AppSource
Pateikti atsiliepimą
Žinynas ir palaikymas
Įrašyti elementai
Privatūs planai
Luktelėkite, prijungiame jus...
Viskas
Programos
Kategorijos
Pramonės šakos
Konsultavimo paslaugos
Partneriai
Filtrai
Valyti viską
Jūsų vieta
Produktai (1)
Pramonės šakos
Paslaugos tipas
Rezultatų: Konsultavimo paslaugos
Rodomi rezultatai konsultavimo paslaugos.
Rodyti
susijusių rezultatų pramonės debesys
.
Visi rezultatai
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
1 out of 35
Copilot Data Protection
Cloud Life
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
2 out of 35
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
3 out of 35
Office 365 Teamwork Security - Managed Service
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Teamwork Security provides a comprehensive security management service for Office 365 platforms
4 out of 35
Threat Protection - 7 days Implementation
SPAN d.d.
+2
Applicable to:
Cloud Security
Threat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
5 out of 35
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
6 out of 35
G Suite to Office 365 migration: 1-Hour Assessment
True.org Cloud
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
Assessment of your current G Suite environment to plan migration to Office 365
7 out of 35
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
8 out of 35
SharePoint and Teams Security - 2 week assessment
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Confident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
9 out of 35
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
10 out of 35
Microsoft Endpoint Management: 3- W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
11 out of 35
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
12 out of 35
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
13 out of 35
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
14 out of 35
Email protection with Microsoft Defender for Office 365: 2h briefing
SMART business LLC
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
15 out of 35
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
16 out of 35
HPT Mitigate Compliance and Privacy Risk_1-Day Workshop
HPT Vietnam Corporation
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Understand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
17 out of 35
True Managed Security Service- 3 day Workshop
true org cloud
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
You have a vision. We can help you secure it...
18 out of 35
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
19 out of 35
Threat Protection - 2 Days Workshop
Mayasoft Bilgi Sistemleri A.S.
+2
Applicable to:
Cloud Security
Threat Protection
We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
20 out of 35
SecureBlu MDR Service for Microsoft 365 Defender
New Era Technology
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
21 out of 35
Security Operation Services
Barikat Internet guvenligi bilisim tic . A.s.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Expertly manage Microsoft 365 and Azure security features. Ensure periodic monitoring, reporting, and maximize benefits. Trust us for seamless operation; focus on your core business
22 out of 35
Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
23 out of 35
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
24 out of 35
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
25 out of 35
Microsoft 365 threat protection assessment
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Identify vulnerabilities and threats in Microsoft 365. Use advanced protection, intelligence, detection, and response to safeguard data. Enhance security with real-time insights and monitoring.
26 out of 35
Device Security Management with Microsoft Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Seamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
27 out of 35
Unifying Microsoft Sentinel with Cloud Services
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
28 out of 35
Security Operations Center with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Monitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
29 out of 35
Device Monitoring with Microsoft Defender for Endpoint
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
30 out of 35
Application Monitoring Solution with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
31 out of 35
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
32 out of 35
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
33 out of 35
Secure Hybrid Identity - Defender for Identity: 6 week Implementation
Performanta
+2
Applicable to:
Identity & Access Management
Threat Protection
Secure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
34 out of 35
Endpoint Management Advisory Service: 6-Wk Implementation
Wragby Business Solutions & Technologies Limited
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
This advisory service enables organizations efficiently manage end points leveraging Microsoft Intune & Configuration Manager through assessments, 1-day workshops and six weeks deployment
35 out of 35
Atgal
1
2