AppSource
Ge feedback
Hjälp och support
Sparade objekt
Privata abonnemang
Vänta ett ögonblick medan du loggas in...
Alla
Appar
Kategorier
Branscher
Konsulttjänster
Partner
Filter
Rensa alla
Din plats
Produkter (1)
Branscher
Typ av tjänst
Konsulttjänster resultat
Visar resultat i konsulttjänster
Visa
relaterade resultat i branschmoln
.
Alla resultat
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
1 out of 60
Email Security Threat Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
2 out of 60
ADFS to Microsoft Entra ID Migration: 4-Wk Implementation
Performanta
+1
Applicable to:
Identity & Access Management
Undertake a seamless ADFS to Microsoft Entra ID app migration, improving security, offering up new features, and getting your organisation back on track.
3 out of 60
BYOD 365: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
The BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
4 out of 60
Endpoint Management Solutions: 4-Wk Implementation
Signal Alliance
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Discover how Signal Alliance Consulting enables users in your organization to be productive, on any device, without compromising IT security by leveraging Microsoft Endpoint Management.
5 out of 60
Endpoint Management with Security - 4 days - FREE Workshop
OPEN BPO
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
This workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
6 out of 60
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
7 out of 60
Sensitive Data Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Sensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
8 out of 60
Phishing, Malware & Spam protection- 2 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
9 out of 60
Microsoft 365 Security 4 Weeks Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
10 out of 60
Microsoft 365 Copilot Readiness Workshop
Swiss IT Security Deutschland GmbH
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Lernen Sie über Tools und Dienste der Microsoft 365 Lizenz, wie sie Risiken minimieren können
11 out of 60
Collaborative Apps: 3 - W Workshop
Exelegent
+3
Applicable to:
Identity & Access Management
Power Platform for Teams
Teamwork Deployment
Build Solutions for your Customers to drive organizations goals and create collaborative experiences.
12 out of 60
Azure AD Implentation in 8 weeks
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Identity & Access Management
Porovide a design and build capability that enables organisations to secure, control and simplify employee access to company data and sensitive resources resources from wherever they are.
13 out of 60
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
14 out of 60
ACP Microsoft 365 Tenant Check (2 Halbtage)
ACP IT Solutions GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Stellen Sie sicher, dass Ihre Microsoft 365 Umgebung jederzeit optimal konfiguriert und sicher ist! In unserem ACP Tenant Check überprüfen wir die Einstellungen Ihres Microsoft 365 Tenants.
15 out of 60
Microsoft 365 Security Assessment: 2 Week Assessment
Kontex Security Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
16 out of 60
Windows 365 Cloud PC: 4-Wk Proof of Concept
Signal Alliance
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Discover how Signal Alliance Consulting helps you get started with Windows 365, the worlds first cloud PC that helps you access your data from anywhere, anytime from any device.
17 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementation
Cloudshift
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
18 out of 60
HPT Nextgen Windows Experience_02 days workshop
HPT Vietnam Corporation
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
NextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
19 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
20 out of 60
Adoption as a Service: 12 months Microsoft 365 support
SNOMANN, UAB
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Benefit from long-term collaboration. We'll act as a trusted advisor on your Microsoft 365 infrastructure consulting, recommending, solving issues, supporting and developing.
21 out of 60
Microsoft 365 Copilot: 12-Wk Implementation
PHAT CONSULTING GmbH
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Copilot Readiness by PHAT helps you to prepare your organization for a successful Microsoft 365 Copilot implementation
22 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
23 out of 60
Microsoft 365: 2-Week Assessment
Practical Solutions, Inc
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
24 out of 60
SVA Boarding Check Copilot for Microsoft 365 - 2d Workshop
SVA System Vertrieb Alexander GmbH
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
Der Boarding Check dient in erster Linie dazu, gemeinsam mit Ihnen die allgemeine Bereitschaft ihres Unternehmens für die Einführung von Copilot for Microsoft 365 festzustellen.
25 out of 60
Security Assessment: 1-D Workshop
atwork
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The Security Assessment Workshop will support you in focusing on your priorities and security strategy, discovering current threats, learning about Microsoft's security tools and planning next steps.
26 out of 60
HPT_Microsoft Cyber Security Assessment_2 week
HPT Vietnam Corporation
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Strengthen your firm's defenses with our all-in-one cybersecurity platform
27 out of 60
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
28 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
29 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
30 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Conscia A/S
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
31 out of 60
Intranet & Data Optimization: 4 Hours Workshop
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Workshop di introduzione pratica alle potenzialità della soluzione SharePoint di Microsoft 365
32 out of 60
Work - 12-wk Implementation
Wortell
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Work, the modern workplace as a service offering by Wortell on a pay-per-user-per-month basis
33 out of 60
CANCOM Microsoft Defender Lifecycle Services - Monthly recurring
CANCOM GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Die CANCOM Microsoft Defender Lifecycle Services beinhalten Leistungen zur Unterstützung im Betrieb der Microsoft Defender Lösungen.
