AppSource
Cung cấp phản hồi
Trợ giúp + hỗ trợ
Mục đã lưu
Gói riêng tư
Xin chờ một chút, đang đăng nhập cho bạn...
Tất cả
Ứng dụng
Thể loại
Ngành
Dịch vụ tư vấn
Đối tác
Bộ lọc
Xóa tất cả
Vị trí của bạn
Sản phẩm (1)
Ngành
Loại dịch vụ
Dịch vụ tư vấn kết quả
Hiển thị kết quả trong dịch vụ tư vấn.
Xem
kết quả liên quan trong đám mây trong ngành
.
Tất cả kết quả
Sensitive Data Protection with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Sensitive Data Protection with Microsoft Purview secures data against breaches and cyberattacks. Tailored policies prevent leaks and ensure compliance, protecting your organization's reputation.
1 out of 60
Phishing, Malware & Spam protection- 2 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
2 out of 60
Microsoft 365 Security 4 Weeks Assessment
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
3 out of 60
Collaborative Apps: 3 - W Workshop
Exelegent
+3
Applicable to:
Identity & Access Management
Power Platform for Teams
Teamwork Deployment
Build Solutions for your Customers to drive organizations goals and create collaborative experiences.
4 out of 60
Azure AD Implentation in 8 weeks
Armis, Sistemas de Informação, Lda
+1
Applicable to:
Identity & Access Management
Porovide a design and build capability that enables organisations to secure, control and simplify employee access to company data and sensitive resources resources from wherever they are.
5 out of 60
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
6 out of 60
Microsoft 365 Security Assessment: 2 Week Assessment
Kontex Security Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
7 out of 60
Office 365 GCC High Migration +Tenant Imp 4Wk
Summit 7 Systems, Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Companies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
8 out of 60
Windows 365 Cloud PC: 4-Wk Proof of Concept
Signal Alliance
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Discover how Signal Alliance Consulting helps you get started with Windows 365, the worlds first cloud PC that helps you access your data from anywhere, anytime from any device.
9 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementation
Cloudshift
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
10 out of 60
HPT Nextgen Windows Experience_02 days workshop
HPT Vietnam Corporation
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
NextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
11 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
12 out of 60
Microsoft 365 Security and Compliance Activation
NVISO
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Our engineering support covers every phase from planning to full implementation, of the different security and compliance solutions included in Microsoft licenses
13 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
14 out of 60
Protect and Govern Healthcare Data Workshop - 3 Day Workshop
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft-Funded Workshop to discuss and understand the hidden privacy and regulatory risks of healthcare data and how to mitigate with actionable next steps
15 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Microsoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
16 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
17 out of 60
Microsoft 365: 2-Week Assessment
Practical Solutions, Inc
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
18 out of 60
Windows Autopilot: 5-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Modern Desktop deployment (Windows Autopilot) is a feature included in Microsoft Intune that enables system administrators to customize Windows 10/11 OOBE
19 out of 60
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
20 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
21 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
22 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Conscia A/S
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
23 out of 60
Intranet & Data Optimization: 4 Hours Workshop
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Workshop di introduzione pratica alle potenzialità della soluzione SharePoint di Microsoft 365
24 out of 60
Work - 12-wk Implementation
Wortell
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Work, the modern workplace as a service offering by Wortell on a pay-per-user-per-month basis
25 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
26 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
27 out of 60
Atos || Pilot program for Windows 365
Atos International SAS
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Atos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
28 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
29 out of 60
Microsoft Purview: 6-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft Purview Information Protection helps you discover, classify, and protect sensitive information wherever it resides or travels.
30 out of 60
Microsoft 365 Email Threat Protection Assessment
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
31 out of 60
CDA as a Service on Microsoft 365: 3 weeks implementation
INDACON S.R.L.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Teams Custom Solutions
CDA as a Service is a Cloud-based platform that allows the management of every Board of Directors phase in a single workspace
32 out of 60
Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
33 out of 60
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
34 out of 60
HPT Secure Identities and Access_03 days workshop
HPT Vietnam Corporation
+2
Applicable to:
Identity & Access Management
Mobile Device Management
With identity attacks on the rise, this workshop will show you how to stop tomorrow’s data breaches by securing identities today.
