AppSource
Pošljite povratne informacije
Pomoč + podpora
Shranjeni izdelki
Zasebni načrti
Počakajte trenutek, da vas prijavimo ...
Vse
Aplikacije
Kategorije
Panoge
Svetovalne storitve
Partnerji
Filtri
Počisti vse
Vaša lokacija
Izdelki (1)
Panoge
Vrsta storitve
Št. rezultatov: Svetovalne storitve
Prikaz toliko rezultatov v aplikaciji svetovalne storitve:
Prikaži
Toliko povezanih rezultatov v oblaki panoge:
.
Vsi rezultati
Managed Services: M(x)DR for Microsoft 365 Defender
Cegeka NV
+2
Applicable to:
Identity & Access Management
Threat Protection
Introducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
1 out of 60
Zero Trust: 4 x 3h Workshop
water IT Security GmbH
+1
Applicable to:
Threat Protection
Stay ahead of the cyber threat wave with our Zero Trust workshop – get an overview of your Zero Trust readiness, a compact guide to today’s IT landscape, and define next steps for your organization.
2 out of 60
CANCOM Microsoft Defender Lifecycle Services - Monthly recurring
CANCOM GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Die CANCOM Microsoft Defender Lifecycle Services beinhalten Leistungen zur Unterstützung im Betrieb der Microsoft Defender Lösungen.
3 out of 60
Starterpaket Managed Modern Endpoint: 7-wöchige Implementierung
novaCapta GmbH
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Den Modern Workplace mit all seinen Vorteilen für die Benutzer:innen auf standardisierte, automatisierte und sichere Weise bereitstellen
4 out of 60
Modern Work Security: 1 Tag Briefing | Arvato Systems
Arvato Systems
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Kreieren Sie mit dem Microsoft 365 Toolstack den geschützten Arbeitsplatz der Zukunft!
5 out of 60
Microsoft Defender for Office 365: 1-hour briefing
Reply
+2
Applicable to:
Cloud Security
Threat Protection
Free one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Office 365
6 out of 60
Microsoft Defender for Cloud Apps: 1-hour briefing
Reply
+2
Applicable to:
Cloud Security
Threat Protection
Free one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Cloud Apps
7 out of 60
Net at Work Security Assessment für Microsoft 365
Net at Work GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Mit dem Microsoft 365 Security Assessment ermitteln wir den Security Reifegrades Ihres Unternehmens und geben Ihnen Maßnahmen zur Verbesserung an die Hand.
8 out of 60
base-IT Pentesting
BaseIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Mit base-IT Pentesting stärken wir Ihre IT-Sicherheit und decken Schwachstellen auf. Durch die Integration von Microsoft 365 (Cloud Security, etc.) entsteht eine umfassende Sicherheitsarchitektur.
9 out of 60
Managed Defender for Identity
Swiss IT Security Deutschland GmbH
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Swiss IT Security Advanced Threat Management: Intelligenter, mehrstufiger Schutz vor Angriffen On-Premise bzw. in der Cloud
10 out of 60
Threat Protection: 2 week Engagement Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you
11 out of 60
Cybersecurity Assessment: Microsoft Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Understand your readiness for common security threats.
12 out of 60
Protect and Manage data in personal devices using Intune
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
Leverage Microsoft Intune for tailored security measures, advanced threat detection, and real-time monitoring to safeguard sensitive data, mitigate risks, and ensure compliance.
13 out of 60
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
14 out of 60
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
15 out of 60
Microsoft Cloud application security Assessment - 2 weeks
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
16 out of 60
Manage Corporate Data on Devices with Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Can you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
17 out of 60
Information Protection with Microsoft Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Boost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
18 out of 60
Microsoft Cloud Apps Security Solutions for Custom Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Know your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
19 out of 60
Data Access Control with MCAS
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
20 out of 60
Microsoft Cloud Application for 3rd Party Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
21 out of 60
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
22 out of 60
Microsoft Cloud Apps Security for Microsoft 365 Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
23 out of 60
Shadow IT discovery with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
24 out of 60
Threat Detection with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
25 out of 60
Microsoft 365 Defender for Endpoint Vulnerability Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
26 out of 60
Insider Risk Management: 8-Wk implementation
PwC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
27 out of 60
G Suite to Office 365 migration: 1-Hour Assessment
True.org Cloud
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
Assessment of your current G Suite environment to plan migration to Office 365
28 out of 60
Microsoft 365 Security: 5 Tage Assessment
Controlware GmbH
+2
Applicable to:
Cloud Security
Threat Protection
Erkennung von potentiellen Sicherheitsmängeln, Dokumentation sicherheitsrelevanter Einstellungen und Reduktion des Risikos durch Schadsoftware innerhalb von Microsoft Office 365.
