AppSource
AplikasiPerkhidmatan PerundinganIndustry CloudsRakan Kongsi
Cari AppSource consulting services
AppSource
Lebih banyak
Cari AppSource consulting services
AppSource
Lebih banyak
Cari AppSource consulting services
AppSource
Cari AppSource consulting services
PenapisKosongkan semua


Perkhidmatan perundingan hasil

Menunjukkan dalam perkhidmatan perundingan%1!s!.
Lihat yang berkaitan dalam awan industri.
Semua keputusan
Compliance: 8H-Workshop Data Risk ManagementadaQuest
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Discover risks from dark data and learn how to address them.
1 out of 60
Identity: 8H-Workshop Secure Identities & DevicesadaQuest
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure user identities and devices.
2 out of 60
Security: 8H-Workshop "Sectors of Cybersecurity"adaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation security operations to work for you with the Azure Sentinel add-on module.
3 out of 60
Endpoint Management Service: 3-hours WorkshopPEAKUP
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-mobile-device-management product iconMobile Device Management
Enterprise Mobility Workshop showcase value of secure remote work capabilties including device management, security and compliance standards.
4 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc. - USHQ
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
5 out of 60
Microsoft Information Protection 10-wk ImplementCyclotron Inc.
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Cyclotron provides a complete approach to identifying, classifying, protecting, and monitoring sensitive data, resulting in real-time views into where your highest-value data lives and flows
6 out of 60
Microsoft 365 Assessments Deployment: 2-Week Imp.iCorps Technologies, Inc
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
iCorps Microsoft 365 Readiness Assessment allows our experts to analyze your current services and platforms and map them to the Microsoft 365 stack of services.
7 out of 60
Teams Governance: 1-day workshopInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-teams-custom-solutions product iconTeams Custom Solutionsm365-sa-teamwork-deployment product iconTeamwork Deployment
Whether you are looking to get started or have already implemented Teams, Interlink can provide guidance during governance planning to help ensure data control, security, and content organization.
8 out of 60
Compliance Workshop Data Risk Management: 4 WeeksDiverge IT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
You will be guided by our Microsoft 365 experts who are trusted by Pro Sports teams, Hollywood studios, and businesses across America to help protect and govern data to achieve complete compliance.
9 out of 60
Microsoft Purview Data Security Basic Quick Start 10-week ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Drive Data Protection Sustainability with Edgile's Data Protection Methodology
10 out of 60
Security & Compliance Readiness: 2-Wk. AssessmentiCorps Technologies, Inc
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
iCorps Security and Compliance Services provide a complete security assessment of your Microsoft platform and integrated services.
11 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Introducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
12 out of 60
Seguridad Corporativa: Evaluación 4 semanasConsultora CognosIT Limitada
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
13 out of 60
Office 365 & Security Alignment Workshop: 2-WkSirius Computer Solutions
+3
Applicable to:
m365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Sirius can help smooth the Microsoft 365 migration process with a highly successful two-phased approach. It is simple, prescriptive and guarantees successful outcomes.
14 out of 60
Managed Services - Microsoft 365ConvergeOne
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Fully utilize your Microsoft 365 Solution with all the Identity, Security, and Collaboration portions available to you
15 out of 60
Advanced eDiscovery : 10-Wks ImplementationWipro Ltd
+2
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Wipro's Microsoft Advanced eDiscovery offering enable organizations to rapidly implement Microsoft 365 Advanced eDiscovery solutions to create and manage legal investigations seamlessly.
16 out of 60
Athenagy™ E-Discovery Assessment: 4 weeksBDO Digital, LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Centralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
17 out of 60
Microsoft 365 Security Healthcheck-1 wk assessmentKiZAN Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Quickly identify security vulnerabilities for Microsoft 365 services with a Security Healthcheck.
18 out of 60
Microsoft Purview Info Protection & Gov: 12 Weeks ImplementationWipro Ltd
+1
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governance
Discover your sensitive data in a hybrid environment to identify potential risks and implement adequate controls to safe guard your data leveraging Microsoft Purview Unified data governance.
