AppSource
Enviar comentários
Ajuda + suporte
Itens salvos
Planos privados
Aguarde um momento, fazendo login...
Todos
Aplicativos
Categorias
Setores
Serviços de Consultoria
Parceiros
Filtros
Desmarcar tudo
Seu local
Produtos (1)
Setores
Tipo de serviço
Serviços de consultoria resultados
Mostrando resultados no serviços de consultoria
Exibir
resultados relacionados em nuvens do setor
.
Todos os resultados
NIST800-171-Microsoft 365-Accelerator-Guided-Deployment
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Provides expert guidance to help organizations achieve NIST 800-171 compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
1 out of 60
License Advisory Services
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Teamwork Deployment
Threat Protection
Whether you’ve been approached by Microsoft for an audit or simply want to conduct a self-assessment, our License Advisory Services is a great solution for understanding your real licensing needs.
2 out of 60
Compliance Assessment - 6 weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Identify your compliance maturity and areas that need improvement
3 out of 60
Avanade Modern Sec Ops FY24
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
4 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers detect, investigate, and take action to mitigate risk and ensure compliance in their modern workplace.
5 out of 60
Microsoft 365 Fundamentals: 1 Day Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
Introduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
6 out of 60
Windows 11 Assessment: 1-WK
Steeves
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
7 out of 60
Modern Management for Endpoints
Ivision, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
8 out of 60
MDM Health Check (All OS): 2-week Assessment
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
9 out of 60
MITRE ATT&CK® MasterClass: 2-Hour Workshop
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s MITRE ATT&CK® MasterClass is focused on educating companies on ransomware threats specifically relevant to their environment.
10 out of 60
Microsoft Defender for Cloud Apps: 2-Hr Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
11 out of 60
Egyptian Data Protection Law: 2 Days Workshop
GLOBAL BRANDS
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
12 out of 60
Microsoft 365 Defender SMC Deployment: 4-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Let BlueVoyant take your security and compliance posture to the next level by deploying and optimizing Microsoft 365 Defender.
13 out of 60
Microsoft 365 Manage Service–12 mth Implementation
Alfa Connections Pte Ltd
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
Alfa Connections providing Microsoft 365 Managed service is designed to enhance your workforce experience by supporting your organization on planning, enablement, implementation, and adoption.
14 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
15 out of 60
Infosys Intelligent Security Solution
Infosys Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Infosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
16 out of 60
Avanade Modern Workplace FY23
Avanade, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Modern Workplace Consulting Services
17 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDO
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Introducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
18 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
19 out of 60
Defender for Endpoint Professional Security Services | Customized Deployment in as Little as 6-Weeks
Difenda
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize your Microsoft Security investment with our Defender for Endpoint Design & Implementation.
20 out of 60
Microsoft 365 Implementation for Financial Service
New Charter Technologies, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Paid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
21 out of 60
Defender for Office 365: 5-Day Assessment
eGroup Enabling Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Microsoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
22 out of 60
Managed Detection and Response [Security Monitoring]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
23 out of 60
Microsoft 365 Copilot: 1-Day Assessment
Data Market Bilgi Hizmetleri A.S
+3
Applicable to:
Adoption & Change Management
Cloud Security
Power Platform for Teams
How Microsoft 365 Copilot can transform your business and the overall concepts you must understand to better daily business life.
24 out of 60
Microsoft 365 Value Discovery - Workshop - 1 Day
DynTek Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT OF MICROSOFT 365 IN YOUR ENVIRONMENT
25 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week Implementation
Beyondsoft Brasil
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
26 out of 60
AgileAscend Microsoft 365 GCC and GCC High: 1 Hour Assessment
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
27 out of 60
Defender Pilot
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
The Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
28 out of 60
Copilot for Security: 3-week Proof of Concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
29 out of 60
Microsoft 365 Security Health Check Assessment 3-Wk
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
30 out of 60
"Threat Protection: 3 Day Workshop"
Insentra Pty Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
31 out of 60
Modern SecOps Discovery Session
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
32 out of 60
Licensing Optimization: 2-Wk Workshop
eGroup Enabling Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Gain confidence in your level of control with your Microsoft 365 licensing.
33 out of 60
Zero Trust as a Service (ZTaaS)
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital transformation and adopting AI starts with building a secure foundation.
34 out of 60
Microsoft 365 Endpoint Manager Deployment Roadmap Assessment - 4 Week Assessment
Protiviti
+1
Applicable to:
Cloud Security
Actionable plan and high-level view to move towards a successful Microsoft Endpoint Manager (MEM) deployment and migration
35 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
36 out of 60
Modern Workplace Optimization - 4 Week Assessment
Protiviti
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This assessment for Microsoft 365 helps customers obtain insights to what it takes to improve productivity against Cyber Threats for Workforce Productivity.
37 out of 60
Microsoft 365 Plan for Success:3-d Assessment
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
38 out of 60
Zones SOCaaS - XDR with Threat Protection
Zones, LLC
+2
Applicable to:
Cloud Security
Threat Protection
Zones SOCaaS powered by Microsoft Sentinel, offers top-tier cybersecurity solutions. Leveraging advanced MDR and XDR capabilities to ensure comprehensive protection against evolving threats.
39 out of 60
Varonis Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
40 out of 60
cyber security threat analysis workshop
U-BTech Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
the workshop is design to discover threats and risks
41 out of 60
Microsoft Defender for Endpoint: 4-Week Implementation
Invoke
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understand your current use cases for antimalware / endpoint detection and response, map those use cases to Defender, and execute on a migration and rollout to Defender for Endpoint.
42 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process Adoption
Vitalyst
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
43 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
44 out of 60
Windows 365 Standardized Pilot
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
45 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
46 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementation
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
47 out of 60
MDR for Microsoft Defender
ADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.
+2
Applicable to:
Cloud Security
Threat Protection
Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
48 out of 60
AvePoint Backup: 4 Weeks Proof Of Concept
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Sentinel Technologies is proud to offer AvePoint’s Cloud Backup, a powerful cloud-to-cloud backup solution for Microsoft 365 and Azure.
49 out of 60
Windows 365 Pilot: 5 Days Proof of Concept
Delphi Consulting
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Delphi Consulting will help you get started with Windows 365 Cloud-PC with its Pilot offering with the program running over 5 days.
50 out of 60
Zones Intune Device Endpoint Management Implementation
Zones, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Mobile Device Management
Elevate your mobile device and application management with Intune—a robust solution offering advanced security features like conditional access, multi-factor authentication, and data encryption.
51 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for Endpoint
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
52 out of 60
Endpoint Security Advanced Quick Start 14-wk Implementation
Edgile, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats.
53 out of 60
Onesec Identity Governance Lifecycle Assessment
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
54 out of 60
Darktrace Managed Network Sensor
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
55 out of 60
Difenda - Information Protection and Governance - 4-week Implementation
Difenda
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Use Microsoft Purview to Implement an Information (Data) Protection and Governance solution to improve Security.
56 out of 60
Microsoft 365 E5 Cyber Range 2 Week Implementation
KAMIND IT, Inc
+2
Applicable to:
Cloud Security
Threat Protection
KAMIND's cybersecurity immersive learning deployment utilizing Project Ares Cyber Range for Microsoft 365 Security Suites.
57 out of 60
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
58 out of 60
CMMC Data Enclave Dplymt: 4-Wk Implementation
C3 Integrated Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Deploy Microsoft 365 to meet CMMC Requirements
59 out of 60
CCPA CPRA: 6 - Wk Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
60 out of 60
Anterior
1
2
3
4
5
Próximo