisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
40 out of 60
Inviso KickStarter - Microsoft 365 E3 Adoption
Inviso Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Helping customers KickStart features in Microsoft 365 E3 Subscription
41 out of 60
Active Assure Attack Assessment - 3 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Breach and Attack Simulations — We Attack to Defend You
42 out of 60
Onesec Digital Identity
Secure Nextgen Systems
+2
Applicable to:
Identity & Access Management
Threat Protection
Having a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
43 out of 60
Endpoint Management with Security Workshop
Migrate LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Let us show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
44 out of 60
On-Prem Exchange to Office 365 Migration: 4-Wk Migration
Exodus Integrity Services, Inc.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Simplify your email migration process to Office 365 with ease and efficiency.
45 out of 60
Microsoft 365 Security Program - 10 Weeks
Trace3
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
46 out of 60
Capgemini Modern Workspace Portfolio
Capgemini Group
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Capgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
47 out of 60
Secure Productive Workplace: Implement 4-Wk
Netsurit
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Netsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
48 out of 60
Microsoft 365 License Optimization:1-hr Assessment
Frontier Technology, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Review current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
49 out of 60
Microsoft Entra Private Access and Entra Internet Access
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Transform your organization's security landscape with our latest jumpstart, designed to fortify managed applications for your remote workforce and ensure secure access to Microsoft 365.
50 out of 60
Office 365 GCC High Migration +Tenant Imp 4Wk
Summit 7 Systems, Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Companies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
51 out of 60
Microsoft Intune Endpoint Manager Discovery: 1-Mo Assessment
ProServeIT
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Enable organization-wide management & security for your endpoints (mobile devices, workstations, etc.) with a Microsoft Intune Endpoint Manager Discovery.
52 out of 60
Zero Trust Workplace Solution: 3-Wk Implementation
Softchoice
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Solution for organizations wanting to improve their overall security posture by implementing key security features for protecting user identity, devices, and data.
53 out of 60
Windows 365: 5-week Proof of Concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
Enhance productivity through flexibility by enabling your team to create secure Cloud PCs and allowing BYOD without increasing risk to your environment
54 out of 60
Security Outcomes Sprint
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Understand the Business Value of Your Cybersecurity Investments
55 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week Implementation
Options Technology Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
56 out of 60
Windows 365: 4 Week Readiness Assessment
Netrix Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Get an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
57 out of 60
Managed Endpoint Assessment
FSI Strategies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
This four-week engagement will determine the level of effort required for a migration to a fully modern desktop using Microsoft 365 services.
58 out of 60
Microsoft Purview Records Management Assessment & Strategy for Government - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists government departments and agencies with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
59 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
60 out of 60
Précédent
1
2
3
4
5
Suivant