تخطي إلى المحتوى الرئيسي
Marketplace
تقديم الملاحظات
المساعدة والدعم
العناصر المحفوظة
خطط خاصة
الرجاء الانتظار قليلا، جار تسجيل دخولك...
الكل
المنتجات
الفئات
الصناعات
الشركاء
عوامل التصفية
إلغاء تطبيق الكل
موقعك
موقعك
منتجات (1)
منتجات (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
الاستخدام وإدارة التغيير
الاستخدام وإدارة التغيير
اتصال لـ Microsoft Teams
اتصال لـ Microsoft Teams
الأمان السحابي
الأمان السحابي
الخدمات الاستشارية للتوافق
الخدمات الاستشارية للتوافق
توزيع الأجهزة وإدارتها
توزيع الأجهزة وإدارتها
عمال الخط الأمامي
عمال الخط الأمامي
إدارة الوصول والهوية
إدارة الوصول والهوية
حماية البيانات وإدارتها
حماية البيانات وإدارتها
خطر داخلي
خطر داخلي
المعرفة ونتائج التحليلات
المعرفة ونتائج التحليلات
غرف اجتماعات Microsoft Teams
غرف اجتماعات Microsoft Teams
اجتماعات Microsoft Teams
اجتماعات Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
إدار ة الأجهزة المحمولة
إدارة الأجهزة المحمولة
Power Platform for Teams
Power Platform for Teams
حلول Teams المخصصة
حلول Teams المخصصة
نشر العمل الجماعي
نشر العمل الجماعي
الحماية من المخاطر
الحماية من المخاطر
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
المجالات
المجالات
نوع الخدمة
نوع الخدمة
نموذج التسعير
نموذج التسعير
نتائج خدمات استشارية
يتم الآن عرض من النتائج في خدمات استشارية
عرض
من النتائج ذات الصلة في سُحب المجالات
.
Microsoft Sentinel Log Management and Threat Detection by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
1 out of 60
Virtual CISO (vCISO) Managed Services
Netrix Global
+1
Applicable to:
Cloud Security
Our virtual CISO offering provides organizations a senior level security executive for ongoing security program management and governance.
2 out of 60
Microsoft OT/IOT Security : 2-Wks Assessment
Wipro Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Identify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
3 out of 60
Microsoft Data Compliance Consulting Services - 2 Weeks Assessment
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
The Microsoft 365 Compliance assessment helps organizations implement a compliance strategy that accelerates and streamlines data security and governance while reducing risk.
4 out of 60
MDR for Microsoft Defender
ADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.
+2
Applicable to:
Cloud Security
Threat Protection
Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
5 out of 60
Security Operations Center with Microsoft Sentinel
AVASOFT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Monitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
6 out of 60
Implementation of Microsoft Defender for Business | Defender for Endpoint
ITX360 (Pvt) Ltd.
+2
Applicable to:
Cloud Security
Threat Protection
Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
7 out of 60
Data Classification and Protection 3Weeks Workshop
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
8 out of 60
UNITE: AI Aware Workshop_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
For business leaders who seek to understand AI in a business context, UNITE: AI Aware_ is an expert-led workshop for all departments. Participants can learn about AI types, capabilities and benefits.
9 out of 60
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
10 out of 60
Unifying Microsoft Sentinel with Cloud Services
AVASOFT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
11 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom Demo
Mazzy Technologies Corp.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
12 out of 60
Microsoft Defender for Endpoint Deployment
Citrin Cooperman Advisors, LLC
+2
Applicable to:
Cloud Security
Threat Protection
Fortify your business with Microsoft Defender for Endpoint that seamlessly integrates into Microsoft 365, safeguarding all devices and strengthening your Zero Trust framework.
13 out of 60
Licensing Microsoft 365: 1-day Assessment
Informatika a.d.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
14 out of 60
XDR as a Service | Assure 365
CyberOne
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Fully Managed XDR with 24x7 detection, response and threat protection—Powered by Microsoft Defender XDR.
15 out of 60
Okta Migration to Azure AD: 3-Week Assessment
Invoke
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
The Okta Migration to Azure AD Assessment offering is designed to assess & plan your migration efforts to your existing investments in Azure AD.
16 out of 60
Microsoft 365: 3 Week Solution Assessment
First National Technology Solutions, Inc.
+3
Applicable to:
Cloud Security
Meetings for Microsoft Teams
Teamwork Deployment
Partner with FNTS to conduct a 3 week workplace modernization solution assessment to build a TOC analysis & evaluate current purchasing structure to make recommendations for adoption of Microsoft 365.
17 out of 60
Vulnerability Management
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+2
Applicable to:
Cloud Security
Threat Protection
Rapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
18 out of 60
Copilot for Security Rapid Test Flight | 2-Wk Workshop
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
19 out of 60
Mailbox Guardian - Security: 2 Week Implementation
ProServeIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cybersecurity review and lockdown of Microsoft 365 environment. Monitor and provide implementation recommendations Protect against phishing and other attacks Review desired state configuration
20 out of 60
Avanade Modern Sec Ops
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
21 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and Planning
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Shorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
22 out of 60
Security Maturity Assessment - 4 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
23 out of 60
Cyber Security Services 9 days Assessment
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
24 out of 60
Implementation of Microsoft Security Copilot
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
25 out of 60
AvePoint Policies & Insights: 10-Days Assesments
IT-Dev sp. z o.o.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Assesment's outcomes: • Enable centralized reporting on Microsoft 365 security. • Discover potential risks and exposed content. • Enforce policies and automatically remediate security breaches!
