AppSource
Berikan umpan balik
Bantuan + dukungan
Item tersimpan
Paket privat
Tunggu sebentar, kami sedang memasukkan Anda...
Semua
Aplikasi
Kategori
Industri
Layanan Konsultasi
Mitra
Filter
Hapus semua
Lokasi Anda
Produk (1)
Industri
Jenis layanan
Layanan konsultan hasil
Menampilkan hasil dalam layanan konsultan
Tampilkan
hasil terkait di industry clouds
.
Semua hasil
Microsoft 365 Security: 2-week assessment
Mirai Security Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
1 out of 60
OneSec Defender for Endpoint – Migration offer
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
The OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
2 out of 60
Free Microsoft 365 Defender Suite 4–6-hour Proof of Concept
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
This free, 4–6-hour workshop will provide you with a hands-on experience using Microsoft 365 Defender, Microsoft Defender for Office 365, Microsoft Defender for Endpoint
3 out of 60
Threat Protection - 2 Days Workshop
Mayasoft Bilgi Sistemleri A.S.
+2
Applicable to:
Cloud Security
Threat Protection
We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
4 out of 60
GoDaddy to Direct Microsoft 365 Migration 2 Hrs Proof of Concept
true org cloud
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Remove GoDaddy and other third-party entities from your tenant, reclaiming internal control over your systems.
5 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
6 out of 60
Avanade Security Business Value 4-Wk Assessment FY24
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
7 out of 60
Viva Insights Workshop
CDW
+3
Applicable to:
Cloud Security
Microsoft 365 Live Events
Teams Custom Solutions
The Enablement Workshop for Microsoft Viva from CDW focuses on finding your organization’s pain points, and it identifies how the Viva platform can help
8 out of 60
Microsoft 365 Defender Rapid Deployment - Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
9 out of 60
Security - Managed Defender - One-Pager - Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
10 out of 60
Sentinel Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
11 out of 60
Sensitive Data Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Sensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
12 out of 60
Microsoft 365 Security and Compliance Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Microsoft 365 Security and Compliance Assessment evaluates your current security posture, identifies vulnerabilities, and offers tailored solutions to enhance your data security and compliance.
13 out of 60
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
14 out of 60
Information Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Our approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
15 out of 60
Microsoft 365 Security 4 Weeks Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
16 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POC
Long View Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure and manage your cloud environments by fortifying your infrastructure against emerging threats.
17 out of 60
4-Day Security Assesment
HSO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
18 out of 60
Microsoft 365 Incident Response - 5 Week Assessment
Protiviti
+2
Applicable to:
Cloud Security
Threat Protection
Assessing the advanced security capabilities of Microsoft 365
19 out of 60
Microsoft 365 OnDemand - 2 Week Implementation
Protiviti
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Microsoft 365 On Demand Support - providing you with dedicated experts to support and maintain your Microsoft 365 environment
20 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
21 out of 60
Compliance Workshop: Data Risk Management
Avaleris
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
A structured approach to discover risks related to organizational data and mapping these risks to solutions that will help manage and protect data and mitigate the associated risks
22 out of 60
Secure Work from Anywhere Workshop
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Teamwork & collaboration are needed to build resilience for your people, teams, & organization. Empower people to be productive & secure as they adapt to new ways of working with Microsoft365
23 out of 60
Hybrid Identity and Security Expert Consulting Imp
Ravenswood Technology Group, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ravenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
24 out of 60
EM+S Consulting Services: 4-Weeks Implementation
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
We will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
25 out of 60
Cybersecurity - 3-Wk Assessment
adaQuest
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
With the Cybersecurity Assessment we take a four-phased approach to set your path forward to the cloud.
26 out of 60
QC Education- Threat Protection - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #14 and provide high-level recommendations to achieve compliance.
27 out of 60
QC Education- Identity Management- 2Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #4 and provide high-level recommendations to achieve compliance.
28 out of 60
Quebec Education - DLP - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #5 and #6 and provide high-level recommendations to achieve compliance.
29 out of 60
Mobile Device Management - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #1, #2 and #3 and provide high-level recommendations to achieve compliance.
30 out of 60
QC Education Security Directives -1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This one day GAP Analysis will help you assess your current state of compliance for Quebec Ministry of Education Security Directives and provide high-level recommendations to address any shortcomings.
