AppSource
Ge feedback
Hjälp och support
Sparade objekt
Privata abonnemang
Vänta ett ögonblick medan du loggas in...
Alla
Appar
Kategorier
Branscher
Konsulttjänster
Partner
Filter
Rensa alla
Din plats
Produkter (1)
Branscher
Typ av tjänst
Konsulttjänster resultat
Visar resultat i konsulttjänster
Visa
relaterade resultat i branschmoln
.
Alla resultat
Mailbox Guardian - Security: 2 Week Implementation
ProServeIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cybersecurity review and lockdown of Microsoft 365 environment. Monitor and provide implementation recommendations Protect against phishing and other attacks Review desired state configuration
1 out of 60
Microsoft 365 Service : Productivity and Security
Cofomo
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Our "Microsoft 365 Service" package is designed to help your organization harness the full potential of Microsoft 365 while ensuring top-notch productivity and security
2 out of 60
Microsoft 365 Security Assessment up to 6 weeks
ACTS
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
ACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
3 out of 60
Advania: Intune Get Started: 2 d training and PoC
Advania AB
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Understand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
4 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
5 out of 60
OENG - Next Generation Endpoints-1 Month Proof of Concept
Secure Nextgen Systems
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Learn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
6 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
7 out of 60
Red Canary Defend Against Threats Siem Plus XDR Workshop
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
8 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
9 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
10 out of 60
Endpoint Management with Security - 4 days - FREE Workshop
OPEN BPO
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
This workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
11 out of 60
Accelerate Windows 365: 1-mo Proof of Concept
AMTRA Solutions Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Accelerate Windows 365 offers innovative management capabilities for your environment and optimizes your existing investment in cloud solutions.
12 out of 60
Defender for Endpoint Professional Security Services | Customized Deployment in as Little as 6-Weeks
Difenda
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize your Microsoft Security investment with our Defender for Endpoint Design & Implementation.
13 out of 60
Endpoint Management Solutions: 4-Wk Implementation
Signal Alliance
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Discover how Signal Alliance Consulting enables users in your organization to be productive, on any device, without compromising IT security by leveraging Microsoft Endpoint Management.
14 out of 60
Windows 365 Cloud PC: 4-Wk Proof of Concept
Signal Alliance
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Discover how Signal Alliance Consulting helps you get started with Windows 365, the worlds first cloud PC that helps you access your data from anywhere, anytime from any device.
15 out of 60
Windows 365 Assessment - 1 day
CC Bilgi Teknolojileri
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Hybrid Windows for a hybrid world Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
16 out of 60
G Suite to M365 Migration: 1-Day Proof of concept
true org cloud
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Proof of concept for migration from G Suite to Microsoft 365
17 out of 60
Securing Identities Workshop: 4-Wk Workshop
ProArch Technologies, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
18 out of 60
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
19 out of 60
Active Directory Security on Demand
Comtrade System Integration
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
20 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week Implementation
Options Technology Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
21 out of 60
Microsoft 365 Security Assessment: 2 Week Assessment
Kontex Security Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
22 out of 60
Microsoft 365: 2-Week Assessment
Practical Solutions, Inc
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
23 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
24 out of 60
Zero Trust Security: 3-day Workshop
Oxford Computer Group LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
25 out of 60
Secure Hybrid Identity - Defender for Identity: 6 week Implementation
Performanta
+2
Applicable to:
Identity & Access Management
Threat Protection
Secure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
26 out of 60
Azure AD Implentation in 8 weeks
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Identity & Access Management
Porovide a design and build capability that enables organisations to secure, control and simplify employee access to company data and sensitive resources resources from wherever they are.
27 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
28 out of 60
Microsoft 365 Plan for Success:3-d Assessment
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
29 out of 60
Entra Permission Risk Assessment
adaQuest
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your Multi-Cloud Environment with Microsoft Entra by automating the remediation of Permissions. Get a comprehensive visibility into permissions assigned to all identities on your organization.
30 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
31 out of 60
Office 365 Migration from Exchange: 15-Day Implementation
ProServeIT
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
Migrate on-premise Microsoft Exchange email infrastructure to Office 365 in Microsoft's cloud infrastructure
32 out of 60
Windows as a Service: 4-Wk Implementation
AMTRA Solutions Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Secure your data and devices, identities and your business with Windows 10/11.
