AppSource
Pošljite povratne informacije
Pomoč + podpora
Shranjeni izdelki
Zasebni načrti
Počakajte trenutek, da vas prijavimo ...
Vse
Aplikacije
Kategorije
Panoge
Svetovalne storitve
Partnerji
Filtri
Počisti vse
Vaša lokacija
Izdelki (1)
Panoge
Vrsta storitve
Št. rezultatov: Svetovalne storitve
Prikaz toliko rezultatov v aplikaciji svetovalne storitve:
Prikaži
Toliko povezanih rezultatov v oblaki panoge:
.
Vsi rezultati
Microsoft 365 Security: 2-week assessment
Mirai Security Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
1 out of 60
Managed Workspace Protection for Microsoft 365 Defender
Orange Business Services - Global
+1
Applicable to:
Threat Protection
Implementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
2 out of 60
Zero Trust Foundation: 6-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Accelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
3 out of 60
Microsoft 365 Protecting Corporate Identities: 5-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your organization from devastating breaches with Microsoft 365 identity solutions.
4 out of 60
OneSec Defender for Endpoint – Migration offer
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
The OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
5 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week Program
Windows Management Experts, Inc.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
6 out of 60
Intune Proof of Concept
Levacloud LLC
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
This free, 4–6-hour workshop will provide you with a hands-on experience using Microsoft Intune.
7 out of 60
Threat Protection - 2 Days Workshop
Mayasoft Bilgi Sistemleri A.S.
+2
Applicable to:
Cloud Security
Threat Protection
We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
8 out of 60
Defender Pilot
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
The Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
9 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
10 out of 60
Microsoft Intune: 3-Wk Current State Assessment
Invoke
+2
Applicable to:
Device Deployment & Management
Threat Protection
Assess your endpoint management current state and have a roadmap to modernize it with the Microsoft Intune family of solutions.
11 out of 60
Defender for Office 365 Professional Security Services | Customized Deployment in as Little as 6-Weeks
Difenda
+2
Applicable to:
Information Protection & Governance
Threat Protection
Take the next step in your Defender for Office 365 journey with Difenda, the 2023 Microsoft Security Impact Award Winner.
12 out of 60
Endpoint Security Foundations 50 users: 1-Yr
Red River Technology LLC
+2
Applicable to:
Cloud Security
Threat Protection
Endpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
13 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5
Collective Insights
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Upgrade to Microsoft 365 E5 for Advanced Productivity and Security
14 out of 60
iT1's Security Assessment
It1 Source LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Improve your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
15 out of 60
Defender for IoT Professional Security Services | Customized Deployment in as Little as 8-Weeks
Difenda
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Threat Protection
Unify your IT and OT security environment with Difenda, the 2023 Microsoft Security Impact Award Winner.
16 out of 60
Defender for Office365
Suri Services SC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Suri Services y Office 365: La alianza impenetrable en ciberseguridad.
17 out of 60
Microsoft Defender for Office 365: 1-hour briefing
Reply
+2
Applicable to:
Cloud Security
Threat Protection
Free one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Office 365
18 out of 60
Microsoft Defender for Cloud Apps: 1-hour briefing
Reply
+2
Applicable to:
Cloud Security
Threat Protection
Free one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Cloud Apps
19 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
20 out of 60
Fortis Assessment Microsoft Online Security
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
21 out of 60
Fortis IR Compromise Assessment
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A high-level forensics evaluation designed to identify current and past threat activity.
22 out of 60
Cyderes Managed Security Services for Microsoft Sentinel
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
23 out of 60
Identity Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
24 out of 60
Fortis IR Active Recovery
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
25 out of 60
Fortis Activerecovery Incident Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
According to multiple studies, breaches and ransomware have more than doubled in the past year.
26 out of 60
Lightstream Complimentary Microsoft 365 Core Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
27 out of 60
Microsoft Cybersecurity: 1 Month Assessment
Big Cloud Consultants
+2
Applicable to:
Cloud Security
Threat Protection
Our expert team will work with you to assess your current security posture and develop recommendations for appropriate improvements.