35 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
36 out of 60
SEIDOR Modern Workplace with Microsoft 365 1-Month Implementation
SEIDOR SA
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
We promote and respond to the current needs of companies in terms of mobility, security, productivity, communication and collaboration through the evolution of their workstations
37 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
38 out of 60
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
39 out of 60
Implementazione Microsoft Endpoint Manager
Inside Technologies
+2
Applicable to:
Cloud Security
Identity & Access Management
Implementazione della piattaforma MDM per gestire gli endpoint aziendali e personali
40 out of 60
Intranet & Data Optimization for SharePoint: 1 Day Assessment
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Assessment rivolto alle aziende che vogliono ottimizzare i processi interni con l'uso di SharePoint e Microsoft 365
41 out of 60
Intranet & Data Migration SharePoint: 3 Days Implementation
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Implementazione di SharePoint come intranet aziendale e migrazione dei dati online su Microsoft 365
42 out of 60
SharePoint Intranet: 2 Hours Briefing
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Briefing di presentazione della soluzione SharePoint e prima analisi delle esigenze e conoscenze di Microsoft 365
43 out of 60
Intranet & Data Optimization: 1 Day Proof of Concept
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Proof of Concept (POC) per provare in modo pratico la soluzione SharePoint nella propria infrastruttura
44 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
45 out of 60
1ID Platform for EDU
Telelink Business Services EAD
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
46 out of 60
Windows Autopatch: 3-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Windows Autopatch is a new service from the Microsoft 365 world that automates the process of deploying updates.
47 out of 60
Microsoft 365 Cybersecurity: 4-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 cybersecurity assessment. We will analyze how secure your on-premises and cloud environment is and guide you on how to improve it.
48 out of 60
Identity Access Hardening: 5-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Identity Access Services Hardening the goal is to prepare your most mission-critical workloads by configuring either your identity management service through best practices
49 out of 60
Defender for Office 365: 5-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Office 365 protects your organization from threats that can come through Microsoft 365 collaboration solutions
50 out of 60
Windows 365 Cloud PC: 4-days Implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Windows 365 is a complete Software-as-a-Service (SaaS) solution that delivers a personalized, secure, and scalable Windows experience to any device.
51 out of 60
Microsoft Defender for Business: 6-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Business is an enterprise-grade device security solution, designed to protect businesses with up to 300 employees against sophisticated cyber threats
52 out of 60
Azure Active Directory Premium: 8-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Increase Microsoft 365 security by implementing Azure MFA and Conditional Access solutions available on the Microsoft 365 platform
53 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
54 out of 60
Security Assessment Journey
Agic Cloud Srl
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cloud Security - 10 days Assessment
55 out of 60
Windows 365 Jumpstart
SoftJam S.p.A.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
SoftJam vi guiderà nelle scelte architetturali e di configurazione che definiranno il disegno, la gestione della vostra infrastruttura Windows 365 e le modalità di deploy dei cloud PC.
56 out of 60
CONSULTING SERVICES FOR ENDPOINT MODERNIZATION AND FOR DEPLOY OF WINDOWS 365
Proge-Software S.r.l.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Deploy and protect Endpoint for hybrid workforce and deploy of Windows 365
57 out of 60
IBM Digital Workforce Offering
IBM Consulting - EA
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Power Platform for Teams
IBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
58 out of 60
Managed Services: M(x)DR for Microsoft 365 Defender
Cegeka NV
+2
Applicable to:
Identity & Access Management
Threat Protection
Introducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
59 out of 60
Roadmap to Modern Collaboration - 3day Assessment
MICROSYS SRL
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
La nostra soluzione consulenziale per definire il miglior percorso di attività per l’aumento della produttività personale e della collaborazione tra le persone
60 out of 60
Trước
1
2
3
Tiếp theo