AppSource
Berikan umpan balik
Bantuan + dukungan
Item tersimpan
Paket privat
Tunggu sebentar, kami sedang memasukkan Anda...
Semua
Aplikasi
Kategori
Industri
Layanan Konsultasi
Mitra
Filter
Hapus semua
Lokasi Anda
Produk (1)
Industri
Jenis layanan
Layanan konsultan hasil
Menampilkan hasil dalam layanan konsultan
Tampilkan
hasil terkait di industry clouds
.
Semua hasil
Securing Identities Workshop: 4-Wk Workshop
ProArch Technologies, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
1 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
2 out of 60
Adopción de Copilot chat Enterprise - Bing Chat Enterprise: 3-Wk
ENCAMINA S.L.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Adopta Copilot Chat Enterptise para multiplicar la productividad de tus empleados protegiendo los datos en tu empresa
3 out of 60
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
4 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Manage and Investigate Risk and Threat Protection
5 out of 60
Viva Insights Workshop
CDW
+3
Applicable to:
Cloud Security
Microsoft 365 Live Events
Teams Custom Solutions
The Enablement Workshop for Microsoft Viva from CDW focuses on finding your organization’s pain points, and it identifies how the Viva platform can help
6 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
7 out of 60
Red Canary Defend Against Threats Siem Plus XDR Workshop
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
8 out of 60
OneSec Defender for Endpoint – Migration offer
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
The OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
9 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage Workshop
CGI Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
10 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
11 out of 60
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
12 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
13 out of 60
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 Wk
Lighthouse Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
This hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
14 out of 60
Protect and Govern Sensitive Data: 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
15 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY24
CGI Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
16 out of 60
Deploying Purview Data Security - Labels and DLP
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
A dependable approach to deployment of Data Security workloads led by governance and following our standard framework for Microsoft 365 customers
17 out of 60
Modern Frontline Work Acceleration 2 days Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
LiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
18 out of 60
GoDaddy to Direct Microsoft 365 Migration 2 Hrs Proof of Concept
true org cloud
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Remove GoDaddy and other third-party entities from your tenant, reclaiming internal control over your systems.
19 out of 60
Secure Live Workspace - 8 Weeks Assessment
LTIMindtree Limited
+3
Applicable to:
Cloud Security
Power Platform for Teams
Teams Custom Solutions
Our Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
20 out of 60
Microsoft 365 HIPAA/HITECH 20 Hour Implementation
New Charter Technologies, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Implementation of Microsoft 365 to include compliance policies and templates for health care.
21 out of 60
Microsoft Sentinel Proof of Concept: 4 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand how prepared is your Microsoft infrastructure when adversaries attack
22 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
23 out of 60
Sentinel Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
24 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process Adoption
Vitalyst
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
25 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
26 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-Weeks
myCloudDoor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Assess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
27 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk Worshops
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
28 out of 60
Infosys Microsoft 365 Security and Compliance: 8 Weeks Assessment
Infosys Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Workplace Analytics
Infosys Microsoft 365 security expert team offers a full spectrum security service for microsoft 365 services facilitated digital workplace.
29 out of 60
SecureBlu MDR Service for Microsoft 365 Defender
New Era Technology
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
30 out of 60
Microsoft 365 Migration 12 Hour Proof-of-Concept
New Charter Technologies, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
31 out of 60
Microsoft 365 Security Assessment: 2 Week Assessment
Kontex Security Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
32 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
33 out of 60
NIST800-171-Microsoft 365-Accelerator-Guided-Deployment
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Provides expert guidance to help organizations achieve NIST 800-171 compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
34 out of 60
Microsoft 365 Plan for Success:3-d Assessment
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
35 out of 60
BDO eDiscovery: 4 Wk Assessment
Lixar IT
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Centralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
36 out of 60
Microsoft 365 Copilot: 1-Day Assessment
Data Market Bilgi Hizmetleri A.S
+3
Applicable to:
Adoption & Change Management
Cloud Security
Power Platform for Teams
How Microsoft 365 Copilot can transform your business and the overall concepts you must understand to better daily business life.
37 out of 60
Ctelecoms Defend Against Threats with SIEM Plus XDR Workshop
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Defend Against Threats with SIEM Plus XDR Workshop Learn how to put next-generation Microsoft security tools to work for you.
38 out of 60
CASB (MCAS) Advisory: 2-week Workshop Series
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
39 out of 60
Defender Pilot
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
The Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
40 out of 60
EM+S Consulting Services: 4-Weeks Implementation
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
We will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
41 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
42 out of 60
Microsoft Cloud App Security: 2 Week Implementation
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Cloud Security
Keep your employees productive and secure on their favorite apps and devices with Cloud App Security. Bring the security of your on-premises systems to your cloud applications.
43 out of 60
Microsoft 365 E5 NIST 800-171 -1 Week GAP Assessmt
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
This offer is for a NIST800-171 Gap Assessment for a single Host Unit, scoped to a single contract, single subnet using the Microsoft 365 E5 license
44 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for Endpoint
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
45 out of 60
Threat Protection: 5-Week Workshop
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
An executive deep dive into security strategy, tailored to your organization.
46 out of 60
Licensing Microsoft 365: 1-day Assessment
Informatika a.d.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
47 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
48 out of 60
Zero Trust Security: 3-day Workshop
Oxford Computer Group LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
49 out of 60
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
50 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
51 out of 60
Avanade Security Risk Assessment
Avanade, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Avanade's 5-day Risk Assessment offers security leaders a comprehensive view of risk posture across their enterprise and proactive ways to protect their organizations from growing cyber threats.
52 out of 60
Mailbox Guardian - Security: 2 Week Implementation
ProServeIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cybersecurity review and lockdown of Microsoft 365 environment. Monitor and provide implementation recommendations Protect against phishing and other attacks Review desired state configuration
53 out of 60
Hybrid Cloud Security Workshop - 1-Day
Zones, LLC
+1
Applicable to:
Cloud Security
Identify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
54 out of 60
Cloud-to-Cloud Backup: 1 Day Implementation
BDO Canada
+1
Applicable to:
Cloud Security
Get scalable backup and recovery implemented for all your Microsoft Office 365 data.
55 out of 60
Defender for Endpoint Professional Security Services | Customized Deployment in as Little as 6-Weeks
Difenda
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize your Microsoft Security investment with our Defender for Endpoint Design & Implementation.
56 out of 60
Microsoft Priva Assessment: 2 Wk
Lighthouse Global
+2
Applicable to:
Cloud Security
Information Protection & Governance
Empowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
57 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
58 out of 60
Microsoft 365 Consulting Services: 10-Week Implementation
Ricoh
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Deployment of Microsoft 365 as a cloud-based solution and the world’s leading productivity platform. Your workforce can access the necessary tools and information whenever and wherever they want.
59 out of 60
Digital Security:1 Months Assessment
Atos International SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital Security, expertise : Cyber Sécurité Services, Systèmes critiques, IAM, Cloud Security, 6000 personnes dédiées
60 out of 60
Sebelumnya
1
2
3
4
5
Berikutnya