FiltresEsborra-ho tot
Núvols del sector resultats de Productes de venda al detall i consumidor
Es mostren resultats a núvols del sector.
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFTEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 29
ai.RETAIL NRF Customer Insights 12 Wk ImpAvanade, Inc.ai.RETAIL is an AI-powered insights solution
+1
Applicable to:
Customer Insights
2 out of 29
Catalyst Envisioning: Two-Day Workshop and ConsultationTietoevry We offer an opportunity to empower your team and drive success to your business with a Tietoevry-lead two-day Microsoft Catalyst Envisioning workshop.
+3
Applicable to:
Supply Chain Management
Finance
Power Automate
3 out of 29
Entra ID Identity and Application Governance Solutions by AVASOFTAVASOFTOur solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 29
NP Retail Print Templates Starter: 3-Hr WorkshopNaviPartnerBasic education enabling new users to customize retail printouts to receipts and label printers.
+1
Applicable to:
Business Central
Dynamics 365 Inventory Intelligence Accelerator: 4-Wk AssessmentTietoevry A 4-week assessment to evaluate readiness for implementing Dynamics 365 solutions for demand planning, traceability, and inventory visibility - delivering a clear path to supply chain transformation.
+3
Applicable to:
Supply Chain Management
Finance
Power Apps
6 out of 29
Secure & Manage Devices using the Microsoft Intune Suite with AVASOFTAVASOFTSeamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
7 out of 29
Dynamics 365 Business Performance Accelerator: 4-Wk AssessmentTietoevry A 4-week assessment to evaluate readiness for Dynamics 365 Business Performance Analytics and Planning - delivering a roadmap for data-driven insights, forecasting, and agile decision-making.
+3
Applicable to:
Supply Chain Management
Finance
Power Apps
8 out of 29
NP Retail Price Management: 4-Hr WorkshopNaviPartnerAdvanced education in Retail and POS price and discount management.
+1
Applicable to:
Business Central
Device Management Migration - On-Premises to Cloud by AVASOFTAVASOFTSeamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
10 out of 29
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFTAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 29
Business Central Deployment and Implementation (6-8 Weeks)Maison Consulting & SolutionsHelping organizations quickly implement and configure core financials, operations, and reporting.
+1
Applicable to:
Business Central
12 out of 29
Shopify connector setup basic: 5h ImplementationScaptaWe will setup the Shopify connector for multiple Shopify shops and 1 Microsoft Dynamics 365 Business Central Company
+1
Applicable to:
Business Central
13 out of 29
Dynamics 365: Implement Your AI Strategy with Microsoft Low-CodeTietoevry This workshop empowers organizations to implement an effective AI strategy using Microsoft Power Platform and low-code solutions.
+3
Applicable to:
Supply Chain Management
Finance
Power Virtual Agents
14 out of 29
AVASecure 360 - Microsoft 365 Security & Governance Solutions by AVASOFTAVASOFTAware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
15 out of 29
Dynamics 365 License Compliance Assessment & Security Role Optimization Assessment OnlyMaison Consulting & SolutionsBrief Assessment of License Enforcement for Microsoft Dynamics 365 Finance and Supply Chain Management
+3
Applicable to:
Commerce
Supply Chain Management
Finance
16 out of 29
Copilot for Microsoft 365 WorkshopCloudGate LLCCopilot for Microsoft 365 Workshop, delivered by Cloud Gate LLC, is a comprehensive three-phase engagement.
+1
Applicable to:
Threat Protection
17 out of 29
Dynamics 365 License Compliance Assessment & Security Role OptimizationMaison Consulting & SolutionsLicense Enforcement for Microsoft Dynamics 365 Finance and Supply Chain Management
+3
Applicable to:
Commerce
Supply Chain Management
Finance
18 out of 29
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFTManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 29
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
20 out of 29
ERP Omnichannel: 3-day Readiness Check AssessmentSPH AGAs a result of the Omnichannel Readiness Check, you will receive a concept with an assessment
and recommendation on possible steps to build up omnichannel processes.
+3
Applicable to:
Commerce
Supply Chain Management
Finance
21 out of 29
TIDK Service for Microsoft Fabric AdoptionTIDK spółka z ograniczoną odpowiedzialnościąEmpowering organizations to seamlessly unify their data estate, analytics, and business intelligence workflows into a single, integrated SaaS platform.
+1
Applicable to:
Power BI apps
22 out of 29
BSE_Cybersecurity_Empower_CYRENProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans la sécurisation de votre SI
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 29
Microsoft 365 Copilot PromptathonORBIS SEEin Tag, der Microsoft 365 Copilot erlebbar macht:
Mitarbeitende entwickeln gemeinsam praxisnahe Use Cases – begleitet von Coaches und Schulungen für mehr Effizienz und KI-Kompetenz im Arbeitsalltag.
+1
Applicable to:
Adoption & Change Management
24 out of 29
Power Apps ConsultancyParge Yazilim Danismanlik Tic.A.S.Pargesoft design solutions for client's workflows by listening closely to clients and understand their business needs with experienced consultants that are specialized in process flows & management
+1
Applicable to:
Power Apps
25 out of 29
ModernIdentity: 3-Months ImplementationEconocom Workplace infra InnovationUnifier la gestion des identités et des accès grâce à Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
26 out of 29
FONDATION ZERO TRUST - 2 Days AtelierJCD GROUPEConstruire les fondations du modèle de sécurité « Zero Trust » avec la sécurité des identités
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 29
CLOUD PC - 3 Days - AtelierJCD GROUPEOffrez à vos employés l'accès à une expérience de bureau sécurisée, où qu'ils soient
+2
Applicable to:
Cloud Security
Identity & Access Management
28 out of 29
MODERN MANAGEMENT- 2 Days - AtelierJCD GROUPEGérez et protégez matériels, données et utilisateurs avec Microsoft Endpoint Manager afin d'améliorer le niveau de sécurité global de votre plateforme
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
29 out of 29