29 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
30 out of 60
4-Day Security Assesment
HSO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
31 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
32 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
33 out of 60
Micorsoft 365 Security Workshop: 1-Day, Workshop
All for One Group SE
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Sie erhalten technische Einblicke zur Erhöhung der Sicherheit in Microsoft 365: von der Identitätsverwaltung und dem Authentifizierungsprozess bis hin zum Schutz der individuellen Information.
34 out of 60
Mobile Endpoint Security: 5 Day, Workshop
All for One Group SE
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
Sicherheit für Unternehmen, die mobile Endgeräte einsetzen, auf denen Unternehmensdaten sowie persönliche bzw. personenbezogene Daten bearbeitet werden.
35 out of 60
Schatten-IT Analyse: 1 Day, Workshop
All for One Group SE
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Gezielt die „dunklen IT-Flecken“ entdecken und abbauen sowie sichere Alternativen anbieten.
36 out of 60
Modern Workplace Security 10-Wk Implementation
Wipro Ltd
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
37 out of 60
CASB (MCAS) Advisory: 2-week Workshop Series
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
38 out of 60
Microsoft Security Deployment: 5-day Workshop
Campana & Schott GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand your Microsoft security posture and minimize risks with the right experts
39 out of 60
Security Configuration Maintenance 2-Wks Imp
Insight Technology Solutions
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
A monthly Security Configuration Maintenance Service. This service will help to secure end-user devices more effectively based on Insight and Microsoft Security best practices.
40 out of 60
Security 360° by aConTech - 1 wk implementation
aConTech GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sie erhalten folgende Leistungen: Die Implementierung von Identity and Access Management, Threat Protection, Conditional Access, Microsoft 365 Defender sowie Security Monitoring.
41 out of 60
Microsoft 365 Security: 1-day Assessment
IF-Blueprint AG
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Nutzen Sie alle Features von Microsoft 365, um Ihre Sicherheit zu erhöhen?! Wir analysieren Ihren Tenant, erstellen einen Report und geben Ihnen Empfehlungen zum besseren Schutz Ihrer Daten.
42 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
43 out of 60
sepago Envisioning Workshop
sepago GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Get a deeper insight into Microsoft Defender 365 Portfolio and why it should be your future security solution!
44 out of 60
Secure & Compliant Modern Workplace: 2 weeks Imp
Insight Technology Solutions
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
Based on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
45 out of 60
Threat Protection - 4 Week Security Implementation
OBVUS
+1
Applicable to:
Threat Protection
Accelerate your implementation of Threat Protection with the Microsoft 365 Security Accelerator onboarding Services that are designed to get you up and running fast to maximize your investment.
46 out of 60
Microsoft 365 Security Envisioning - 1day workshop
Officeline SA
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Learn how to improve your organization’s security posture with Office Line’s Microsoft 365 Security 1-day Workshop.
47 out of 60
Sycor.ManagedSecurity: 4-hr Implementation Service
Sycor
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
IT-Sicherheit heute - Make or buy? Mit unseren standardisierten Leistungspaketen des Sycor.ManagedSecurity steigern Sie dauerhaft die IT-Sicherheit in Ihrem Unternehmen.
48 out of 60
Zero-Trust: 3-Day Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
49 out of 60
Microsoft 365 Security Assessment (3 days)*
PlanB. GmbH
+2
Applicable to:
Cloud Security
Threat Protection
Get an actionable security roadmap based on evaluated and prioritized security recommendations for your organization.
50 out of 60
Microsoft Defender for Server:5-day Implementation
Delphi Consulting
+2
Applicable to:
Cloud Security
Threat Protection
Delphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
51 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
52 out of 60
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
53 out of 60
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
54 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days Implementation
HCL Technologies Limited.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
55 out of 60
Endpoint Management Workshop
York Telecom Corp
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
56 out of 60
Intelligent Endpoint Protection: 2-week Workshop
NTT DATA Inc.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
57 out of 60
Data Classification and Protection 3Weeks Workshop
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
58 out of 60
Security365 by CyberCare: 3 Wochen Implementierung
Arvato Systems
+2
Applicable to:
Cloud Security
Threat Protection
Consulting Service for Microsoft 365 Defender - Tool Configuration and Secure Score Management
59 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
60 out of 60
Nazaj
1
2
3
4
Naprej