AppSource
Przekaż swoją opinię
Pomoc i obsługa techniczna
Zapisane elementy
Plany prywatne
Zaczekaj chwilę, trwa logowanie...
Wszystko
Aplikacje
Kategorie
Branże
Usługi doradcze
Partnerzy
Filtry
Wyczyść wszystko
Twoja lokalizacja
Produkty (1)
Branże
Typ usługi
Wyniki: Usługi doradcze
Pokazywanie wyników w usługi doradcze.
Widok
powiązane wyniki w: chmury branżowe
.
Wszystkie wyniki
Microsoft Entra – IAM Review and Assessment
Collective Insights
+1
Applicable to:
Identity & Access Management
Streamline your Microsoft 365 identity management and enhance your security with insights from our Microsoft Entra IAM Review and Assessment
1 out of 60
Office 365 Migration from Exchange: 15-Day Implementation
ProServeIT
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Migrate on-premise Microsoft Exchange email infrastructure to Office 365 in Microsoft's cloud infrastructure
2 out of 60
Difenda - Information Protection and Governance - 4-week Implementation
Difenda
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Use Microsoft Purview to Implement an Information (Data) Protection and Governance solution to improve Security.
3 out of 60
Okta to Microsoft Entra ID Migration
Performanta
+1
Applicable to:
Identity & Access Management
Performanta's Okta to Microsoft Entra ID Application Migration service will give you a controlled, seamless and secure transition to Azure AD.
4 out of 60
Microsoft Funded Workshop for Copilot for Microsoft 365: 2-Wk Assessment
ProServeIT
+2
Applicable to:
Compliance Advisory Services
Identity & Access Management
If your company is eligible, we can deliver a Microsoft funded readiness assessment for Copilot for Microsoft 365 to you free of charge ($5,000 USD value).
5 out of 60
Microsoft 365 Cyber Insurance Review: 2-5 Wk Assessment
KiZAN Technologies
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Map your business cyber insurance carrier requirements to Microsoft 365 environment controls ranked by priority and impact to your security posture.
6 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week Implementation
Beyondsoft Brasil
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
7 out of 60
Microsoft Intune Jumpstart for Endpoints - Mobile & Workstations: 2-Wk Implementation
ProServeIT
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Enable organization-wide management & security for your mobile devices & workstations with a Microsoft Intune jumpstart pilot.
8 out of 60
CGI - Managed Services for Microsoft 365 FY24
CGI Inc.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Leave the end-to-end Microsoft 365 support services to CGI so that your IT support team can focus on value-added tasks.
9 out of 60
Microsoft Cybersecurity Assessment
Akins IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
10 out of 60
Autopilot: 2-Wk Proof of Concept
FSI Strategies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
FSi Strategies will review the deployment scenarios with the client and execute a proof of concept up to 25 devices in order to demonstrate the capabilities of Windows Autopilot
11 out of 60
Copilot Readiness Assessment for Microsoft 365
Mint Management Technologies
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
Mint Group is thrilled to bring you a consulting service designed to supercharge your Microsoft 365 experience and get you Microsoft 365 Copilot ready.
12 out of 60
Mergers and Acquisitions Playbook
Ivision, Inc.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
ivision leverages an approach and methodology designed to help clients successfully plan and design for a M/A&D migrations to achieve successful mergers, consolidation or a separation outcome.
13 out of 60
Data Protection Impact Assessment: 8 Wk
Lighthouse Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Empowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
14 out of 60
ThreatHunter MXDR: 3-Wk Implemenation
eGroup Enabling Technologies
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
eGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.
15 out of 60
Endpoint Modernization Quickstart Service
Dell Technologies Services
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Dell Quick Start service helps customers configure their environment and prepare it for Modern Device Management and Modern Provisioning.
16 out of 60
Crayon Cloud Security Assessment: 3-Wk Assessment
Crayon
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Evaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
17 out of 60
Atos || Microsoft Windows 365 Pilot
Atos International SAS
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Atos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
18 out of 60
Microsoft 365 Copilot Readiness: 2 week Assessment
TOKIOTA
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
We help our clients to integrate Microsoft 365 Copilot in their organization in the most secure and efficent way
19 out of 60
Microsoft Copilot Readiness Discovery: 3-Wk Assessment
ProServeIT
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
A Microsoft Copilot Readiness Assessment will identify your AI foundational requirements & permission settings to prepare your organization for leading edge efficiency.
20 out of 60
Microsoft 365 Copilot: 2-Wk Readiness Assessment
Invoke
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Invoke's Microsoft 365 Copilot Readiness Assessment is a service that helps customers prepare for using Copilot 365, a solution that leverages data to enhance creativity, productivity, and skills.
21 out of 60
Red Canary MSSP FastTrack for Security
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Leverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
22 out of 60
Office 365 GCC High Migration +Tenant Imp 4Wk
Summit 7 Systems, Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Companies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
23 out of 60
Endpoint Management Solutions: 4-Wk Implementation
Signal Alliance
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Discover how Signal Alliance Consulting enables users in your organization to be productive, on any device, without compromising IT security by leveraging Microsoft Endpoint Management.
24 out of 60
Avanade Hybrid Windows Endpoint Solutions FY24
Avanade, Inc.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Avanade has developed the next generation of endpoint solutions for the modern workforce, with integrated physical, virtual and hybrid solutions
25 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365 GCC High for CMMC/ITAR: 6-Wk Assessment and Planning
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Shorten the time to value from an M&A activity which includes partial or all going to Microsoft 365 GCC High by starting with an assessment and plan to rationalize identities, tenants, and costs.
