AppSource
Enviar comentários
Ajuda + suporte
Itens salvos
Planos privados
Aguarde um momento, fazendo login...
Todos
Aplicativos
Categorias
Setores
Serviços de Consultoria
Parceiros
Filtros
Desmarcar tudo
Seu local
Produtos (1)
Setores
Tipo de serviço
Serviços de consultoria resultados
Mostrando resultados no serviços de consultoria
Exibir
resultados relacionados em nuvens do setor
.
Todos os resultados
Microsoft Defender for Business Deployment: 6-Wk Implementation
Algen Solutions S.A. de C.V.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
We will provide you with a suite of security features that can help protect devices and data, reduce the burden on IT staff and meet regulation compliance requirements with Microsoft Defender.
1 out of 60
Solution Assessment for Security: 30 Day
Concurrency, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
An assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
2 out of 60
Microsoft 365 Strategic Roadmap Workshop
CDI LLC
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
CDI provides this Strategic Roadmap workshop to identify workloads that can be migrated to Microsoft 365 and design a roadmap for you, our customer, to drive adoption and improve ROI.
3 out of 60
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
4 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk Assessment
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
5 out of 60
Change Management: 1-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Change Management is a proven methodology to deploy technology changes to large groups of diverse Microsoft 365 users.
6 out of 60
Microsoft 365 Security Briefing
CDI LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
7 out of 60
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
8 out of 60
MITRE ATT&CK® MasterClass: 2-Hour Workshop
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s MITRE ATT&CK® MasterClass is focused on educating companies on ransomware threats specifically relevant to their environment.
9 out of 60
Microsoft Cloud PC - 4 Day Proof of Concept Engagement
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Our Microsoft Cloud PC offering is designed to help organizations simplify desktop management, increase security, streamline application delivery and increase end user satisfaction.
10 out of 60
Compliance Workshop Data Risk Management: 4 Weeks
Diverge IT
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
You will be guided by our Microsoft 365 experts who are trusted by Pro Sports teams, Hollywood studios, and businesses across America to help protect and govern data to achieve complete compliance.
11 out of 60
Microsoft 365 Tenant to Tenant Migration: 6 Week Implementation
All Covered, a division of Konica Minolta
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Let All Covered help you assess, plan and skillfully implement your Microsoft 365 Tenant to Tenant migration.
12 out of 60
Microsoft Security Immersion: 1 Day Briefing
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Knowing that your time is valuable, we have developed a true to life, hands-on, interactive session designed to give you a deep understanding of the Microsoft 365 Security suite of products.
13 out of 60
Microsoft 365 Inter-Tenant Migration: 2 days Assessment
Preeminent Solutions, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Preeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
14 out of 60
Rapid Zero Trust Deployment : 8-WK Implementation
Maureen Data Systems
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
The purpose and objectives of this engagement are to develop a Zero Trust Implementation Strategy
15 out of 60
Microsoft Defender for Endpoint Implementation
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
16 out of 60
Cloud-Native Migration Service: 4-Month Implementation
Cyclotron Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
17 out of 60
HPT Secure Identities and Access_03 days workshop
HPT Vietnam Corporation
+2
Applicable to:
Identity & Access Management
Mobile Device Management
With identity attacks on the rise, this workshop will show you how to stop tomorrow’s data breaches by securing identities today.
18 out of 60
Secure Workspace: 1 Day Workshop
Watserv Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
19 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
20 out of 60
Microsoft 365 Security: 1 Month Implementation
Valorem LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
A detailed baseline assessment of your current and desired state followed by a pilot production of Microsoft’s advanced security solutions to accelerate your modern security journey.
21 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
22 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk Assessment
ErgoServices
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ergo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
23 out of 60
Zero Trust Foundation: 6-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Accelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
24 out of 60
Merge and Acquisitions-Discovery, Planning Assessment
New Era Technology
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
M&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
25 out of 60
Microsoft 365 consultancy
Onex Group
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Get Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
26 out of 60
EMS Energize: 1-month proof of concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Interlink Cloud Advisors’ EMS Energize engagement provides you with security experts who can help guide your business into a secure, productive cloud platform.
27 out of 60
Windows 365: 10-day Pilot Service
Ultima Business Solutions
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Ultima Business Solutions offers a 10 day, potentially funded, pilot service to help you explore the benefits of Windows 365, the cloud-based Windows experience that enables hybrid work scenarios.
