AppSource
Enviar comentários
Ajuda + suporte
Itens salvos
Planos privados
Aguarde um momento, fazendo login...
Todos
Aplicativos
Categorias
Setores
Serviços de Consultoria
Parceiros
Filtros
Desmarcar tudo
Seu local
Produtos (1)
Setores
Tipo de serviço
Serviços de consultoria resultados
Mostrando resultados no serviços de consultoria
Exibir
resultados relacionados em nuvens do setor
.
Todos os resultados
base-IT Pentesting
BaseIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Mit base-IT Pentesting stärken wir Ihre IT-Sicherheit und decken Schwachstellen auf. Durch die Integration von Microsoft 365 (Cloud Security, etc.) entsteht eine umfassende Sicherheitsarchitektur.
1 out of 40
Managed Defender for Identity
Swiss IT Security Deutschland GmbH
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Swiss IT Security Advanced Threat Management: Intelligenter, mehrstufiger Schutz vor Angriffen On-Premise bzw. in der Cloud
2 out of 40
Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
3 out of 40
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
4 out of 40
SharePoint and Teams Security - 2 week assessment
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Confident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
5 out of 40
Teams & SharePoint Security Hardening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
6 out of 40
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
7 out of 40
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
8 out of 40
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
9 out of 40
Data Protection and Governance with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
10 out of 40
Phishing, Malware & Spam protection- 2 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
11 out of 40
Microsoft 365 Security: 5 Tage Assessment
Controlware GmbH
+2
Applicable to:
Cloud Security
Threat Protection
Erkennung von potentiellen Sicherheitsmängeln, Dokumentation sicherheitsrelevanter Einstellungen und Reduktion des Risikos durch Schadsoftware innerhalb von Microsoft Office 365.
12 out of 40
4-Day Security Assesment
HSO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
13 out of 40
Security Configuration Maintenance 2-Wks Imp
Insight Technology Solutions
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
A monthly Security Configuration Maintenance Service. This service will help to secure end-user devices more effectively based on Insight and Microsoft Security best practices.
14 out of 40
Security 360° by aConTech - 1 wk implementation
aConTech GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sie erhalten folgende Leistungen: Die Implementierung von Identity and Access Management, Threat Protection, Conditional Access, Microsoft 365 Defender sowie Security Monitoring.
15 out of 40
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
16 out of 40
Secure & Compliant Modern Workplace: 2 weeks Imp
Insight Technology Solutions
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
Based on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
17 out of 40
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
18 out of 40
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
19 out of 40
Security365 by CyberCare: 3 Wochen Implementierung
Arvato Systems
+2
Applicable to:
Cloud Security
Threat Protection
Consulting Service for Microsoft 365 Defender - Tool Configuration and Secure Score Management
20 out of 40
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
21 out of 40
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
22 out of 40
1-Day Envisioning Workshop - Microsoft XDR
water IT Security GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
In product dedicated sessions we will explain the different pieces of Microsoft XDR product families and show the unique value add as solution but also as security platform in the bigger picture.
23 out of 40
sepago adapt:impl Microsoft 365 processes in 9 wks
sepago GmbH
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Threat Protection
sepago adapt ensures that your security team can follow processes fitting your organization at each point in time. This makes sure that Microsoft 365 solutions can unfold their full potential.
24 out of 40
Discover Sensitive Data: 5-Week Workshop
Rackspace
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
25 out of 40
Cybersecurity Awareness: 12 month implementation
Prodware Group
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
Cybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
26 out of 40
Bechtle Microsoft 365 E5 Security - 2d Workshop
Bechtle AG
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
In this workshop we will talk about today's cyber security risks and show you how you can use the Microsoft 365 E5 Security Suite to initiate a zero trust approach.
27 out of 40
1-Tag Microsoft 365 Health & Security Assessment
Comma Soft AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assessment Ihrer bestehenden Microsoft 365 Umgebung hinsichtlich Best-Practices und Betreibbarkeit
28 out of 40
Microsoft Endpoint Manager: 90 minütiger Workshop
novaCapta GmbH
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Client Management: Zentralisiert und kostenoptimiert. Der Workshop zur Bewältigung des Balanceaktes zwischen Usability und IT-Security.
29 out of 40
Zero Touch Provisioning: 5-tägiger Workshop
novaCapta GmbH
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Client Management optimieren: Lernen Sie in unserem 5-tägigen Workshop den Windows Autopiloten kennen, erfassen Sie seine Vorteile und machen Sie die ersten Schritte mit uns
30 out of 40
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
31 out of 40
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Nil d.o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
32 out of 40
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
33 out of 40
Microsoft 365 Defender Enterprise Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Manage and Investigate Risk and Threat Protection
34 out of 40
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
35 out of 40
[Threat Management: 5-Days Assessment]
Computacenter Plc
+1
Applicable to:
Threat Protection
Customer security assessment in regards of Threat management: 5 day offer
36 out of 40
Insight Discover Sensitive Data 5 Day Workshop
Insight Technology Solutions
+2
Applicable to:
Information Protection & Governance
Threat Protection
Insight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
37 out of 40
Insight Security Mini Audit: 1 Day Workshop
Insight Technology Solutions
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Insight will work with you to evaluate your Microsoft 365 environment to make sure that it is in line with industry security best practices.
38 out of 40
Managed Security Services for Microsoft Defender for Endpoint DACH: 12 Mon Implementation
Telekom Deutschland GmbH Main Account
+2
Applicable to:
Information Protection & Governance
Threat Protection
Configuration and operation of customer specific solution based on Microsoft Defender for Endpoint incl. integration into the Security Operation Center of Deutsche Telekom Security
39 out of 40
Threat Protection 3 Day Workshop
Insight Technology Solutions
+1
Applicable to:
Threat Protection
Insight's Threat Protection Workshop identifies real-time threats in an organisation’s environment and helps define clear next steps to mitigate risks with Microsoft 365
40 out of 40
Anterior
1
2
3