AppSource
Feedback geven
Help en ondersteuning
Opgeslagen items
Privéplannen
Een ogenblik geduld, u wordt aangemeld...
Alle
Apps
Categorieën
Branches
Adviesdiensten
Partners
Filters
Alles wissen
Uw locatie
Producten (1)
Branches
Servicetype
Adviesdiensten resultaten
resultaten worden weergegeven in adviesdiensten.
Weergave
gerelateerde resultaten weergeven in brancheclouds
.
Alle resultaten
Modern SecOps Discovery Session
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
1 out of 60
AgileAscend Microsoft 365 GCC and GCC High: 1 Hour Assessment
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
2 out of 60
Microsoft 365 Tenant to Tenant Migration: 6 Week Implementation
All Covered, a division of Konica Minolta
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Let All Covered help you assess, plan and skillfully implement your Microsoft 365 Tenant to Tenant migration.
3 out of 60
Microsoft 365 Inter-Tenant Migration: 2 days Assessment
Preeminent Solutions, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Preeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
4 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed Service
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
5 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week Implementation
Beyondsoft Brasil
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
6 out of 60
Windows 365 Standardized Pilot
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
7 out of 60
Change Management: 1-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Change Management is a proven methodology to deploy technology changes to large groups of diverse Microsoft 365 users.
8 out of 60
Intune for macOS: 2Weeks Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Manage your macOS devices from Microsoft Intune with zero-touch provisioning, OS and app updates, and more.
9 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementation
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
10 out of 60
Microsoft 365 Roadmap: 1-Wk Workshop
Egroup, Inc.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Mobile Device Management
Enable a Secure and Productive Workforce with a Modern Workplace Roadmap powered by Microsoft 365 solutions.
11 out of 60
Identity & Endpoint Protection with Microsoft Zero Trust
Dell Technologies Services
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Dell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
12 out of 60
MITRE ATT&CK® MasterClass: 2-Hour Workshop
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s MITRE ATT&CK® MasterClass is focused on educating companies on ransomware threats specifically relevant to their environment.
13 out of 60
MXDR Consultation
CBTS Technology Solutions LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
14 out of 60
Implementation of Microsoft Identity Security
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW's Implementation of Microsoft Identity Security service helps customers strengthen their security posture, reduce the risk of data breaches and improve compliance with industry regulations.
15 out of 60
Microsoft Cybersecurity Assessment
Akins IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
16 out of 60
Intune for Windows: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
17 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
18 out of 60
Data Security and Governance Assessment and Roadmap
Centric Consulting, LLC
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
Provide customers with a clear path forward in addressing data security needs
19 out of 60
Microsoft Copilot Readiness: 2-Wk Workshop
Centric Consulting, LLC
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
A facilitated workshop to build a Roadmap to guide your organization in implementing Microsoft Copilot
20 out of 60
Cloud-Native Migration Service: 4-Month Implementation
Cyclotron Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
21 out of 60
G Suite to M365 Migration: 1-Day Proof of concept
true org cloud
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Proof of concept for migration from G Suite to Microsoft 365
22 out of 60
Microsoft Purview Records Management Assessment & Strategy for Financial Services - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists Financial Services organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
23 out of 60
Securing Identities: 3 Days Workshop
INOVASYS FOR SYSTEMS
+1
Applicable to:
Identity & Access Management
Microsoft funded Securing Identities is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
24 out of 60
UNITE: Secure Core_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
UNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
25 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
26 out of 60
Intune for Android: 2-wk Imp
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Android devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
27 out of 60
Modern Management for Endpoints
Ivision, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
28 out of 60
Capgemini Modern Workspace Portfolio
Capgemini Group
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Capgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
29 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 Wks
Wipro Ltd
+2
Applicable to:
Identity & Access Management
Threat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
30 out of 60
Microsoft 365 Security Program - 10 Weeks
Trace3
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
31 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week Implementation
Options Technology Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
32 out of 60
Modern EndPoint Management - Jumpstart: 1-Wk Proof of Concept
Logicalis, Inc.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune Jumpstart will help showcase the value of Microsoft Intune, to show you how to more effectively manage endpoints within Intune. Proof of Concept deployment included!
