AppSource
תן משוב
עזרה + תמיכה
פריטים שנשמרו
תוכניות פרטיות
רק רגע, מחבר אותך...
הכל
אפליקציות
קטגוריות
תעשיות
שירותי ייעוץ
שותפים
מסננים
נקה הכל
המיקום שלך
מוצרים (1)
מגזרים עסקיים
סוג שירות
שירותי ייעוץ תוצאות
מציג תוצאות ב- שירותי ייעוץ.
הצג
תוצאות קשורות ב- ענני תעשייה
.
כל התוצאות
Phishing, Malware & Spam protection- 2 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
1 out of 60
4-Day Security Assesment
HSO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
2 out of 60
Mobile Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Corporate Mobile Devices (iOS, Android and macOS)
3 out of 60
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
4 out of 60
ANECT Security Monitoring and Response 3 Months PoC
ANECT a.s.
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
5 out of 60
Infosys Intelligent Security Solution
Infosys Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Infosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
6 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
7 out of 60
CASB (MCAS) Advisory: 2-week Workshop Series
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
8 out of 60
Secure Modern Workplace Platform Implementation
Cognizant
+3
Applicable to:
Adoption & Change Management
Teamwork Deployment
Threat Protection
Enables teams to securely collaborate, connect and be more productive than ever before, no matter when or where they work.
9 out of 60
Defend Against Threats with SIEM Plus XDR usage Workshop
Orange Business Services - Global
+1
Applicable to:
Threat Protection
Our workshop will help you designing and deploying Microsoft security technologies for your unique needs.
10 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
11 out of 60
Email Security Threat Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
12 out of 60
Baseline Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Aware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
13 out of 60
Insider Risk Management: 8-Wk implementation
PwC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
14 out of 60
Device as a Service with Windows 11 and Intune: 4 Week Implementation
Cognizant
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Windows 10 has revolutionized how organizations manage operating systems, delivering the features that you have come to know and rely on, while enhancing mobility and agility without losing data.
15 out of 60
Copilot - 2 Days Adoption Workshop
INSOMEA COMPUTER SOLUTIONS TUNISIE SARL
+2
Applicable to:
Frontline Workers
Threat Protection
INSOMEA will help users in adopting copilot within companies from different sectors and sizes
16 out of 60
Protect 365 App - 1 hour implementation
Cloud Life
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
17 out of 60
ASD Essential 8 Assessment and Roadmap: 10-day Assessment
QUORUM SYSTEMS PTY LTD
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Quorum’s Essential 8 Assessment & Roadmap guides you to prioritise valuable remediations within a strategic roadmap, enabling quick wins, & developing strategies to tackle more complex use-cases.
18 out of 60
Microsoft Defender for Server:5-day Implementation
Delphi Consulting
+2
Applicable to:
Cloud Security
Threat Protection
Delphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
19 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
20 out of 60
Unified Endpoint Mgmt. - 6 Weeks - Implementation
TCS - Digital Workplace
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
TCS Unified Endpoint Management combines Microsoft Intune, Microsoft Defender for Endpoint and Configuration Manager solutions to provide modern management of endpoints with a Zero Trust strategy.
21 out of 60
Data#3 Defend against threats: - 8-weeks Implementation
Data#3 Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats using Microsoft Defender, Azure Defender and Azure Sentinel provides you with an integrated solution to protect your organisation.
22 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
23 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
24 out of 60
Cloud Safeguard - 12 Month Implementation
Rapid Circle
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our Cloud Safeguard managed security service enables customers to focus on core business and innovation while we keep your Microsoft 365 platforms safe & secure.
25 out of 60
Microsoft 365 Licence Health Check: 1-Day Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
26 out of 60
Ransomware & Supply Chain Incident Management: 12 Hour Assessment
Maureen Data Systems
+3
Applicable to:
Compliance Advisory Services
Knowledge & Insights
Threat Protection
Identify vulnerabilities within your organization, including those who pose a threat to your supply chain, provide & mature a tailored incident response & management program.
27 out of 60
Citadel Security Managed Services
Datacom
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Datacom Citadel provides managed security delivered by Datacom specialists in partnership with Microsoft and their cybersecurity solution stack. Citadel delivers proactive and effective security.
28 out of 60
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
29 out of 60
Security and compliance assessment with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Fortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
30 out of 60
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
31 out of 60
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
32 out of 60
Conditional Access & MFA 5d Proof of Concept
Generation-e Productivity Solutions Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conditional Access and Multi Factor Authentication deployed without negatively impacting users. We setup the environment then deploy 5 devices plus train you how to do the rest.
33 out of 60
Defender for Endpoint: 5-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
34 out of 60
Microsoft 365 Security Assessment: 6-day Assessment
Performanta
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Performanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
35 out of 60
Teams & SharePoint Security Hardening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
36 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
37 out of 60
Copilot Data Protection
Cloud Life
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
38 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
39 out of 60
Office 365 Teamwork Security - Managed Service
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Teamwork Security provides a comprehensive security management service for Office 365 platforms
40 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
41 out of 60
BYOD Intune 1-Wk Accelerated Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Bring Your Own Device (BYOD) capability
42 out of 60
Microsoft 365 Secure Score: 2 Week Assessment
Insight
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Align your security priorities with best practice management and protection of your devices, apps and users.
43 out of 60
Defender for IoT Operational Technology Discovery: 2-Hour Workshop
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT (OT) Discovery Workshop helps you understand the solution, the fit to your OT estate and potential threat posture improvements
44 out of 60
G Suite to Office 365 migration: 1-Hour Assessment
True.org Cloud
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
Assessment of your current G Suite environment to plan migration to Office 365
45 out of 60
Microsoft Cloud Security Accelerator: 3 week implementation
Satalyst Pty Ltd
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Satalyst’s Microsoft Cloud Security Accelerator is designed to strengthen security quickly and enable an organisation to monitor and manage security events effectively.
46 out of 60
Microsoft 365 Defender - MXDR Service - 1 Year Implementation
CGI Inc.
+1
Applicable to:
Threat Protection
Unleash your Microsoft Defender 365 capabilities. Automatically detect & correlate threat signals across your endpoints, email, cloud applications, identities, cloud and on-premises workloads.
47 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
48 out of 60
SharePoint and Teams Security - 2 week assessment
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Confident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
49 out of 60
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
50 out of 60
Microsoft Endpoint Management: 3- W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
51 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
52 out of 60
Unified Endpoint Management: 8-Wk Assessment
Zetta Pty Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Zetta’s Assessment and Optimisation engagement will assess the way you currently manage your corporate devices and advise you on how to modernise your endpoint management.
53 out of 60
"Threat Protection: 3 Day Workshop"
Insentra Pty Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
54 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
55 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
56 out of 60
Windows Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
57 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefing
SMART business LLC
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
58 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
59 out of 60
HPT Mitigate Compliance and Privacy Risk_1-Day Workshop
HPT Vietnam Corporation
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Understand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
60 out of 60
הקודם
1
2
3
הבא