AppSource
תן משוב
עזרה + תמיכה
פריטים שנשמרו
תוכניות פרטיות
רק רגע, מחבר אותך...
הכל
אפליקציות
קטגוריות
תעשיות
שירותי ייעוץ
שותפים
מסננים
נקה הכל
המיקום שלך
מוצרים (1)
מגזרים עסקיים
סוג שירות
שירותי ייעוץ תוצאות
מציג תוצאות ב- שירותי ייעוץ.
הצג
תוצאות קשורות ב- ענני תעשייה
.
כל התוצאות
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk Worshops
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
1 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free Briefing
Netwoven
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Netwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
2 out of 60
MXDR Consultation
CBTS Technology Solutions LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
3 out of 60
Microsoft Cybersecurity Assessment
Akins IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
4 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
5 out of 60
1-Tages Update Workshop: Cloud Security & Compliance mit Microsoft 365
AppSphere AG
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Knowledge & Insights
Entdecken Sie das Fundament der Cloud-Sicherheit für eine Compliance konforme Nutzung von Microsoft 365
6 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5
Collective Insights
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Upgrade to Microsoft 365 E5 for Advanced Productivity and Security
7 out of 60
Windows 365 Assessment - 1 day
CC Bilgi Teknolojileri
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Hybrid Windows for a hybrid world Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
8 out of 60
Securing Identities Workshop: 4-Wk Workshop
ProArch Technologies, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
9 out of 60
Discover Sensitive Data Workshop: 4-Wk Workshop
ProArch Technologies, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
ProArch’s Discover Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data
10 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk Engagement
CloudScale International
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
11 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
12 out of 60
Windows 365 Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
13 out of 60
Secure Live Workspace - 8 Weeks Assessment
LTIMindtree Limited
+3
Applicable to:
Cloud Security
Power Platform for Teams
Teams Custom Solutions
Our Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
14 out of 60
Endpoint Management: 3-Day Workshop
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Begin the steps to manage and protect your devices, your apps, and your users
15 out of 60
Endpoint Management: 2-Week Implementation
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Maintain control over your devices and the data stored on them to stay protected in a cloud-focused environment.
16 out of 60
Microsoft 365 Security: 4-Week Assessment
Apex Digital Solutions
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most and improving your security maturity over time.
17 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk Assessment
Apex Digital Solutions
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
18 out of 60
Cy:lent Pursuit Threat Hunt: 6-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ascent’s intel-based approach to cybersecurity threat hunting helps identify threat actors faster and more accurately than other, more traditional methodologies.
19 out of 60
Endpoint Management: 3-Day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Get an executive deep dive into remote deployment, management, and the security of corporate and BYOD devices in your organization with ECF Data’s Endpoint Management Workshop
20 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
21 out of 60
Zero Trust Implementation
JourneyTEAM
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Unlock the potential of your Microsoft 365 cybersecurity with JourneyTEAM's comprehensive Zero Trust Implementation.
22 out of 60
SecureBlu MDR Service for Microsoft 365 Defender
New Era Technology
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
23 out of 60
Microsoft 365 Migration: 10-Wk Implementation
Neway Technologies
+2
Applicable to:
Cloud Security
Power Platform for Teams
Successfully migrate your Microsoft 365 environment to a managed services model.
24 out of 60
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
25 out of 60
Microsoft Cloud Accelerator Workshops 2-Days
SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Improve NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
26 out of 60
BUI Cyber MDR - 1 Day Discovery Workshop
BUI (Pty) Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
27 out of 60
Cyber Security Assessment
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
28 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
29 out of 60
Microsoft 365 Security Briefing
CDI LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
30 out of 60
Communication Security Quick Start 12-wk Implementation
Edgile, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
31 out of 60
Hybrid Identity Security Quick Start 12-wk Implementation
Edgile, Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
32 out of 60
Microsoft 365 E5 CMMC L1 3 Week Implementation
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 1 using Microsoft 365 security Suite and Azure Sentinel SIEM.
33 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security Services
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
34 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
35 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
36 out of 60
Microsoft Data Compliance Consulting Services - 2 Weeks Assessment
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
The Microsoft 365 Compliance assessment helps organizations implement a compliance strategy that accelerates and streamlines data security and governance while reducing risk.
37 out of 60
MDR Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
“MDR Shield” is Long View’s cyber security managed detection and response service.
38 out of 60
Zero Trust Protect and Govern Sensitive Data
KiZAN Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Lock down your data and take back control. Our Zero Trust Protect and Govern program empowers you to secure your sensitive information, simplify compliance, and gain peace of mind.
39 out of 60
Microsoft Sentinel Workshop and Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
40 out of 60
Protect and Govern Sensitive Data: 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
41 out of 60
Big Green IT Security Assessment: 3-Week
Big Green IT - Dev
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
42 out of 60
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
43 out of 60
1-Day Security & Identity Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Tailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
44 out of 60
MDR for Microsoft Sentinel + XDR-5 Week Implementation
KiZAN Technologies
+2
Applicable to:
Cloud Security
Threat Protection
Implement Managed Threat Detection and Response Services with Microsoft Sentinel and Defender
45 out of 60
Microsoft 365 Security Program - 10 Weeks
Trace3
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
46 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week Implementation
Options Technology Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
47 out of 60
Ransomware Protection: 1 Day-Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
48 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
49 out of 60
Defender for IoT Operational Technology Discovery: 2-Hour Workshop
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT (OT) Discovery Workshop helps you understand the solution, the fit to your OT estate and potential threat posture improvements
50 out of 60
Microsoft 365 Passwordless Authentication: 3-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Unlock a new era of robust authentication with Microsoft's Passwordless Authentication solutions.
51 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
52 out of 60
Zero Trust Security: 3-day Workshop
Oxford Computer Group LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
53 out of 60
Microsoft 365 License Optimization:1-hr Assessment
Frontier Technology, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Review current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
54 out of 60
Microsoft 365: 2-Week Implementation
Technologent
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Expert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
55 out of 60
Data Security and Governance: 3 Day Workshop
Netwoven
+2
Applicable to:
Cloud Security
Information Protection & Governance
Netwoven Data Security and Governance workshop will get you started on the path to discover, protect, and govern your sensitive corporate data
56 out of 60
Active Assure Attack Assessment - 3 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Breach and Attack Simulations — We Attack to Defend You
57 out of 60
Licensing Microsoft 365: 1-day Assessment
Informatika a.d.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
58 out of 60
Conditional Access Penetration Test: 4 Days Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
59 out of 60
Onesec’s Secure Access to Microsoft 365 with Zscaler
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
60 out of 60
הקודם
3
4
5
6
7
הבא