AppSource
Berikan umpan balik
Bantuan + dukungan
Item tersimpan
Paket privat
Tunggu sebentar, kami sedang memasukkan Anda...
Semua
Aplikasi
Kategori
Industri
Layanan Konsultasi
Mitra
Filter
Hapus semua
Lokasi Anda
Produk (1)
Industri
Jenis layanan
Layanan konsultan hasil
Menampilkan hasil dalam layanan konsultan
Tampilkan
hasil terkait di industry clouds
.
Semua hasil
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
1 out of 58
Microsoft Cloud Accelerator Workshops 2-Days
SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Improve NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
2 out of 58
Microsoft 365 Secure Score: 2 Week Assessment
Insight
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Align your security priorities with best practice management and protection of your devices, apps and users.
3 out of 58
Secure Hybrid & Multi-Cloud: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
4 out of 58
CASB (MCAS) Advisory: 2-week Workshop Series
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
5 out of 58
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk Worshops
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
6 out of 58
Microsoft 365 Security Assessment: 2 Week Assessment
Kontex Security Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
7 out of 58
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
8 out of 58
Citadel Security Managed Services
Datacom
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Datacom Citadel provides managed security delivered by Datacom specialists in partnership with Microsoft and their cybersecurity solution stack. Citadel delivers proactive and effective security.
9 out of 58
Microsoft 365 Plan for Success:3-d Assessment
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
10 out of 58
Microsoft 365 Migration 12 Hour Proof-of-Concept
New Charter Technologies, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
11 out of 58
Cloud Safeguard - 12 Month Implementation
Rapid Circle
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our Cloud Safeguard managed security service enables customers to focus on core business and innovation while we keep your Microsoft 365 platforms safe & secure.
12 out of 58
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
13 out of 58
Microsoft Cloud Security Accelerator: 3 week implementation
Satalyst Pty Ltd
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Satalyst’s Microsoft Cloud Security Accelerator is designed to strengthen security quickly and enable an organisation to monitor and manage security events effectively.
14 out of 58
ANECT Security Monitoring and Response 3 Months PoC
ANECT a.s.
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
15 out of 58
Identity and Access Management: 4-Wk Assessment
Zetta Pty Ltd
+2
Applicable to:
Cloud Security
Identity & Access Management
Zetta’s Assessment and Optimisation engagement will assess your current identity posture and advise you how to manage and secure your users and access to all your apps.
16 out of 58
Mitigate Compliance and Privacy Risks - 3 Day Workshop
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Microsoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
17 out of 58
Defender for IoT Operational Technology Discovery: 2-Hour Workshop
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT (OT) Discovery Workshop helps you understand the solution, the fit to your OT estate and potential threat posture improvements
18 out of 58
Security - Defender for Endpoint
Linktech Australia
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
A cloud centric approach that symbiotically targets architectural building blocks to alleviate issues and enhance the overall Defender for Endpoint experience for Endpoints being managed remotely
19 out of 58
Mitigate Compliance and Privacy Risks - 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers detect, investigate, and take action to mitigate risk and ensure compliance in their modern workplace.
20 out of 58
Zero Trust: 3-Day Assessment
QUORUM SYSTEMS PTY LTD
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The assessment has been designed and scoped to focus on Microsoft 365 or Azure security elements as these relate to inform a robust zero trust strategy.
21 out of 58
Wc-PC- Wragby Cloud PC
Wragby Business Solutions & Technologies Limited
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
22 out of 58
Office 365 Assessment Service
Waterstons Limited
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Plan, design and implement Office 365 or evaluate and optimise your existing Office 365 investment.
23 out of 58
Windows 365 Hybrid Work Proof of Concept
Zetta Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
Zetta’s Windows 365 Hybrid Work Proof of Concept will help you identify how Windows 365 can meet your organisation's hybrid work needs.
24 out of 58
Microsoft Defender for Cloud Apps: 2-Hr Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
25 out of 58
DLP Implementation and Tuning Services
INFOTECHTION
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Reduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
26 out of 58
Avanade Security Business Value 4-Wk Assessment FY24
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
27 out of 58
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-Weeks
myCloudDoor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Assess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
28 out of 58
Essential Eight Maturity Assessment
Chamonix IT Consulting
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The culmination of this assessment is the establishment of a robust security foundation to equip you with a solid base upon which you can build and enhance your cybersecurity posture.