28 out of 60
Defender Implementation, Tuning, and Testing
Security Risk Advisors Intl, LLC
+1
Applicable to:
Threat Protection
Implement Windows Defender for Endpoint on Windows OS.
29 out of 60
KAMIND CMMC L1 DIY
KAMIND IT, Inc
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Consulting on how to utilize the Microsoft 365 Licenses on your path to CMMC L1 Compliance.
30 out of 60
Lightstream Threat Protection Assessment and Deployment Roadmap
Lightstream
+2
Applicable to:
Cloud Security
Threat Protection
Leveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
31 out of 60
Microsoft Defender for Business Deployment: 6-Wk Implementation
Algen Solutions S.A. de C.V.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
We will provide you with a suite of security features that can help protect devices and data, reduce the burden on IT staff and meet regulation compliance requirements with Microsoft Defender.
32 out of 60
Windows 365 Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
33 out of 60
Intune for Endpoint Management - Discovery Consultation
CBTS Technology Solutions LLC
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Learn from CBTS how to utilize Microsoft Intune for Endpoint Management & Security in this free discovery consultation.
34 out of 60
MXDR Consultation
CBTS Technology Solutions LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
35 out of 60
Threat Protection: 2 week Engagement Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you
36 out of 60
Cybersecurity Assessment: Microsoft Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Understand your readiness for common security threats.
37 out of 60
Protect and Manage data in personal devices using Intune
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
Leverage Microsoft Intune for tailored security measures, advanced threat detection, and real-time monitoring to safeguard sensitive data, mitigate risks, and ensure compliance.
38 out of 60
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
39 out of 60
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
40 out of 60
Microsoft Cloud application security Assessment - 2 weeks
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
41 out of 60
Manage Corporate Data on Devices with Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Can you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
42 out of 60
Information Protection with Microsoft Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Boost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
43 out of 60
Cloud Security Assessment - 3 Day Workshop
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
44 out of 60
Microsoft Security: 3-Day Workshop
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
45 out of 60
Microsoft 365/Azure Cloud Secure 5 Day Assessment
DynTek Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
DynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
46 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
47 out of 60
Microsoft 365 Incident Response - 5 Week Assessment
Protiviti
+2
Applicable to:
Cloud Security
Threat Protection
Assessing the advanced security capabilities of Microsoft 365
48 out of 60
Microsoft 365 Security: 4-Week Assessment
Apex Digital Solutions
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most and improving your security maturity over time.
49 out of 60
EMS Energize: 1-month proof of concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Interlink Cloud Advisors’ EMS Energize engagement provides you with security experts who can help guide your business into a secure, productive cloud platform.
50 out of 60
Microsoft 365 Secure Score: 4 Week Implementation
Razor Technology, LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Audit, review, and improve security posture of Microsoft 365 Estate through Secure Score methodology. Receive expert advice for identity, compliance, and threat protection improvements.
51 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
52 out of 60
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
53 out of 60
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
54 out of 60
BUI Cyber MDR - 1 Day Discovery Workshop
BUI (Pty) Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
55 out of 60
CSE Security Baseline 3 days implementation
Computer Solutions East
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
56 out of 60
Security & Compliance Readiness: 2-Wk. Assessment
iCorps Technologies, Inc
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
iCorps Security and Compliance Services provide a complete security assessment of your Microsoft platform and integrated services.
57 out of 60
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
58 out of 60
Microsoft 365 Defender Threat Check: 4-wk assess
Interlink Cloud Advisors, Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
59 out of 60
ThreatHunter MXDR: 3-Wk Implemenation
eGroup Enabling Technologies
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
eGroup Enabling Technologies, LLC's ThreatHunter MXDR consulting, configuration, and training services help organizations protect, detect, and respond to risks.
60 out of 60
Nazaj
3
4
5
6
7
Naprej