26 out of 60
Zones SOCaaS - MXDR with Threat Protection
Zones Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Zones SOCaaS powered by Microsoft Sentinel and Defender offers advanced MDR and XDR capabilities, reinforcing your business’s safety.
27 out of 60
Defender for IoT Operational Technology: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
28 out of 60
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
29 out of 60
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-Weeks
Invoke
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Invoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
30 out of 60
Modern Frontline Work Acceleration 2 days Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
LiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
31 out of 60
AvePoint Backup: 4 Weeks Proof Of Concept
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Sentinel Technologies is proud to offer AvePoint’s Cloud Backup, a powerful cloud-to-cloud backup solution for Microsoft 365 and Azure.
32 out of 60
KPMG Agent 365 Implementation - Adoption & Management
KPMG
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enable organisations to operationalise Microsoft Agent 365 with trusted governance, security, and lifecycle controls so AI agents can scale safely beyond pilots
33 out of 60
DLP Implementation and Tuning Services
INFOTECHTION
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Reduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
34 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
35 out of 60
CMMC Assessment Ready Solution
Planet Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Based off the Planet secure collaboration enclave, this provides customers with CMMC Assessment Ready artifacts.
36 out of 60
Lightstream Data Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Lightstream will Identify data security risks in your organizational data. Identify data security risks in your organizational data
37 out of 60
MDS - Threat Protection Engagement
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
38 out of 60
Copilot for Microsoft 365: Taller De Seguridad Y Datos De 1 Día
Awara IT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Desbloquea el máximo potencial de Copilot for Microsoft 365 mientras refuerzas la seguridad y protección de tus datos con un taller intensivo de un día dirigido por los expertos de Awara IT.
39 out of 60
Defender for Office365
Suri Services SC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Suri Services y Office 365: La alianza impenetrable en ciberseguridad.
40 out of 60
Cloud App Security – Advanced CASB Solution for Cloud Data Protection
ITX360 (Pvt) Ltd.
+1
Applicable to:
Cloud Security
Secure your cloud apps with real-time monitoring, Shadow IT discovery, and automated data protection. Integrated with Microsoft Information Protection for enhanced compliance and threat detection.
41 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
42 out of 60
Microsoft Sentinel Proof of Concept: 4 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand how prepared is your Microsoft infrastructure when adversaries attack
43 out of 60
MDS - Cybersecurity Assessment
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
44 out of 60
Copilot for Security Readiness Assessment
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Get a Copilot for Security Readiness + a Security Health Check on your Microsoft 365 environment
45 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
46 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
47 out of 60
Onesec Identity Governance Lifecycle Assessment
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
48 out of 60
Threat Protection Workshop
Mobile Mentor
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
During this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
49 out of 60
Microsoft 365 E5 CMMC L3 8 Week Implementation
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
50 out of 60
ADFS to Entra ID Migration Service
Mobile Mentor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Mobile Mentor’s ADFS to Entra ID Migration Service offers a secure, cloud-first Single Sign-On experience that eliminates outdated infrastructure and unlocks the full potential of Microsoft Entra ID.
51 out of 60
Microsoft 365 Copilot Accelerator: 12Wk Implementation
BDO Canada
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Leveraging BDO’s Microsoft 365 Copilot Framework, we'll quickly help you assess your readiness and then accelerate your deployment of Microsoft 365 Copilot in just 12 weeks.
52 out of 60
Nanyang Bandang security operation services
上海南洋万邦软件技术有限公司
+1
Applicable to:
Cloud Security
Security operation services with Microsoft Denfender component and Sentinel
53 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week Implementation
Beyondsoft
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
54 out of 60
Avanade Security Business Value 4-Wk Assessment
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
55 out of 60
Microsoft 365 Copilot Onboarding Workshop
SMART business LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Join our interactive workshop to learn about the capabilities of Microsoft Copilot for Microsoft 365!
56 out of 60
Microsoft 365 Manage Service–12 mth Implementation
Alfa Connections Pte Ltd
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
Alfa Connections providing Microsoft 365 Managed service is designed to enhance your workforce experience by supporting your organization on planning, enablement, implementation, and adoption.
57 out of 60
Comprehensive Threat Protection: Free Workshop
Long View Systems
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Protect against advanced threats with Long View’s Threat Protection, leveraging Microsoft Defender for full security.
58 out of 60
Microsoft 365 Security Readiness: 4-Wk Assessment
Quadrasystems.net (India) P Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Identify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
59 out of 60
Identity as a Service | Assure 365
CyberOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Fully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
60 out of 60
السابق
2
3
4
5
6
التالي