AppSource
Pošljite povratne informacije
Pomoč + podpora
Shranjeni izdelki
Zasebni načrti
Počakajte trenutek, da vas prijavimo ...
Vse
Aplikacije
Kategorije
Panoge
Svetovalne storitve
Partnerji
Filtri
Počisti vse
Vaša lokacija
Izdelki (1)
Panoge
Vrsta storitve
Št. rezultatov: Svetovalne storitve
Prikaz toliko rezultatov v aplikaciji svetovalne storitve:
Prikaži
Toliko povezanih rezultatov v oblaki panoge:
.
Vsi rezultati
Microsoft 365 Copilot: 2-Wk Readiness Assessment
Invoke
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Invoke's Microsoft 365 Copilot Readiness Assessment is a service that helps customers prepare for using Copilot 365, a solution that leverages data to enhance creativity, productivity, and skills.
1 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free Briefing
Netwoven
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Netwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
2 out of 60
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
3 out of 60
Varonis Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
4 out of 60
Start your GenAI journey with NTT DATA: Boost Copilot for Microsoft 365 adoption with our Adoption Accelerator
NTT DATA Inc.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
Discover the Power of NTT DATA's Copilot for Microsoft 365 Implementation and Adoption Services, Engineered to Unlock the Full Potential of Generative AI Technology for Your Business
5 out of 60
Microsoft Intune Deployment
Secure Future Bilgi Tek. ve Hiz. Tic A.S.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
6 out of 60
Windows 365 Jumpstart: 3 Week Implementation
Steeves
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
We'll discuss the value of Windows 365 and its key functionalities, followed by a workshop to expose key areas and document decisions that drive implementation to ensure a successful adoption.
7 out of 60
Windows 365 Assessment - 1 day
CC Bilgi Teknolojileri
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Hybrid Windows for a hybrid world Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
8 out of 60
Modern Workplace - Cloud Endpoint Management
Arxus
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Our Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
9 out of 60
Modern EndPoint Management - Jumpstart: 1-Wk Proof of Concept
Logicalis, Inc.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune Jumpstart will help showcase the value of Microsoft Intune, to show you how to more effectively manage endpoints within Intune. Proof of Concept deployment included!
10 out of 60
Security Assessment - 4-Week Assessment
Coretek Services
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Analysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
11 out of 60
Zero Trust Launchpad: 3-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
12 out of 60
MicroAge ManageWise Microsoft 365 Assessment & Services
MicroAge
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Comprehensive assessment of our clients Microsoft 365 tenant providing an Executive summary detailed report to reduce vulnerabilities improving Secure Score with 40 hours of Engineer time
13 out of 60
Email Security Threat Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
14 out of 60
Baseline Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Aware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
15 out of 60
Sensitive Data Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Sensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
16 out of 60
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
17 out of 60
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
18 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
19 out of 60
Conditional Access Penetration Test: 4 Days Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
20 out of 60
Microsoft 365 Security Assessment: 3-Week Assessment
Spyglass MTG, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
21 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
22 out of 60
Identity & Endpoint Protection with Microsoft Zero Trust
Dell Technologies Services
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Dell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
23 out of 60
Cloud Security Assessment - 2 Week Assessment and Roadmap
CloudServus
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Gain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
24 out of 60
Microsoft Cybersecurity Assessment
Akins IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
25 out of 60
Zero Trust Workplace Solution: 3-Wk Implementation
Softchoice
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Solution for organizations wanting to improve their overall security posture by implementing key security features for protecting user identity, devices, and data.
26 out of 60
Mergers and Acquisitions: 1-month implementation
Interlink Cloud Advisors, Inc.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Mergers and acquisitions are messy. Interlink will build the foundation for a smooth infrastructure consolidation process.
27 out of 60
Microsoft 365 Azure AD 3-wk Implementation Roadmap
Cyclotron Inc.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
28 out of 60
Fortis IR Table Top Exercises
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
29 out of 60
Ongoing Managed Services for Microsoft 365 Administration
Finchloom
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Teamwork Deployment
Standardized management of your Microsoft 365 Tenant. Free up internal resources from regular administration tasks, firefighting issues, and escalating to Microsoft Support.
