AppSource
Enviar comentários
Ajuda + suporte
Itens salvos
Planos privados
Aguarde um momento, fazendo login...
Todos
Aplicativos
Categorias
Setores
Serviços de Consultoria
Parceiros
Filtros
Desmarcar tudo
Seu local
Produtos (1)
Setores
Tipo de serviço
Serviços de consultoria resultados
Mostrando resultados no serviços de consultoria
Exibir
resultados relacionados em nuvens do setor
.
Todos os resultados
Ctelecoms Protect and Govern Sensitive Data Workshop
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Protect & Govern Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
1 out of 36
Ctelecoms Secure Identities and Access Workshop
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure Identities and Access Workshop helps you find and mitigate identity risks and safeguard their organizations with a seamless identity solution.
2 out of 36
Endpoint Management: 4 Wk of Workshop Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+1
Applicable to:
Cloud Security
4 weeks of workshop implementation to learn how to manage and protect your devices, applications and users
3 out of 36
AntiSpam e AntiPhishing
Redbelt Security
+2
Applicable to:
Cloud Security
Threat Protection
Implementação, assessment de melhores práticas e acompanhamento e apoio na adoção, remediação e resposta a incidentes
4 out of 36
MSS com Soluções Microsoft
Redbelt Security
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Serviços de gerenciamento e operação de segurança em soluções Microsoft.
5 out of 36
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
6 out of 36
Onesec’s Secure Access to Microsoft 365 with Zscaler
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
7 out of 36
Defend Against Threats with SIEM Plus XDR Workshop: 4 Weeks of Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
Cloud Security
Threat Protection
The goal of the workshop is to show how Microsoft's security solutions can help organizations protect themselves from cyberthreats
8 out of 36
Protect & Govern Sensitive Data Workshop: 4 Weeks of Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
Cloud Security
Information Protection & Governance
It is an intensive workshop that teaches you how to protect and govern your organization's sensitive data with Microsoft solutions.
9 out of 36
Secure Multicloud Environment Workshop: 4 Weeks of Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
Cloud Security
Threat Protection
The workshop aims to present best practices and tools for designing, implementing and managing a secure multi-cloud environment, leveraging the capabilities of Microsoft Azure, Microsoft 365, etc.
10 out of 36
Mitigate Compliance & Privacy Risk Workshop: 4 Weeks of Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
Cloud Security
Insider Risk
Designed to help organizations identify and reduce compliance and privacy risks associated with the use of the cloud.
11 out of 36
Secure Identities & Access Workshop: 4 Weeks of Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
Cloud Security
Identity & Access Management
The objective of the workshop is to help customers find and mitigate identity risks and protect your organization with a seamless identity solution.
12 out of 36
Avanade Security Business Value 4-Wk Assessment FY24
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
13 out of 36
Avanade Security Risk Assessment
Avanade, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Avanade's 5-day Risk Assessment offers security leaders a comprehensive view of risk posture across their enterprise and proactive ways to protect their organizations from growing cyber threats.
14 out of 36
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-Weeks
myCloudDoor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Assess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
15 out of 36
Sensitive Data Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Sensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
16 out of 36
Microsoft 365 Security and Compliance Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Microsoft 365 Security and Compliance Assessment evaluates your current security posture, identifies vulnerabilities, and offers tailored solutions to enhance your data security and compliance.
17 out of 36
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
18 out of 36
Information Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Our approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
19 out of 36
Microsoft 365 Security 4 Weeks Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
20 out of 36
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
21 out of 36
EM+S Consulting Services: 4-Weeks Implementation
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
We will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
22 out of 36
Cybersecurity - 3-Wk Assessment
adaQuest
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
With the Cybersecurity Assessment we take a four-phased approach to set your path forward to the cloud.
23 out of 36
Defend Against Threats with SIEM Plus XDR: 8H Workshop
adaQuest
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
24 out of 36
Endpoint Management: 6-Week Workshop
VENHA PRA NUVEM
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Aprenda e descubra como gerenciar e proteger seus dispositivos, aplicativos e usuários no Microsoft 365
25 out of 36
Threat Protection: 5-Week Workshop
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
An executive deep dive into security strategy, tailored to your organization.
26 out of 36
Zero-trust collaboration security 6wk Implement
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
27 out of 36
Zero-Trust Secure Email 6wk Imp
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
28 out of 36
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
29 out of 36
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
30 out of 36
Microsoft 365 Defender Enterprise Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Manage and Investigate Risk and Threat Protection
31 out of 36
Microsoft Cloud App Security: 2 Week Implementation
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Cloud Security
Keep your employees productive and secure on their favorite apps and devices with Cloud App Security. Bring the security of your on-premises systems to your cloud applications.
32 out of 36
Microsoft Data Compliance Consulting Services - 2 Weeks Assessment
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
The Microsoft 365 Compliance assessment helps organizations implement a compliance strategy that accelerates and streamlines data security and governance while reducing risk.
33 out of 36
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
34 out of 36
"Solo Microsoft 365 Discovery": 1-Wk Assessment
Solo Network Brasil S/A
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Tenha visão de GAPS de segurança em seu ambiente e como protege-lo de forma efetiva utilizando a suíte Microsoft 365
35 out of 36
Assessment-Implementation Plan for Information Protection: 3-Months Assesment
Cipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
36 out of 36
Anterior
1
2
3