28 out of 60
Microsoft 365: 2-Week Implementation
Technologent
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Expert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
29 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
30 out of 60
Window 365 Cloud PC: 3-Day Proof-of-Concept
CTGlobal A/S
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Assess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
31 out of 60
Defender for Endpoint: 5-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
32 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
33 out of 60
Microsoft 365 Identity & Security: 2-Wk Assessment
PSM Partners
+2
Applicable to:
Cloud Security
Identity & Access Management
Customized identity and security assessment focused on the Microsoft 365 platform
34 out of 60
Lightstream Complimentary Microsoft 365 Core Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
35 out of 60
Windows 365: 5-week Proof of Concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
Enhance productivity through flexibility by enabling your team to create secure Cloud PCs and allowing BYOD without increasing risk to your environment
36 out of 60
Microsoft Endpoint Manager: 8-Hours Workshop
Onex Group
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Learn how to secure Windows 11 environments with Microsoft Endpoint Manager
37 out of 60
Enable Windows 365 Cloud PC
Cofomo
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
With the right endpoint modernization strategy and tools, employees get a secure experience on every mobile device, tablet, or laptop they’re using, all while eliminating major management headaches.
38 out of 60
eDiscovery Workshop: 4 hours Workshop
Planet Technologies
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
A half-day Workshop that provides an overview and deep understanding of Microsoft 365 eDiscovery Standard and Premium products.
39 out of 60
MXDR Consultation
CBTS Technology Solutions LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
40 out of 60
Zero Trust Security: 3-day Workshop
Oxford Computer Group LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
41 out of 60
Microsoft 365 Security Workshop
Collective Insights
+2
Applicable to:
Identity & Access Management
Threat Protection
Equip your organization with insights, strategies, and tools to fortify defenses, mitigate threats, and enhance overall security readiness across your digital estate.
42 out of 60
Compliance Manager: 8 Week Implementation
Razor Technology, LLC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Comprehensive orientation, deployment, training, support, administration, updates, documentation and testing services to get started quickly and expand with Compliance Manager and Compliance Score
43 out of 60
Design and Implementation of Microsoft Security Solutions: 12-Week Engagement
Kudelski Security
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
Kudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
44 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
45 out of 60
Security Assessment - 4-Week Assessment
Coretek Services
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Analysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
46 out of 60
Microsoft 365 License Optimization:1-hr Assessment
Frontier Technology, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Review current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
47 out of 60
Inviso KickStarter - Microsoft 365 E3 Adoption
Inviso Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Helping customers KickStart features in Microsoft 365 E3 Subscription
48 out of 60
Finchloom+ for Microsoft Intune
Finchloom
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Optimize your organization’s device management with Finchloom+ for Microsoft Intune. Tailored monthly managed service ensures streamlined, cloud-based endpoint management for company and BYOD devices.
49 out of 60
Fortis Assessment Microsoft Online Security
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
50 out of 60
Healthcare Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
51 out of 60
Office 365 to Office 365 Migration: 4-Wk Implementation
Exodus Integrity Services, Inc.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Simplify the complexities of merging, consolidating, or transitioning your Office 365 environments with our specialized Office 365 Migration Service.
52 out of 60
Microsoft Entra in 30: 6-wk Implementation
Long View Systems
+1
Applicable to:
Identity & Access Management
Long View’s Entra in 30 offers a unified identity, access security, and data governance solution to help minimize these cybersecurity risks in 30 days.
53 out of 60
Hiram Machado
adaQuest
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Protect, Simplify, Power better experience with Windows 11, Windows 365 and Intune. Unlock hybrid work scenarios!
54 out of 60
Entra Permission Risk Assessment
adaQuest
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your Multi-Cloud Environment with Microsoft Entra by automating the remediation of Permissions. Get a comprehensive visibility into permissions assigned to all identities on your organization.
55 out of 60
Microsoft Endpoint Manager Baseline
SHI International Corp
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Explore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
56 out of 60
Protect & Govern Sensitive Data: 3-Day Workshop
Netrix Global
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
A 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
57 out of 60
Assessment - Workplace Modernization & Optimization - 1-Month
Zones, LLC
+3
Applicable to:
Calling for Microsoft Teams
Compliance Advisory Services
Identity & Access Management
Analysis of current environment to highlight opportunities to reduce duplicative cost and modernize your workplace
58 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
59 out of 60
Secure Identities and Access: 4-Week Engagement & Workshop
CompuNet
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
4-week engagement and workshop that helps customers design and plan out their optimal identity model to ensure they have a roadmap to enhanced security using Microsoft 365 and Azure Active Directory
60 out of 60
Anterior
3
4
5
6
7
Próximo