19 out of 60
Rapid Zero Trust Deployment : 8-WK ImplementationMaureen Data Systems
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The purpose and objectives of this engagement are to develop a Zero Trust Implementation Strategy
20 out of 60
ThreatHunter Implementation 3 weeksEnabling Technologies Corporation
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Gold Partner Enabling Technologies provides ThreatHunter: consulting, configuration, and training services to help organizations protect, detect, and respond to risks.
21 out of 60
Discover Sensitive Data: 5-Week WorkshopRackspace
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
22 out of 60
Teams / Microsoft 365 Governance: 6-Wk ImplCentric Consulting, LLC
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-teams-custom-solutions product iconTeams Custom Solutionsm365-sa-teamwork-deployment product iconTeamwork Deployment
A definition and implementation of a strong, yet flexible Teams and SharePoint governance that technically enforces organizational policies and processes, using a third party product called Orchestry.
23 out of 60
Microsoft Purview Compliance Quickstart - 4-6 Week ImplementationProtiviti
+2
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Jump Start your Compliance Journey with Microsoft Purview Compliance Manager to Govern Risk and Compliance
24 out of 60
Cy:lent Pursuit Threat Hunt: 6-Wk AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Ascent’s intel-based approach to cybersecurity threat hunting helps identify threat actors faster and more accurately than other, more traditional methodologies.
25 out of 60
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
26 out of 60
Avanade M365 Mergers, Acquisitions & Divestitures FY23Avanade, Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-teams-custom-solutions product iconTeams Custom Solutions
With increasing complexity, manageability of M365 M&A transformation becomes even more important requiring innovative tools and methodology. Avanade's unique methodology delivers the business outcome.
27 out of 60
Rapid Risk Assessment: 4-Wk AssessmentAscent Global, Inc.
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Immediate and long-term Microsoft security strategy assessment utilizing security tools such as Defender, Sentinel, and Cloud App Security.
28 out of 60
Modern Workplace and Microsoft 365: 3 hr workshopInsight
+2
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This workshop will give customers the knowledge they need to examine their environment and the requirements to support a modern workplace with solutions from Microsoft 365.
29 out of 60
Azure Sentinel: 8H WorkshopadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Modernize your security operations with Azure Sentinel.
30 out of 60
Discover Sensitive Data: 2 Week WorkshopNetwoven
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Netwoven Discover Sensitive Data workshop will train you to better discover, protect, and govern your corporate data
31 out of 60
Microsoft Purview Advisory: 30 Day ImplementationEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Epiq Microsoft Purview information governance consulting and advisory services ensure secure, compliant and efficient information governance strategies and deployment for Microsoft Purview compliance.
32 out of 60
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Catapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
33 out of 60
Avanade Secure Identities and Access FY23Avanade, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
We help our customers to define a modern identity strategy
34 out of 60
Client Services-Cloud Backup 365 - Briefing (2h)Iver Sverige AB
+1
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governance
Cloud Backup 365 is the Supplier’s service for backing up and recovering the Customer’s data in the Office 365 cloud service.
35 out of 60
Microsoft 365: 30-Day ImplementationReply Ltd
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-teamwork-deployment product iconTeamwork Deployment
With our Modern Work consulting and implementation services you can ensure your organisation is getting the most from Microsoft 365.
36 out of 60
Hybrid Cloud Security: 3 Day WorkshopModality Systems
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our workshop delivers a customised threat & vulnerability analysis of your hybrid and multi-cloud environment, and will teach you how to build a more robust cloud security system.
37 out of 60
Office 365 Teamwork Security - Managed ServiceCognizant
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Teamwork Security provides a comprehensive security management service for Office 365 platforms
38 out of 60
Infosys One Bundle M365 Managed ServiceInfosys Limited
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-teamwork-deployment product iconTeamwork Deployment
Infosys O365 Managed Service offering to enhance the workforce experience on collaboration continuum –It included service management with governance, change management, training & enablement services.