33 out of 60
Microsoft Entra Private Access and Entra Internet Access
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Transform your organization's security landscape with our latest jumpstart, designed to fortify managed applications for your remote workforce and ensure secure access to Microsoft 365.
34 out of 60
Windows 11 Assessment: 1-WK
Steeves
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
35 out of 60
Microsoft 365 License Optimization:1-hr Assessment
Frontier Technology, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Review current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
36 out of 60
Office 365 GCC High Migration +Tenant Imp 4Wk
Summit 7 Systems, Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Companies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
37 out of 60
Microsoft Intune Endpoint Manager Discovery: 1-Mo Assessment
ProServeIT
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Enable organization-wide management & security for your endpoints (mobile devices, workstations, etc.) with a Microsoft Intune Endpoint Manager Discovery.
38 out of 60
Secure Data on Personally-Owned Devices: 2 Week Implementation
CDI LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
Deploy Intune App Protection Policies to secure organization data on employee-owned devices
39 out of 60
Cloud Managed Windows Endpoint Migration: 5 Week Pilot Implementation
CDI LLC
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
Deploy a working model for cloud-managed Windows endpoints leveraging Microsoft Entra ID and Microsoft Intune
40 out of 60
Zero Trust Workplace Solution: 3-Wk Implementation
Softchoice
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Solution for organizations wanting to improve their overall security posture by implementing key security features for protecting user identity, devices, and data.
41 out of 60
MDR Workshop
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
42 out of 60
On-Prem Exchange to Office 365 Migration: 4-Wk Migration
Exodus Integrity Services, Inc.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Simplify your email migration process to Office 365 with ease and efficiency.
43 out of 60
Security Outcomes Sprint
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Understand the Business Value of Your Cybersecurity Investments
44 out of 60
Microsoft Purview Records Management Assessment & Strategy - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
45 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
46 out of 60
Managed Endpoint Assessment
FSI Strategies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
This four-week engagement will determine the level of effort required for a migration to a fully modern desktop using Microsoft 365 services.
47 out of 60
Inviso KickStarter - Microsoft 365 E3 Adoption
Inviso Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Helping customers KickStart features in Microsoft 365 E3 Subscription
48 out of 60
Finchloom+ for Microsoft 365 Administration
Finchloom
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Standardized management of your Microsoft 365 Tenant. Free up internal resources from regular administration tasks, firefighting issues, and escalating to Microsoft Support.
49 out of 60
Endpoint Management with Security Workshop
Migrate LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Let us show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
50 out of 60
Microsoft Intune Deployment
Secure Future Bilgi Tek. ve Hiz. Tic A.S.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
51 out of 60
Microsoft Purview Records Management Assessment & Strategy for Government - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists government departments and agencies with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
52 out of 60
Google to Microsoft 365 Migration
Managed Solution
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Empowering digital transformation through a Google to Microsoft 365 migration with world-class support, so you can focus on what matters most—your business.
53 out of 60
Microsoft Intune: 4-Wk Implementation
eGroup Enabling Technologies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Enable users to be productive on any device, without compromising security.
54 out of 60
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week Implementation
Quisitive
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Quisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
55 out of 60
Microsoft Purview: 5-Day Fundamentals Workshop
eGroup Enabling Technologies
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Quickly reduce risk and enable compliance controls with an eGroup Enabling Technologies, LLC Microsoft Purview Fundamentals Workshop.
56 out of 60
Microsoft Endpoint Manager Baseline
SHI International Corp
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Explore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
57 out of 60
Managed Threat Detection [xdr] [log]
Orange Cyberdefense Global
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
Stop threats with a cloud-native SIEM adapted to your new business needs.
58 out of 60
Defender for Endpoint: 5-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
59 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
60 out of 60
Vorige
1
2
3
4
5
Volgende