AppSource
Enviar feedback
Ajuda + suporte
Itens guardados
Planos privados
Só um momento, a iniciar a sua sessão...
Tudo
Aplicações
Categorias
Indústrias
Serviços de Consultoria
Parceiros
Filtros
Limpar tudo
A sua localização
Produtos (1)
Indústrias
Tipo de serviço
Serviços de consultoria resultados
A mostrar resultados em serviços de consultoria.
Ver
resultados relacionados em nuvens da indústria
.
Todos os resultados
Avanade Microsoft Copilot for Security
Avanade, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
1 out of 60
Copilot for Security Readiness Assessment
Performanta
+2
Applicable to:
Cloud Security
Threat Protection
Futureproof your Business Security with Microsoft Security Copilot and Performanta
2 out of 60
Microsoft Copilot for Security: 2 x 4h Workshop
water IT Security GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Get ready for Microsoft’s Copilot for Security and learn how generative AI can strengthen your organization’s IT. We cover everything you need to know – from the implementation to proper prompting.
3 out of 60
Proof of Concept Solution Microsoft 365 Copilot
KPCS CZ, s.r.o.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
Embark on a transformative journey with KPCS's 4 weeks PoC for Microsoft 365 Copilot. Uncover tailored use-cases and maximize the value for your business. Revolutionize your approach to innovation.
4 out of 60
DORA act assessment and implementation
Sii Sp. z o.o.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
5 out of 60
MDS - Microsoft Copilot for Security Workshop
Maureen Data Systems
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Discover how Microsoft Copilot for Security can enhance your security operations, streamline incident response, and empower your security teams
6 out of 60
KMicro's Sentinel360 MXDR with Microsoft Copilot for Security: 4-Wk POC/POV
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance threat hunting & accelerated MXDR for Microsoft Sentinel with Copilot for Security integration
7 out of 60
Microsoft Copilot for Security: 2 x 3h Workshop
Skaylink GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Unlocking Security Excellence with Microsoft Copilot for Security - 2 x 3h Workshop
8 out of 60
Cloud Security Operations Center
Reply
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Verified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
9 out of 60
Bulletproof 365 Enterprise: MXDR Service
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
10 out of 60
Performanta MXDR Services
Performanta
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Performanta’s Consultancy and MXDR service is built on Microsoft’s Endpoint Detection and Response technology, and combines the critical elements required to provide enterprise-class cyber security.
11 out of 60
Microsoft Defender for Business Managed Service: Monthly MDR
e2e-assure Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Maximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
12 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
13 out of 60
Microsoft 365 Rapid Security Assessment: 1-Wk Assessment
Awara IT Kazakhstan LLP
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft 365 Rapid Security Assessment is a quick yet comprehensive evaluation to enhance Microsoft 365 security against evolving cyber threats
14 out of 60
Cybersecurity Assessment - 3 Weeks
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Microsoft Security Assessment: detect security problems and take targeted action
15 out of 60
Microsoft 365 Threat Protection Workshop + 5 Day
Cyberwise Siber Güvenlik TIC. AS.
+1
Applicable to:
Threat Protection
Is your Microsoft 365 environment secure? Do you wonder about your current security maturity? We will assist you with a full-fledged workshop on how to deploy and implement Microsoft 365 Security.
16 out of 60
M365 Security Audit: 1-Wk Audit
Joker IT AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Nachhaltig das Bewusstsein für die Cloud-Sicherheit verbessern
17 out of 60
Microsoft 365 Security: 1-day Assessment
IF-Blueprint AG
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Nutzen Sie alle Features von Microsoft 365, um Ihre Sicherheit zu erhöhen?! Wir analysieren Ihren Tenant, erstellen einen Report und geben Ihnen Empfehlungen zum besseren Schutz Ihrer Daten.
18 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
19 out of 60
Active Directory Security on Demand
Comtrade System Integration
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
20 out of 60
CxO Modern Work & Copilot: 1 Tag Briefing | Arvato Systems
Arvato Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Threat Protection
Zielkorridor und Rahmen für den wirkungsvollen Einsatz Ihres Modern-Work-Konzeptes festlegen
21 out of 60
HCLTech Business Email Protection: 10-Days Implementation
HCL Technologies Limited.
+1
Applicable to:
Threat Protection
HCLTech Business Email Protection (BEP) Powered By Microsoft EOP and MDO, Enable real time Business Email Protection alerting and automated remediation for email service hosted on Microsoft platform
22 out of 60
Cyber Security Assessment
ELEVATE Solutions Limited
+1
Applicable to:
Threat Protection
The Cybersecurity Assessment helps customers assess their security posture and risk to insider threats.
23 out of 60
Introducing Microsoft Entra: 2 Hour Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn about how Microsoft Entra will help your business step into tomorrow with modern identity and access solutions by introducing you to modern access security across a broad range of products.
24 out of 60
Defender for Endpoint Managed Service
e2e-assure Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
25 out of 60
Barracuda Office 365 email-based security
Crayon
+1
Applicable to:
Threat Protection
Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defense, API-based inbox defense, incident response, data protection, and compliance capabilities.
26 out of 60
Managed service : EDR with Defender for Endpoint
Cegeka NV
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Our EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
27 out of 60
SVA Microsoft Copilot for Security Readiness Workshop 1d
SVA System Vertrieb Alexander GmbH
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
In zwei Sitzungen zu jeweils vier Stunden geben wir Ihnen eine umfassende Einführung in Copilot for Security.
