AppSource
Pošljite povratne informacije
Pomoč + podpora
Shranjeni izdelki
Zasebni načrti
Počakajte trenutek, da vas prijavimo ...
Vse
Aplikacije
Kategorije
Panoge
Svetovalne storitve
Partnerji
Filtri
Počisti vse
Vaša lokacija
Izdelki (1)
Panoge
Vrsta storitve
Št. rezultatov: Svetovalne storitve
Prikaz toliko rezultatov v aplikaciji svetovalne storitve:
Prikaži
Toliko povezanih rezultatov v oblaki panoge:
.
Vsi rezultati
Copilot Data Protection
Cloud Life
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
1 out of 32
Cybersecurity Assessment: Microsoft Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Understand your readiness for common security threats.
2 out of 32
Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
3 out of 32
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
4 out of 32
SharePoint and Teams Security - 2 week assessment
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Confident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
5 out of 32
Teams & SharePoint Security Hardening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
6 out of 32
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
7 out of 32
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
8 out of 32
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
9 out of 32
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
10 out of 32
4-Day Security Assesment
HSO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
11 out of 32
Security Assessment: 2Wk Assessment
SXIQ DIGITAL PTY LTD
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Security Assessment Service to rapidly help organisations understand their Azure, DC and M365 current state security posture against common industry standards NIST, CIS, Essential 8 and ISO27001.
12 out of 32
Cloud Security Assessment: 2 Week Assessment
Byte Information Technology Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Identify real threats to your cloud environment and develop plans and next steps for your security journey.
13 out of 32
Security Controls Review - 2wk Assessment
The Missing Link Network Integration Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We can help you achieve a more mature, secure IT environment with our comprehensive Security Controls Review powered by Microsoft Security and Compliance.
14 out of 32
IdentityCARE 3-Wk Implementation
SecureCom Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Securing organizations Exchange Online and Multifactor Identity services.
15 out of 32
Secure Remote Work: 4-Hours Workshop
Professional Advantage Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enable your people to work from anywhere, securely with Microsoft 365.
16 out of 32
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
17 out of 32
Security Assessment - 5-Day Assessment
QUORUM SYSTEMS PTY LTD
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
The outcome of this assessment is a documented security assessment work plan with steps, tools and procedures used to conduct the assessment.
18 out of 32
Discover Sensitive Data: 5-Week Workshop
Rackspace
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
19 out of 32
Conditional Access & MFA 5d Proof of Concept
Generation-e Productivity Solutions Pty Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conditional Access and Multi Factor Authentication deployed without negatively impacting users. We setup the environment then deploy 5 devices plus train you how to do the rest.
20 out of 32
Data#3 Defend against threats: - 8-weeks Implementation
Data#3 Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats using Microsoft Defender, Azure Defender and Azure Sentinel provides you with an integrated solution to protect your organisation.
21 out of 32
Mobile Endpoint Mgt: 1-Wk Accelerated Implement'n
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Corporate Mobile Devices (iOS, Android and macOS)
22 out of 32
Windows Endpoint Mgt: 1-Wk Accelerated Implement'n
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
23 out of 32
Data#3 Essential Eight Adoption Roadmap 2-Week Assessment
Data#3 Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Essential Eight Assessment is a 2 weeks engagement. The audit will help you understand your current security maturity and defensive posture, in alignment with the ACSC Essential Eight.
24 out of 32
Defender for Office 365: 3-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
25 out of 32
iTop MDR 5-Week Implementation
登豐數位科技股份有限公司
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
協助您的企業快速的偵測惡意活動、使用者行為及各項由端點發起的惡意活動,即時探索弱點和錯誤的設定,以進行補救。
26 out of 32
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
27 out of 32
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
28 out of 32
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
29 out of 32
Microsoft 365 Defender Enterprise Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Manage and Investigate Risk and Threat Protection
30 out of 32
Secure Hybrid Identity - Defender for Identity: 6 week Implementation
Performanta
+2
Applicable to:
Identity & Access Management
Threat Protection
Secure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
31 out of 32
RFFR/ISO 27001 Risk & Compliance Assessment: 6-12 Months
eStorm Australia
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Become Right Fit for Risk (RFFR) & ISO 27001 accredited, address compliance risks, and secure your endpoint devices/users in Microsoft 365 with eStorm’s RFFR & ISO 27001 Risk & Compliance Assessment
32 out of 32
Nazaj
1
2
3