31 out of 60
Microsoft Security Workshop: 3-day
Oxford Computer Group LLC
+2
Applicable to:
Cloud Security
Threat Protection
This 3-day workshop shows you how to put Microsoft’s security capabilities to work. Learn how secure your organization is now and how to mitigate and protect against threats in the future.
32 out of 60
Defend Against Threats with SIEM Plus XDR
Netrix Global
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
33 out of 60
Hybrid Return to Work Enablement: 4 Wk-Assessment
Insight Canada Inc
+3
Applicable to:
Cloud Security
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
This offer helps enable your hybrid return to work strategy and ensure your organization is ready for this transition.
34 out of 60
Secure Workspace: 1 Day Workshop
Watserv Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
35 out of 60
Microsoft 365 Security: 1-Day Briefing
Netrix Global
+1
Applicable to:
Cloud Security
A tailored planning engagement targeted at ensuring your Microsoft cloud solutions are aligned with your needs.
36 out of 60
Enterprise Mobility - 1 Day Briefing
Avaleris
+2
Applicable to:
Cloud Security
Mobile Device Management
Avaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Enterprise Mobility policies, procedures and technology against best practices.
37 out of 60
Threat Protection - 1 Day Briefing
Avaleris
+2
Applicable to:
Cloud Security
Threat Protection
Avaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Threat Protection policies, procedures and technology against best practices.
38 out of 60
Enterprise Identity and Governance -1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Avaleris developed a Capability Maturity Model to help organizations quickly assess the current state of Identity Management and Governance policies, procedures and technology against best practice.
39 out of 60
Information Protection - 1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Avaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Information Protection policies, procedures and technology against best practices.
40 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
41 out of 60
Sauvegarde Microsoft 365 : 2Wk - implementation
Projetlys
+2
Applicable to:
Cloud Security
Information Protection & Governance
Ensemble de service permettant de mettre en place facilement une solution de backup Veeam pour Microsoft 365 ?
42 out of 60
Adoptez Microsoft Edge : 2-Wk Implementation
Projetlys
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Notre approche pour la mise en place et l'adoption de Microsoft Edge.
43 out of 60
Microsoft 365 Security Assessment - 4wk Assessment
Protiviti
+1
Applicable to:
Cloud Security
Effective Analysis of CIS & NIST Benchmarking, Active Directory to Azure and Microsoft 365 Configurations
44 out of 60
Security Maturity Assessment: 4 Wks
Lixar IT
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Let BDO help you design your roadmap to increase your security score with cost-effective security tools with our 4 week Security Maturity Assessment
45 out of 60
BDO eDiscovery: 4 Wk Assessment
Lixar IT
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Centralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
46 out of 60
Insider Risk Management Assessment: 4 Wks
Lixar IT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
BDO's Insider Risk Management Assessment can help you identify insider data risks and establish a plan to reduce data leakage using Microsoft 365 to ensure compliance and security.
47 out of 60
Defender for Office 365: 3-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
48 out of 60
Microsoft 365 Digital Workforce Workshop
VNEXT Group
+3
Applicable to:
Cloud Security
Knowledge & Insights
Teams Custom Solutions
Learn how to empower people to be more productive and secure as they adapt to new ways of working with Microsoft 365.
49 out of 60
User Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
50 out of 60
Endpoint Management: 5-Days Workshop
VNEXT Group
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Learn how to manage users’ devices, apps, and identities from anywhere.
51 out of 60
Securing Identities Workshop: 4-Wk Workshop
ProArch Technologies, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
52 out of 60
Discover Sensitive Data Workshop: 4-Wk Workshop
ProArch Technologies, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
ProArch’s Discover Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data
53 out of 60
Defend Against Threats with SIEM Plus XDR: 8H Workshop
adaQuest
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
54 out of 60
Microsoft 365 HIPAA/HITECH 20 Hour Implementation
New Charter Technologies, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Implementation of Microsoft 365 to include compliance policies and templates for health care.
55 out of 60
Modern Frontline Work Acceleration 2 days Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
LiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
56 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
57 out of 60
Zero-trust collaboration security 6wk Implement
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
58 out of 60
Zero-Trust Secure Email 6wk Imp
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
59 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
60 out of 60
Sebelumnya
1
2
3
4
5
Berikutnya