AppSource
Feedback geven
Help en ondersteuning
Opgeslagen items
Privéplannen
Een ogenblik geduld, u wordt aangemeld...
Alle
Apps
Categorieën
Branches
Adviesdiensten
Partners
Filters
Alles wissen
Uw locatie
Producten (1)
Branches
Servicetype
Adviesdiensten resultaten
resultaten worden weergegeven in adviesdiensten.
Weergave
gerelateerde resultaten weergeven in brancheclouds
.
Alle resultaten
Co-pilot Technical Readiness
PHOENIX SOFTWARE LTD
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
Help your organisation ensure that they are technically ready for Co-pilot
1 out of 60
Red Canary MSSP FastTrack for Security
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Leverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
2 out of 60
Microsoft Copilot for Security: 6-Wk Enablement
Cyclotron Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Copilot for Security empowers security teams investigations and operations, harnessing real-time data across digital security estates to improve response time, intelligence, and investigation quality.
3 out of 60
CGI - Managed Services for Microsoft 365 FY24
CGI Inc.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Leave the end-to-end Microsoft 365 support services to CGI so that your IT support team can focus on value-added tasks.
4 out of 60
Windows 365 Jumpstart: 3 Week Implementation
Steeves
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
We'll discuss the value of Windows 365 and its key functionalities, followed by a workshop to expose key areas and document decisions that drive implementation to ensure a successful adoption.
5 out of 60
Windows 365: 5-week Proof of Concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
Enhance productivity through flexibility by enabling your team to create secure Cloud PCs and allowing BYOD without increasing risk to your environment
6 out of 60
Windows 11 Assessment: 1-WK
Steeves
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
7 out of 60
UNITE: Secure Core_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
UNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
8 out of 60
Office 365 GCC High Migration +Tenant Imp 4Wk
Summit 7 Systems, Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Companies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
9 out of 60
Microsoft 365 GCC High Migration from Microsoft 365 Commercial: 6 Week Implementation
Daymark Solutions
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
White-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Microsoft 365 Commercial
10 out of 60
Microsoft 365 consultancy
Onex Group
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Get Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
11 out of 60
Endpoint Management and Windows Deployment Services: 4-Wk Implementation
Data Market Bilgi Hizmetleri A.S
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Endpoint Management and Windows Deployment Services Consultancy is a professional consultancy service for modernization of device and application management infrastructure .
12 out of 60
Microsoft 365 Copilot Deployment and Readiness Services
Insight
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Insight can guide you on your Microsoft 365 Copilot journey with help of more than 1,500 dedicated Modern Work professionals who have been working to optimize Microsoft environments for 20 years.
13 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk Implementation
Neway Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Streamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
14 out of 60
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week Implementation
Quisitive
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Quisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
15 out of 60
Secure Identities and Access: 3 W - Workshop
Exelegent
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Help customers find and mitigate identity risks and safeguard their organization with a seamless identity solution.
16 out of 60
Endpoint Modernization Quickstart Service
Dell Technologies Services
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Dell Quick Start service helps customers configure their environment and prepare it for Modern Device Management and Modern Provisioning.
17 out of 60
Threat Protection: 2-Week Workshop
Forsyte IT Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
18 out of 60
Difenda - Information Protection and Governance - 4-week Implementation
Difenda
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Use Microsoft Purview to Implement an Information (Data) Protection and Governance solution to improve Security.
19 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
20 out of 60
Microsoft 365 Copilot: 2-Wk Readiness Assessment
Invoke
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Invoke's Microsoft 365 Copilot Readiness Assessment is a service that helps customers prepare for using Copilot 365, a solution that leverages data to enhance creativity, productivity, and skills.
21 out of 60
Microsoft 365 Managed Services
Netrix Global
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
Netrix’s 24x7x365 managed services for Microsoft 365 combines a reactive service desk with proactive strategic planning to ensure your team is productive and secure.
22 out of 60
Threat Protection: 3-Wk Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
23 out of 60
Zero Trust as a Service (ZTaaS)
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital transformation and adopting AI starts with building a secure foundation.
24 out of 60
Managed Threat Detection [xdr] [log]
Orange Cyberdefense Global
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
Stop threats with a cloud-native SIEM adapted to your new business needs.
25 out of 60
Incident Response Retainer
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
26 out of 60
Mergers and Acquisitions Playbook
Ivision, Inc.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
ivision leverages an approach and methodology designed to help clients successfully plan and design for a M/A&D migrations to achieve successful mergers, consolidation or a separation outcome.
