AppSource
Visszajelzés küldése
Súgó és támogatás
Mentett elemek
Privát csomagok
Kis türelmet, bejelentkezés folyamatban...
Összes
Alkalmazások
Kategóriák
Ágazatok
Tanácsadási szolgáltatások
Partnerek
Szűrők
Az összes törlése
Az Ön tartózkodási helye
Termékek (1)
Iparágak
Szolgáltatástípus
Tanácsadási szolgáltatások eredmény
találat látható innen: tanácsadási szolgáltatások.
Nézet
kapcsolódó eredmény itt: iparági felhők
.
Az összes találat
Microsoft 365 Governance: 1 month Assessment
Crayon
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Crayon Microsoft 365 Governance Assessment will assess your configuration and build recommendation report
1 out of 60
Always on VPN - Implementation Service - 2 Weeks
PowerONPlatforms Limited
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Have a secure Microsoft Always On VPN Environment deployed quickly and effectively to support your remote working needs
2 out of 60
Microsoft 365 Security Assessment: 2 Week Assessment
Kontex Security Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
3 out of 60
Adoption d'Intune Autopilot : 5 jours
Econocom Products & Solutions Belux
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Scénarios d'adoption zerotouch avec Intune Autopilot dans Microsoft 365
4 out of 60
Microsoft 365 configuration + Email migration
Senetic S.A.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
We will launch your Microsoft 365 solution package and migrate your company's mailboxes!
5 out of 60
Office 365 GCC High Migration +Tenant Imp 4Wk
Summit 7 Systems, Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Companies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
6 out of 60
Microsoft 365 Security Essentials Implementation Service
Softcat
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Kick-starting your Microsoft 365 security position, aligning with industry best practice standards.
7 out of 60
Windows 365 Cloud PC: 4-Wk Proof of Concept
Signal Alliance
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Discover how Signal Alliance Consulting helps you get started with Windows 365, the worlds first cloud PC that helps you access your data from anywhere, anytime from any device.
8 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementation
Cloudshift
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
9 out of 60
HPT Nextgen Windows Experience_02 days workshop
HPT Vietnam Corporation
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
NextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
10 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
11 out of 60
Managed Collaboration Suite: 4 Week Implementation
Logicalis UK
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Meeting Rooms for Microsoft Teams
The Logicalis Collaboration Suite enables employees to collaborate effectively and provides management with clear benchmarking and analytics to track adoption and measure success.
12 out of 60
Collaboration & Data Governance 4-Week Implementation
HTG
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
HTG’s Collaboration & Data Governance pack can help companies achieve the right balance of user freedom while ensuring compliance with corporate policies.
13 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
14 out of 60
Protect and Govern Healthcare Data Workshop - 3 Day Workshop
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft-Funded Workshop to discuss and understand the hidden privacy and regulatory risks of healthcare data and how to mitigate with actionable next steps
15 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Microsoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
16 out of 60
Introduction to AI & Microsoft 365 Copilot - 2 Day Workshop
CDW UK LTD
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
Demonstrate how AI & Microsoft 365 Copilot can revolutionize your business.
17 out of 60
SCC XDR Pathfinder
SCC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Boost Your Security Posture With SCC's XDR Pathfinder
18 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
19 out of 60
Secure Microsoft 365 Managed Service
CW Systems Integration Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
20 out of 60
BYOD 365: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
The BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
21 out of 60
Microsoft 365: 2-Week Assessment
Practical Solutions, Inc
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
22 out of 60
PwC Digital Identity: 4-Wk Assessment
PricewaterhouseCoopers UK
+2
Applicable to:
Cloud Security
Identity & Access Management
PwC provides leading class Identity and Access Management advisory, assurance and delivery services that offer distinctive value and enable clients to optimise their digital services and processes.
23 out of 60
Modern Endpoint Management - 2 Hour Assessment
PowerONPlatforms Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
2 Hour Assessment with a Solutions Consultant to assist in developing the potential roadmap leveraging your existing Microsoft 365 investment with a supporting recommendations and next steps report.
