AppSource
Berikan umpan balik
Bantuan + dukungan
Item tersimpan
Paket privat
Tunggu sebentar, kami sedang memasukkan Anda...
Semua
Aplikasi
Kategori
Industri
Layanan Konsultasi
Mitra
Filter
Hapus semua
Lokasi Anda
Produk (1)
Industri
Jenis layanan
Layanan konsultan hasil
Menampilkan hasil dalam layanan konsultan
Tampilkan
hasil terkait di industry clouds
.
Semua hasil
XENSHIELD365 - Managed Detection and Response (MDR)
Xencia Technology Solutions Pvt Ltd
+2
Applicable to:
Cloud Security
Threat Protection
24x7 Managed Security Operations SoC through shared team of Security experts Defender XDR
1 out of 55
Threat Protection: 2 week Engagement Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you
2 out of 55
Cybersecurity Assessment: Microsoft Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Understand your readiness for common security threats.
3 out of 55
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
4 out of 55
G Suite to Office 365 migration: 1-Hour Assessment
True.org Cloud
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
Assessment of your current G Suite environment to plan migration to Office 365
5 out of 55
Microsoft Security: 4-Week Implementation
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Establish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
6 out of 55
Microsoft 365/Azure Cloud Secure 5 Day Assessment
DynTek Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
DynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
7 out of 55
Microsoft 365 E5 CMMC L3 8 Week Implementation
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
8 out of 55
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
9 out of 55
Microsoft 365 Security: 4-Week Assessment
Apex Digital Solutions
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most and improving your security maturity over time.
10 out of 55
CASB (MCAS) Advisory: 2-week Workshop Series
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
11 out of 55
Microsoft Security Deployment: 5-day Workshop
Campana & Schott GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand your Microsoft security posture and minimize risks with the right experts
12 out of 55
Avanade Cybersecurity Services Global offerings FY23
Avanade, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
13 out of 55
Healthcare Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
14 out of 55
Big Green IT Security Assessment: 3-Week
Big Green IT - Dev
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
15 out of 55
Zero-Trust: 3-Day Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
16 out of 55
Cybersecurity - 3-Wk Assessment
adaQuest
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
With the Cybersecurity Assessment we take a four-phased approach to set your path forward to the cloud.
17 out of 55
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
18 out of 55
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
19 out of 55
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
20 out of 55
Defend Against Threats with SIEM Plus XDR
Netrix Global
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
21 out of 55
Intelligent Endpoint Protection: 2-week Workshop
NTT DATA Inc.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
22 out of 55
Microsoft 365 Defender 10-week Implementation
Cyclotron Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender for enterprises, resulting in improved detection rates, threat coverage, and organizational security posture.
23 out of 55
CSE Security Baseline 3 days implementation
Computer Solutions East
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
24 out of 55
Seguridad Corporativa: Evaluaci ón 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
25 out of 55
Secure Endpoint Management - 5 Day - Proof of Concept
Coretek Services
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Protect your organization's endpoints. In this 5-Day quick start Coretek offers three options for providing unified endpoint management and security across all devices.
26 out of 55
Security Maturity Assessment - 4 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
27 out of 55
Microsoft 365 Defender Threat Check: 4-wk assess
Interlink Cloud Advisors, Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
28 out of 55
Office 365 Protection: Design & Pilot 1-Wk POC
Managed Solution
+2
Applicable to:
Cloud Security
Threat Protection
Protect Your Employees from External Email Threats with Defender for Office 365 Protection
29 out of 55
Discover Sensitive Data: 5-Week Workshop
Rackspace
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
30 out of 55
24x7 Microsoft 365 Security MDR: 4-Wk Assessment
Apex Digital Solutions
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
31 out of 55
Cy:lent Pursuit Threat Hunt: 6-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ascent’s intel-based approach to cybersecurity threat hunting helps identify threat actors faster and more accurately than other, more traditional methodologies.
32 out of 55
BYOD Endpoint Mgt: 1-Wk Accelerated Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Bring Your Own Device (BYOD) capability
33 out of 55
Mobile Endpoint Mgt: 1-Wk Accelerated Implement'n
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Corporate Mobile Devices (iOS, Android and macOS)
34 out of 55
Windows Endpoint Mgt: 1-Wk Accelerated Implement'n
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
35 out of 55
Rapid Risk Assessment: 4-Wk Assessment
Ascent Global, Inc.
+2
Applicable to:
Information Protection & Governance
Threat Protection
Immediate and long-term Microsoft security strategy assessment utilizing security tools such as Defender, Sentinel, and Cloud App Security.
36 out of 55
Security Assessment: 2 Week Assessment
Tallan
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
37 out of 55
Threat Protection and Cloud Security: 3 Day Workshop
Netwoven
+2
Applicable to:
Cloud Security
Threat Protection
Improve your security posture with a Microsoft Threat Protection Assessment Workshop
38 out of 55
Defender for Office 365: 3-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
39 out of 55
Microsoft 365 Security: 4-hour Assessment
Catapult Systems, LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Catapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
40 out of 55
Retail Kiosk Program Workshop - 5 Days
CB5 Solutions
+3
Applicable to:
Frontline Workers
Identity & Access Management
Threat Protection
A secure kiosk management solution built for Zebra, Android and iOS devices in retail and finance services.
41 out of 55
Security Solutions:2-Weeks Implementation
Alpine Health Technologies Corp
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Discover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
42 out of 55
GDPR Assessment: 6-Week Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
43 out of 55
CCPA CPRA: 6 - Wk Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
44 out of 55
Zero Trust Foundation: 6 Week Implementation
Valorem LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Using Azure Active Directory and Microsoft 365 Security, our teams will custom design a zero trust foundation that advances your security posture, reduces risk and makes your environment more secure.
45 out of 55
Defend Against Threats with SIEM Plus XDR: 8H Workshop
adaQuest
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
46 out of 55
Microsoft 365 Messaging: 5 Day Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
The Microsoft 365 Messaging course is designed for IT Professionals who deploy and manage the messaging infrastructure for Microsoft 365 in their organization
47 out of 55
Microsoft 365 Fundamentals: 1 Day Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
Introduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
48 out of 55
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
49 out of 55
Zero-trust collaboration security 6wk Implement
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
50 out of 55
Zero-Trust Secure Email 6wk Imp
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
51 out of 55
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
52 out of 55
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
53 out of 55
Microsoft Information Protection Administrator: 3 Days Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Information Protection Administrator course focuses on data governance and information protection within your organization.
54 out of 55
Zero Trust Launchpad: 3-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
55 out of 55
Sebelumnya
2
3
4
5
6