AppSource
フィードバックの送信
ヘルプとサポート
保存済みアイテム
非公開プラン
しばらくお待ちください。ログインしています...
すべて
アプリ
カテゴリ
業種
コンサルティング サービス
パートナー
フィルター
すべてクリア
現在の場所
製品 (1)
業種
サービスの種類
コンサルティング サービス 件の結果
件の結果を コンサルティング サービス で表示。
ビュー
業界別クラウド の 件の関連する結果
.
すべての結果
DORA act assessment and implementation
Sii Sp. z o.o.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
1 out of 60
Proof of Concept Solution Microsoft 365 Copilot
KPCS CZ, s.r.o.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
Embark on a transformative journey with KPCS's 4 weeks PoC for Microsoft 365 Copilot. Uncover tailored use-cases and maximize the value for your business. Revolutionize your approach to innovation.
2 out of 60
Avanade Microsoft Copilot for Security
Avanade, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
3 out of 60
Copilot for Security Readiness Assessment
Performanta
+2
Applicable to:
Cloud Security
Threat Protection
Futureproof your Business Security with Microsoft Security Copilot and Performanta
4 out of 60
Microsoft 365 Rapid Security Assessment: 1-Wk Assessment
Awara IT Kazakhstan LLP
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft 365 Rapid Security Assessment is a quick yet comprehensive evaluation to enhance Microsoft 365 security against evolving cyber threats
5 out of 60
MDS - Microsoft Copilot for Security Workshop
Maureen Data Systems
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Discover how Microsoft Copilot for Security can enhance your security operations, streamline incident response, and empower your security teams
6 out of 60
Managed Extended Detection & Response for Workplace - Implementation
DXC
+1
Applicable to:
Threat Protection
Secure your business with Managed XDR for Workplace
7 out of 60
Copilot for Microsoft 365: Security Accelerator
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security with KMicro's Copilot For Microsoft 365 Security Accelerator: Tailored insights and guided deployments.
8 out of 60
Microsoft 365 Defender SMC Deployment: 4-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Let BlueVoyant take your security and compliance posture to the next level by deploying and optimizing Microsoft 365 Defender.
9 out of 60
SSC Endpoint Mgmt & Security Services Workshop
SCC
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Discover, Envision, Educate and Plan for Device Management & Security with Microsoft 365 E3
10 out of 60
Defend Against Threats with SIEM Plus XDR: 2-W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR (with Attack Simulation) workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
11 out of 60
KMicro's Sentinel360 MXDR with Microsoft Copilot for Security: 4-Wk POC/POV
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance threat hunting & accelerated MXDR for Microsoft Sentinel with Copilot for Security integration
12 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-Weeks
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
13 out of 60
Introducing Microsoft Entra: 2 Hour Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn about how Microsoft Entra will help your business step into tomorrow with modern identity and access solutions by introducing you to modern access security across a broad range of products.
14 out of 60
Microsoft Defender for Business Managed Service: Monthly MDR
e2e-assure Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Maximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
15 out of 60
UNITE: Secure Core_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
UNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
16 out of 60
UNITE: Cyber Security Assessment_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
17 out of 60
Azure and Microsoft 365 SecOps Diagnostics
BlueVoyant
+1
Applicable to:
Threat Protection
BlueVoyant experts review an organization's Azure and Microsoft 365 Defender Security Portal to identify potential vulnerabilities and provide actionable recommendations.
18 out of 60
Microsoft 365 Security Assurance Service: Assessment
Performanta
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
19 out of 60
Red Canary MSSP FastTrack for Security
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Leverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
20 out of 60
Avanade Modern Sec Ops FY24
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
21 out of 60
Microsoft Endpoint Management: 3- W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
22 out of 60
Performanta MXDR Services
Performanta
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Performanta’s Consultancy and MXDR service is built on Microsoft’s Endpoint Detection and Response technology, and combines the critical elements required to provide enterprise-class cyber security.
23 out of 60
Microsoft 365 Security Hardening: 3 Days Implementation
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2-3 days of consultancy from a Microsoft Gold Partner to improve the security stance within your Microsoft 365 tenant, including Conditional Access, MAM, MFA, email filtering and alerts.
24 out of 60
Data Protection and Governance with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
25 out of 60
MDR for Microsoft Defender
ADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.
+2
Applicable to:
Cloud Security
Threat Protection
Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
26 out of 60
HCLTech Business Email Protection: 10-Days Implementation
HCL Technologies Limited.
+1
Applicable to:
Threat Protection
HCLTech Business Email Protection (BEP) Powered By Microsoft EOP and MDO, Enable real time Business Email Protection alerting and automated remediation for email service hosted on Microsoft platform
27 out of 60
PwC Portfolio Rationalisation
PricewaterhouseCoopers UK
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
The objective of PwC's portfolio rationalisation is to simplify your portfolio to reduce the cost and complexity of your environment. Many companies have redundant tools that cost them time and money.