28 out of 60
Microsoft Sentinel Security Consulting Service
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
29 out of 60
Microsoft 365 Defender - MXDR Service - 1 Year Implementation
CGI Inc.
+1
Applicable to:
Threat Protection
Unleash your Microsoft Defender 365 capabilities. Automatically detect & correlate threat signals across your endpoints, email, cloud applications, identities, cloud and on-premises workloads.
30 out of 60
Security für den Einsatz von Microsoft 365 Copilot
novaCapta GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Eine sichere Basis schaffen und technische Hindernisse aus dem Weg räumen für den Einsatz von Copilot for Microsoft 365
31 out of 60
Modern Workplace Security 10-Wk Implementation
Wipro Ltd
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
32 out of 60
Defend Against Threats with SIEM Plus XDR: 2-W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR (with Attack Simulation) workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
33 out of 60
Managed SOC_by SoftwareOne
SoftwareOne
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure your IT Environment with Microsoft Services and on-call Cyber-security Analysts with Managed SOC by SoftwareOne
34 out of 60
Red Canary MSSP FastTrack for Security
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Leverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
35 out of 60
Microsoft 365 Copilot for Security: 1-Day Workshop
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft 365 Copilot Readiness and Deployment Services: 1-Day Security Copilot Workshop by Awara IT experts.
36 out of 60
Cybersecurity: 3-Wks Quick-Assessment
Unipartner IT Services, S.A.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
37 out of 60
Avanade Modern Sec Ops FY24
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
38 out of 60
Azure and Microsoft 365 SecOps Diagnostics
BlueVoyant
+1
Applicable to:
Threat Protection
BlueVoyant experts review an organization's Azure and Microsoft 365 Defender Security Portal to identify potential vulnerabilities and provide actionable recommendations.
39 out of 60
Microsoft 365 Security Assurance Service: Assessment
Performanta
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
40 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 Wks
Wipro Ltd
+2
Applicable to:
Identity & Access Management
Threat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
41 out of 60
Microsoft 365 Security Posture 10-days Assessment
FUJITSU
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Secure Microsoft 365 and maximise your investment
42 out of 60
Microsoft Defender for Office 365: 1-hour briefing
Reply
+2
Applicable to:
Cloud Security
Threat Protection
Free one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Office 365
43 out of 60
Copilot Data Protection
Cloud Life
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
44 out of 60
Protect 365 App - 1 hour implementation
Cloud Life
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
45 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
46 out of 60
Endpoint Management Workshop
York Telecom Corp
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
47 out of 60
Managed Security Services for Microsoft Defender for Endpoint DACH: 12 Mon Implementation
Telekom Deutschland GmbH Main Account
+2
Applicable to:
Information Protection & Governance
Threat Protection
Configuration and operation of customer specific solution based on Microsoft Defender for Endpoint incl. integration into the Security Operation Center of Deutsche Telekom Security
48 out of 60
Device as a Service with Windows 11 and Intune: 4 Week Implementation
Cognizant
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Windows 10 has revolutionized how organizations manage operating systems, delivering the features that you have come to know and rely on, while enhancing mobility and agility without losing data.
49 out of 60
Insider Risk Management: 8-Wk implementation
PwC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
50 out of 60
Microsoft Security and Rapid Cyberattack Assessment: 3-tägiges Assessment
novaCapta GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Das Microsoft Security Assessment hilft Ihrem Unternehmen zu verstehen, wie Sie Bedrohungen durch den Einsatz von Microsoft 365-Security-Lösungen gezielt reduzieren und sich vor Angriffen schützen.
51 out of 60
Microsoft 365 Security Health Check Assessment 3-Wk
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
52 out of 60
Managed Services: M(x)DR for Microsoft 365 Defender
Cegeka NV
+2
Applicable to:
Identity & Access Management
Threat Protection
Introducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
53 out of 60
Data Classification and Protection 3Weeks Workshop
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
54 out of 60
Managed EDR with Microsoft Defender for Endpoint - 2 hours Best Practices Workshop
NTT DATA Deutschland GmbH
+2
Applicable to:
Information Protection & Governance
Threat Protection
Find the right level of endpoint security for your business with Microsoft 365 Defender
55 out of 60
Managed Security Services für den Microsoft Defender for Endpoint: 12-Mon Implementation
Telekom Deutschland GmbH Main Account
+2
Applicable to:
Information Protection & Governance
Threat Protection
Inbetriebnahme und Betrieb der kundenspezifischen Lösung auf Basis des Microsoft Defender for Endpoint inkl. Integration in das Security Operation Center der Deutschen Telekom Security
56 out of 60
Microsoft Defender for Endpoint SMC Deployment: 4-Week Implementation
BlueVoyant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our services are designed to maximize your investment with Microsoft with hands-on onboarding & baseline configuration services.
57 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security Services
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
58 out of 60
Microsoft Attack Simulation Training - 9 wk impl
sepago GmbH
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
Microsoft Attack Simulation Training powered by sepago can increase your employees’ resilience against cyber-crime up to 45%!
59 out of 60
Identity & Endpoint Protection with Microsoft Zero Trust
Dell Technologies Services
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Dell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
60 out of 60
1
2
3
4
Seguinte