AppSource
Cung cấp phản hồi
Trợ giúp + hỗ trợ
Mục đã lưu
Gói riêng tư
Xin chờ một chút, đang đăng nhập cho bạn...
Tất cả
Ứng dụng
Thể loại
Ngành
Dịch vụ tư vấn
Đối tác
Bộ lọc
Xóa tất cả
Vị trí của bạn
Sản phẩm (1)
Ngành
Loại dịch vụ
Dịch vụ tư vấn kết quả
Hiển thị kết quả trong dịch vụ tư vấn.
Xem
kết quả liên quan trong đám mây trong ngành
.
Tất cả kết quả
Microsoft Defender for Endpoint SMC Deployment: 4-Week Implementation
BlueVoyant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our services are designed to maximize your investment with Microsoft with hands-on onboarding & baseline configuration services.
1 out of 60
Microsoft 365 Threat Protection Workshop + 5 Day
Cyberwise Siber Güvenlik TIC. AS.
+1
Applicable to:
Threat Protection
Is your Microsoft 365 environment secure? Do you wonder about your current security maturity? We will assist you with a full-fledged workshop on how to deploy and implement Microsoft 365 Security.
2 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDO
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Introducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
3 out of 60
Microsoft 365 E5 Zero Trust Security Assessment
SHI International Corp
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Explore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
4 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Understand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
5 out of 60
Modern Workplace Security 10-Wk Implementation
Wipro Ltd
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
6 out of 60
Microsoft 365 Defender - MXDR Service - 1 Year Implementation
CGI Inc.
+1
Applicable to:
Threat Protection
Unleash your Microsoft Defender 365 capabilities. Automatically detect & correlate threat signals across your endpoints, email, cloud applications, identities, cloud and on-premises workloads.
7 out of 60
Unified Endpoint Mgmt. - 6 Weeks - Implementation
TCS - Digital Workplace
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
TCS Unified Endpoint Management combines Microsoft Intune, Microsoft Defender for Endpoint and Configuration Manager solutions to provide modern management of endpoints with a Zero Trust strategy.
8 out of 60
Microsoft 365 Threat Check Assessment: 3-Wk Assessment
Invoke
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
9 out of 60
Optimized SecOps leveraging Microsoft Copilot for Security
Synergy Advisors LLC
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
A Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
10 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
11 out of 60
"Threat Protection: 3 Day Workshop"
Insentra Pty Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
12 out of 60
Fortis IR Table Top Exercises
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
13 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
14 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
15 out of 60
Infosys Intelligent Security Solution
Infosys Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Infosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
16 out of 60
Microsoft 365 Security Assessment: 3-Week Assessment
Spyglass MTG, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
17 out of 60
Cyderes Microsoft Security Adoption Advisory
Cyderes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
The Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
18 out of 60
Cybersecurity Assessment - 3 Weeks
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Microsoft Security Assessment: detect security problems and take targeted action
19 out of 60
HCLTech Business Email Protection: 10-Days Implementation
HCL Technologies Limited.
+1
Applicable to:
Threat Protection
HCLTech Business Email Protection (BEP) Powered By Microsoft EOP and MDO, Enable real time Business Email Protection alerting and automated remediation for email service hosted on Microsoft platform
20 out of 60
Synergy Advisor Architecture Design Sessions (ADS) for Microsoft Copilot for Security
Synergy Advisors LLC
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
A Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
21 out of 60
Secure & Improve Windows 10 & 11 with NextGen Windows: 3 Day Workshop
Agile IT
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Build on your investments in Microsoft 365 by reducing risks and increase delight with your organization to manage and secure Windows locally and in the cloud
22 out of 60
Identity & Endpoint Protection with Microsoft Zero Trust
Dell Technologies Services
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Dell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
23 out of 60
4-Day Security Assesment
HSO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
24 out of 60
Microsoft OT/IOT Security : 2-Wks Assessment
Wipro Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Identify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
25 out of 60
Office 365 Teamwork Security - Managed Service
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Teamwork Security provides a comprehensive security management service for Office 365 platforms
26 out of 60
Microsoft Purview Data Security Basic Quick Start 10-week Implementation
Edgile, Inc.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Drive Data Protection Sustainability with Edgile's Data Protection Methodology
27 out of 60
Red Canary MSSP FastTrack for Security
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Leverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
28 out of 60
Modern SecOps Discovery Session
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
29 out of 60
Data Classification and Protection 3Weeks Workshop
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
30 out of 60
Device as a Service with Windows 11 and Intune: 4 Week Implementation
Cognizant
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Windows 10 has revolutionized how organizations manage operating systems, delivering the features that you have come to know and rely on, while enhancing mobility and agility without losing data.
