AppSource
Pateikti atsiliepimą
Žinynas ir palaikymas
Įrašyti elementai
Privatūs planai
Luktelėkite, prijungiame jus...
Viskas
Programos
Kategorijos
Pramonės šakos
Konsultavimo paslaugos
Partneriai
Filtrai
Valyti viską
Jūsų vieta
Produktai (1)
Pramonės šakos
Paslaugos tipas
Rezultatų: Konsultavimo paslaugos
Rodomi rezultatai konsultavimo paslaugos.
Rodyti
susijusių rezultatų pramonės debesys
.
Visi rezultatai
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
1 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
2 out of 60
Entra ID: 5-day Assessment
CDI LLC
+1
Applicable to:
Identity & Access Management
Protect identities in Microsoft 365 by hardening your Entra ID configuration as a result of this 5-day identity and authentication assessment
3 out of 60
Protect and Govern Healthcare Data Workshop - 3 Day Workshop
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft-Funded Workshop to discuss and understand the hidden privacy and regulatory risks of healthcare data and how to mitigate with actionable next steps
4 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Microsoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
5 out of 60
Avanade Cybersecurity Services Global offerings FY23
Avanade, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
6 out of 60
Mailbox Guardian - Security: 2 Week Implementation
ProServeIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cybersecurity review and lockdown of Microsoft 365 environment. Monitor and provide implementation recommendations Protect against phishing and other attacks Review desired state configuration
7 out of 60
Windows 365 Accelerator: 4 Week Implementation
KiZAN Technologies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
During this 4-week engagement, KiZAN will assist with the design and implementation of Windows 365, including education, planning, documentation, and pilot for up to 50 users.
8 out of 60
Autopilot: 2-Wk Proof of Concept
FSI Strategies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
FSi Strategies will review the deployment scenarios with the client and execute a proof of concept up to 25 devices in order to demonstrate the capabilities of Windows Autopilot
9 out of 60
Quadra Entra Permissions Management
Quadrasystems.net (India) P Ltd
+1
Applicable to:
Identity & Access Management
Understand how permissions creep can impact the attack surface risk in your cloud infrastructure Understand how to manage user and identity risk
10 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
11 out of 60
CIS Top 20 Control Gap Analysis: 3-Day Assmt
CompuNet
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
By leveraging CompuNet, armed with CIS top 20 controls and its team of experts, they can advise on what controls to leverage inside the Microsoft suite as well as when to leverage 3rd party solutions.
12 out of 60
Microsoft 365: 2-Week Assessment
Practical Solutions, Inc
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
13 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk Assessment
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Leverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
14 out of 60
GoDaddy to Office 365 Migration
SkyTerra Technologies LLC
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
If you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
15 out of 60
HPT_Microsoft Cyber Security Assessment_2 week
HPT Vietnam Corporation
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Strengthen your firm's defenses with our all-in-one cybersecurity platform
16 out of 60
Microsoft Copilot Readiness Discovery: 3-Wk Assessment
ProServeIT
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
A Microsoft Copilot Readiness Assessment will identify your AI foundational requirements & permission settings to prepare your organization for leading edge efficiency.
17 out of 60
Implementation of Microsoft Identity Security
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW's Implementation of Microsoft Identity Security service helps customers strengthen their security posture, reduce the risk of data breaches and improve compliance with industry regulations.
18 out of 60
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
19 out of 60
Onesec Identity Governance Lifecycle Assessment
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
20 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
21 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
22 out of 60
Windows 365 Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
23 out of 60
Defender for Endpoint: 5-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
24 out of 60
Microsoft Security: 3-Day Workshop
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
25 out of 60
NTT Americas - Microsoft Device Management
NTT Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Deployment of Microsoft Unified Endpoint Management Services. Assessment of your resources and business objectives to develop a fresh approach to your security strategy.
