Zum Hauptinhalt wechseln
Marketplace
Feedback geben
Hilfe und Support
Gespeicherte Elemente
Private Pläne
Nur einen Moment, wir melden Sie an...
Alle
Produkte
Kategorien
Branchen
Partner
Filter
Alle löschen
Ihr Standort
Ihr Standort
Produkte (1)
Produkte (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Einführungs- und Änderungsverwaltung
Einführungs- und Änderungsverwaltung
Telefonsystem über Microsoft Teams
Telefonsystem über Microsoft Teams
Cloud Security
Cloud Security
Beratungsdienste zur Compliance
Beratungsdienste zur Compliance
Gerätebereitstellung und -verwaltung
Gerätebereitstellung und -verwaltung
Mitarbeiter in Service und Produktion
Mitarbeiter in Service und Produktion
Identity & Access Management
Identity & Access Management
Information Protection & Governance
Information Protection & Governance
Insiderrisiko
Insiderrisiko
Wissen und Erkenntnisse
Wissen und Erkenntnisse
Besprechungsräume für Microsoft Teams
Besprechungsräume für Microsoft Teams
Besprechungen für Microsoft Teams
Besprechungen für Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Verwaltung mobiler Geräte
Verwaltung mobiler Geräte
Power Platform for Teams
Power Platform for Teams
Benutzerdefinierte Teams-Lösungen
Benutzerdefinierte Teams-Lösungen
Einsatz von Teamwork
Einsatz von Teamwork
Bedrohungsschutz
Bedrohungsschutz
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Branchen
Branchen
Diensttyp
Diensttyp
Preismodell
Preismodell
Beratungsdienste Ergebnisse
Es werden Ergebnisse in beratungsdienste angezeigt.
Anzeigen
verknüpfte Ergebnisse in branchenclouds
.
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week Project
Virteva LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Get a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
1 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk Engagement
CloudScale International
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
2 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed Service
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
3 out of 60
Microsoft Sentinel Quick Start
Edgile, Inc.
+1
Applicable to:
Cloud Security
Production pilot, which is expected to provide centralized log collection, detection of previously undetected threats, investigation with artificial intelligence, and Rapid Response to incidents.
4 out of 60
Communication Security Quick Start 12-wk Implementation
Edgile, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
5 out of 60
Endpoint Security Advanced Quick Start 14-wk Implementation
Edgile, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats.
6 out of 60
Endpoint Security Basic Quick Start 12-wk Implementation
Edgile, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Achieve a Microsoft pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats
7 out of 60
Hybrid Identity Security Quick Start 12-wk Implementation
Edgile, Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
8 out of 60
Virteva Microsoft 365 Defender Ready Deploy
Virteva LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
9 out of 60
Digital Workplace Program: 4-week Assessment
Quisitive
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
The Digital Workplace Foundations Assessment helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tool
10 out of 60
Defender for Endpoint and Defender for Server Deployment
CISILION LTD
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
11 out of 60
Microsoft 365 Security: 2-week assessment
Mirai Security Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
12 out of 60
MXDR Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
13 out of 60
Microsoft Defender for Office Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
14 out of 60
Windows 365 Deployment : 12 month Implementation
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Patriot will design, configure, test and deploy Microsoft Windows 365 for your environment.
15 out of 60
Exchange Online Migration: 6-Week Deployment
Cyclotron Inc.
+2
Applicable to:
Cloud Security
Information Protection & Governance
Exchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
16 out of 60
Enable Data Leak Prevention: 5-Day Configure and Enable DLP Policies
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Protect your organization from data leaks, block the transfer of confidential information, use our tool for monitoring your daily work of employees to find security weaknesses before the incident.
17 out of 60
Defender Pilot
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
The Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
18 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Shadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
19 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
The primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
20 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Configure and customize transport rules in Microsoft Exchange Online, ensuring efficient email routing, improved security, and compliance for your organization.
21 out of 60
Office 365 Tenant - Initial Setup: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
The goal is to efficiently and effectively set up your organization's Office 365 tenant, enabling seamless access to a suite of productivity tools and collaboration services.
22 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
This service moves key server tasks to a new one for upgrades or system changes.
23 out of 60
Assessment and Roadmap: Microsoft Security (Azure, Microsoft 365, Active Directory, Entra ID) 6-Week Engagement
Kudelski Security
+2
Applicable to:
Cloud Security
Compliance Advisory Services
This assessment defines and recommends steps to achieve your desired security state using your existing security solutions and capabilities.
24 out of 60
Microsoft 365 / Office 365 / Azure / Dynamics 365 Knowledge Transfer: 3-Hours Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Unlock the true potential of your Microsoft 365 environment with our specialized "Knowledge Transfer" consulting service – a roadmap to maximize your organization's capabilities.
