AppSource
Ge feedback
Hjälp och support
Sparade objekt
Privata abonnemang
Vänta ett ögonblick medan du loggas in...
Alla
Appar
Kategorier
Branscher
Konsulttjänster
Partner
Filter
Rensa alla
Din plats
Produkter (1)
Branscher
Typ av tjänst
Konsulttjänster resultat
Visar resultat i konsulttjänster
Visa
relaterade resultat i branschmoln
.
Alla resultat
Security Maturity Assessment: 4 Wks
Lixar IT
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Let BDO help you design your roadmap to increase your security score with cost-effective security tools with our 4 week Security Maturity Assessment
1 out of 23
BDO eDiscovery: 4 Wk Assessment
Lixar IT
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Centralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
2 out of 23
Insider Risk Management Assessment: 4 Wks
Lixar IT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
BDO's Insider Risk Management Assessment can help you identify insider data risks and establish a plan to reduce data leakage using Microsoft 365 to ensure compliance and security.
3 out of 23
Defender for Office 365: 3-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
4 out of 23
Microsoft 365 Digital Workforce Workshop
VNEXT Group
+3
Applicable to:
Cloud Security
Knowledge & Insights
Teams Custom Solutions
Learn how to empower people to be more productive and secure as they adapt to new ways of working with Microsoft 365.
5 out of 23
Endpoint Management: 5-Days Workshop
VNEXT Group
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Learn how to manage users’ devices, apps, and identities from anywhere.
6 out of 23
Discover Sensitive Data Workshop: 4-Wk Workshop
ProArch Technologies, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
ProArch’s Discover Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data
7 out of 23
Defend Against Threats with SIEM Plus XDR: 8H Workshop
adaQuest
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
8 out of 23
Microsoft 365 HIPAA/HITECH 20 Hour Implementation
New Charter Technologies, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Implementation of Microsoft 365 to include compliance policies and templates for health care.
9 out of 23
Modern Frontline Work Acceleration 2 days Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
LiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
10 out of 23
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
11 out of 23
Zero-trust collaboration security 6wk Implement
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
12 out of 23
Zero-Trust Secure Email 6wk Imp
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
13 out of 23
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
14 out of 23
microsoft365_security_identity_protection_1 Day_Workshop_Canada
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Identity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to manage your access quickly and accurately
15 out of 23
Microsoft 365 Security Device Protection 1 Day Workshop - Canada
CDW
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
As more and more users become mobile and are using a wider variety of devices, applications and documents need to keep up.
16 out of 23
Microsoft365_security_information_protection_1Day_Workshop_Canada
CDW
+2
Applicable to:
Cloud Security
Threat Protection
Information is one of your most valuable assets and can easily be shared, even outside the organization.
17 out of 23
Licensing Microsoft 365: 1-day Assessment
Informatika a.d.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
18 out of 23
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POC
Bitscape
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
19 out of 23
Microsoft Cloud App Security: 2 Week Implementation
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Cloud Security
Keep your employees productive and secure on their favorite apps and devices with Cloud App Security. Bring the security of your on-premises systems to your cloud applications.
20 out of 23
Microsoft Defender for Endpoint: 2-Wks Proof of Concept
Lotus Beta Analytics Nigeria Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Experience Threat identification, Triage and Automatic Remediation
21 out of 23
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 Wk
Lighthouse Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
This hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
22 out of 23
Assessment-Implementation Plan for Information Protection: 3-Months Assesment
Cipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
23 out of 23
Föregående
1
2
3
4
5