AppSource
Berikan umpan balik
Bantuan + dukungan
Item tersimpan
Paket privat
Tunggu sebentar, kami sedang memasukkan Anda...
Semua
Aplikasi
Kategori
Industri
Layanan Konsultasi
Mitra
Filter
Hapus semua
Lokasi Anda
Produk (1)
Industri
Jenis layanan
Layanan konsultan hasil
Menampilkan hasil dalam layanan konsultan
Tampilkan
hasil terkait di industry clouds
.
Semua hasil
Protection des applications -4-Week Implementation
EXAKIS NELITE
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Une vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
1 out of 28
Cybersecurity Infrastructure - 1d Workshop
Bechtle AG
+1
Applicable to:
Cloud Security
Mission afin d’évaluer la sécurité de vos actifs Microsoft et proposer des correctifs pour mieux sécuriser votre environnement.
2 out of 28
Frontline Workers : 3 jours - Évaluation
ALFUN
+3
Applicable to:
Cloud Security
Frontline Workers
Power Platform for Teams
Digitalisez vos métiers en fournissant des solutions adaptées à vos équipes sur le terrain !
3 out of 28
Microsoft 365 Sécurité : 1-S implémentation
EFISENS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Bénéficiez d’une sécurité complète et protéger votre entreprise contre les menaces avancées en temps réel
4 out of 28
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
5 out of 28
Data Classification and labelling: 6-Months Impl.
Toreon CVBA
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Data classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
6 out of 28
Protection de l'identité : Implémentation 1 mois
ROXYS
+2
Applicable to:
Cloud Security
Threat Protection
Vous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
7 out of 28
Threat Protection: 5-Week Workshop
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
An executive deep dive into security strategy, tailored to your organization.
8 out of 28
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
9 out of 28
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
10 out of 28
Secure Your SaaS/IaaS: 1-Mth Proof of Concept
Vorstone
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Proof of Concept on how you can secure your Saas and/or IaaS
11 out of 28
Shadow IT: 6-Wk Proof of Concept.
Vorstone
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Proof of Concept in order to identify applications not controlled by your IT department
12 out of 28
Passwordless: 3-Wk Proof of Concept
Vorstone
+2
Applicable to:
Cloud Security
Identity & Access Management
Remove the use of password on your Information System
13 out of 28
Audit SSI: 1-Wk Assessment
Vorstone
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Assessment in order to identify the weaknesses of your IaaS/SaaS
14 out of 28
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Nil d.o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
15 out of 28
ModernIdentity: 3-Months Implementation
Econocom Workplace infra Innovation
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Unifier la gestion des identités et des accès grâce à Microsoft 365
16 out of 28
Evaluation Outils sécurité Microsoft 365: 5-D Assessment
ELIADIS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Evaluez vos menaces et découvrez les outils sécurité Microsoft 365, à destination des DSI de sociétés de 300 à 5000 users. Découvrez, améliorez votre sécurité, élaborez un plan sécurité avec un expert
17 out of 28
Sécurisation-terminaux- Microsoft 365: 5-D Assessment
ELIADIS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Découvrir, apprendre, protéger, sécuriser les identités de l'ensemble des terminaux avec Endoint manager. Obtenir des recommandations expertes sur les prochaines étapes de sécurisation des appareils.
18 out of 28
FONDATION ZERO TRUST - 2 Days Atelier
GLOBAL INFO
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Construire les fondations du modèle de sécurité « Zero Trust » avec la sécurité des identités
19 out of 28
Microsoft 365 Defender Enterprise Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Manage and Investigate Risk and Threat Protection
20 out of 28
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POC
Bitscape
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
21 out of 28
Microsoft Cloud App Security: 2 Week Implementation
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Cloud Security
Keep your employees productive and secure on their favorite apps and devices with Cloud App Security. Bring the security of your on-premises systems to your cloud applications.
22 out of 28
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
23 out of 28
Microsoft 365 (SaaS), Azure (IaaS), Hybrid - Managed SAM Services: 6-Months Implementation
SCHNEIDER IT MANAGEMENT SARL & CIE SECS
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Workplace Analytics
All-in Managed Software Asset Management (SAM) Services Implementation. Manage the Consumption & Compliance of your Software Assets - no matter if Microsoft 365 (SaaS), Azure (IaaS) or Hybrid.
24 out of 28
Microsoft 365 Governance: 1 month Assessment
Crayon
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Crayon Microsoft 365 Governance Assessment will assess your configuration and build recommendation report
25 out of 28
Smart Services - Security - 12 months Implementation
Elgon S.A.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Smart Services, mise en place des bonne pratique sécurité pour vos service Microsoft 365 et Azure
26 out of 28
CLOUD PC - 3 Days - Atelier
GLOBAL INFO
+2
Applicable to:
Cloud Security
Identity & Access Management
Offrez à vos employés l'accès à une expérience de bureau sécurisée, où qu'ils soient
27 out of 28
MODERN MANAGEMENT- 2 Days - Atelier
GLOBAL INFO
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Gérez et protégez matériels, données et utilisateurs avec Microsoft Endpoint Manager afin d'améliorer le niveau de sécurité global de votre plateforme
28 out of 28
Sebelumnya
1
2
3
4