34 out of 60
ACP Workshop Conditional Access (4 to 6 weeks)
ACP IT Solutions GmbH
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Knowledge & Insights
Stellen Sie sicher, dass Ihr Conditional Access Sicherheit & Usability bestmöglich vereint. Bei diesem ACP Workshop setzen wir gemeinsam ein Regel-Set anhand eines fundierten Best Practice Ansatzes um
35 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装 をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
36 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
37 out of 60
Atos || Pilot program for Windows 365
Atos International SAS
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Atos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
38 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
39 out of 60
Bechtle Microsoft Windows 365 Einführung
Bechtle AG
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
Erfahren Sie von Intune-Spezialisten alles über Windows 365: Der Cloud-PC für mobiles Arbeiten. Datenzugriff, Sicherheit & mehr für Ihr Unternehmen.
40 out of 60
Guest Lifecycle for Azure AD
Swiss IT Security AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Guest Lifecycle for Azure AD (GL4AAD) handles maintenance and hygiene tasks for you.
41 out of 60
Microsoft 365 Email Threat Protection Assessment
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
42 out of 60
Copilot für Microsoft 365 User Adoption Assessment
CANCOM GmbH
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Workplace Analytics
Nachhaltiges Change & Adoption Management für Copilot für Microsoft 365
43 out of 60
Magenta Security Services for Microsoft DACH:3 months Implementation
Telekom Deutschland GmbH Main Account
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Magenta Security for Microsoft provides the management and the integration in as well as the continuous monitoring of your Microsoft Security by the SOC of Deutsche Telekom
44 out of 60
CDA as a Service on Microsoft 365: 3 weeks implementation
INDACON S.R.L.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Teams Custom Solutions
CDA as a Service is a Cloud-based platform that allows the management of every Board of Directors phase in a single workspace
45 out of 60
Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
46 out of 60
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
47 out of 60
HPT Secure Identities and Access_03 days workshop
HPT Vietnam Corporation
+2
Applicable to:
Identity & Access Management
Mobile Device Management
With identity attacks on the rise, this workshop will show you how to stop tomorrow’s data breaches by securing identities today.
48 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
49 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
50 out of 60
Managed Security Operations Center: 1 Month Implementation
novaCapta GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Wir bieten einen professionellen 24/7-Sicherheitsbetrieb Ihrer Umgebung mit unserem zertifizierten deutschen SOC-Team
51 out of 60
Microsoft 365 Governance: 4-Days Workshop
SoftwareONE Deutschland GmbH
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
Um keine Überraschungen auf dem Weg in die Cloud zu erleben, werden im Microsoft 365 Governance Advisory Workshop Schwachstellen und Risiken in der aktuellen und geplanten Umgebung analysiert.
52 out of 60
Microsoft 365 Vision Scope Advisory: 5-Days Workshop
SoftwareONE Deutschland GmbH
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Wir zeigen Ihnen, wie Sie sich mit Microsoft 365 auf Basis neuester Cloud-Technologien mit SharePoint, Teams und Exchange neue Möglichkeiten für die Zusammenarbeit und Kommunikation eröffnen.
53 out of 60
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
54 out of 60
Microsoft Security Services:5-Wk Implementation
Energy Time LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Deploy&Configure Microsoft Security Services: Azure AD Premium features, Microsoft Defender Family, Endpoint Management, Information Protection
55 out of 60
Intranet & Data Optimization for SharePoint: 1 Day Assessment
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Assessment rivolto alle aziende che vogliono ottimizzare i processi interni con l'uso di SharePoint e Microsoft 365
56 out of 60
Intranet & Data Migration SharePoint: 3 Days Implementation
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Implementazione di SharePoint come intranet aziendale e migrazione dei dati online su Microsoft 365
57 out of 60
SharePoint Intranet: 2 Hours Briefing
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Briefing di presentazione della soluzione SharePoint e prima analisi delle esigenze e conoscenze di Microsoft 365
58 out of 60
Intranet & Data Optimization: 1 Day Proof of Concept
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Proof of Concept (POC) per provare in modo pratico la soluzione SharePoint nella propria infrastruttura
59 out of 60
ADVIA Service Implementierung & Migration
ADVIA GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Die Cloud ist das Ziel, der Weg ist klar, doch was ist mit Ihren Daten?
60 out of 60
Föregående
1
2
3
4
Nästa