29 out of 58
Assessment of Microsoft Defender for Identity
Eighty20 Solutions Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Our Defender for Identity Assessment is a dependable way to get ready for your Defender for Identity adoption, ensuring that you enhance your environment and evaluate the results before you begin.
30 out of 58
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
31 out of 58
Security Assessment: 2Wk Assessment
SXIQ DIGITAL PTY LTD
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Security Assessment Service to rapidly help organisations understand their Azure, DC and M365 current state security posture against common industry standards NIST, CIS, Essential 8 and ISO27001.
32 out of 58
Limitless Security 4 week Implementation
Jasco Consulting Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Limitless Security targets securing identities, protecting Office 365, managing Devices and security information that enables continuous security improvement.
33 out of 58
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
34 out of 58
EM+S Consulting Services: 4-Weeks Implementation
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
We will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
35 out of 58
Cloud Security Assessment: 2 Week Assessment
Byte Information Technology Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Identify real threats to your cloud environment and develop plans and next steps for your security journey.
36 out of 58
Security Controls Review - 2wk Assessment
The Missing Link Network Integration Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We can help you achieve a more mature, secure IT environment with our comprehensive Security Controls Review powered by Microsoft Security and Compliance.
37 out of 58
IdentityCARE 3-Wk Implementation
SecureCom Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Securing organizations Exchange Online and Multifactor Identity services.
38 out of 58
Complete Cloud Transformation: 1 Day Workshop
Jasco Consulting Pty Ltd
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Meeting Rooms for Microsoft Teams
From empowering employees to work better together, to ensuring complete security when working outside of the office, this offering has got you covered.
39 out of 58
Secure Remote Work: 4-Hours Workshop
Professional Advantage Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enable your people to work from anywhere, securely with Microsoft 365.
40 out of 58
Conditional Access & MFA 5d Proof of Concept
Generation-e Productivity Solutions Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conditional Access and Multi Factor Authentication deployed without negatively impacting users. We setup the environment then deploy 5 devices plus train you how to do the rest.
41 out of 58
Microsoft Security for hybrid work: 1wk impl.
Generation-e Productivity Solutions Pty Ltd
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Generation-e help clients manage and control access information and operate securely. Security starts with getting identity right so you can control exactly who and how someone access.
42 out of 58
Data#3 Defend against threats: - 8-weeks Implementation
Data#3 Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats using Microsoft Defender, Azure Defender and Azure Sentinel provides you with an integrated solution to protect your organisation.
43 out of 58
Defender for Office 365: 3-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
44 out of 58
M365-Digital Workspace Consulting-2wk Assessment
Orange Business Services - Global
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Teams Custom Solutions
To enhance collaboration work through a complete offer with Microsoft 365 with complete voice capabilities for today's workforce collaboration across multiple locations.
45 out of 58
iTop MDR 5-Week Implementation
登豐數位科技股份有限公司
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
協助您的企業快速的偵測惡意活動、使用者行為及各項由端點發起的惡意活動,即時探索弱點和錯誤的設定,以進行補救。
46 out of 58
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
47 out of 58
CCPA CPRA: 6 - Wk Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
48 out of 58
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
49 out of 58
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
50 out of 58
Modern Workplace - Enterprise-Grade for SMB: 4-Wk Implementation
Atarix
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Build all the foundations needed to create a flexible and scalable Modern workplace in just 30 days!
51 out of 58
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
52 out of 58
Data#3 Cyber Resilience with Surface: 2-Weeks Implementation
Data#3 Limited
+2
Applicable to:
Cloud Security
Device Deployment & Management
The Cyber Resilience with Surface Pilot is an engagement where we deploy Intune, Surface Management Portal, a DFCI profile, and Autopilot to manage and automatically deploy devices with Windows 10/11.
53 out of 58
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POC
Bitscape
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
54 out of 58
Microsoft Intune: 3-Wk QuickStart Implementation
Eighty20 Solutions Pty Ltd
+1
Applicable to:
Cloud Security
Balance security and user experience to deliver Mobile Device Management and Application Management.
55 out of 58
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
56 out of 58
Microsoft Autopilot 4-Wk Implementation
Eighty20 Solutions Pty Ltd
+1
Applicable to:
Cloud Security
Balance security and user experience to deliver Microsoft Autopilot for Modern Managed devices
57 out of 58
Microsoft 365 Governance: 1 month Assessment
Crayon
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Crayon Microsoft 365 Governance Assessment will assess your configuration and build recommendation report
58 out of 58
Sebelumnya
1
2
3