AppSource
Cung cấp phản hồi
Trợ giúp + hỗ trợ
Mục đã lưu
Gói riêng tư
Xin chờ một chút, đang đăng nhập cho bạn...
Tất cả
Ứng dụng
Thể loại
Ngành
Dịch vụ tư vấn
Đối tác
Bộ lọc
Xóa tất cả
Vị trí của bạn
Sản phẩm (1)
Ngành
Loại dịch vụ
Dịch vụ tư vấn kết quả
Hiển thị kết quả trong dịch vụ tư vấn.
Xem
kết quả liên quan trong đám mây trong ngành
.
Tất cả kết quả
Intranet & Data Optimization for SharePoint: 1 Day Assessment
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Assessment rivolto alle aziende che vogliono ottimizzare i processi interni con l'uso di SharePoint e Microsoft 365
1 out of 60
Intranet & Data Migration SharePoint: 3 Days Implementation
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Implementazione di SharePoint come intranet aziendale e migrazione dei dati online su Microsoft 365
2 out of 60
SharePoint Intranet: 2 Hours Briefing
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Briefing di presentazione della soluzione SharePoint e prima analisi delle esigenze e conoscenze di Microsoft 365
3 out of 60
Intranet & Data Optimization: 1 Day Proof of Concept
ACS Data Systems
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Proof of Concept (POC) per provare in modo pratico la soluzione SharePoint nella propria infrastruttura
4 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
5 out of 60
1ID Platform for EDU
Telelink Business Services EAD
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
6 out of 60
Windows Autopatch: 3-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Windows Autopatch is a new service from the Microsoft 365 world that automates the process of deploying updates.
7 out of 60
Microsoft 365 Cybersecurity: 4-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 cybersecurity assessment. We will analyze how secure your on-premises and cloud environment is and guide you on how to improve it.
8 out of 60
Identity Access Hardening: 5-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Identity Access Services Hardening the goal is to prepare your most mission-critical workloads by configuring either your identity management service through best practices
9 out of 60
Defender for Office 365: 5-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Office 365 protects your organization from threats that can come through Microsoft 365 collaboration solutions
10 out of 60
Windows 365 Cloud PC: 4-days Implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Windows 365 is a complete Software-as-a-Service (SaaS) solution that delivers a personalized, secure, and scalable Windows experience to any device.
11 out of 60
Microsoft Defender for Business: 6-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Business is an enterprise-grade device security solution, designed to protect businesses with up to 300 employees against sophisticated cyber threats
12 out of 60
Azure Active Directory Premium: 8-days implementation
PROJECT INFORMATICA SRL
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Increase Microsoft 365 security by implementing Azure MFA and Conditional Access solutions available on the Microsoft 365 platform
13 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
14 out of 60
Security Assessment Journey
Agic Cloud Srl
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cloud Security - 10 days Assessment
15 out of 60
Windows 365 Jumpstart
SoftJam S.p.A.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
SoftJam vi guiderà nelle scelte architetturali e di configurazione che definiranno il disegno, la gestione della vostra infrastruttura Windows 365 e le modalità di deploy dei cloud PC.
16 out of 60
CONSULTING SERVICES FOR ENDPOINT MODERNIZATION AND FOR DEPLOY OF WINDOWS 365
Proge-Software S.r.l.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Deploy and protect Endpoint for hybrid workforce and deploy of Windows 365
17 out of 60
IBM Digital Workforce Offering
IBM Consulting - EA
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Power Platform for Teams
IBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
18 out of 60
Managed Services: M(x)DR for Microsoft 365 Defender
Cegeka NV
+2
Applicable to:
Identity & Access Management
Threat Protection
Introducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
19 out of 60
Roadmap to Modern Collaboration - 3day Assessment
MICROSYS SRL
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
La nostra soluzione consulenziale per definire il miglior percorso di attività per l’aumento della produttività personale e della collaborazione tra le persone
20 out of 60
base-IT Pentesting
BaseIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Mit base-IT Pentesting stärken wir Ihre IT-Sicherheit und decken Schwachstellen auf. Durch die Integration von Microsoft 365 (Cloud Security, etc.) entsteht eine umfassende Sicherheitsarchitektur.
21 out of 60
Gestion Unifiée des Terminaux : 2 semaines de Proof of Concept
Econocom Products & Solutions Belux
+2
Applicable to:
Identity & Access Management
Mobile Device Management
Audit fonctionnel et technique de l'environnement de gestions des terminaux (desktop, laptop et mobile).
