FiltreRyd alle
Brancheskyer resultater for Detail og forbrugsvarer
Viser resultater i brancheskyer.
Intelligent Customer Experiences with Azure Synapse and Dynamics 365 Customer Insights: 8 week POCCognizantTruly understand your customers needs and preferences to deliver intelligent customer experiences.
+1
Applicable to:
Customer Insights
1 out of 38
JKIT Retail 360 Power BI Dashboard: 4-Week ImplementationJohn Keells Information Technology Pvt LtdJohn Keells IT offers a Retail 360 Power BI dashboard for identifying temporal and spatial patterns in sales and identify issues in demand management by using advanced analytics.
+1
Applicable to:
Power BI apps
2 out of 38
NP Retail & POS: 1-Wk ImplementationNaviPartnerGet a full implementation of our NP Retail & Point of Sales (POS) App in three retail shops, with all the necessary training to use our solution independently!
+1
Applicable to:
Business Central
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFTEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 38
ai.RETAIL NRF Customer Insights 12 Wk ImpAvanade, Inc.ai.RETAIL is an AI-powered insights solution
+1
Applicable to:
Customer Insights
5 out of 38
Analysis of the implementation of the ERP-Audit Dynamics 365Sii Sp. z o.o.Identification of the implementation scope of Dynamics 365 Finance & Supply Chain Management solution
+3
Applicable to:
Supply Chain Management
Sales
Customer Service
6 out of 38
Catalyst Envisioning: Two-Day Workshop and ConsultationTietoevry We offer an opportunity to empower your team and drive success to your business with a Tietoevry-lead two-day Microsoft Catalyst Envisioning workshop.
+3
Applicable to:
Supply Chain Management
Finance
Power Automate
7 out of 38
Entra ID Identity and Application Governance Solutions by AVASOFTAVASOFTOur solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 38
Analysis of the implementation of the CRM-Audit Dynamics 365Sii Sp. z o.o.As part of the 10-day audit, we will prepare a list of needs for the implementation of the CRM project
+2
Applicable to:
Sales
Customer Service
9 out of 38
NP Retail Print Templates Starter: 3-Hr WorkshopNaviPartnerBasic education enabling new users to customize retail printouts to receipts and label printers.
+1
Applicable to:
Business Central
Dynamics 365 Inventory Intelligence Accelerator: 4-Wk AssessmentTietoevry A 4-week assessment to evaluate readiness for implementing Dynamics 365 solutions for demand planning, traceability, and inventory visibility - delivering a clear path to supply chain transformation.
+3
Applicable to:
Supply Chain Management
Finance
Power Apps
11 out of 38
Secure & Manage Devices using the Microsoft Intune Suite with AVASOFTAVASOFTSeamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
12 out of 38
Dynamics 365 Business Performance Accelerator: 4-Wk AssessmentTietoevry A 4-week assessment to evaluate readiness for Dynamics 365 Business Performance Analytics and Planning - delivering a roadmap for data-driven insights, forecasting, and agile decision-making.
+3
Applicable to:
Supply Chain Management
Finance
Power Apps
13 out of 38
NP Retail Price Management: 4-Hr WorkshopNaviPartnerAdvanced education in Retail and POS price and discount management.
+1
Applicable to:
Business Central
Device Management Migration - On-Premises to Cloud by AVASOFTAVASOFTSeamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
15 out of 38
Sunrise D365 Migration ServiceSunrise TechnologiesSunrise is a data migration expert regardless of the source system.
+3
Applicable to:
Commerce
Supply Chain Management
Finance
16 out of 38
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFTAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 38
Business Central Deployment and Implementation (6-8 Weeks)Maison Consulting & SolutionsHelping organizations quickly implement and configure core financials, operations, and reporting.
+1
Applicable to:
Business Central
18 out of 38
Shopify connector setup basic: 5h ImplementationScaptaWe will setup the Shopify connector for multiple Shopify shops and 1 Microsoft Dynamics 365 Business Central Company
+1
Applicable to:
Business Central
19 out of 38
Dynamics 365: Implement Your AI Strategy with Microsoft Low-CodeTietoevry This workshop empowers organizations to implement an effective AI strategy using Microsoft Power Platform and low-code solutions.