27 out of 60
Fortis IR Table Top Exercises
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
28 out of 60
Microsoft 365 Mergers and Acquisitions (M&A): 4-Week Implementation
Spyglass MTG, LLC
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Spyglass’s Microsoft 365 Mergers and Acquisitions (M&A) Implementation is a 4-week/ $50k engagement that focuses on quickly being able to move data to its desired destination.
29 out of 60
Varonis Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
30 out of 60
Copilot for Microsoft 365 Pilot Launch: 2-Wk Proof of Concept
ProServeIT
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
A rapid Copilot for Microsoft 365 pilot/proof of concept with an initial use case will provide quick value from AI and learnings to expand the roll out and more use cases to other groups.
31 out of 60
Modern Workplace - Cloud Endpoint Management
Arxus
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Our Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
32 out of 60
Intune for macOS: 2Weeks Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Manage your macOS devices from Microsoft Intune with zero-touch provisioning, OS and app updates, and more.
33 out of 60
Capgemini Modern Workspace Portfolio
Capgemini Group
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Capgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
34 out of 60
Cybersecurity: 3-Wks Quick-Assessment
Unipartner IT Services, S.A.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
35 out of 60
Non-Profit Security Essentials : 1 Day Workshop
true org cloud
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
True.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
36 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk Assessment
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
37 out of 60
Office 365 Migration from Exchange: 15-Day Implementation
ProServeIT
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Migrate on-premise Microsoft Exchange email infrastructure to Office 365 in Microsoft's cloud infrastructure
38 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC Compliance
Agile IT
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Agile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
39 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 Wks
Wipro Ltd
+2
Applicable to:
Identity & Access Management
Threat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
40 out of 60
Microsoft 365 Security Assessment: 3-Week Assessment
Spyglass MTG, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
41 out of 60
Modern Management for Endpoints
Ivision, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
42 out of 60
Pentest-4wks Assessment
adaQuest
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Gain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
43 out of 60
Threat Protection Engagement
The Partner Masters
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
44 out of 60
Microsoft Intune Deployment
Secure Future Bilgi Tek. ve Hiz. Tic A.S.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
45 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed Service
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
46 out of 60
Journey to Microsoft 365 Copilot: 4-hours Workshop
PROJECT INFORMATICA SRL
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Microsoft 365 Copilot workshop bring to you the opportunity to create awareness about holistic to Microsoft 365 Copilot
47 out of 60
Merge and Acquisitions-Discovery, Planning Assessment
New Era Technology
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
M&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
48 out of 60
Microsoft Copilot Readiness Discovery: 3-Wk Assessment
ProServeIT
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
A Microsoft Copilot Readiness Assessment will identify your AI foundational requirements & permission settings to prepare your organization for leading edge efficiency.
49 out of 60
Microsoft Intune Endpoint Manager Discovery: 1-Mo Assessment
ProServeIT
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Enable organization-wide management & security for your endpoints (mobile devices, workstations, etc.) with a Microsoft Intune Endpoint Manager Discovery.
50 out of 60
Managed Detection and Response [Security Monitoring]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
51 out of 60
Microsoft 365 Copilot & Sales Readiness Assessment
JourneyTEAM
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
Accelerate your sales team's performance with JourneyTEAM's Copilot & Sales Readiness Assessment
52 out of 60
Microsoft Endpoint Manager: 8-Hours Workshop
Onex Group
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Learn how to secure Windows 11 environments with Microsoft Endpoint Manager
53 out of 60
Infosys Modern Identity and Access Solution with MS Entra
Infosys Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Microsoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
54 out of 60
Inviso KickStarter - Microsoft 365 E3 Adoption
Inviso Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Helping customers KickStart features in Microsoft 365 E3 Subscription
55 out of 60
Modern Management: 4 week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Modern Management is a Microsoft 365 focused managed service that reduces cost, improves security and delights employees!
56 out of 60
Identity & Endpoint Protection with Microsoft Zero Trust
Dell Technologies Services
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Dell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
57 out of 60
MITRE ATT&CK® MasterClass: 2-Hour Workshop
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s MITRE ATT&CK® MasterClass is focused on educating companies on ransomware threats specifically relevant to their environment.
58 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
59 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
60 out of 60
Vorige
1
2
3
4
5
Volgende