22 out of 60
Audit de sécurité : 5 jours
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Evaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
23 out of 60
POC Securité IT : 2 semaines
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Validation des capacités des solutions de sécurité Microsoft dans votre environnement
24 out of 60
Solutions de Sécurité Microsoft : 4 semaines
Econocom Products & Solutions Belux
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
25 out of 60
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
26 out of 60
Device Security Management with Microsoft Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Seamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
27 out of 60
Infra & Network Monitoring with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Boost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
28 out of 60
Integrating Microsoft Sentinel with External EDR Service
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
29 out of 60
Device Monitoring with Microsoft Defender for Endpoint
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
30 out of 60
Device Domain Migration from On-Premises to Cloud
AVA SOFTWARE INC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Seamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
31 out of 60
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
32 out of 60
Microsoft Cloud application security Assessment - 2 weeks
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
33 out of 60
Manage Corporate Data on Devices with Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Can you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
34 out of 60
Information Protection with Microsoft Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Boost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
35 out of 60
MFA Conditional Access QuickStart: 4-Day Imp
Var Group
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We know that a username and password is a weak model. We have developed a service to easily implement Azure Active directory feature as a Conditional Access and MFA within your company.
36 out of 60
Microsoft Information Protection: 6-Day Imp
Var Group
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Microsoft information Protection helps your organization to discovering, managing confidential information and to repond to regulations such as GDPR.
37 out of 60
Microsoft 365 Security Envisioning - 1day workshop
Officeline SA
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Learn how to improve your organization’s security posture with Office Line’s Microsoft 365 Security 1-day Workshop.
38 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
39 out of 60
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
40 out of 60
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
41 out of 60
Portfolio Rationalisation: 10-Wk Implementation
PricewaterhouseCoopers UK
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Manage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
42 out of 60
Microsoft365 Round Table 3-hours
Var Group
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
Microsoft 365 round table is a workshop for share the Microsoft workplace modernization approach across security, compliance, productivity, and communications.
43 out of 60
Microsoft 365 CyberSecurity: 5-Day Assessment
Var Group
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
After quickly enabling employees to work from home, many companies are taking the time to securitize their remote work environments.
44 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
45 out of 60
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
46 out of 60
Smart Working: 3-Weeks Assessment
DURANTE SPA
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Meeting Rooms for Microsoft Teams
The goal of the Durante Smart Working (DSW) solution is to allow our customers to identify and implement the smart working technological model that best suits their needs.
47 out of 60
Microsoft Security - 4 Hrs Briefing
Reply
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Our briefing will provide the information needed to empower employees to stay productive, while ICT maintain sure security and control
48 out of 60
Secure Remote Work: 3 Days Intro and Plan Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Engagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
49 out of 60
Identity & Access Management: 1-Mth Implementation
Officeline SA
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Microsoft 365 Identity & Access Management to improve and streamline security on cloud and applications
50 out of 60
Approach of the Modern Workplace: 4 hours Briefing
Cegeka NV
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
The goal of this briefing is to clarify some misconceptions about the approach to a modern digital workplace.
51 out of 60
Securing Identities: 3 Days Workshop
INOVASYS FOR SYSTEMS
+1
Applicable to:
Identity & Access Management
Microsoft funded Securing Identities is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
52 out of 60
Intune for Android: 2-wk Imp
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Android devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
53 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
54 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Nil d.o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
55 out of 60
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POC
Bitscape
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
56 out of 60
Secure Hybrid Identity - Defender for Identity: 6 week Implementation
Performanta
+2
Applicable to:
Identity & Access Management
Threat Protection
Secure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
57 out of 60
Insight Security Mini Audit: 1 Day Workshop
Insight Technology Solutions
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Insight will work with you to evaluate your Microsoft 365 environment to make sure that it is in line with industry security best practices.
58 out of 60
Endpoint Management and Windows Deployment: 2-days Implementation
CC Bilgi Teknolojileri
+2
Applicable to:
Device Deployment & Management
Identity & Access Management
Microsoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-premises.
59 out of 60
Information Discovery Week: 1-Week Assesment
Cipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
One of the big problems that all organizations encounter is the classification of information and its discovery. From Cipher we offer a service, which performs this function for a short period.
60 out of 60
Trước
1
2
3
4
Tiếp theo