AppSource
Visszajelzés küldése
Súgó és támogatás
Mentett elemek
Privát csomagok
Kis türelmet, bejelentkezés folyamatban...
Összes
Alkalmazások
Kategóriák
Ágazatok
Tanácsadási szolgáltatások
Partnerek
Szűrők
Az összes törlése
Az Ön tartózkodási helye
Termékek (1)
Iparágak
Szolgáltatástípus
Tanácsadási szolgáltatások eredmény
találat látható innen: tanácsadási szolgáltatások.
Nézet
kapcsolódó eredmény itt: iparági felhők
.
Az összes találat
Cybersecurity Risk Assessment 2 Weeks
White Hat Consultores S.A. de C.V.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Evaluación de ciberseguridad para la detección de riesgos y construcción de un programa de mejora
1 out of 30
Seguridad en Identidades con Microsoft 365
DATCO SA
+1
Applicable to:
Identity & Access Management
Configuración, Soporte, Capacitación e Implementación de seguridad en identidades con Microsoft 365
2 out of 30
Microsoft Defender for Identity Deployment: 1 Week Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
Identity & Access Management
Insider Risk
Identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
3 out of 30
Microsoft Intune Deployment: 2 Weeks Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Manage and protect connection points for better hybrid work experiences and lower total cost of ownership with Intune.
4 out of 30
Microsoft 365 Defender for Endpoints Deployment: 2 Weeks Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Protect your organization's devices against advanced threats such as malware, ransomware, phishing and zero-day attacks.
5 out of 30
Microsoft Entra Deployment: 3 Week Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Protect all identities and secure access to any resource with a family of multi-cloud identity and network access solutions.
6 out of 30
Secure Identities & Access Workshop: 4 Weeks of Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
Cloud Security
Identity & Access Management
The objective of the workshop is to help customers find and mitigate identity risks and protect your organization with a seamless identity solution.
7 out of 30
Identity Governance Lifecycle: 4 Weeks of Assessment
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The objective of the assessment is to identify areas for improvement and potential risks in the identity environment, based on the maturity level of the organization's identity governance model.
8 out of 30
Intune Implementación Estándar
Suri Services SC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
En Suri Services, te ayudamos a implementar Microsoft Intune, una solución que mejora la seguridad y facilita la gestión de tus dispositivos y aplicaciones.
9 out of 30
Suri Services y Microsoft Defender for Endpoint: Tu Escudo de Seguridad Empresarial
Suri Services SC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Suri Services, en colaboración con Microsoft Defender for Endpoint, ofrece una solución de seguridad excepcional para tus puntos de acceso.
10 out of 30
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
11 out of 30
Microsoft Cloud application security Assessment - 2 weeks
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
12 out of 30
Manage Corporate Data on Devices with Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Can you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
13 out of 30
Microsoft Cloud Apps Security Solutions for Custom Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Know your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
14 out of 30
Data Access Control with MCAS
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
15 out of 30
Microsoft Cloud Application for 3rd Party Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
16 out of 30
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
17 out of 30
Microsoft Cloud Apps Security for Microsoft 365 Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
18 out of 30
Shadow IT discovery with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
19 out of 30
Threat Detection with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
20 out of 30
Microsoft 365 Defender for Endpoint Vulnerability Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
21 out of 30
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
22 out of 30
Secure Remote Work: 3 Days Intro and Plan Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Engagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
23 out of 30
Securing Identities: 3 Days Workshop
INOVASYS FOR SYSTEMS
+1
Applicable to:
Identity & Access Management
Microsoft funded Securing Identities is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
24 out of 30
Zero-trust collaboration security 6wk Implement
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
25 out of 30
Zero-Trust Secure Email 6wk Imp
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
26 out of 30
Intune for Android: 2-wk Imp
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Android devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
27 out of 30
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
28 out of 30
Secure Hybrid Identity - Defender for Identity: 6 week Implementation
Performanta
+2
Applicable to:
Identity & Access Management
Threat Protection
Secure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
29 out of 30
Endpoint Management and Windows Deployment: 2-days Implementation
CC Bilgi Teknolojileri
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
Microsoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises.
30 out of 30
Vissza
1
2
3