AppSource
Ge feedback
Hjälp och support
Sparade objekt
Privata abonnemang
Vänta ett ögonblick medan du loggas in...
Alla
Appar
Kategorier
Branscher
Konsulttjänster
Partner
Filter
Rensa alla
Din plats
Produkter (1)
Branscher
Typ av tjänst
Konsulttjänster resultat
Visar resultat i konsulttjänster
Visa
relaterade resultat i branschmoln
.
Alla resultat
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
1 out of 60
Intranet & Data Optimization for SharePoint: 1 Day Assessment
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Assessment rivolto alle aziende che vogliono ottimizzare i processi interni con l'uso di SharePoint e Microsoft 365
2 out of 60
Intranet & Data Migration SharePoint: 3 Days Implementation
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Implementazione di SharePoint come intranet aziendale e migrazione dei dati online su Microsoft 365
3 out of 60
SharePoint Intranet: 2 Hours Briefing
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Briefing di presentazione della soluzione SharePoint e prima analisi delle esigenze e conoscenze di Microsoft 365
4 out of 60
Intranet & Data Optimization: 4 Hours Workshop
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Workshop di introduzione pratica alle potenzialità della soluzione SharePoint di Microsoft 365
5 out of 60
Intranet & Data Optimization: 1 Day Proof of Concept
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Proof of Concept (POC) per provare in modo pratico la soluzione SharePoint nella propria infrastruttura
6 out of 60
Modern Secure Workplace: 10-days Implementation
Abtis-GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
One-Stop-Offering: 24/7/365 Managed Security Service für den Mittelstand mit M365 Defender und Microsoft Sentinel. Zero Trust, Security Monitoring, SIEM/SOC, XDR, Threat Detection, Incident Response.
7 out of 60
ADVIA Service Implementierung & Migration
ADVIA GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Die Cloud ist das Ziel, der Weg ist klar, doch was ist mit Ihren Daten?
8 out of 60
Defender for Endpoint: 5-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
9 out of 60
Windows Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
10 out of 60
cyber security threat analysis workshop
U-BTech Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
the workshop is design to discover threats and risks
11 out of 60
Quick Security Assessment für die Microsoft Cloud: 2 Wochen
IT-Improvement Deutschland GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Standortbestimmung im Security Bereich der Microsoft Cloud Umgebung und Entwicklung von Handlungsempfehlungen.
12 out of 60
Envisioning Workshop Firstline Workers: 1-Day Workshop
PwC GmbH WPG (Germany)
+3
Applicable to:
Adoption & Change Management
Frontline Workers
Identity & Access Management
PwC’s one-day Envisioning Workshop helps you to start your firstline workers digital enablement journey
13 out of 60
1ID Platform for EDU
Telelink Business Services EAD
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
14 out of 60
Secure identities and access - 4 day workshop
aConTech GmbH
+1
Applicable to:
Identity & Access Management
Get an overview of identity and access management with Microsoft 365 and create a personalized plan to improve and maintain security posture with aConTech, German's leading Microsoft Cloud Partner.
15 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage Workshop
CGI Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
16 out of 60
Adoption as a Service: 12 months Microsoft 365 support
SNOMANN, UAB
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Benefit from long-term collaboration. We'll act as a trusted advisor on your Microsoft 365 infrastructure consulting, recommending, solving issues, supporting and developing.
17 out of 60
10-WK Sustainability-Net-Zero-IT
PHAT CONSULTING GmbH
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
NET ZERO IT - den Fußabdruck der IT reduzieren
18 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
19 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY24
CGI Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
20 out of 60
IBM Digital Workforce Offering
IBM Consulting - EA
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Power Platform for Teams
IBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
21 out of 60
End-to-End Modern Workplace Security
PwC GmbH WPG (Germany)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Get up to speed the safe way with PwC's Modern Workplace Security implementation approach covering state-of-the-art security, compliance and collaboration technology in a Zero Trust environment.
22 out of 60
Next Gen Endpoint Accelerator 3wk Workshop
Trans4mation IT GmbH
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Help customers to understand the benefit working with cloud endpoints
23 out of 60
Magenta Security for Microsoft:3 months Implementation
Telekom Deutschland GmbH Main Account
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Magenta Security für Microsoft bietet das Management sowie die Integration in und kontinuierliche Analyse Ihrer Microsoft Security durch das SOC der Deutschen Telekom Security
24 out of 60
Managed Services: M(x)DR for Microsoft 365 Defender
Cegeka NV
+2
Applicable to:
Identity & Access Management
Threat Protection
Introducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
25 out of 60
Copilot für Microsoft 365 Technical Delivery (ab 5 Tagen)
CANCOM GmbH
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Workplace Analytics
Nahtlose Integration und technische Umsetzung von Copilot für Microsoft 365 in Ihre IT-Umgebung
26 out of 60
Net at Work Security Assessment für Microsoft 365
Net at Work GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Mit dem Microsoft 365 Security Assessment ermitteln wir den Security Reifegrades Ihres Unternehmens und geben Ihnen Maßnahmen zur Verbesserung an die Hand.
