AppSource
Ge feedback
Hjälp och support
Sparade objekt
Privata abonnemang
Vänta ett ögonblick medan du loggas in...
Alla
Appar
Kategorier
Branscher
Konsulttjänster
Partner
Filter
Rensa alla
Din plats
Produkter (1)
Branscher
Typ av tjänst
Konsulttjänster resultat
Visar resultat i konsulttjänster
Visa
relaterade resultat i branschmoln
.
Alla resultat
Securing Identities Workshop: 4-Wk Workshop
ProArch Technologies, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
1 out of 60
Hybrid Cloud Security Workshop - 1-Day
Zones, LLC
+1
Applicable to:
Cloud Security
Identify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
2 out of 60
Adopción de Copilot chat Enterprise - Bing Chat Enterprise: 3-Wk
ENCAMINA S.L.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Adopta Copilot Chat Enterptise para multiplicar la productividad de tus empleados protegiendo los datos en tu empresa
3 out of 60
Cloud-to-Cloud Backup: 1 Day Implementation
BDO Canada
+1
Applicable to:
Cloud Security
Get scalable backup and recovery implemented for all your Microsoft Office 365 data.
4 out of 60
MDM Health Check (All OS): 2-week Assessment
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
5 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeks
Plain Concepts
+2
Applicable to:
Cloud Security
Information Protection & Governance
The objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
6 out of 60
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
7 out of 60
Egyptian Data Protection Law: 2 Days Workshop
GLOBAL BRANDS
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
8 out of 60
Microsoft 365 Consulting Services: 10-Week Implementation
Ricoh
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Deployment of Microsoft 365 as a cloud-based solution and the world’s leading productivity platform. Your workforce can access the necessary tools and information whenever and wherever they want.
9 out of 60
Digital Security:1 Months Assessment
Atos International SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital Security, expertise : Cyber Sécurité Services, Systèmes critiques, IAM, Cloud Security, 6000 personnes dédiées
10 out of 60
Ctelecoms Defend Against Threats with SIEM Plus XDR Workshop
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Defend Against Threats with SIEM Plus XDR Workshop Learn how to put next-generation Microsoft security tools to work for you.
11 out of 60
Ctelecoms Protect and Govern Sensitive Data Workshop
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Protect & Govern Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
12 out of 60
Ctelecoms Mitigate Compliance and Privacy Risks Workshop
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
The Mitigate Compliance & Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organization.
13 out of 60
Microsoft 365 Cybersecurity Jumpstart: 1Wk Implementation
BDO Canada
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ensure the right safeguards are in place. Secure your Microsoft 365 tenant through BDO Lixar’s security configuration services and the cloud provisioning expertise
14 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
15 out of 60
Defender for IoT Operational Technology: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
16 out of 60
Imagine workshop for Security: 3days
Softlanding Solutions Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
MCI Build Intent Workshops demonstrate value, build customer intent, and maximize opportunities for Modern Work and Security for Microsft365
17 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage Workshop
CGI Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
18 out of 60
Active Assure Attack Assessment - 3 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Breach and Attack Simulations — We Attack to Defend You
19 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
20 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY24
CGI Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
21 out of 60
Microsoft 365 Security: 2-week assessment
Mirai Security Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
22 out of 60
OneSec Defender for Endpoint – Migration offer
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
The OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
23 out of 60
Threat Protection - 2 Days Workshop
Mayasoft Bilgi Sistemleri A.S.
+2
Applicable to:
Cloud Security
Threat Protection
We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
24 out of 60
Defender Pilot
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
The Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
25 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
26 out of 60
Windows 365: 4 Week Readiness Assessment
Netrix Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Get an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
27 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process Adoption
Vitalyst
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
28 out of 60
Viva Insights Workshop
CDW
+3
Applicable to:
Cloud Security
Microsoft 365 Live Events
Teams Custom Solutions
The Enablement Workshop for Microsoft Viva from CDW focuses on finding your organization’s pain points, and it identifies how the Viva platform can help
29 out of 60
Microsoft 365 Defender Rapid Deployment - Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
30 out of 60
Security - Managed Defender - One-Pager - Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
31 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
32 out of 60
Deploying Purview Data Security - Labels and DLP
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
A dependable approach to deployment of Data Security workloads led by governance and following our standard framework for Microsoft 365 customers
33 out of 60
Cyderes Managed Security Services for Microsoft Sentinel
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
34 out of 60
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
35 out of 60
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
36 out of 60
Copilot for Microsoft 365 Data and Security Readiness Assessment
Awara IT Kazakhstan LLP
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Elevate Your Data and Security with Copilot for Microsoft 365 Readiness Assessment by Awara IT's experts.