26 out of 60
Microsoft 365 GCC High Mig from Google (25 Users)
Daymark Solutions
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
White-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Google G Suite
27 out of 60
Windows 365 Jumpstart: 3 Week Implementation
Steeves
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
We'll discuss the value of Windows 365 and its key functionalities, followed by a workshop to expose key areas and document decisions that drive implementation to ensure a successful adoption.
28 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Microsoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
29 out of 60
MFA Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan.
30 out of 60
Modern Workplace Security 10-Wk Implementation
Wipro Ltd
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
31 out of 60
Microsoft 365 Managed Services
Netrix Global
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
Netrix’s 24x7x365 managed services for Microsoft 365 combines a reactive service desk with proactive strategic planning to ensure your team is productive and secure.
32 out of 60
Microsoft 365 GCC High Migration from Microsoft 365 Commercial: 6 Week Implementation
Daymark Solutions
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
White-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Microsoft 365 Commercial
33 out of 60
Zero Touch Provisioning: 3-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Zero-Touch Provisioning sets you up to ship devices straight to users, with auto-configuration occurring over the air on initial sign in.
34 out of 60
Cyber Security Assessment
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
35 out of 60
Windows 365 Deployment : 12 month Implementation
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Patriot will design, configure, test and deploy Microsoft Windows 365 for your environment.
36 out of 60
ADFS to Microsoft Entra ID Migration: 4-Wk Implementation
Performanta
+1
Applicable to:
Identity & Access Management
Undertake a seamless ADFS to Microsoft Entra ID app migration, improving security, offering up new features, and getting your organisation back on track.
37 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 Wks
Wipro Ltd
+2
Applicable to:
Identity & Access Management
Threat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
38 out of 60
SharePoint Premium Readiness Assessment & Roadmap - 5 Week Assessment
Protiviti
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Evaluate and ensure your readiness for implementing SharePoint Premium, considering technical, business case, data lifecycle, and administration perspectives.
39 out of 60
Modern EndPoint Management - Jumpstart: 1-Wk Proof of Concept
Logicalis, Inc.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune Jumpstart will help showcase the value of Microsoft Intune, to show you how to more effectively manage endpoints within Intune. Proof of Concept deployment included!
40 out of 60
Cybersecurity: 3-Wks Quick-Assessment
Unipartner IT Services, S.A.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
41 out of 60
Intune for Windows: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
42 out of 60
Capgemini Modern Workspace Portfolio
Capgemini Group
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Capgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
43 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
44 out of 60
Introducing Microsoft Entra: 2 Hour Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn about how Microsoft Entra will help your business step into tomorrow with modern identity and access solutions by introducing you to modern access security across a broad range of products.
45 out of 60
AgileAscend Microsoft 365 GCC and GCC High: 1 Hour Assessment
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
46 out of 60
Securing Identities Workshop: 4-Wk Workshop
ProArch Technologies, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
47 out of 60
Microsoft Copilot for Security: 6-Wk Enablement
Cyclotron Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Copilot for Security empowers security teams investigations and operations, harnessing real-time data across digital security estates to improve response time, intelligence, and investigation quality.
48 out of 60
Intune for macOS: 2Weeks Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Manage your macOS devices from Microsoft Intune with zero-touch provisioning, OS and app updates, and more.
49 out of 60
Co-pilot Technical Readiness
PHOENIX SOFTWARE LTD
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
Help your organisation ensure that they are technically ready for Co-pilot
50 out of 60
Microsoft 365 Security Assurance Service: Assessment
Performanta
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
51 out of 60
Fortis IR Table Top Exercises
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
52 out of 60
Copilot for Microsoft 365 Pilot Launch: 2-Wk Proof of Concept
ProServeIT
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
A rapid Copilot for Microsoft 365 pilot/proof of concept with an initial use case will provide quick value from AI and learnings to expand the roll out and more use cases to other groups.
53 out of 60
Incident Response Retainer
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
54 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
55 out of 60
Microsoft 365 Mergers and Acquisitions (M&A): 4-Week Implementation
Spyglass MTG, LLC
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Spyglass’s Microsoft 365 Mergers and Acquisitions (M&A) Implementation is a 4-week/ $50k engagement that focuses on quickly being able to move data to its desired destination.
56 out of 60
Microsoft 365 Security Health Check Assessment 3-Wk
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
57 out of 60
Identity & Access Management : 6 Wk Implementation
Happiest Minds Technologies Limited
+1
Applicable to:
Identity & Access Management
End to end Microsoft IAM Analysis & License Utilization, Plan- Deploy- Implement & Roll Out Microsoft IAM Suite, followed by ongoing managed services.
58 out of 60
Windows 365 Accelerator: 4 Week Implementation
KiZAN Technologies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
During this 4-week engagement, KiZAN will assist with the design and implementation of Windows 365, including education, planning, documentation, and pilot for up to 50 users.
59 out of 60
Microsoft Windows Autopilot Services: 5-Day Proof of Concept
eGroup Enabling Technologies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Reduce IT complexity and eliminate time-consuming corporate re-imaging by shipping and deploying straight to users with Microsoft Windows Autopilot.
60 out of 60
Wstecz
1
2
3
4
5
Dalej