27 out of 60
base-IT Pentesting
BaseIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Mit base-IT Pentesting stärken wir Ihre IT-Sicherheit und decken Schwachstellen auf. Durch die Integration von Microsoft 365 (Cloud Security, etc.) entsteht eine umfassende Sicherheitsarchitektur.
28 out of 60
Microsoft Copilot for Security: 2 x 3h Workshop
Skaylink GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Unlocking Security Excellence with Microsoft Copilot for Security - 2 x 3h Workshop
29 out of 60
Gestion Unifiée des Terminaux : 2 semaines de Proof of Concept
Econocom Products & Solutions Belux
+2
Applicable to:
Identity & Access Management
Mobile Device Management
Audit fonctionnel et technique de l'environnement de gestions des terminaux (desktop, laptop et mobile).
30 out of 60
Copilot Discovery Workshop für Microsoft 365
aConTech GmbH
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Identifiziert Eure individuellen Ziele, Herausforderungen sowie Eure Roadmap für die Einführung von Copilot. Wir begleiten Euch ganzheitlich vom sanften Einstieg bis hin zur sicheren Implementierung.
31 out of 60
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
32 out of 60
Microsoft Cloud application security Assessment - 2 weeks
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
33 out of 60
Manage Corporate Data on Devices with Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Can you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
34 out of 60
Microsoft Cloud Apps Security Solutions for Custom Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Know your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
35 out of 60
Data Access Control with MCAS
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
36 out of 60
Microsoft Cloud Application for 3rd Party Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
37 out of 60
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
38 out of 60
Microsoft Cloud Apps Security for Microsoft 365 Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
39 out of 60
Shadow IT discovery with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
40 out of 60
Threat Detection with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
41 out of 60
Microsoft 365 Defender for Endpoint Vulnerability Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
42 out of 60
Security and Operations with Expert Microsoft 365 Support
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Maximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
43 out of 60
Security Assessment
2source4 B.V.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Volledig Microsoft 365 Security Assessment waarbij pijnpunten in de beveiliging worden blootgelegd en adviezen worden opgesteld om pijnpunten af te dekken.
44 out of 60
Rackspace Security & Compliance 10-hr Assessment
Rackspace EMEA
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Rackspace helps you to identify potential risks in your current Microsoft 365 environment. Recommendations and improvement measures will be provided after the assessment.
45 out of 60
Intune for Windows: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
46 out of 60
MDM Health Check (Mobile OS Only): 2-week Assessment
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
47 out of 60
BYOD 365: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
The BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
48 out of 60
Zero Touch Provisioning: 3-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Zero-Touch Provisioning sets you up to ship devices straight to users, with auto-configuration occurring over the air on initial sign in.
49 out of 60
Advania: Intune Get Started: 2 d training and PoC
Advania AB
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Understand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
50 out of 60
Hybrid Identity Workshop: 1-day
novaCapta GmbH
+1
Applicable to:
Identity & Access Management
Der Hybrid Identity Workshop hilft Ihnen, eine Strategie für Identity und Access für die Zukunft einzuführen und die Microsoft 365 Suite zu nutzen. Wir unterstützen Sie bei der Umsetzung.
51 out of 60
G Suite to M365 Migration: 1-Day Proof of concept
true org cloud
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Proof of concept for migration from G Suite to Microsoft 365
52 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
53 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
54 out of 60
Microsoft Intune: 4-Wk Implementation Services
TechNet UC LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Microsoft Intune Design and Deployment Services
55 out of 60
Microsoft 365 Security Assessment:1-Day, Workshop
All for One Group SE
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Stellen Sie die richtigen Stellschrauben um die Systemsicherheit Ihrer Office 365 / Microsoft 365 Umgebung zu erhöhen. Microsoft 365 Security Assessment via Secure-Score (eintägiger Workshop)
56 out of 60
Micorsoft 365 Security Workshop: 1-Day, Workshop
All for One Group SE
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Sie erhalten technische Einblicke zur Erhöhung der Sicherheit in Microsoft 365: von der Identitätsverwaltung und dem Authentifizierungsprozess bis hin zum Schutz der individuellen Information.
57 out of 60
Microsoft 365: 2-Week Assessment
Practical Solutions, Inc
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
58 out of 60
IT Security Assessment: 1 Day, Assessment
All for One Group SE
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Mit der IT-Sicherheitsanalyse alles zum gegenwärtigen Zustand erfahren, ihn bewerten, konkrete Handlungsfelder aufzeigen und geeignete Maßnahmen für mehr Sicherheit finden.
59 out of 60
Modern Workplace Security 10-Wk Implementation
Wipro Ltd
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
60 out of 60
Föregående
1
2
3
4
5
Nästa