25 out of 60
Cloud App Security Information and Threat Protection: 3-Wk Professional service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Protect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
26 out of 60
Multi-Factor Authentication - Initial Setup: 3-Professional service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
The goal of the service is to make Microsoft 365 accounts safer by adding an extra layer of security, so only authorized users can access them.
27 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
28 out of 60
Get AI Ready: 5-Day Assessment
PSM Partners
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
AI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
29 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
30 out of 60
Digital Transformation Calls: 1-Day Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Qualified assistance in resolving any issues after migration to the Microsoft 365 cloud services.
31 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Service used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
32 out of 60
Endpoint Security Foundations 50 users: 1-Yr
Red River Technology LLC
+2
Applicable to:
Cloud Security
Threat Protection
Endpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
33 out of 60
Microsoft 365 Security: 30-Days Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Establish a foundational, secure environment for clients by configuring their Microsoft 365 tenant with core security features.
34 out of 60
Foundational Identity Analysis
JourneyTEAM
+1
Applicable to:
Cloud Security
Ensure a Secure Foundation for Microsoft Cloud Services using our Foundational Identity Analysis.
35 out of 60
Copilot for Microsoft 365 Assessment
It1 Source LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Prepare your organization for the future of AI technology with a secure, productive, and modernized data foundation
36 out of 60
Modern Managed Services: 2-tägiges Assessment
novaCapta GmbH
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Ihre Optionen für Managed Services rund um Endpunkte, Microsoft Azure, Microsoft 365 und Security am Modern Workplace entdecken
37 out of 60
Cybersecurity Assessment: 5-Wk Assessment
PSM Partners
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
This assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
38 out of 60
Cyderes Microsoft Security Adoption Advisory
Cyderes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
The Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
39 out of 60
Office 365 Encrypted Email - Initial Setup: 1-Day Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost Microsoft 365 security with default encryption. Elevate messaging protection and implement email encryption and rights protection for sensitive data.
40 out of 60
Cutover Exchange Online migration from any IMAP email system: 7-Days Professional service
IT Partner LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Migrate users, email data, and email folders from any IMAP system to Microsoft 365 / Exchange Online.
41 out of 60
Cyber Security Health Check: 4-Hr Assessment
eGroup Enabling Technologies
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Cyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
42 out of 60
Fortis Assessment SOC2
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
43 out of 60
Fortis IR Readiness Assessment
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
44 out of 60
Fortis Activerecovery Incident Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
According to multiple studies, breaches and ransomware have more than doubled in the past year.
45 out of 60
Defender for Office 365: 5-Day Assessment
eGroup Enabling Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Microsoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
46 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk Assessment
ErgoServices
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ergo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
47 out of 60
Power Apps - 4 Week Engagement
Synergy Technical, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
The one thing that can make or break the process is how well the IT integration project goes. M&A transactions have a defined transition services agreement that says how long the new company can use t
48 out of 60
Microsoft Cloud PC - 4 Day Proof of Concept Engagement
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Our Microsoft Cloud PC offering is designed to help organizations simplify desktop management, increase security, streamline application delivery and increase end user satisfaction.
49 out of 60
Secure Hybrid Work Offering
Ivision, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Work from anywhere while safeguarding critical business assets and data.
50 out of 60
Windows 365 Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
51 out of 60
XENSHIELD365 - Managed Detection and Response (MDR)
Xencia Technology Solutions Pvt Ltd
+2
Applicable to:
Cloud Security
Threat Protection
24x7 Managed Security Operations SoC through shared team of Security experts Defender XDR
52 out of 60
XENMDM - Monthly SoC Support for Mobile Devices
Xencia Technology Solutions Pvt Ltd
+1
Applicable to:
Cloud Security
Microsoft Intune platform based Managed Services covering device management, control and compliance along with monitoring and remediation of issues, policies, users, devices and threats.
53 out of 60
Copilot for Security: 3-week Proof of Concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
54 out of 60
Cybersecurity Assessment Engagement - 4 weeks
Grant Thornton LLP
+2
Applicable to:
Cloud Security
Identity & Access Management
Enhance Your Cloud Security Posture with Grant Thornton’s Cybersecurity Assessment
55 out of 60
Threat Protection Engagement - 4 weeks
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Improve your Security Posture with Grant Thornton's Threat Protection Engagement
56 out of 60
Dynapt Advisory Services for Microsoft 365 Copilot 3 Week Workshop
Dynapt Inc
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Unleash the potential of AI to transform your business operations with Microsoft 365 Copilot.
57 out of 60
Energy Cybersecurity Assessment: 5-Wk Assessment
PSM Partners
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
This assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
58 out of 60
Implementation of Microsoft Defender for Office 365
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
59 out of 60
Workshop for Microsoft 365 Threat Protection
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Workshop for Microsoft 365 Threat Protection provides the following objectives to ensure thorough enablement of crucial Microsoft products for a more secure environment.
60 out of 60
Zurück
8
9
10
11
12
Weiter