تخطي إلى المحتوى الرئيسي
Marketplace
تقديم الملاحظات
المساعدة والدعم
العناصر المحفوظة
خطط خاصة
الرجاء الانتظار قليلا، جار تسجيل دخولك...
الكل
المنتجات
الفئات
الصناعات
الشركاء
عوامل التصفية
إلغاء تطبيق الكل
موقعك
موقعك
منتجات (1)
منتجات (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
الاستخدام وإدارة التغيير
الاستخدام وإدارة التغيير
اتصال لـ Microsoft Teams
اتصال لـ Microsoft Teams
الأمان السحابي
الأمان السحابي
الخدمات الاستشارية للتوافق
الخدمات الاستشارية للتوافق
توزيع الأجهزة وإدارتها
توزيع الأجهزة وإدارتها
عمال الخط الأمامي
عمال الخط الأمامي
إدارة الوصول والهوية
إدارة الوصول والهوية
حماية البيانات وإدارتها
حماية البيانات وإدارتها
خطر داخلي
خطر داخلي
المعرفة ونتائج التحليلات
المعرفة ونتائج التحليلات
غرف اجتماعات Microsoft Teams
غرف اجتماعات Microsoft Teams
اجتماعات Microsoft Teams
اجتماعات Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
إدار ة الأجهزة المحمولة
إدارة الأجهزة المحمولة
Power Platform for Teams
Power Platform for Teams
حلول Teams المخصصة
حلول Teams المخصصة
نشر العمل الجماعي
نشر العمل الجماعي
الحماية من المخاطر
الحماية من المخاطر
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
المجالات
المجالات
نوع الخدمة
نوع الخدمة
نموذج التسعير
نموذج التسعير
نتائج خدمات استشارية
يتم الآن عرض من النتائج في خدمات استشارية
AI Agent Launchpad
KiZAN Technologies
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
A 6-week implementation to enable the roll out of AI agents responsibly, with clear guardrails, measurable oversight, and a repeatable path to scale.
1 out of 53
Erste Schritte zur NIS-2-Readiness: AppSphere NIS-2 Readiness Engagement
AppSphere AG
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Das Engagement umfasst einen NIS‑2 Compliance Check zur Bewertung des aktuellen Compliance‑Stands sowie ein Microsoft 365-Tenant Assessment, das sicherheitsrelevante Schwachstellen sichtbar macht.
2 out of 53
Enabling Secure AI Adoption with Agent 365
PwC (Global)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
PwC will help enhance visibility across the agent estate, define critical governance and security controls, and deliver an Agent 365 roadmap ready for action
3 out of 53
Microsoft 365 E7 Frontier Transformation Service
Exquitech
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Accelerate your AI journey with a secure, governed, and scalable solution—combining Microsoft 365 E7, Copilot, and Agent 365 with expert-led deployment and adoption services.
4 out of 53
Microsoft 365 Security Confidence Accelerator
Reliance Infosystems
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
A structured Microsoft 365 security posture accelerator that identifies and reduces security risk across identity, devices, applications, and data — delivering clear outcomes.
5 out of 53
Microsoft 365 Security Readiness & Assurance Accelerator
Reliance Infosystems Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
A structured Microsoft 365 security readiness engagement that identifies, prioritises, and reduces risk across identity, devices, applications, and data — delivering audit confidence, & Clarity
6 out of 53
Hitachi Solutions – Agent 365 Governance Accelerator
Hitachi Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Establish governance, control, and operating model for AI agents using Microsoft Agent 365 to enable secure, scalable enterprise adoption.
7 out of 53
Salesforce and Microsoft Defender Integration
IT Partner LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure Salesforce with Defender to detect compromised accounts, monitor exfiltration, and automate threats. Enforce Conditional Access and Sentinel. Pricing/timeline customized post-scoping.
8 out of 53
GCCH Enclave Rapid Deployment in 2 Weeks
R3
+1
Applicable to:
Cloud Security
Deploy a secure, GCCH enclave in just two weeks with a standardized approach for rapid CMMC readiness.
9 out of 53
Salesforce and OneDrive for Business Integration
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Automate doc management by linking OneDrive files to Salesforce records securely. Cuts manual uploads, ensures version control, & maintains compliance. Pricing/timeline scoped per project.
10 out of 53
Salesforce and Microsoft Intune Integration
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Secure Salesforce access with Intune. Enforce device compliance, conditional access, and data protection for CRM. Pricing and timeline customized post-scoping.
11 out of 53
Microsoft 365 E7 Envisioning by SoftwareOne
SoftwareOne
+3
Applicable to:
Adoption & Change Management
Cloud Security
Meetings for Microsoft Teams
Microsoft E7 Envisioning is a focused, advisory-led engagement that gives you a clear, defensible path to E7 adoption.
12 out of 53
Red Teaming by H One
H One (Private) Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
By H One, powered by Axiata Cyber Fusion Center (ACFC) Simulate real-world adversaries to uncover hidden vulnerabilities and strengthen your cyber resilience.
13 out of 53
Microsoft 365 Security & Compliance Assessment
Meridian Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
4-week expert-led assessment that evaluates your Microsoft 365 security posture and compliance readiness, delivering a prioritized remediation roadmap aligned with Zero Trust and regulatory framework.