26 out of 60
Exchange Migration to Microsoft 365: 6-Week Implementation
All Covered, a division of Konica Minolta
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
All Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
27 out of 60
Frontline Worker: 3-Wk Proof of Concept
eGroup Enabling Technologies
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Reimagine the frontline worker experience with an eGroup Enabling Technologies, LLC. Frontline Worker Proof of Concept
28 out of 60
Fortis IR Readiness Assessment
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
29 out of 60
The Modern Workplace: 1 hour Briefing Session
Automize
+3
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device Management
This 1 hours briefing session provides a complete overview of our Modern Workplace concept of Endpoint Management, Identity & Access Management and Collaboration Solutions in context to your business.
30 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
31 out of 60
Microsoft Security Immersion: 1 Day Briefing
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Knowing that your time is valuable, we have developed a true to life, hands-on, interactive session designed to give you a deep understanding of the Microsoft 365 Security suite of products.
32 out of 60
Microsoft 365 Strategic Roadmap Workshop
CDI LLC
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
CDI provides this Strategic Roadmap workshop to identify workloads that can be migrated to Microsoft 365 and design a roadmap for you, our customer, to drive adoption and improve ROI.
33 out of 60
Defender for Identity Professional Security Services | Customized Deployment in as Little As 6-Weeks
Difenda
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure Azure Active Directory with Difenda, the 2023 Microsoft Security Impact Award Winner.
34 out of 60
Cybersecurity Assessment
PSM Partners
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
This assessment is designed to help you understand the importance of security and how to protect your organization from potential threats.
35 out of 60
MDR Workshop
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
36 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
37 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
38 out of 60
Atos || Pilot program for Windows 365
Atos International SAS
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Atos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
39 out of 60
Hybrid Identity Security Quick Start 12-wk Implementation
Edgile, Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
40 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
41 out of 60
Zero Trust Defend Against Threats: 7-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Accelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
42 out of 60
Defend Against Threats with SIEM Plus XDR
Netrix Global
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
43 out of 60
Security Assessment: 2-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
44 out of 60
Microsoft Defender for Endpoint: 2-wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Defender for Endpoint assessment will help the customers review the current state, evaluate existing AV and EDR solutions and expectations, deploy MDE, and plan for ongoing management.
45 out of 60
Microsoft 365 Defender 10-week Implementation
Cyclotron Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender for enterprises, resulting in improved detection rates, threat coverage, and organizational security posture.
46 out of 60
UNITE: Exploring E5 Security Workshop_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
UNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
47 out of 60
Window 365 Cloud PC: 3-Day Proof-of-Concept
CTGlobal A/S
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Assess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
48 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed Service
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
49 out of 60
Office 365 Managment: 1 Day Assessment
Eze Castle Integration
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
ECI will review your Office 365 Tennant Configuration and suggest on-going managment needs
50 out of 60
Aseguramiento de ciberseguridad: taller 4 semanas
Sofistic Colombia SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
51 out of 60
Solution Assessment for Security: 30 Day
Concurrency, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
An assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
52 out of 60
CMMC Data Enclave Dplymt: 4-Wk Implementation
C3 Integrated Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Deploy Microsoft 365 to meet CMMC Requirements
53 out of 60
Microsoft Intune Endpoint Mgmt Level Up: 1-Mo Implementation
ProServeIT
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Enable organization-wide management & security for your endpoints (mobile devices, workstations, etc.) with a Microsoft Intune Endpoint Management implementation.
54 out of 60
BCN Intranet Lite
BCN Group Ltd.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
55 out of 60
Security Outcomes Sprint
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Understand the Business Value of Your Cybersecurity Investments
56 out of 60
Microsoft 365 Email Threat Protection Assessment
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
57 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
58 out of 60
Modern Work Services Proof of Concept
Crayon US
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Meetings for Microsoft Teams
Crayon Modern Work Services PoC will help you pilot a subset of users with the best of Microsoft 365 prior to implementation. This will allow us to ensure a smooth transition for all users.
59 out of 60
Fortis Assessment SOC2
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
60 out of 60
Atgal
2
3
4
5
6
Pirmyn