AppSource
Залишити відгук
Довідка та підтримка
Збережені елементи
Приватні плани
Зачекайте, виконується вхід…
Усі
Програми
Категорії
Галузі
Консультаційні послуги
Партнери
Фільтри
Очистити все
Ваше розташування
Продукти (1)
Галузі
Тип послуги
Результати: Консультаційні послуги
У консультаційні послуги відображається така кількість результатів: .
Переглянути
Така кількість пов’язаних результатів в галузеві хмари:
.
Усі результати
Modern EndPoint Management - Jumpstart: 1-Wk Proof of Concept
Logicalis, Inc.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune Jumpstart will help showcase the value of Microsoft Intune, to show you how to more effectively manage endpoints within Intune. Proof of Concept deployment included!
1 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
2 out of 60
Microsoft 365 Licence Health Check: 1-Day Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
3 out of 60
Cloud Security Assessment - 2 Week Assessment and Roadmap
CloudServus
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Gain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
4 out of 60
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
5 out of 60
Sensitive Data Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Sensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
6 out of 60
MicroAge ManageWise Microsoft 365 Assessment & Services
MicroAge
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Comprehensive assessment of our clients Microsoft 365 tenant providing an Executive summary detailed report to reduce vulnerabilities improving Secure Score with 40 hours of Engineer time
7 out of 60
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
8 out of 60
Zero Trust Launchpad: 3-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
9 out of 60
Microsoft Purview Records Management Assessment & Strategy - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
10 out of 60
Modern EndPoint: 3 Day Workshop
Insentra Pty Ltd
+2
Applicable to:
Identity & Access Management
Mobile Device Management
An executive deep dive into remote deployment, management, and the security of corporate and BYOD devices in your organization
11 out of 60
Zero Trust Security: 3-day Workshop
Oxford Computer Group LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
12 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
13 out of 60
Microsoft 365 Digital Workforce: 2-Day Workshop
CompuNet
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Two-day engagement to envision agile work scenarios and how to enable people to be productive and secure from anywhere with Microsoft 365
14 out of 60
Infra & Network Monitoring with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Boost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
15 out of 60
Integrating Microsoft Sentinel with External EDR Service
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
16 out of 60
Device Monitoring with Microsoft Defender for Endpoint
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
17 out of 60
Device Security Management with Microsoft Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Seamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
18 out of 60
Device Domain Migration from On-Premises to Cloud
AVA SOFTWARE INC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Seamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
19 out of 60
Modernize Endpoints Consulting Offer: 3 Days Implementation
Adaptive Business Communications Ltd t/a CloudAssist
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
With Hybrid work becoming prevalent and increasing threat trends, organizations need to proactively secure & modernize management of their endpoints across mobile, PCs and including virtual endpoints.
20 out of 60
Microsoft Endpoint Manager Baseline
SHI International Corp
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Explore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
21 out of 60
Microsoft 365 FastTrack: 1-Day Briefing
Egroup, Inc.
+3
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device Management
Microsoft's FastTrack benefit provides guidance to help you to deploy Microsoft 365 Cloud Solutions at no additional cost.
22 out of 60
ADFS to Microsoft Entra ID Migration: 4-Wk Implementation
Performanta
+1
Applicable to:
Identity & Access Management
Undertake a seamless ADFS to Microsoft Entra ID app migration, improving security, offering up new features, and getting your organisation back on track.
23 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and Planning
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Shorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
24 out of 60
Microsoft 365 Security Program - 10 Weeks
Trace3
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
25 out of 60
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
26 out of 60
Microsoft Endpoint Manager: 8-Hours Workshop
Onex Group
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Learn how to secure Windows 11 environments with Microsoft Endpoint Manager
27 out of 60
Endpoint Management Solutions: 4-Wk Implementation
Signal Alliance
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Discover how Signal Alliance Consulting enables users in your organization to be productive, on any device, without compromising IT security by leveraging Microsoft Endpoint Management.
