AppSource
Enviar comentários
Ajuda + suporte
Itens salvos
Planos privados
Aguarde um momento, fazendo login...
Todos
Aplicativos
Categorias
Setores
Serviços de Consultoria
Parceiros
Filtros
Desmarcar tudo
Seu local
Produtos (1)
Setores
Tipo de serviço
Serviços de consultoria resultados
Mostrando resultados no serviços de consultoria
Exibir
resultados relacionados em nuvens do setor
.
Todos os resultados
Microsoft Defender for Cloud Apps: 2-Hr Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
1 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
2 out of 60
Deploying Purview Data Security - Labels and DLP
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
A dependable approach to deployment of Data Security workloads led by governance and following our standard framework for Microsoft 365 customers
3 out of 60
Microsoft 365 Security Workshop
Olive + Goose
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Improve your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
4 out of 60
Get AI Ready: 5-Day Assessment
PSM Partners
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
AI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
5 out of 60
Defender Pilot
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
The Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
6 out of 60
Fortis Assessment SOC2
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
7 out of 60
Office 365 Migration 3-Month Implementation
RKON TECHNOLOGIES
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
Leverage RKON's consulting expertise for a smooth and seamless migration to Microsoft's Office 365 suite of products including SharePoint, OneDrive, and Teams
8 out of 60
Finchloom+ for Microsoft 365 Email Security
Finchloom
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your employees with our tailored email security managed service. Easily spots phishing attempts, responds swiftly with human-powered detection, and halts business email compromise.
9 out of 60
Zero Trust Launchpad: 3-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
10 out of 60
cyber security threat analysis workshop
U-BTech Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
the workshop is design to discover threats and risks
11 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk Assessment
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
12 out of 60
Windows 365 Rapid Deploy
Ivision, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
The ivision Windows 365 Rapid Deployment approach will accelerates the adoption and use case development of Windows 365 virtual desktops.
13 out of 60
MITRE ATT&CK® MasterClass: 2-Hour Workshop
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s MITRE ATT&CK® MasterClass is focused on educating companies on ransomware threats specifically relevant to their environment.
14 out of 60
Virteva Microsoft 365 Defender Ready Deploy
Virteva LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
15 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
16 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk Assessment
ErgoServices
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ergo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
17 out of 60
Cyderes Managed Security Services for Microsoft Sentinel
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
18 out of 60
Windows 365: 4 Week Readiness Assessment
Netrix Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Get an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
19 out of 60
Microsoft 365: 2-Week Implementation
Technologent
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Expert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
20 out of 60
Data Security and Governance: 2 Hour Free Briefing
Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Netwoven Data Security and Governance free strategy workshop will help you get started on the path to discover, protect, and govern your sensitive corporate data
21 out of 60
1-Tages Update Workshop: Cloud Security & Compliance mit Microsoft 365
AppSphere AG
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Knowledge & Insights
Entdecken Sie das Fundament der Cloud-Sicherheit für eine Compliance konforme Nutzung von Microsoft 365
22 out of 60
Communication Security Quick Start 12-wk Implementation
Edgile, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
23 out of 60
MDM Health Check (All OS): 2-week Assessment
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
24 out of 60
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
25 out of 60
Microsoft 365 Fundamentals: 1 Day Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
Introduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
26 out of 60
Free Microsoft 365 Defender Suite 4–6-hour Proof of Concept
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
This free, 4–6-hour workshop will provide you with a hands-on experience using Microsoft 365 Defender, Microsoft Defender for Office 365, Microsoft Defender for Endpoint
27 out of 60
Information Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Our approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
28 out of 60
Threat Protection Engagement
The Partner Masters
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
29 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementation
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
30 out of 60
Microsoft Defender for End Points Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
31 out of 60
Cloud-Native Migration Service: 4-Month Implementation
Cyclotron Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
32 out of 60
Exchange Online Migration: 6-Week Deployment
Cyclotron Inc.
+2
Applicable to:
Cloud Security
Information Protection & Governance
Exchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
33 out of 60
Managed Detection and Response [Threat Hunting]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Inspect events in your network to locate threat indicators and entities
34 out of 60
Cyber Security Services 9 days Assessment
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
35 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
36 out of 60
Hybrid Cloud Security Workshop - 1-Day
Zones, LLC
+1
Applicable to:
Cloud Security
Identify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
37 out of 60
Microsoft 365 Security and Compliance Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Microsoft 365 Security and Compliance Assessment evaluates your current security posture, identifies vulnerabilities, and offers tailored solutions to enhance your data security and compliance.
38 out of 60
Security Modernization: 3 Day Workshop
Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Safeguard your business with a three-step security modernization solution from Netwoven
39 out of 60
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
40 out of 60
Adopción de Copilot chat Enterprise - Bing Chat Enterprise: 3-Wk
ENCAMINA S.L.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Adopta Copilot Chat Enterptise para multiplicar la productividad de tus empleados protegiendo los datos en tu empresa
41 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk Engagement
CloudScale International
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
42 out of 60
XENSHIELD365 - Managed Detection and Response (MDR)
Xencia Technology Solutions Pvt Ltd
+2
Applicable to:
Cloud Security
Threat Protection
24x7 Managed Security Operations SoC through shared team of Security experts Defender XDR
43 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
44 out of 60
GoDaddy to Office 365 Migration
SkyTerra Technologies LLC
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
If you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
45 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and Planning
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Shorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
46 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
47 out of 60
Microsoft Information Protection Administrator: 3 Days Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Information Protection Administrator course focuses on data governance and information protection within your organization.
48 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
49 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
50 out of 60
Microsoft 365 Security 4 Weeks Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
51 out of 60
Microsoft Copilot for Security: 2-Day Workshop
Planet Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
This 2-day workshop covers the essential aspects you need to effectively and efficiently leverage Microsoft Copilot for Security for your organization's security operations and needs.
52 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
53 out of 60
Windows 365 Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
54 out of 60
Egyptian Data Protection Law: 2 Days Workshop
GLOBAL BRANDS
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
55 out of 60
Microsoft 365 Endpoint Manager Deployment Roadmap Assessment - 4 Week Assessment
Protiviti
+1
Applicable to:
Cloud Security
Actionable plan and high-level view to move towards a successful Microsoft Endpoint Manager (MEM) deployment and migration
56 out of 60
Microsoft 365 Copilot Adoption: 2-3 Week Assessment
Coretek Services
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Evaluate the current customer Microsoft investments adoption of Microsoft Cloud Services and overall Security posture in an effort to develop a "Art of the Possible" to Adopt Microsoft 365 Copilot.
57 out of 60
Defender for Endpoint and Defender for Server Deployment
CISILION LTD
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
58 out of 60
MDR Workshop
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
59 out of 60
Security Outcomes Sprint
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Understand the Business Value of Your Cybersecurity Investments
60 out of 60
Anterior
2
3
4
5
6
Próximo