AppSource
Berikan umpan balik
Bantuan + dukungan
Item tersimpan
Paket privat
Tunggu sebentar, kami sedang memasukkan Anda...
Semua
Aplikasi
Kategori
Industri
Layanan Konsultasi
Mitra
Filter
Hapus semua
Lokasi Anda
Produk (1)
Industri
Jenis layanan
Layanan konsultan hasil
Menampilkan hasil dalam layanan konsultan
Tampilkan
hasil terkait di industry clouds
.
Semua hasil
NIST800-171-Microsoft 365-Accelerator-Guided-Deployment
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Provides expert guidance to help organizations achieve NIST 800-171 compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
1 out of 60
Microsoft 365 Migration 12 Hour Proof-of-Concept
New Charter Technologies, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
2 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers detect, investigate, and take action to mitigate risk and ensure compliance in their modern workplace.
3 out of 60
DLP Implementation and Tuning Services
INFOTECHTION
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Reduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
4 out of 60
Infosys Intelligent Security Solution
Infosys Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Infosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
5 out of 60
Avanade Modern Sec Ops FY24
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
6 out of 60
Enterprise Mobility + Security Quickstart for Nonprofit
SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Secure, compliant, and adaptable productivity for mission-driven work
7 out of 60
Mentoring Service
Mobile Mentor
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Our mentoring service helps customers leverage Microsoft 365 to improve endpoint security & user experience. We help accelerate the learning curve & reduce risk by deploying Microsoft 365 optimally.
8 out of 60
MDM Health Check (All OS): 2-week Assessment
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
9 out of 60
Microsoft Defender for Cloud Apps: 2-Hr Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
10 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
11 out of 60
Microsoft Defender for Endpoint SMC Deployment: 4-Week Implementation
BlueVoyant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our services are designed to maximize your investment with Microsoft with hands-on onboarding & baseline configuration services.
12 out of 60
Defender for Endpoint Professional Security Services | Customized Deployment in as Little as 6-Weeks
Difenda
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize your Microsoft Security investment with our Defender for Endpoint Design & Implementation.
13 out of 60
Defender for IoT Enterprise: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understanding risk with unmanaged IoT devices can be difficult. Our Defender for Enterprise IoT Proof of Concept helps you visualise and understand the threats to your environment.
14 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
15 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-Weeks
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
16 out of 60
Microsoft 365 Security Health Check Assessment 3-Wk
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
17 out of 60
Defender Pilot
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
The Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
18 out of 60
Overwatch Microsoft 365 Security: 12 Month Implementation
THREATSCAPE LIMITED
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Overwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
19 out of 60
Windows 365 Pilot: 5 Days Proof of Concept
Delphi Consulting
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Delphi Consulting will help you get started with Windows 365 Cloud-PC with its Pilot offering with the program running over 5 days.
20 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for Endpoint
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
21 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process Adoption
Vitalyst
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
22 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
23 out of 60
Windows 365 Standardized Pilot
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
24 out of 60
MDR for Microsoft Defender
ADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.
+2
Applicable to:
Cloud Security
Threat Protection
Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
25 out of 60
Protect and Govern Sensitive Data: 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
26 out of 60
Onesec Identity Governance Lifecycle Assessment
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
27 out of 60
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
28 out of 60
Microsoft OT/IOT Security : 2-Wks Assessment
Wipro Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Identify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
29 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security Services
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
30 out of 60
Protect 365 App - 1 hour implementation
Cloud Life
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
31 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
32 out of 60
Deploying Purview Data Security - Labels and DLP
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
A dependable approach to deployment of Data Security workloads led by governance and following our standard framework for Microsoft 365 customers
33 out of 60
Egyptian Data Protection Law: 2 Days Workshop
GLOBAL BRANDS
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
34 out of 60
ANECT Security Monitoring and Response 3 Months PoC
ANECT a.s.
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
35 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week Implementation
Beyondsoft Brasil
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
36 out of 60
Data Protection and Compliance Quick Start
Softchoice
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
The Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
37 out of 60
Red Canary Defend Against Threats Siem Plus XDR Workshop
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
38 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Understand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
39 out of 60
Microsoft 365 Copilot: 1-Day Assessment
Data Market Bilgi Hizmetleri A.S
+3
Applicable to:
Adoption & Change Management
Cloud Security
Power Platform for Teams
How Microsoft 365 Copilot can transform your business and the overall concepts you must understand to better daily business life.
40 out of 60
Microsoft 365 Defender SMC Deployment: 4-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Let BlueVoyant take your security and compliance posture to the next level by deploying and optimizing Microsoft 365 Defender.
41 out of 60
Onesec’s Secure Access to Microsoft 365 with Zscaler
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
42 out of 60
Microsoft 365 Security Assurance Service: Assessment
Performanta
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
43 out of 60
System Center Endpoint Manager 40 hour Quick Start Proof of Concept with Co-Management with Endpoint Manager in Office 365
York Telecom Corp
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
System Center Endpoint Manager 40-Hour Quick Start Proof-of-Concept. Design, deploy and learn SCEM in 40-hour proof-of-concept with Co-Management with Endpoint Manager Office 365
44 out of 60
Microsoft Cloud Accelerator Workshops 2-Days
SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Improve NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
45 out of 60
Defender for Endpoint Managed Service
e2e-assure Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
46 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
47 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
48 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
49 out of 60
MDR Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
“MDR Shield” is Long View’s cyber security managed detection and response service.
50 out of 60
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
51 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
52 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk Worshops
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
53 out of 60
Cyderes Managed Security Services for Microsoft Sentinel
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
54 out of 60
Microsoft Endpoint Management: 3- W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
55 out of 60
Windows 365: 4 Week Readiness Assessment
Netrix Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Get an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
56 out of 60
1-Tages Update Workshop: Cloud Security & Compliance mit Microsoft 365
AppSphere AG
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Knowledge & Insights
Entdecken Sie das Fundament der Cloud-Sicherheit für eine Compliance konforme Nutzung von Microsoft 365
57 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
58 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week Implementation
Options Technology Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
59 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
60 out of 60
Sebelumnya
1
2
3
4
5
Berikutnya