28 out of 60
Implementation of Microsoft Identity Security
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW's Implementation of Microsoft Identity Security service helps customers strengthen their security posture, reduce the risk of data breaches and improve compliance with industry regulations.
29 out of 60
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
30 out of 60
Merge and Acquisitions-Discovery, Planning Assessment
New Era Technology
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
M&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
31 out of 60
Sogeti SmartWorkspace: 4 Week Implementation
Capgemini Group
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Sogeti provides a one-stop shop set of offerings around the SharePoint solutions. Our offer comprises consultancy, discovery of the existing landscape, Solution Architecture, SharePoint migration etc.
32 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week Implementation
Options Technology Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
33 out of 60
Microsoft Defender for Endpoint Implementation
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
34 out of 60
Microsoft 365 Security Assessment: 2 Week Assessment
Kontex Security Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
35 out of 60
Microsoft Entra Verified ID and Credivera: 3-day Planning Workshop
Oxford Computer Group LLC
+1
Applicable to:
Identity & Access Management
This Planning Workshop is designed to help you get started with a verifiable credentials solution using Credivera and Microsoft Entra Verified ID.
36 out of 60
Managed Detection and Response [Threat Hunting]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Inspect events in your network to locate threat indicators and entities
37 out of 60
Active Directory Security on Demand
Comtrade System Integration
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
38 out of 60
Microsoft 365 Security Health Check Assessment 3-Wk
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
39 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC Compliance
Agile IT
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Agile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
40 out of 60
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
41 out of 60
Ongoing Managed Services for Microsoft 365 Administration
Finchloom
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Teamwork Deployment
Standardized management of your Microsoft 365 Tenant. Free up internal resources from regular administration tasks, firefighting issues, and escalating to Microsoft Support.
42 out of 60
Security Baseline Integrity Manager
Aegis Innovators
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Single pane of glass for unified configuration, governance, and lifecycle management of security workloads across Microsoft 365.
43 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
44 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, Implementation
Reply
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Valorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
45 out of 60
Microsoft 365 Passwordless Authentication: 3-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Unlock a new era of robust authentication with Microsoft's Passwordless Authentication solutions.
46 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk Assessment
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
47 out of 60
Cybersecurity Assessment
PSM Partners
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
This assessment is designed to help you understand the importance of security and how to protect your organization from potential threats.
48 out of 60
Microsoft 365 Inter-Tenant Migration: 2 days Assessment
Preeminent Solutions, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Preeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
49 out of 60
Windows 365 Jumpstart: 3 Week Implementation
Steeves
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
We'll discuss the value of Windows 365 and its key functionalities, followed by a workshop to expose key areas and document decisions that drive implementation to ensure a successful adoption.
50 out of 60
Email Security Threat Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
51 out of 60
Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
52 out of 60
Microsoft 365 Email Threat Protection Assessment
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
53 out of 60
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
54 out of 60
Managed Detection and Response [Security Monitoring]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
55 out of 60
Windows 365 Accelerator: 4 Week Implementation
KiZAN Technologies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
During this 4-week engagement, KiZAN will assist with the design and implementation of Windows 365, including education, planning, documentation, and pilot for up to 50 users.
56 out of 60
Quadra Entra Permissions Management
Quadrasystems.net (India) P Ltd
+1
Applicable to:
Identity & Access Management
Understand how permissions creep can impact the attack surface risk in your cloud infrastructure Understand how to manage user and identity risk
57 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
58 out of 60
HPT Secure Identities and Access_03 days workshop
HPT Vietnam Corporation
+2
Applicable to:
Identity & Access Management
Mobile Device Management
With identity attacks on the rise, this workshop will show you how to stop tomorrow’s data breaches by securing identities today.
59 out of 60
Wc-PC- Wragby Cloud PC
Wragby Business Solutions & Technologies Limited
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
60 out of 60
Назад
1
2
3
4
5
Далі