14 out of 53
Entra Global Secure Access (GSA), Private Access and Internet Access proof of value
Bridewell Consulting Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Experience the benefits of Entra Global Secure Access in order to build skills and the business case for adoption
15 out of 53
Enterprise‑Ready Security for Microsoft Copilot
EPAM Systems, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Secure Microsoft 365 Copilot adoption through identity, data protection, and governance readiness.
16 out of 53
Azure Migration Assessment by C1st
C1st Technologies LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The C1st Azure Migrate Assessment helps customers get started with or expand their use of Microsoft Azure and Microsoft 365 through expert migration guidance, cost visibility and modernization support
17 out of 53
Agent 365 Quickstart by SoftwareOne
SoftwareOne
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
From Governance to live Copilot Studio Agent. Fast, secure, and adoption ready.
18 out of 53
HCLTech Frontline Worker Digital Experience – Assessment & Implementation support for Empowering Frontline Workers
HCL America Inc_HCLT
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
HCLTech’s solution streamlines frontline communication, digital workflows, and secure device management, powered by HCLTech, Microsoft, and Zebra for a modern, sustainable frontline workplace.
19 out of 53
Endpoint Management: 3-Day Workshop
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Begin the steps to manage and protect your devices, your apps, and your users
20 out of 53
Microsoft 365 Identity & Security: 2-Wk Assessment
PSM Partners
+2
Applicable to:
Cloud Security
Identity & Access Management
Customized identity and security assessment focused on the Microsoft 365 platform
21 out of 53
Security Assessment: 2-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
22 out of 53
Hybrid Identity and Security Expert Consulting Imp
Ravenswood Technology Group, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ravenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
23 out of 53
Remote Access to On-Prem Apps: 3 Wk Implementation
Invoke
+2
Applicable to:
Cloud Security
Identity & Access Management
Surface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
24 out of 53
Big Green IT Security Assessment: 3-Week
Big Green IT - Dev
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
25 out of 53
CMMC Data Enclave Dplymt: 4-Wk Implementation
C3 Integrated Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Deploy Microsoft 365 to meet CMMC Requirements
26 out of 53
Managed Security for Compliance: 1 yr Mgd Service
Insight
+2
Applicable to:
Cloud Security
Compliance Advisory Services
Discover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
27 out of 53
Microsoft 365 License Optimization:1-hr Assessment
Frontier Technology, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Review current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
28 out of 53
Office 365 Security: 1-Day Assessment
Netrix Global
+1
Applicable to:
Cloud Security
Security assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
29 out of 53
Secure Workspace: 1 Day Workshop
Watserv Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
30 out of 53
Mail Airlift: Exchange Online Implementation
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Our Mail Airlift engagement will get you up and running with Microsoft Exchange online in the fastest, most secure manner.
31 out of 53
Document Airlift-OneDrive Implementation
Synergy Technical, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Our Document Airlift will enable and configure your organization’s environment to use OneDrive for Business services in your Office 365 tenant.
32 out of 53
1-Day Security & Identity Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Tailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
33 out of 53
Ransomware Protection: 1 Day-Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
34 out of 53
Windows 365 Quick Start: 4-Day Proof of Concept
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
The Windows 365 Quick Start engagement is designed to give you everything you need to deploy Windows 365. Included are a solution overview, planning services, as well as a proof of concept engagement
35 out of 53
Microsoft 365 Defender Threat Check: 4-wk assess
Interlink Cloud Advisors, Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
36 out of 53
Office 365 Protection: Design & Pilot 1-Wk POC
Managed Solution
+2
Applicable to:
Cloud Security
Threat Protection
Protect Your Employees from External Email Threats with Defender for Office 365 Protection
37 out of 53
Modern Identity Workshop | 4 Weeks | Workshop
Enterprise It Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Enable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
38 out of 53
Microsoft 365 Security Alignment Workshop: 10 Days
Sirius Computer Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
39 out of 53
Managing and Identifying Risk: 3-Day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
40 out of 53
Security Assessment: 2 Week Assessment
Tallan
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
41 out of 53
Security Solutions:2-Weeks Implementation
Alpine Health Technologies Corp
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Discover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
42 out of 53
Digital Workplace Foundations: 4-wk Assessment
Catapult Systems, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Catapult’s Digital Workplace Foundations helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tools.
43 out of 53
Microsoft 365 Implementation for Financial Service
New Charter Technologies, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Paid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
44 out of 53
Microsoft 365 Fundamentals: 1 Day Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
Introduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
45 out of 53
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
46 out of 53
Microsoft 365 Inter-Tenant Migration: 2 days Assessment
Preeminent Solutions, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Preeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
47 out of 53
Microsoft Security Assessment: 3-Wk Assessment
eGroup Enabling Technologies, LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Analyze your cross platform security posture, with evaluated vulnerabilities and risks identified with a Microsoft Security Assessment.
48 out of 53
Microsoft Information Protection Administrator: 3 Days Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Information Protection Administrator course focuses on data governance and information protection within your organization.
49 out of 53
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 Wk
Lighthouse Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
This hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
50 out of 53
Modern IT: 2 Hour Assessment
Modern IT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Identify areas for business process optimization through Modern IT
51 out of 53
Zero Trust Launchpad: 3-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
52 out of 53
Assessment-Implementation Plan for Information Protection: 3-Months Assesment
Cipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
53 out of 53
السابق
9
10
11
12
13