AppSource
Ge feedback
Hjälp och support
Sparade objekt
Privata abonnemang
Vänta ett ögonblick medan du loggas in...
Alla
Appar
Kategorier
Branscher
Konsulttjänster
Partner
Filter
Rensa alla
Din plats
Produkter (1)
Branscher
Typ av tjänst
Konsulttjänster resultat
Visar resultat i konsulttjänster
Visa
relaterade resultat i branschmoln
.
Alla resultat
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days Implementation
HCL Technologies Limited.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
1 out of 60
Defender for Endpoint Managed Service
e2e-assure Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
2 out of 60
ANECT Security Monitoring and Response 3 Months PoC
ANECT a.s.
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
3 out of 60
CASB (MCAS) Advisory: 2-week Workshop Series
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
4 out of 60
Endpoint Management with Security - 4 days - FREE Workshop
OPEN BPO
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
This workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
5 out of 60
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
6 out of 60
Phishing, Malware & Spam protection- 2 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
7 out of 60
Copilot - 2 Days Adoption Workshop
INSOMEA COMPUTER SOLUTIONS TUNISIE SARL
+2
Applicable to:
Frontline Workers
Threat Protection
INSOMEA will help users in adopting copilot within companies from different sectors and sizes
8 out of 60
Protect 365 App - 1 hour implementation
Cloud Life
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
9 out of 60
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
10 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security Services
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
11 out of 60
Managed EDR with Microsoft Defender for Endpoint - 2 hours Best Practices Workshop
NTT DATA Deutschland GmbH
+2
Applicable to:
Information Protection & Governance
Threat Protection
Find the right level of endpoint security for your business with Microsoft 365 Defender
12 out of 60
Microsoft 365 Security: 5 Tage Assessment
Controlware GmbH
+2
Applicable to:
Cloud Security
Threat Protection
Erkennung von potentiellen Sicherheitsmängeln, Dokumentation sicherheitsrelevanter Einstellungen und Reduktion des Risikos durch Schadsoftware innerhalb von Microsoft Office 365.
13 out of 60
Ransomware & Supply Chain Incident Management: 12 Hour Assessment
Maureen Data Systems
+3
Applicable to:
Compliance Advisory Services
Knowledge & Insights
Threat Protection
Identify vulnerabilities within your organization, including those who pose a threat to your supply chain, provide & mature a tailored incident response & management program.
14 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
15 out of 60
HPT_Microsoft Cyber Security Assessment_2 week
HPT Vietnam Corporation
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Strengthen your firm's defenses with our all-in-one cybersecurity platform
16 out of 60
Copilot Data Protection
Cloud Life
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
17 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
18 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Conscia A/S
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
19 out of 60
CANCOM Microsoft Defender Lifecycle Services - Monthly recurring
CANCOM GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Die CANCOM Microsoft Defender Lifecycle Services beinhalten Leistungen zur Unterstützung im Betrieb der Microsoft Defender Lösungen.
20 out of 60
True Managed Security Service- 3 day Workshop
true org cloud
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
You have a vision. We can help you secure it...
21 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
22 out of 60
Security and compliance assessment with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Fortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
23 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
24 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
25 out of 60
Secure Multi Cloud environments - 4 Day workshop
aConTech GmbH
+1
Applicable to:
Threat Protection
Get a customized threat & vulnerability analysis of your hybrid and multi-cloud environment and learn how to build a more robust cloud security system with Microsoft 365.
26 out of 60
Microsoft Defender for Server:5-day Implementation
Delphi Consulting
+2
Applicable to:
Cloud Security
Threat Protection
Delphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
27 out of 60
SharePoint and Teams Security - 2 week assessment
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Confident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
28 out of 60
Magenta Security Services for Microsoft DACH:3 months Implementation
Telekom Deutschland GmbH Main Account
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Magenta Security for Microsoft provides the management and the integration in as well as the continuous monitoring of your Microsoft Security by the SOC of Deutsche Telekom
29 out of 60
G Suite to Office 365 migration: 1-Hour Assessment
True.org Cloud
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
Assessment of your current G Suite environment to plan migration to Office 365
30 out of 60
SecureBlu MDR Service for Microsoft 365 Defender
New Era Technology
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
31 out of 60
Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
32 out of 60
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
33 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
34 out of 60
Security Operations Center: 1-Months Implementation
iteracon GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Das ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
35 out of 60
Sichere Endpunkte: 3-stündiger Starterworkshop
novaCapta GmbH
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Erfahren Sie, wie Sie mithilfe des Defender for Endpoint wirkungsvoll gegen Cyberangriffe auf Endpunkte vorgehen können.
