AppSource
Ge feedback
Hjälp och support
Sparade objekt
Privata abonnemang
Vänta ett ögonblick medan du loggas in...
Alla
Appar
Kategorier
Branscher
Konsulttjänster
Partner
Filter
Rensa alla
Din plats
Produkter (1)
Branscher
Typ av tjänst
Konsulttjänster resultat
Visar resultat i konsulttjänster
Visa
relaterade resultat i branschmoln
.
Alla resultat
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
1 out of 60
Windows 365 Standardized Pilot
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
2 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
3 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeks
Plain Concepts
+2
Applicable to:
Cloud Security
Information Protection & Governance
The objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
4 out of 60
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
5 out of 60
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 Wk
Lighthouse Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
This hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
6 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
7 out of 60
Protect and Govern Sensitive Data: 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
8 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY24
CGI Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
9 out of 60
Microsoft 365 Licence Health Check: 1-Day Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
10 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
11 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
12 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
13 out of 60
ANECT Security Monitoring and Response 3 Months PoC
ANECT a.s.
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
14 out of 60
Mailbox Guardian - Security: 2 Week Implementation
ProServeIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cybersecurity review and lockdown of Microsoft 365 environment. Monitor and provide implementation recommendations Protect against phishing and other attacks Review desired state configuration
15 out of 60
Microsoft 365 Security Assessment up to 6 weeks
ACTS
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
ACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
16 out of 60
1-Tages Update Workshop: Cloud Security & Compliance mit Microsoft 365
AppSphere AG
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Knowledge & Insights
Entdecken Sie das Fundament der Cloud-Sicherheit für eine Compliance konforme Nutzung von Microsoft 365
17 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
18 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
19 out of 60
Secure Live Workspace - 8 Weeks Assessment
LTIMindtree Limited
+3
Applicable to:
Cloud Security
Power Platform for Teams
Teams Custom Solutions
Our Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
20 out of 60
Red Canary Defend Against Threats Siem Plus XDR Workshop
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
21 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
22 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
23 out of 60
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
24 out of 60
Microsoft Cloud Accelerator Workshops 2-Days
SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Improve NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
25 out of 60
Defender for Endpoint Professional Security Services | Customized Deployment in as Little as 6-Weeks
Difenda
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize your Microsoft Security investment with our Defender for Endpoint Design & Implementation.
26 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk Worshops
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
27 out of 60
Cyderes Microsoft 365 Incident Response
Cyderes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Cyderes Digital Forensics and Incident Response (DFIR) services encompass the full security motion and emphasize your ability to respond.
28 out of 60
Windows 365 Assessment - 1 day
CC Bilgi Teknolojileri
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Hybrid Windows for a hybrid world Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
29 out of 60
Securing Identities Workshop: 4-Wk Workshop
ProArch Technologies, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
30 out of 60
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
31 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers detect, investigate, and take action to mitigate risk and ensure compliance in their modern workplace.
32 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week Implementation
Options Technology Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
33 out of 60
DLP Implementation and Tuning Services
INFOTECHTION
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Reduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
34 out of 60
Microsoft 365 Security Assessment: 2 Week Assessment
Kontex Security Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
35 out of 60
GoDaddy to Direct Microsoft 365 Migration 2 Hrs Proof of Concept
true org cloud
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Remove GoDaddy and other third-party entities from your tenant, reclaiming internal control over your systems.
36 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
37 out of 60
Zero Trust Security: 3-day Workshop
Oxford Computer Group LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
38 out of 60
Microsoft 365 Plan for Success:3-d Assessment
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
39 out of 60
BDO eDiscovery: 4 Wk Assessment
Lixar IT
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Centralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
40 out of 60
NIST800-171-Microsoft 365-Accelerator-Guided-Deployment
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Provides expert guidance to help organizations achieve NIST 800-171 compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
41 out of 60
Licensing Microsoft 365: 1-day Assessment
Informatika a.d.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
42 out of 60
4-Day Security Assesment
HSO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
43 out of 60
Microsoft 365 Migration 12 Hour Proof-of-Concept
New Charter Technologies, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
44 out of 60
Modern Frontline Work Acceleration 2 days Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
LiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
45 out of 60
Hybrid Cloud Security Workshop - 1-Day
Zones, LLC
+1
Applicable to:
Cloud Security
Identify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
46 out of 60
Cloud-to-Cloud Backup: 1 Day Implementation
BDO Canada
+1
Applicable to:
Cloud Security
Get scalable backup and recovery implemented for all your Microsoft Office 365 data.
47 out of 60
Conditional Access Penetration Test: 4 Days Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
48 out of 60
Microsoft Priva Assessment: 2 Wk
Lighthouse Global
+2
Applicable to:
Cloud Security
Information Protection & Governance
Empowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
49 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
50 out of 60
Microsoft 365 Consulting Services: 10-Week Implementation
Ricoh
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Deployment of Microsoft 365 as a cloud-based solution and the world’s leading productivity platform. Your workforce can access the necessary tools and information whenever and wherever they want.
51 out of 60
Digital Security:1 Months Assessment
Atos International SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital Security, expertise : Cyber Sécurité Services, Systèmes critiques, IAM, Cloud Security, 6000 personnes dédiées
52 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Microsoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
53 out of 60
Ctelecoms Defend Against Threats with SIEM Plus XDR Workshop
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Defend Against Threats with SIEM Plus XDR Workshop Learn how to put next-generation Microsoft security tools to work for you.
54 out of 60
Ctelecoms Protect and Govern Sensitive Data Workshop
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Protect & Govern Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
55 out of 60
Ctelecoms Mitigate Compliance and Privacy Risks Workshop
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
The Mitigate Compliance & Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organization.
56 out of 60
Microsoft 365 Cybersecurity Jumpstart: 1Wk Implementation
BDO Canada
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ensure the right safeguards are in place. Secure your Microsoft 365 tenant through BDO Lixar’s security configuration services and the cloud provisioning expertise
57 out of 60
MDR for Microsoft Defender
ADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.
+2
Applicable to:
Cloud Security
Threat Protection
Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
58 out of 60
Defender for IoT Operational Technology Discovery: 2-Hour Workshop
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT (OT) Discovery Workshop helps you understand the solution, the fit to your OT estate and potential threat posture improvements
59 out of 60
Imagine workshop for Security: 3days
Softlanding Solutions Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
MCI Build Intent Workshops demonstrate value, build customer intent, and maximize opportunities for Modern Work and Security for Microsft365
60 out of 60
Föregående
1
2
3
4
5
Nästa