30 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC Compliance
Agile IT
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Agile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
31 out of 60
1-Day Security & Identity Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Tailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
32 out of 60
Office 365 to Office 365 Migration: 4-Wk Implementation
Exodus Integrity Services, Inc.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Simplify the complexities of merging, consolidating, or transitioning your Office 365 environments with our specialized Office 365 Migration Service.
33 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementation
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
34 out of 60
Mergers and Acquisitions Playbook
Ivision, Inc.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
ivision leverages an approach and methodology designed to help clients successfully plan and design for a M/A&D migrations to achieve successful mergers, consolidation or a separation outcome.
35 out of 60
Microsoft Purview Records Management Assessment & Strategy - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
36 out of 60
Secure Productive Workplace: Implement 4-Wk
Netsurit
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Netsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
37 out of 60
Change Management: 1-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Change Management is a proven methodology to deploy technology changes to large groups of diverse Microsoft 365 users.
38 out of 60
Zero Touch Provisioning: 3-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Zero-Touch Provisioning sets you up to ship devices straight to users, with auto-configuration occurring over the air on initial sign in.
39 out of 60
Advania: Intune Get Started: 2 d training and PoC
Advania AB
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Understand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
40 out of 60
Zero Trust Security: 3-day Workshop
Oxford Computer Group LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
41 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
42 out of 60
Microsoft 365 Digital Workforce: 2-Day Workshop
CompuNet
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Two-day engagement to envision agile work scenarios and how to enable people to be productive and secure from anywhere with Microsoft 365
43 out of 60
Integrating Microsoft Sentinel with External EDR Service
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
44 out of 60
Modern EndPoint: 3 Day Workshop
Insentra Pty Ltd
+2
Applicable to:
Identity & Access Management
Mobile Device Management
An executive deep dive into remote deployment, management, and the security of corporate and BYOD devices in your organization
45 out of 60
Infra & Network Monitoring with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Boost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
46 out of 60
Device Security Management with Microsoft Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Seamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
47 out of 60
Device Monitoring with Microsoft Defender for Endpoint
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
48 out of 60
Device Domain Migration from On-Premises to Cloud
AVA SOFTWARE INC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Seamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
49 out of 60
Atos || Microsoft Windows 365 Pilot
Atos International SAS
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Atos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
50 out of 60
Intune for Windows: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
51 out of 60
Microsoft 365 Roadmap: 1-Wk Workshop
Egroup, Inc.
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Mobile Device Management
Enable a Secure and Productive Workforce with a Modern Workplace Roadmap powered by Microsoft 365 solutions.
52 out of 60
Microsoft Endpoint Manager: 8-Hours Workshop
Onex Group
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Learn how to secure Windows 11 environments with Microsoft Endpoint Manager
53 out of 60
Cybersecurity: 3-Wks Quick-Assessment
Unipartner IT Services, S.A.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
54 out of 60
Endpoint Management Solutions: 4-Wk Implementation
Signal Alliance
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Discover how Signal Alliance Consulting enables users in your organization to be productive, on any device, without compromising IT security by leveraging Microsoft Endpoint Management.
55 out of 60
BYOD 365: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
The BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
56 out of 60
SharePoint Premium Readiness Assessment & Roadmap - 5 Week Assessment
Protiviti
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Evaluate and ensure your readiness for implementing SharePoint Premium, considering technical, business case, data lifecycle, and administration perspectives.
57 out of 60
Modernize Endpoints Consulting Offer: 3 Days Implementation
Adaptive Business Communications Ltd t/a CloudAssist
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
With Hybrid work becoming prevalent and increasing threat trends, organizations need to proactively secure & modernize management of their endpoints across mobile, PCs and including virtual endpoints.
58 out of 60
Microsoft Endpoint Manager Baseline
SHI International Corp
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Explore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
59 out of 60
ADFS to Microsoft Entra ID Migration: 4-Wk Implementation
Performanta
+1
Applicable to:
Identity & Access Management
Undertake a seamless ADFS to Microsoft Entra ID app migration, improving security, offering up new features, and getting your organisation back on track.
60 out of 60
Nazaj
1
2
3
4
5
Naprej