28 out of 60
Microsoft Defender XDR Accelerator
The Partner Masters
+1
Applicable to:
Threat Protection
We empower your security team to detect and respond to cyberthreats with expanded visibility, incident-level investigation tools, and built-in automation
29 out of 60
Managed XDR Services (1- Day Readiness Assessment)
Kocho
+2
Applicable to:
Cloud Security
Threat Protection
Combine Microsoft Sentinel and Defender Managed Services for comprehensive coverage, cutting-edge security, and complete peace of mind.
30 out of 60
Microsoft Defender for Endpoint SMC Deployment: 4-Week Implementation
BlueVoyant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our services are designed to maximize your investment with Microsoft with hands-on onboarding & baseline configuration services.
31 out of 60
Managed Threat Detection [xdr] [log]
Orange Cyberdefense Global
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
Stop threats with a cloud-native SIEM adapted to your new business needs.
32 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Manage and Investigate Risk and Threat Protection
33 out of 60
Threat Protection: 5-Week Workshop
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
An executive deep dive into security strategy, tailored to your organization.
34 out of 60
Barracuda Office 365 email-based security
Crayon
+1
Applicable to:
Threat Protection
Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defense, API-based inbox defense, incident response, data protection, and compliance capabilities.
35 out of 60
Endpoint Management with Security - 4 days - FREE Workshop
OPEN BPO
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
This workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
36 out of 60
Microsoft 365 Security Briefing
CDI LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
37 out of 60
Cybersecurity Assessment - 3 Weeks
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Microsoft Security Assessment: detect security problems and take targeted action
38 out of 60
Device as a Service with Windows 11 and Intune: 4 Week Implementation
Cognizant
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Windows 10 has revolutionized how organizations manage operating systems, delivering the features that you have come to know and rely on, while enhancing mobility and agility without losing data.
39 out of 60
Microsoft 365 Security Posture 10-days Assessment
FUJITSU
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Secure Microsoft 365 and maximise your investment
40 out of 60
Red Canary Defend Against Threats Siem Plus XDR Workshop
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
41 out of 60
Onesec’s Secure Access to Microsoft 365 with Zscaler
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
42 out of 60
Teams & SharePoint Security Hardening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
43 out of 60
Overwatch Microsoft 365 Security: 12 Month Implementation
THREATSCAPE LIMITED
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Overwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
44 out of 60
Secure AI
Logicalis Solutions
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Comprehensive security for generative AI applications, ensuring safe usage and protection of sensitive data
45 out of 60
Phishing, Malware & Spam protection- 2 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
46 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security Services
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
47 out of 60
Microsoft 365 Threat Protection Workshop + 5 Day
Cyberwise Siber Güvenlik TIC. AS.
+1
Applicable to:
Threat Protection
Is your Microsoft 365 environment secure? Do you wonder about your current security maturity? We will assist you with a full-fledged workshop on how to deploy and implement Microsoft 365 Security.
48 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 Wks
Wipro Ltd
+2
Applicable to:
Identity & Access Management
Threat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
49 out of 60
Ransomware & Supply Chain Incident Management: 12 Hour Assessment
Maureen Data Systems
+3
Applicable to:
Compliance Advisory Services
Knowledge & Insights
Threat Protection
Identify vulnerabilities within your organization, including those who pose a threat to your supply chain, provide & mature a tailored incident response & management program.
50 out of 60
Cyber Security Assessment
ELEVATE Solutions Limited
+1
Applicable to:
Threat Protection
The Cybersecurity Assessment helps customers assess their security posture and risk to insider threats.
51 out of 60
Synergy Advisor Architecture Design Sessions (ADS) for Microsoft Copilot for Security
Synergy Advisors LLC
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
A Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
52 out of 60
Microsoft Sentinel Security Consulting Service
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
53 out of 60
Microsoft 365 Defender - MXDR Service - 1 Year Implementation
CGI Inc.
+1
Applicable to:
Threat Protection
Unleash your Microsoft Defender 365 capabilities. Automatically detect & correlate threat signals across your endpoints, email, cloud applications, identities, cloud and on-premises workloads.
54 out of 60
Microsoft Intune Deployment
Secure Future Bilgi Tek. ve Hiz. Tic A.S.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
55 out of 60
Copilot - 2 Days Adoption Workshop
INSOMEA COMPUTER SOLUTIONS TUNISIE SARL
+2
Applicable to:
Frontline Workers
Threat Protection
INSOMEA will help users in adopting copilot within companies from different sectors and sizes
56 out of 60
Identity & Endpoint Protection with Microsoft Zero Trust
Dell Technologies Services
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Dell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
57 out of 60
Baseline Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Aware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
58 out of 60
Optimized SecOps leveraging Microsoft Copilot for Security
Synergy Advisors LLC
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
A Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
59 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
60 out of 60
1
2
3
4
5
次へ