AppSource
Sniegt atsauksmes
Palīdzība un atbalsts
Saglabātie vienumi
Privātie plāni
Brīdi uzgaidiet, notiek pieteikšanās...
Visi
Programmas
Kategorijas
Nozares
Konsultāciju pakalpojumi
Partneri
Filtri
Notīrīt visu
Jūsu atrašanās vieta
Produkti (1)
Nozares
Pakalpojuma tips
Konsultāciju pakalpojumi rezultāti
Tiek rādīti rezultāti šeit: konsultāciju pakalpojumi.
Skats
saistītie rezultāti šeit: nozares mākoņi
.
Visi rezultāti
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
1 out of 60
Microsoft Cloud application security Assessment - 2 weeks
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
2 out of 60
Manage Corporate Data on Devices with Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Can you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
3 out of 60
Microsoft Cloud Apps Security Solutions for Custom Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Know your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
4 out of 60
Data Access Control with MCAS
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
5 out of 60
Microsoft Cloud Application for 3rd Party Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
6 out of 60
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
7 out of 60
Microsoft Cloud Apps Security for Microsoft 365 Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
8 out of 60
Shadow IT discovery with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
9 out of 60
Threat Detection with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
10 out of 60
Microsoft 365 Defender for Endpoint Vulnerability Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
11 out of 60
Security and Operations with Expert Microsoft 365 Support
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Maximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
12 out of 60
Azure MFA 4-hour workshop
edgemo
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 hour workshop focussing on Azure Multi-Factor Authentication (MFA) and Conditonal Access
13 out of 60
Intune for Windows: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
14 out of 60
MDM Health Check (Mobile OS Only): 2-week Assessment
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
15 out of 60
BYOD 365: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
The BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
16 out of 60
Zero Touch Provisioning: 3-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Zero-Touch Provisioning sets you up to ship devices straight to users, with auto-configuration occurring over the air on initial sign in.
17 out of 60
Advania: Intune Get Started: 2 d training and PoC
Advania AB
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Understand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
18 out of 60
G Suite to M365 Migration: 1-Day Proof of concept
true org cloud
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Proof of concept for migration from G Suite to Microsoft 365
19 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
20 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
21 out of 60
Microsoft Intune: 4-Wk Implementation Services
TechNet UC LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Microsoft Intune Design and Deployment Services
22 out of 60
Microsoft 365: 2-Week Assessment
Practical Solutions, Inc
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
23 out of 60
Modern Workplace Security 10-Wk Implementation
Wipro Ltd
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
24 out of 60
Secure Collaboration 5 Wks implementation
Innofactor Norway
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enterprises with significant number of employees and digital estates need best practice collaboration and security. Innofactor Secure Collaboration delivers that as code.
25 out of 60
SecWise Assess for Workplace: 5-Day Security Assessment
SecWise
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
An assessment of your modern workplace set-up to make sure it matches cyber security standards and best-practices.
26 out of 60
SecWise Identity (Zero Trust): Azure AD activation
SecWise
+1
Applicable to:
Identity & Access Management
Identify your Zero Trust modern Identity & Access Management (IAM) jump-start configuration based on our pre-defined IAM Jump-start configurations.
27 out of 60
Azure AD Implentation in 8 weeks
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Identity & Access Management
Porovide a design and build capability that enables organisations to secure, control and simplify employee access to company data and sensitive resources resources from wherever they are.
28 out of 60
Microsoft 365 Kickoff - 1 Day workshop
Innofactor Finland
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teams Custom Solutions
Assess, envision and find next action points to harness the power of Modern Teamwork and Microsoft 365
29 out of 60
Modern Management: 4 week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Modern Management is a Microsoft 365 focused managed service that reduces cost, improves security and delights employees!
30 out of 60
Office 365 GCC High Migration +Tenant Imp 4Wk
Summit 7 Systems, Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Companies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
31 out of 60
Microsoft 365 Security Envisioning - 1day workshop
Officeline SA
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Learn how to improve your organization’s security posture with Office Line’s Microsoft 365 Security 1-day Workshop.
32 out of 60
Change Management: 1-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Change Management is a proven methodology to deploy technology changes to large groups of diverse Microsoft 365 users.
33 out of 60
Zero-Trust: 3-Day Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
34 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
35 out of 60
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
36 out of 60
Microsoft 365 Samarbejde&Kommunikation – Workshop
timengo a/s
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Teamwork Deployment
1-dags workshop incl. Roadmap rapport med anbefalinger til konfiguration, implementering og idriftsættelse af Microsoft 365 baseret på timengo's referencearkitektur.
37 out of 60
Modern Device Management Implementation
DXC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Improve the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
38 out of 60
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
39 out of 60
Unified Endpoint Management 10-Days POC
Venzo A/S
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
VENZO's Unified Endpoint Management solution keeps devices used to utilize organizational updated and secure no matter location or network
40 out of 60
Unified Endpoint Management 10-Days Assessment
Venzo A/S
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
VENZO's Unified Endpoint Management solution keeps devices used to utilize organizational updated and secure no matter location or network
41 out of 60
Portfolio Rationalisation: 10-Wk Implementation
PricewaterhouseCoopers UK
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Manage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
42 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
43 out of 60
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
44 out of 60
IAM Assessment 3-weeks
Venzo A/S
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
Our 3-week assessment gives your organization an overview of your identity protection and access management delegation as to identify next steps in your identity protection journey.
45 out of 60
Secure Remote Work: 3 Days Intro and Plan Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Engagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
46 out of 60
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
47 out of 60
Microsoft 365 Plan for Success:3-d Assessment
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
48 out of 60
Non-Profit Security Essentials : 1 Day Workshop
true org cloud
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
True.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
49 out of 60
Identity & Access Management: 1-Mth Implementation
Officeline SA
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Microsoft 365 Identity & Access Management to improve and streamline security on cloud and applications
50 out of 60
Hybrid Work-Work is not a place: 2 wks assesment
Globeteam
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
Companies need to support a hybrid workforce and support employees need for flexibility. This offer gives you an assessment of your maturity to support hybrid work, and a plan for your implementation.
51 out of 60
Avanade Hybrid Windows Endpoint Solutions FY24
Avanade, Inc.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Avanade has developed the next generation of endpoint solutions for the modern workforce, with integrated physical, virtual and hybrid solutions
52 out of 60
Accenture Modern Workplace Services
Accenture
+3
Applicable to:
Frontline Workers
Identity & Access Management
Meetings for Microsoft Teams
Accenture Modern Workplace Services
53 out of 60
Baseline Security Plus: 4-week Assessment
IT Relation A/S
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Baseline Security Plus enables you to protect your organization against more advanced attack with adaptive, built-in intelligence. Baseline Security is a range of security services to your company.
54 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
55 out of 60
Endpoint Modernization Quickstart Service
Dell Technologies Services
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Dell Quick Start service helps customers configure their environment and prepare it for Modern Device Management and Modern Provisioning.
56 out of 60
Cybersecurity: 3-Wks Quick-Assessment
Unipartner IT Services, S.A.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
57 out of 60
Next Gen Endpoints 3-Day Workshop
FUJITSU
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Provide your employees with access to a secure desktop experience from virtually anywhere.
58 out of 60
Securing Identities: 3 Days Workshop
INOVASYS FOR SYSTEMS
+1
Applicable to:
Identity & Access Management
Microsoft funded Securing Identities is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
59 out of 60
Intune for Android: 2-wk Imp
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Android devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
60 out of 60
Atpakaļ
1
2
3
4
Tālāk