+3
Applicable to:
Supply Chain Management
Finance
Power Virtual Agents
20 out of 38
AVASecure 360 - Microsoft 365 Security & Governance Solutions by AVASOFTAVASOFTAware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
21 out of 38
Dynamics 365 License Compliance Assessment & Security Role Optimization Assessment OnlyMaison Consulting & SolutionsBrief Assessment of License Enforcement for Microsoft Dynamics 365 Finance and Supply Chain Management
+3
Applicable to:
Commerce
Supply Chain Management
Finance
22 out of 38
Copilot for Microsoft 365 WorkshopCloudGate LLCCopilot for Microsoft 365 Workshop, delivered by Cloud Gate LLC, is a comprehensive three-phase engagement.
+1
Applicable to:
Threat Protection
23 out of 38
Dynamics 365 License Compliance Assessment & Security Role OptimizationMaison Consulting & SolutionsLicense Enforcement for Microsoft Dynamics 365 Finance and Supply Chain Management
+3
Applicable to:
Commerce
Supply Chain Management
Finance
24 out of 38
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFTManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 38
Microsoft Cloud for Retail - 2 Day AssessmentSunrise TechnologiesMicrosoft Cloud for Retail - Deploy an optimized end-to-end retail value chain - Free 2 Day Assessment by Sunrise Technologies
+3
Applicable to:
Commerce
Supply Chain Management
Finance
26 out of 38
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 38
ERP Omnichannel: 3-day Readiness Check AssessmentSPH AGAs a result of the Omnichannel Readiness Check, you will receive a concept with an assessment
and recommendation on possible steps to build up omnichannel processes.
+3
Applicable to:
Commerce
Supply Chain Management
Finance
28 out of 38
TIDK Service for Microsoft Fabric AdoptionTIDK spółka z ograniczoną odpowiedzialnościąEmpowering organizations to seamlessly unify their data estate, analytics, and business intelligence workflows into a single, integrated SaaS platform.
+1
Applicable to:
Power BI apps
29 out of 38
Protect devices : 4 days assessmentSopra Steria France4 days of assessment focused on device / EDR protection.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
30 out of 38
Digitaliser un processus métier-10jrs-ImplemterTalanCréation d’une application low-code unique, intuitive et moderne s'appuyant sur des technologies avant gardistes.
+3
Applicable to:
Power BI apps
Power Automate
Power Apps
31 out of 38
BSE_Cybersecurity_Empower_CYRENProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans la sécurisation de votre SI
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 38
Microsoft 365 Copilot PromptathonORBIS SEEin Tag, der Microsoft 365 Copilot erlebbar macht:
Mitarbeitende entwickeln gemeinsam praxisnahe Use Cases – begleitet von Coaches und Schulungen für mehr Effizienz und KI-Kompetenz im Arbeitsalltag.
+1
Applicable to:
Adoption & Change Management
33 out of 38
Power Apps ConsultancyParge Yazilim Danismanlik Tic.A.S.Pargesoft design solutions for client's workflows by listening closely to clients and understand their business needs with experienced consultants that are specialized in process flows & management
+1
Applicable to:
Power Apps
34 out of 38
ModernIdentity: 3-Months ImplementationEconocom Workplace infra InnovationUnifier la gestion des identités et des accès grâce à Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
35 out of 38
FONDATION ZERO TRUST - 2 Days AtelierJCD GROUPEConstruire les fondations du modèle de sécurité « Zero Trust » avec la sécurité des identités
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 38
CLOUD PC - 3 Days - AtelierJCD GROUPEOffrez à vos employés l'accès à une expérience de bureau sécurisée, où qu'ils soient
+2
Applicable to:
Cloud Security
Identity & Access Management
37 out of 38
MODERN MANAGEMENT- 2 Days - AtelierJCD GROUPEGérez et protégez matériels, données et utilisateurs avec Microsoft Endpoint Manager afin d'améliorer le niveau de sécurité global de votre plateforme
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
38 out of 38