24 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Conscia A/S
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
25 out of 60
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
26 out of 60
Device Security Management with Microsoft Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Seamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
27 out of 60
Infra & Network Monitoring with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Boost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
28 out of 60
Device Domain Migration from On-Premises to Cloud
AVA SOFTWARE INC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Seamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
29 out of 60
Integrating Microsoft Sentinel with External EDR Service
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
30 out of 60
Device Monitoring with Microsoft Defender for Endpoint
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
31 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
32 out of 60
Zero Trust Security: 3-day Workshop
Oxford Computer Group LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
33 out of 60
Microsoft 365 Copilot Readiness Assessment
Insentra Pty Ltd
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Through consultative advisory workshops, the assessment provides a roadmap to help you identify key persona's and use cases where Copilot will have the biggest impact
34 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
35 out of 60
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
36 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
37 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
38 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
39 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
40 out of 60
Microsoft 365 Security Assessment: 6-day Assessment
Performanta
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Performanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
41 out of 60
Atos || Pilot program for Windows 365
Atos International SAS
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Atos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
42 out of 60
UEM Migration Accelerator: 2-Weeks Implementation
CW Systems Integration Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune UEM Migration Accelerator Service - Accelerate your migration to Microsoft Intune UEM platform by up to 80%
43 out of 60
Windows 365 Managed Service
SIX DEGREES TECHNOLOGY GROUP LTD
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Deploy and Manage Windows 365 Cloud PC's from a trusted Microsoft Expert MSP.
44 out of 60
Security Maturity Assessment - 4 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
45 out of 60
Connect by Centrality : Cloud Native ever green best in class Windows 10/11 & Microsoft 365 end user experience delivered as managed service
CENTRALITY LTD
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Connect by Centrality: Cloud Native Windows & Microsoft 365 end user experience that is simple, seamless and secure (Cyber Essential + Ready) which is always up to date delivered as a managed service
46 out of 60
UNITE: Exploring E5 Security Workshop_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
UNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
47 out of 60
Security Assessment Microsoft 365: 2day assessment
Prodware Group
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
A service for Office 365 and Microsoft 365 protection
48 out of 60
Information Governance Pre-study
Advania Finland Oy
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
This prestudy gets you started to create a framework for information governance and compliance, help your organization to direct and control activities and meet external standards and obligations.
49 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
50 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
51 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
52 out of 60
Endpoint Privilege Management with Intune Suite: 6-Wk Implementation
PHOENIX SOFTWARE LTD
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
During this implementation we'll discover your application requirements, define Endpoint Privilege Management rules based on the discovery and roll these out to your end user base.
53 out of 60
BCN Intranet Lite
BCN Group Ltd.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
54 out of 60
Guest Lifecycle for Azure AD
Swiss IT Security AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Guest Lifecycle for Azure AD (GL4AAD) handles maintenance and hygiene tasks for you.
55 out of 60
Office 365 Managment: 1 Day Assessment
Eze Castle Integration
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
ECI will review your Office 365 Tennant Configuration and suggest on-going managment needs
56 out of 60
Microsoft 365: 1 Day Secure Score and Tenant Review
Cobweb Solutions Ltd.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cobweb’s Secure Score and Tenant Review offers to help you gain visibility of your existing tenant configuration and outstanding security recommendations.
57 out of 60
Microsoft 365 Security: 6-Day Implementation
Cloud Direct
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
58 out of 60
Windows 365 Cloud PC 10-Days PoC
Sonata Information Technology Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Paid Assessment and PoC to deploy and use Windows 365 Cloud PC
59 out of 60
Windows 365 Proof of Concept
Agilisys Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
The Windows 365 proof of concept will deliver an operational pilot that allows you to validate the cloud PC against your use-case and requirements.
60 out of 60
Vissza
1
2
3
4
5
Tovább