AppSource
Ge feedback
Hjälp och support
Sparade objekt
Privata abonnemang
Vänta ett ögonblick medan du loggas in...
Alla
Appar
Kategorier
Branscher
Konsulttjänster
Partner
Filter
Rensa alla
Din plats
Produkter (1)
Branscher
Typ av tjänst
Konsulttjänster resultat
Visar resultat i konsulttjänster
Visa
relaterade resultat i branschmoln
.
Alla resultat
Microsoft Purview Records Management Assessment & Strategy for Financial Services - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists Financial Services organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
1 out of 59
Microsoft 365 Defender Rapid Deployment - Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
2 out of 59
Security - Managed Defender - One-Pager - Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
3 out of 59
Microsoft Entra in 30: 6-wk Implementation
Long View Systems
+1
Applicable to:
Identity & Access Management
Long View’s Entra in 30 offers a unified identity, access security, and data governance solution to help minimize these cybersecurity risks in 30 days.
4 out of 59
Microsoft Intune Endpoint Mgmt Managed Serv: 12-Mo Install
ProServeIT
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Continuously improve your organization-wide management and security for endpoints such as mobile devices, workstations & more with our Endpoint Management Managed Services engagement.
5 out of 59
Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
6 out of 59
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
7 out of 59
Sensitive Data Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Sensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
8 out of 59
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
9 out of 59
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
10 out of 59
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
11 out of 59
Device Security Management with Microsoft Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Seamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
12 out of 59
Infra & Network Monitoring with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Boost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
13 out of 59
Integrating Microsoft Sentinel with External EDR Service
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
14 out of 59
Device Monitoring with Microsoft Defender for Endpoint
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
15 out of 59
Device Domain Migration from On-Premises to Cloud
AVA SOFTWARE INC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Seamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
16 out of 59
Office 365: Setup, Demo Train: 3-Hr Implementation
true org cloud
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Gain a competitive edge and be more productive with a higher growth in your business with the help of True.org Cloud’s Microsoft 365 Business implementation.
17 out of 59
Microsoft 365: 2-Week Assessment
Practical Solutions, Inc
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
18 out of 59
Secure Work from Anywhere Workshop
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Teamwork & collaboration are needed to build resilience for your people, teams, & organization. Empower people to be productive & secure as they adapt to new ways of working with Microsoft365
19 out of 59
Hybrid Identity and Security Expert Consulting Imp
Ravenswood Technology Group, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ravenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
20 out of 59
Device Lifecycle Management: 1-Hour Assessment
WBM Technologies Inc.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
A Holistic Approach to Device Selection, Deployment, and Management
21 out of 59
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
22 out of 59
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
23 out of 59
QC Education- Threat Protection - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #14 and provide high-level recommendations to achieve compliance.
24 out of 59
QC Education- Identity Management- 2Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #4 and provide high-level recommendations to achieve compliance.
25 out of 59
Quebec Education - DLP - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #5 and #6 and provide high-level recommendations to achieve compliance.
26 out of 59
Mobile Device Management - 2 Day Assessment
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #1, #2 and #3 and provide high-level recommendations to achieve compliance.
27 out of 59
QC Education Security Directives -1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This one day GAP Analysis will help you assess your current state of compliance for Quebec Ministry of Education Security Directives and provide high-level recommendations to address any shortcomings.
28 out of 59
Secure Workspace: 1 Day Workshop
Watserv Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
29 out of 59
Secure Work from Anywhere Workshop: 1 day-Workshop
Insight Canada Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Discuss the most critical steps for remote work, and how we can rapidly deploy key scenarios. We’ll evaluate your options and leave you with a concrete deployment plan and next steps.
30 out of 59
Teams FastStart: 1-Wk Implementation
Insight Canada Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Teams FastStart is a Teams Enablement and Pilot that will enable your users to start collaborating and communicating using Microsoft's Teams platform.
31 out of 59
Enterprise Identity and Governance -1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Avaleris developed a Capability Maturity Model to help organizations quickly assess the current state of Identity Management and Governance policies, procedures and technology against best practice.
32 out of 59
Information Protection - 1 Day Briefing
Avaleris
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Avaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Information Protection policies, procedures and technology against best practices.
33 out of 59
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
34 out of 59
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
35 out of 59
Managed Services - Microsoft 365
ConvergeOne
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Fully utilize your Microsoft 365 Solution with all the Identity, Security, and Collaboration portions available to you
36 out of 59
Collab Now: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
Collab Now (Microsoft 365) supports worker productivity by delivering and managing a unified and integrated collaboration platform
37 out of 59
Rapid Zero Trust Deployment : 8-WK Implementation
Maureen Data Systems
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
The purpose and objectives of this engagement are to develop a Zero Trust Implementation Strategy
38 out of 59
Secure Remote Work: 3 Days Intro and Plan Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Engagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
39 out of 59
Security Maturity Assessment: 4 Wks
Lixar IT
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Let BDO help you design your roadmap to increase your security score with cost-effective security tools with our 4 week Security Maturity Assessment
40 out of 59
Endpoint Management: 5-Days Workshop
VNEXT Group
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Learn how to manage users’ devices, apps, and identities from anywhere.
41 out of 59
Securing Identities Workshop: 4-Wk Workshop
ProArch Technologies, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
42 out of 59
Identity & Access Management : 6 Wk Implementation
Happiest Minds Technologies Limited
+1
Applicable to:
Identity & Access Management
End to end Microsoft IAM Analysis & License Utilization, Plan- Deploy- Implement & Roll Out Microsoft IAM Suite, followed by ongoing managed services.
43 out of 59
Securing Identities: 3 Days Workshop
INOVASYS FOR SYSTEMS
+1
Applicable to:
Identity & Access Management
Microsoft funded Securing Identities is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
44 out of 59
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
45 out of 59
Zero-trust collaboration security 6wk Implement
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
46 out of 59
Zero-Trust Secure Email 6wk Imp
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
47 out of 59
Intune for Android: 2-wk Imp
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Android devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
48 out of 59
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
49 out of 59
microsoft365_security_identity_protection_1 Day_Workshop_Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Identity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to manage your access quickly and accurately
50 out of 59
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
51 out of 59
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POC
Bitscape
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
52 out of 59
Secure Hybrid Identity - Defender for Identity: 6 week Implementation
Performanta
+2
Applicable to:
Identity & Access Management
Threat Protection
Secure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
53 out of 59
Microsoft Defender for Endpoint: 2-Wks Proof of Concept
Lotus Beta Analytics Nigeria Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Experience Threat identification, Triage and Automatic Remediation
54 out of 59
Microsoft 365 E3 12-Months Implementation
Office Depot
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
Connected Workplace for All Users with Microsoft 365 E3 Bundle
55 out of 59
Assessment - Workplace Modernization & Optimization - 1-Month
Zones, LLC
+3
Applicable to:
Calling for Microsoft Teams
Compliance Advisory Services
Identity & Access Management
Analysis of current environment to highlight opportunities to reduce duplicative cost and modernize your workplace
56 out of 59
Endpoint Management and Windows Deployment: 2-days Implementation
CC Bilgi Teknolojileri
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
Microsoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises.
57 out of 59
Information Discovery Week: 1-Week Assesment
Cipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
One of the big problems that all organizations encounter is the classification of information and its discovery. From Cipher we offer a service, which performs this function for a short period.
58 out of 59
Assessment-Implementation Plan for Information Protection: 3-Months Assesment
Cipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
59 out of 59
Föregående
1
2
3
4