AppSource
Przekaż swoją opinię
Pomoc i obsługa techniczna
Zapisane elementy
Plany prywatne
Zaczekaj chwilę, trwa logowanie...
Wszystko
Aplikacje
Kategorie
Branże
Usługi doradcze
Partnerzy
Filtry
Wyczyść wszystko
Twoja lokalizacja
Produkty (1)
Branże
Typ usługi
Wyniki: Usługi doradcze
Pokazywanie wyników w usługi doradcze.
Widok
powiązane wyniki w: chmury branżowe
.
Wszystkie wyniki
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed Service
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
1 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
2 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementation
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
3 out of 60
Cybersecurity: 3-Wks Quick-Assessment
Unipartner IT Services, S.A.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
4 out of 60
Cyber Security Health Check: 4-Hr Assessment
Enabling Technologies Corporation
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Cyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
5 out of 60
Microsoft 365 Security Workshop
Olive + Goose
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Improve your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
6 out of 60
Microsoft Copilot for Security: 2-Day Workshop
Planet Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
This 2-day workshop covers the essential aspects you need to effectively and efficiently leverage Microsoft Copilot for Security for your organization's security operations and needs.
7 out of 60
Varonis Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
8 out of 60
Copilot - 2 Days Adoption Workshop
INSOMEA COMPUTER SOLUTIONS TUNISIE SARL
+2
Applicable to:
Frontline Workers
Threat Protection
INSOMEA will help users in adopting copilot within companies from different sectors and sizes
9 out of 60
Secure Modern Workplace Platform Implementation
Cognizant
+3
Applicable to:
Adoption & Change Management
Teamwork Deployment
Threat Protection
Enables teams to securely collaborate, connect and be more productive than ever before, no matter when or where they work.
10 out of 60
CASB (MCAS) Advisory: 2-week Workshop Series
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
11 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
12 out of 60
Microsoft 365 GCCH Cybersecurity Maturity Model Certification Configuration Assessment - 5 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Provide IT and Security departments with an indication of readiness for your Microsoft 365 GCCH Tenant as it pertains to Cybersecurity Maturity Model Certification.
13 out of 60
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day Implementation
Critical Start
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Rapidly identify, contain, and remediate a breach.
14 out of 60
Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
15 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
16 out of 60
Microsoft 365 E5 CMMC L3 8 Week Implementation
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
17 out of 60
Microsoft 365 E5 NIST 800-171 -1 Week GAP Assessmt
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
This offer is for a NIST800-171 Gap Assessment for a single Host Unit, scoped to a single contract, single subnet using the Microsoft 365 E5 license
18 out of 60
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
19 out of 60
Defend Against Threats with SIEM Plus XDR usage Workshop
Orange Business Services - Global
+1
Applicable to:
Threat Protection
Our workshop will help you designing and deploying Microsoft security technologies for your unique needs.
20 out of 60
Assessment of Microsoft Intune
CDW
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
CDW's Assessment of Microsoft Intune is a professional service that provides a comprehensive review of your current Microsoft Intune environment, including policies, settings and configurations.
21 out of 60
Security Assessment - 4-Week Assessment
Coretek Services
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Analysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
22 out of 60
Zero Trust Launchpad: 3-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
23 out of 60
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
24 out of 60
Security and compliance assessment with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Fortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
25 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
26 out of 60
Managed SOC_by SoftwareOne
SoftwareOne
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure your IT Environment with Microsoft Services and on-call Cyber-security Analysts with Managed SOC by SoftwareOne
27 out of 60
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
28 out of 60
Secure Productive Workplace: Implement 4-Wk
Netsurit
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Netsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
29 out of 60
XENSHIELD365 - Managed Detection and Response (MDR)
Xencia Technology Solutions Pvt Ltd
+2
Applicable to:
Cloud Security
Threat Protection
24x7 Managed Security Operations SoC through shared team of Security experts Defender XDR
30 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
31 out of 60
Microsoft 365 Security: 2-week assessment
Mirai Security Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
32 out of 60
Onevinn Secure Microsoft Copilot Journey Workshop
Onevinn AB
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
This workshop will enable you to take full advantage of Microsoft 365 Copilot with focus on Compliance and Information Protection.
33 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 Wks
Wipro Ltd
+2
Applicable to:
Identity & Access Management
Threat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
34 out of 60
Microsoft 365 Security Program - 10 Weeks
Trace3
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
35 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days Implementation
HCL Technologies Limited.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
36 out of 60
Defender for Endpoint Managed Service
e2e-assure Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
37 out of 60
TS As a Services (TSaaS): 5-day Implementation
E-Level Cloud Services S.A. de C.V.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
38 out of 60
Zones SOCaaS - XDR with Threat Protection
Zones, LLC
+2
Applicable to:
Cloud Security
Threat Protection
Zones SOCaaS powered by Microsoft Sentinel, offers top-tier cybersecurity solutions. Leveraging advanced MDR and XDR capabilities to ensure comprehensive protection against evolving threats.
39 out of 60
Intelligent Endpoint Protection: 2-week Workshop
NTT DATA Inc.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
40 out of 60
Implementation of Microsoft Identity Security
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW's Implementation of Microsoft Identity Security service helps customers strengthen their security posture, reduce the risk of data breaches and improve compliance with industry regulations.
41 out of 60
Microsoft Defender for Endpoint Implementation
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
42 out of 60
Threat Protection and Cloud Security: 3 Day Workshop
Netwoven
+2
Applicable to:
Cloud Security
Threat Protection
Improve your security posture with a Microsoft Threat Protection Assessment Workshop
43 out of 60
Office 365 Teamwork Security - Managed Service
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Teamwork Security provides a comprehensive security management service for Office 365 platforms
44 out of 60
1-Day Security & Identity Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Tailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
45 out of 60
License Advisory Services
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Teamwork Deployment
Threat Protection
Whether you’ve been approached by Microsoft for an audit or simply want to conduct a self-assessment, our License Advisory Services is a great solution for understanding your real licensing needs.
46 out of 60
Active Directory Security on Demand
Comtrade System Integration
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
47 out of 60
Microsoft OT/IOT Security : 2-Wks Assessment
Wipro Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Identify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
48 out of 60
Insider Risk Management: 8-Wk implementation
PwC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
49 out of 60
Microsoft 365 Security Health Check Assessment 3-Wk
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
50 out of 60
Microsoft Intune Deployment
Secure Future Bilgi Tek. ve Hiz. Tic A.S.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
51 out of 60
Mobile Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Corporate Mobile Devices (iOS, Android and macOS)
52 out of 60
Data Classification and Protection 3Weeks Workshop
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
53 out of 60
Managed Extended Detection & Response (MXDR) for Workplace: 2 Hr Workshop
Netwoven
+2
Applicable to:
Cloud Security
Threat Protection
Learn how to put next generation Microsoft security tools to work for you.
54 out of 60
Endpoint Management Workshop
York Telecom Corp
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
55 out of 60
Copilot Data Protection
Cloud Life
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
56 out of 60
Big Green IT Security Assessment: 3-Week
Big Green IT - Dev
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
57 out of 60
Managed Threat Detection [xdr] for Microsoft 365 Defender
Orange Business Services - Global
+1
Applicable to:
Threat Protection
Implementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
58 out of 60
Darktrace Managed Network Sensor
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
59 out of 60
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
60 out of 60
Wstecz
1
2
3
4
5
Dalej