37 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
38 out of 60
Microsoft 365 Incident Response - 5 Week Assessment
Protiviti
+2
Applicable to:
Cloud Security
Threat Protection
Assessing the advanced security capabilities of Microsoft 365
39 out of 60
Microsoft 365 OnDemand - 2 Week Implementation
Protiviti
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Microsoft 365 On Demand Support - providing you with dedicated experts to support and maintain your Microsoft 365 environment
40 out of 60
Endpoint Management Workshop
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Cloud Accelerator Workshop will demonstrate how Microsoft Endpoint Manager can help your organization protect endpoint devices, secure user identities, and increase user productivity.
41 out of 60
Compliance Workshop: Data Risk Management
Avaleris
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
A structured approach to discover risks related to organizational data and mapping these risks to solutions that will help manage and protect data and mitigate the associated risks
42 out of 60
Secure Work from Anywhere Workshop
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Teamwork & collaboration are needed to build resilience for your people, teams, & organization. Empower people to be productive & secure as they adapt to new ways of working with Microsoft365
43 out of 60
Hybrid Identity and Security Expert Consulting Imp
Ravenswood Technology Group, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ravenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
44 out of 60
EM+S Consulting Services: 4-Weeks Implementation
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
We will help you deploy Microsoft EMS to help protect and secure your organization while keeping your employees productiveand with the freedom to work from anywhere.
45 out of 60
Microsoft 365 Security Assessment up to 6 weeks
ACTS
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
ACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
46 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
47 out of 60
QC Education- Threat Protection - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #14 and provide high-level recommendations to achieve compliance.
48 out of 60
QC Education- Identity Management- 2Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #4 and provide high-level recommendations to achieve compliance.
49 out of 60
Quebec Education - DLP - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #5 and #6 and provide high-level recommendations to achieve compliance.
50 out of 60
Mobile Device Management - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #1, #2 and #3 and provide high-level recommendations to achieve compliance.
51 out of 60
QC Education Security Directives -1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This one day GAP Analysis will help you assess your current state of compliance for Quebec Ministry of Education Security Directives and provide high-level recommendations to address any shortcomings.
52 out of 60
Hybrid Return to Work Enablement: 4 Wk-Assessment
Insight Canada Inc
+3
Applicable to:
Cloud Security
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
This offer helps enable your hybrid return to work strategy and ensure your organization is ready for this transition.
53 out of 60
Secure Workspace: 1 Day Workshop
Watserv Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
54 out of 60
Enterprise Mobility - 1 Day Briefing
Avaleris
+2
Applicable to:
Cloud Security
Mobile Device Management
Avaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Enterprise Mobility policies, procedures and technology against best practices.
55 out of 60
Threat Protection - 1 Day Briefing
Avaleris
+2
Applicable to:
Cloud Security
Threat Protection
Avaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Threat Protection policies, procedures and technology against best practices.
56 out of 60
Enterprise Identity and Governance -1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Avaleris developed a Capability Maturity Model to help organizations quickly assess the current state of Identity Management and Governance policies, procedures and technology against best practice.
57 out of 60
Information Protection - 1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Avaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Information Protection policies, procedures and technology against best practices.
58 out of 60
Sauvegarde Microsoft 365 : 2Wk - implementation
Projetlys
+2
Applicable to:
Cloud Security
Information Protection & Governance
Ensemble de service permettant de mettre en place facilement une solution de backup Veeam pour Microsoft 365 ?
59 out of 60
Adoptez Microsoft Edge : 2-Wk Implementation
Projetlys
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Notre approche pour la mise en place et l'adoption de Microsoft Edge.
60 out of 60
Föregående
1
2
3
4
5
Nästa