31 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
32 out of 60
Fortis Assessment Microsoft Online Security
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
33 out of 60
Microsoft 365 Security Workshop
Olive + Goose
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Improve your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
34 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days Implementation
HCL Technologies Limited.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
35 out of 60
Endpoint Management Workshop
York Telecom Corp
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
36 out of 60
Protect 365 App - 1 hour implementation
Cloud Life
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
37 out of 60
Microsoft 365 Defender SMC Deployment: 4-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Let BlueVoyant take your security and compliance posture to the next level by deploying and optimizing Microsoft 365 Defender.
38 out of 60
Modern Workplace Optimization - 4 Week Assessment
Protiviti
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This assessment for Microsoft 365 helps customers obtain insights to what it takes to improve productivity against Cyber Threats for Workforce Productivity.
39 out of 60
Overwatch Microsoft 365 Security: 12 Month Implementation
THREATSCAPE LIMITED
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Overwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
40 out of 60
Microsoft Defender for Server:5-day Implementation
Delphi Consulting
+2
Applicable to:
Cloud Security
Threat Protection
Delphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
41 out of 60
Defend Against Threats with SIEM Plus XDR
Netrix Global
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
42 out of 60
Cyber Security Assessment
ELEVATE Solutions Limited
+1
Applicable to:
Threat Protection
The Cybersecurity Assessment helps customers assess their security posture and risk to insider threats.
43 out of 60
Microsoft Sentinel Workshop and Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
44 out of 60
Threat Protection: 2 week Engagement Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you
45 out of 60
Cybersecurity Assessment: Microsoft Workshop
Orange Cyberdefense Global
+1
Applicable to:
Threat Protection
Understand your readiness for common security threats.
46 out of 60
Compliance Assessment - 6 weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Identify your compliance maturity and areas that need improvement
47 out of 60
Microsoft Cybersecurity Assessment
Akins IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
48 out of 60
Protiviti's Security Platform Rationalization Tool - 6 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Understand your current security solutions compared to those included in Microsoft’s E5 enterprise licensing to identify potential security gaps, tool redundancy, and cost reduction.
49 out of 60
Defender for IoT Professional Security Services | Customized Deployment in as Little as 8-Weeks
Difenda
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Threat Protection
Unify your IT and OT security environment with Difenda, the 2023 Microsoft Security Impact Award Winner.
50 out of 60
Implementation of Microsoft Identity Security
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW's Implementation of Microsoft Identity Security service helps customers strengthen their security posture, reduce the risk of data breaches and improve compliance with industry regulations.
51 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementation
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
52 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week Implementation
Beyondsoft Brasil
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
53 out of 60
Varonis Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
54 out of 60
Microsoft 365 Security Program - 10 Weeks
Trace3
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
55 out of 60
AgileAscend Microsoft 365 GCC and GCC High: 1 Hour Assessment
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
56 out of 60
Darktrace Managed Network Sensor
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
57 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
58 out of 60
Active Directory Security on Demand
Comtrade System Integration
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
59 out of 60
Secure Modern Workplace Platform Implementation
Cognizant
+3
Applicable to:
Adoption & Change Management
Teamwork Deployment
Threat Protection
Enables teams to securely collaborate, connect and be more productive than ever before, no matter when or where they work.
60 out of 60
Trước
1
2
3
4
5
Tiếp theo