AppSource
Enviar comentários
Ajuda + suporte
Itens salvos
Planos privados
Aguarde um momento, fazendo login...
Todos
Aplicativos
Categorias
Setores
Serviços de Consultoria
Parceiros
Filtros
Desmarcar tudo
Seu local
Produtos (1)
Setores
Tipo de serviço
Serviços de consultoria resultados
Mostrando resultados no serviços de consultoria
Exibir
resultados relacionados em nuvens do setor
.
Todos os resultados
Dell Implementation Services for Copilot Security
Dell Technologies Services
+1
Applicable to:
Cloud Security
Readiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
1 out of 43
Microsoft 365 Copilot workshop: 1-week consulting services
Uni Systems S.M.S.A.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
2 out of 43
Modern WorkPlace PME:15 days Implementation
Aurera
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Mise en place d’un environnement de travail collaboratif à l’état de l’art pour les PME, comprenant une plate-forme digitale et des outils permettant une facilité de gestion et de déploiement.
3 out of 43
EM+S Consulting Services: 4-Weeks Implementation
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
We will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
4 out of 43
Microsoft 365 Level Up: 1-Year Workshop
WAKERS
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Pour être toujours au top des dernières nouveautés de votre environnement Microsoft 365 pendant 1 an !
5 out of 43
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
6 out of 43
Endpoint Management Workshop
York Telecom Corp
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
7 out of 43
Migration MSG vers Office 365,10J d'implémentation
BSD
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Vous souhaitez migrer depuis Lotus Domino/Gmail/Exchange vers Office 365
8 out of 43
Portfolio Rationalisation: 10-Wk Implementation
PricewaterhouseCoopers UK
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Manage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
9 out of 43
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
10 out of 43
Microsoft 365 - adoption: 6-Weeks Implementation
Neos-SDI
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Accompagner le changement vers Microsoft 365: Une approche transverse qui adresse les enjeux de gouvernance, de déploiement, d’adoption et de sécurisation des nouveaux usages Microsoft 365.
11 out of 43
Sauvegarde Microsoft 365 : 2Wk - implementation
Projetlys
+2
Applicable to:
Cloud Security
Information Protection & Governance
Ensemble de service permettant de mettre en place facilement une solution de backup Veeam pour Microsoft 365 ?
12 out of 43
Adoptez Microsoft Edge : 2-Wk Implementation
Projetlys
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Notre approche pour la mise en place et l'adoption de Microsoft Edge.
13 out of 43
Sécurisation des identités - 3-Week Implementation
EXAKIS NELITE
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
14 out of 43
Protection des applications -4-Week Implementation
EXAKIS NELITE
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Une vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
15 out of 43
Identity & Access Management: 1-Mth Implementation
Officeline SA
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Microsoft 365 Identity & Access Management to improve and streamline security on cloud and applications
16 out of 43
Information Protection - 1Month Implementation
Officeline SA
+2
Applicable to:
Cloud Security
Information Protection & Governance
An offering of Microsoft Information Protection implementation to improve and streamline compliance across all environments.
17 out of 43
Cybersecurity Infrastructure - 1d Workshop
Bechtle AG
+1
Applicable to:
Cloud Security
Mission afin d’évaluer la sécurité de vos actifs Microsoft et proposer des correctifs pour mieux sécuriser votre environnement.
18 out of 43
Frontline Workers : 3 jours - Évaluation
ALFUN
+3
Applicable to:
Cloud Security
Frontline Workers
Power Platform for Teams
Digitalisez vos métiers en fournissant des solutions adaptées à vos équipes sur le terrain !
19 out of 43
Microsoft 365 Sécurité : 1-S implémentation
EFISENS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Bénéficiez d’une sécurité complète et protéger votre entreprise contre les menaces avancées en temps réel
20 out of 43
Data Classification and labelling: 6-Months Impl.
Toreon CVBA
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Data classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
21 out of 43
Modern Frontline Work Acceleration 2 days Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
LiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
22 out of 43
Protection de l'identité : Implémentation 1 mois
ROXYS
+2
Applicable to:
Cloud Security
Threat Protection
Vous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
23 out of 43
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
24 out of 43
Secure Your SaaS/IaaS: 1-Mth Proof of Concept
Vorstone
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Proof of Concept on how you can secure your Saas and/or IaaS
25 out of 43
Risk analysis Office 365, Azure: 3-Wk Assessment
Vorstone
+1
Applicable to:
Cloud Security
Assessment to understand the risks exposure and how enhance your security posture
26 out of 43
Shadow IT: 6-Wk Proof of Concept.
Vorstone
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Proof of Concept in order to identify applications not controlled by your IT department
27 out of 43
Passwordless: 3-Wk Proof of Concept
Vorstone
+2
Applicable to:
Cloud Security
Identity & Access Management
Remove the use of password on your Information System
28 out of 43
Audit SSI: 1-Wk Assessment
Vorstone
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Assessment in order to identify the weaknesses of your IaaS/SaaS
29 out of 43
Licensing Microsoft 365: 1-day Assessment
Informatika a.d.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
30 out of 43
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Nil d.o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
31 out of 43
ModernIdentity: 3-Months Implementation
Econocom Workplace infra Innovation
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Unifier la gestion des identités et des accès grâce à Microsoft 365
32 out of 43
Evaluation Outils sécurité Microsoft 365: 5-D Assessment
ELIADIS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Evaluez vos menaces et découvrez les outils sécurité Microsoft 365, à destination des DSI de sociétés de 300 à 5000 users. Découvrez, améliorez votre sécurité, élaborez un plan sécurité avec un expert
33 out of 43
Sécurisation-terminaux- Microsoft 365: 5-D Assessment
ELIADIS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Découvrir, apprendre, protéger, sécuriser les identités de l'ensemble des terminaux avec Endoint manager. Obtenir des recommandations expertes sur les prochaines étapes de sécurisation des appareils.
34 out of 43
FONDATION ZERO TRUST - 2 Days Atelier
GLOBAL INFO
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Construire les fondations du modèle de sécurité « Zero Trust » avec la sécurité des identités
35 out of 43
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POC
Bitscape
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
36 out of 43
Microsoft Cloud App Security: 2 Week Implementation
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Cloud Security
Keep your employees productive and secure on their favorite apps and devices with Cloud App Security. Bring the security of your on-premises systems to your cloud applications.
37 out of 43
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 Wk
Lighthouse Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
This hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
38 out of 43
Modernize Endpoints (Microsoft Intune): 1 Day Workshop
Crayon
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Endpoint Management Workshop is a one-day engagement that will help you showcase the value of Microsoft Endpoint Manager and how to manage users’ devices and apps from anywhere.
39 out of 43
Road to Microsoft 365: 1 month Implementation
Crayon
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Crayon Microsoft 365 migration services brings best practices and expertise to assure seamless migration.
40 out of 43
Smart Services - Security - 12 months Implementation
Elgon S.A.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Smart Services, mise en place des bonne pratique sécurité pour vos service Microsoft 365 et Azure
41 out of 43
CLOUD PC - 3 Days - Atelier
GLOBAL INFO
+2
Applicable to:
Cloud Security
Identity & Access Management
Offrez à vos employés l'accès à une expérience de bureau sécurisée, où qu'ils soient
42 out of 43
MODERN MANAGEMENT- 2 Days - Atelier
GLOBAL INFO
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Gérez et protégez matériels, données et utilisateurs avec Microsoft Endpoint Manager afin d'améliorer le niveau de sécurité global de votre plateforme
43 out of 43
Anterior
1
2
3
4