39 out of 60
Infosys Workplace Transformation Service OfferingInfosys Limited
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
To realize faster return on investment with O365, Infosys workplace transformation offering helps enterprise to build cohesive solutions, with a well defined maturity framework for O365 adoption
40 out of 60
IWS Modern Workplace Suite :1-Month ImplementationInfosys Limited
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
IWS Modern Workplace Suite – An Office 365 based tool that harnesses the power of automation to help users quickly iterate, prototype, and realize value from investments in Office 365.
41 out of 60
AvePoint Policies & Insights: 10-Days AssesmentsIT-Dev sp. z o. o.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Assesment's outcomes: • Enable centralized reporting on Microsoft 365 security. • Discover potential risks and exposed content. • Enforce policies and automatically remediate security breaches!
42 out of 60
Avanade Protect & Govern Sensitive Data FY23Avanade, Inc.
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-mobile-device-management product iconMobile Device Management
Implementing strategic information protection and secure collaboration solutions
43 out of 60
Security Assessment - 4-Week AssessmentCoretek Services
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Analysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
44 out of 60
Avanade Manage and Investigate Risks FY23Avanade, Inc.
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Control and help secure sensitive business information and protect against insider threats.
45 out of 60
Modern Workplace AssessmentHTG
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This assessment supports businesses in their cloud journey to quickly develop or migrate into a modern cloud-based organisation by implementing a Software as a Service Strategy with Microsoft 365.
46 out of 60
Microsoft 365 Security: 1 Month ImplementationValorem LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
A detailed baseline assessment of your current and desired state followed by a pilot production of Microsoft’s advanced security solutions to accelerate your modern security journey.
47 out of 60
Microsoft 365 Security: 3 Week Exec WorkshopValorem LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A strategic deep dive for security decision-makers to better understand, prioritize, and mitigate real-time threats in your environment.
48 out of 60
Zero Trust Foundation: 6 Week ImplementationValorem LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Using Azure Active Directory and Microsoft 365 Security, our teams will custom design a zero trust foundation that advances your security posture, reduces risk and makes your environment more secure.
49 out of 60
Infosys EMS solution : 1 Month ImplementationInfosys Limited
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-mobile-device-management product iconMobile Device Management
EMS + Security solution helps organizations to build a secure Modern Workplace by protecting the corporate data and simplifying workforce mobility.
50 out of 60
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
51 out of 60
Microsoft 365 Implementation for Financial ServiceNew Charter Technologies, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Paid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
52 out of 60
Microsoft 365 HIPAA/HITECH 20 Hour ImplementationNew Charter Technologies, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Implementation of Microsoft 365 to include compliance policies and templates for health care.
53 out of 60
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
54 out of 60
SharePoint Intranet Jumpstart: 20-D ImplementationTotal Solutions, Incorporated
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-teamwork-deployment product iconTeamwork Deployment
Use Microsoft SharePoint Online to grow your business. In this offer you will receive consulting services to implement a SharePoint Online Intranet to increase collaboration and improve your data.
55 out of 60
Mitigate Compliance and Privacy Risks: 8H WorkshopadaQuest
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Intelligently investigate and take action on insider and privacy risks.
56 out of 60
Protect & Govern Sensitive Data Workshop​: 8H WorkshopadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Discover risks from dark data and learn how to address them with the Protect & Govern Sensitive Data Workshop​
57 out of 60
Secure Multi-Cloud Environments: 8H WorkshopadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get a customized threat & vulnerability analysis of your hybrid and multi-cloud environment and learn how to build a more robust cloud security system.
58 out of 60
Microsoft 365 Mobility & Security: 5 Days WorkshopNETCOM LEARNING
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Examine all the common types of threat vectors and data breaches facing organizations today.
59 out of 60
Manage and Investigate Risk: 4-Week WorkshopBlueVoyant
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Discovering the hidden compliance risks in your organization.
60 out of 60
  • Sebelumnya
  • 1
  • 2
  • 3
  • 4
  • Seterusnya