36 out of 60
Microsoft Security and Rapid Cyberattack Assessment: 3-tägiges Assessment
novaCapta GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Das Microsoft Security Assessment hilft Ihrem Unternehmen zu verstehen, wie Sie Bedrohungen durch den Einsatz von Microsoft 365-Security-Lösungen gezielt reduzieren und sich vor Angriffen schützen.
37 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
38 out of 60
Microsoft 365 Tenant Security Workshop: 3tägiger Workshop
novaCapta GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Erfahren Sie wie Sie die Microsoft Security Tools bestmöglich nutzen um Ihren Tenant zu schützen
39 out of 60
Conscia Security Assessment: 1-2 Weeks Infra Assessment
Conscia A/S
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
We can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
40 out of 60
Microsoft Security Services:5-Wk Implementation
Energy Time LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Deploy&Configure Microsoft Security Services: Azure AD Premium features, Microsoft Defender Family, Endpoint Management, Information Protection
41 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefing
SMART business LLC
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
42 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
43 out of 60
HPT Mitigate Compliance and Privacy Risk_1-Day Workshop
HPT Vietnam Corporation
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Understand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
44 out of 60
Defend against threats with SIEM plus XDR - 4 Day Workshop
aConTech GmbH
+1
Applicable to:
Threat Protection
Get a deep understanding of Security solutions like Microsoft 365 Defender, Endpoint Protection and more. We will review your security goals and objectives to create a personalized security plan.
45 out of 60
Base-IT Managed Service Security & SOC
BaseIT
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Base-IT Managed Service Security & SOC bietet Ihnen eine PROAKTIVE und PROFESSIONELLE Betreuung, sehr gerne auf Wunsch Rund-um-die-Uhr. Wir garantieren Ihnen vollumfassenden IT-Security Schutz.
46 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
47 out of 60
Threat Protection - 2 Days Workshop
Mayasoft Bilgi Sistemleri A.S.
+2
Applicable to:
Cloud Security
Threat Protection
We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
48 out of 60
Managed Services: M(x)DR for Microsoft 365 Defender
Cegeka NV
+2
Applicable to:
Identity & Access Management
Threat Protection
Introducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
49 out of 60
Zero Trust: 4 x 3h Workshop
water IT Security GmbH
+1
Applicable to:
Threat Protection
Stay ahead of the cyber threat wave with our Zero Trust workshop – get an overview of your Zero Trust readiness, a compact guide to today’s IT landscape, and define next steps for your organization.
50 out of 60
Starterpaket Managed Modern Endpoint: 7-wöchige Implementierung
novaCapta GmbH
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Den Modern Workplace mit all seinen Vorteilen für die Benutzer:innen auf standardisierte, automatisierte und sichere Weise bereitstellen
51 out of 60
Modern Work Security: 1 Tag Briefing | Arvato Systems
Arvato Systems
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Kreieren Sie mit dem Microsoft 365 Toolstack den geschützten Arbeitsplatz der Zukunft!
52 out of 60
Net at Work Security Assessment für Microsoft 365
Net at Work GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Mit dem Microsoft 365 Security Assessment ermitteln wir den Security Reifegrades Ihres Unternehmens und geben Ihnen Maßnahmen zur Verbesserung an die Hand.
53 out of 60
base-IT Pentesting
BaseIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Mit base-IT Pentesting stärken wir Ihre IT-Sicherheit und decken Schwachstellen auf. Durch die Integration von Microsoft 365 (Cloud Security, etc.) entsteht eine umfassende Sicherheitsarchitektur.
54 out of 60
Managed Defender for Identity
Swiss IT Security Deutschland GmbH
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Swiss IT Security Advanced Threat Management: Intelligenter, mehrstufiger Schutz vor Angriffen On-Premise bzw. in der Cloud
55 out of 60
Threat Protection: 2 week Engagement Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you
56 out of 60
Cybersecurity Assessment: Microsoft Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Understand your readiness for common security threats.
57 out of 60
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
58 out of 60
Microsoft 365 threat protection assessment
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Identify vulnerabilities and threats in Microsoft 365. Use advanced protection, intelligence, detection, and response to safeguard data. Enhance security with real-time insights and monitoring.
59 out of 60
Device Security Management with Microsoft Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Seamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
60 out of 60
Föregående
1
2
3
Nästa