33 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementation
Cloudshift
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
34 out of 60
Conditional Access Penetration Test: 4 Days Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
35 out of 60
Protect & Govern Sensitive Data: 3-Day Workshop
Netrix Global
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
A 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
36 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
37 out of 60
OAAA Advanced Adversary Assesment-1 month assesment
Secure Nextgen Systems
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Learn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
38 out of 60
Digital Security:1 Months Assessment
Atos International SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital Security, expertise : Cyber Sécurité Services, Systèmes critiques, IAM, Cloud Security, 6000 personnes dédiées
39 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Microsoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
40 out of 60
Ctelecoms Microsoft 365 Digital Workforce Workshop
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Frontline Workers
Identity & Access Management
Teamwork Deployment
Productivity and teamwork are fundamental to build resilience for your people, teams, and organization with Microsoft 365.
41 out of 60
Microsoft 365 Cybersecurity Jumpstart: 1Wk Implementation
BDO Canada
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ensure the right safeguards are in place. Secure your Microsoft 365 tenant through BDO Lixar’s security configuration services and the cloud provisioning expertise
42 out of 60
Enable Windows 365 Cloud PC
Cofomo
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
With the right endpoint modernization strategy and tools, employees get a secure experience on every mobile device, tablet, or laptop they’re using, all while eliminating major management headaches.
43 out of 60
HPT_Microsoft Cyber Security Assessment_2 week
HPT Vietnam Corporation
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Strengthen your firm's defenses with our all-in-one cybersecurity platform
44 out of 60
HPT Secure Identities and Access_03 days workshop
HPT Vietnam Corporation
+2
Applicable to:
Identity & Access Management
Mobile Device Management
With identity attacks on the rise, this workshop will show you how to stop tomorrow’s data breaches by securing identities today.
45 out of 60
1ID Platform for EDU
Telelink Business Services EAD
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
46 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage Workshop
CGI Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
47 out of 60
Protect and Govern Healthcare Data Workshop - 3 Day Workshop
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft-Funded Workshop to discuss and understand the hidden privacy and regulatory risks of healthcare data and how to mitigate with actionable next steps
48 out of 60
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
49 out of 60
Microsoft 365 Security: 2-week assessment
Mirai Security Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
50 out of 60
Identity and Access Management Quick Start
Softchoice
+1
Applicable to:
Identity & Access Management
Prioritizing security services to combat identity breaches by prioritizing security services, and protecting against mismanaged privileges, and access-related data breaches.
51 out of 60
Microsoft Entra Verified ID and Credivera: 3-day Planning Workshop
Oxford Computer Group LLC
+1
Applicable to:
Identity & Access Management
This Planning Workshop is designed to help you get started with a verifiable credentials solution using Credivera and Microsoft Entra Verified ID.
52 out of 60
Office 365 Security & Protection: 2-Week Implementation
IT Weapons
+2
Applicable to:
Identity & Access Management
Threat Protection
IT Weapons can protect your Office 365 tenant against cyber threats by reviewing the tenant and making key changes within it. We also include an ongoing managed service to keep your tenant secure.
53 out of 60
Defender for Identity Professional Security Services | Customized Deployment in as Little As 6-Weeks
Difenda
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure Azure Active Directory with Difenda, the 2023 Microsoft Security Impact Award Winner.
54 out of 60
Microsoft 365 Copilot Readiness: 2 week Assessment
TOKIOTA
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
We help our clients to integrate Microsoft 365 Copilot in their organization in the most secure and efficent way
55 out of 60
Hiram Machado
adaQuest
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Protect, Simplify, Power better experience with Windows 11, Windows 365 and Intune. Unlock hybrid work scenarios!
56 out of 60
Microsoft 365 Defender Rapid Deployment - Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
57 out of 60
Security - Managed Defender - One-Pager - Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
58 out of 60
Microsoft Intune Endpoint Mgmt Level Up: 1-Mo Implementation
ProServeIT
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Enable organization-wide management & security for your endpoints (mobile devices, workstations, etc.) with a Microsoft Intune Endpoint Management implementation.
59 out of 60
Microsoft Intune Endpoint Mgmt Managed Serv: 12-Mo Install
ProServeIT
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Continuously improve your organization-wide management and security for endpoints such as mobile devices, workstations & more with our Endpoint Management Managed Services engagement.
60 out of 60
Föregående
1
2
3
4
Nästa