Pasar al contenido principal
Marketplace
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Productos
Categorías
Sectores
Asociados
Filters
Clear all
Su ubicación
Su ubicación
Productos (1)
Productos (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adopción y administración de los cambios
Adopción y administración de los cambios
Llamada para Microsoft Teams
Llamada para Microsoft Teams
Seguridad en la nube
Seguridad en la nube
Servicios de asesoría de cumplimiento
Servicios de asesoría de cumplimiento
Implementación y administración de dispositivos
Implementación y administración de dispositivos
Trabajadores de primera línea
Trabajadores de primera línea
Administración de identidad y acceso
Administración de identidad y acceso
Information Protection y Gobernanza
Information Protection y Gobernanza
Riesgo interno
Riesgo interno
Conocimiento e información
Conocimiento e información
Salas de reuniones para Microsoft Teams
Salas de reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Administración de dispositivos móviles
Administración de dispositivos móviles
Power Platform for Teams
Power Platform for Teams
Soluciones personalizadas de Teams
Soluciones personalizadas de Teams
Implementación de trabajo en equipo
Implementación de trabajo en equipo
Protección contra amenazas
Protección contra amenazas
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Sectores
Sectores
Tipo de servicio
Tipo de servicio
Modelo de precios
Modelo de precios
Consulting services results
Showing results in consulting services.
Avanade Intelligent Security Operations
Avanade, Inc.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
AI-driven, pre-packaged Security Operations offering that rapidly modernizes security operations using the Microsoft Security platform, with optional managed services to extend value.
1 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed Service
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
2 out of 60
Endpoint Security Foundations 50 users: 1-Yr
Red River Technology LLC
+2
Applicable to:
Cloud Security
Threat Protection
Endpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
3 out of 60
Data Security with Microsoft Purview Solutions
BDO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Enhance data security control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
4 out of 60
Fortis IR Readiness Assessment
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
5 out of 60
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 Wk
Lighthouse Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
This hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
6 out of 60
Security Audit and Recommendations: 3-Days Consulting Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Goal: help organizations review their security settings, configurations, and policies to identify any potential vulnerabilities and ensure that the tenant is properly secured against external threats.
7 out of 60
Managed Support for Microsoft Defender and Endpoint Detection and Response (EDR) Service
Olive + Goose
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
A fully managed Microsoft Defender + EDR service designed to protect your organization from today’s most persistent cyber threats.
8 out of 60
Microsoft 365 Migration: 10-Wk Implementation
abra
+2
Applicable to:
Cloud Security
Power Platform for Teams
Successfully migrate your Microsoft 365 environment to a managed services model.
9 out of 60
Fortis IR Active Recovery
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
10 out of 60
NEST Arena
Noibit
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Two-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
11 out of 60
Security Assessment: 2-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
12 out of 60
Endpoint Security Basic Quick Start 12-wk Implementation
Edgile, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Achieve a Microsoft pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats
13 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
14 out of 60
Office 365 Tenant - Initial Setup: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
The goal is to efficiently and effectively set up your organization's Office 365 tenant, enabling seamless access to a suite of productivity tools and collaboration services.
15 out of 60
Microsoft 365 E5 Shield Deployment: 8 Week Imp.
KAMIND IT, Inc
+2
Applicable to:
Cloud Security
Threat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack
16 out of 60
Microsoft 365 Value Discovery - Workshop - 1 Day
DynTek Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT OF MICROSOFT 365 IN YOUR ENVIRONMENT
17 out of 60
Microsoft Cybersecurity: 1 Month Assessment
Big Cloud Consultants
+2
Applicable to:
Cloud Security
Threat Protection
Our expert team will work with you to assess your current security posture and develop recommendations for appropriate improvements.
18 out of 60
T-Mobile USA Implementation of Microsoft 365
T-Mobile USA, Inc.
+3
Applicable to:
Adoption & Change Management
Calling for Microsoft Teams
Cloud Security
Certified Cloud Professional Services from T-Mobile offers an extension of your IT capabilities that provides technical support from end-to-end
19 out of 60
Secure AI Quickstart: 3-week Assessment and Proof of Concept
Quisitive
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Secure AI Quick Start is a fundable, Microsoft-aligned security engagement that rapidly analyzes organizational AI readiness and identifies critical security & governance improvements
20 out of 60
Data Security Assessment
PSM Partners
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
This assessment is designed to help companies identify their data security, privacy, and compliance goals while accelerating their compliance journey using the latest Microsoft technologies.
21 out of 60
Microsoft Managed Security Services
Netrix Global
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Netrix’s 24x7x365 virtual Security Operations Center (SOC) leverages Microsoft’s enterprise-grade security software to monitor and respond to incidents as well as proactively hunt threats.
22 out of 60
Microsoft 365 Defender 10-week Implementation
Cyclotron Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender for enterprises, resulting in improved detection rates, threat coverage, and organizational security posture.
23 out of 60
MXDR Consultation
CBTS Technology Solutions LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
24 out of 60
XENMDM - Monthly SoC Support for Mobile Devices
Xencia Technology Solutions Pvt Ltd
+1
Applicable to:
Cloud Security
Microsoft Intune platform based Managed Services covering device management, control and compliance along with monitoring and remediation of issues, policies, users, devices and threats.
25 out of 60
TSG Microsoft Security Risk Assessment
Technology Service Group Ltd
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Assess your true cyber risk. Get a practical roadmap built on the Microsoft Security stack.
26 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeks
Plain Concepts
+2
Applicable to:
Cloud Security
Information Protection & Governance
The objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
27 out of 60
IT Infrastructure Optimization
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
IT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
28 out of 60
MDR Workshop
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
29 out of 60
Microsoft 365 Copilot Readiness Assessment (Security, Data, Governance)
BlueAlly Technology Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Assess your Microsoft 365 environment for secure Copilot adoption. Identify risks from oversharing, legacy auth, and data gaps, and get a roadmap to strengthen security and compliance readiness.
30 out of 60
Securing Identities and Access: 3-day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
31 out of 60
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week Implementation
Quisitive
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Quisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
32 out of 60
Management Services: 3-month Assessment
Quisitive
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Quisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
33 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Advanced endpoint security and threat protection: detect, investigate, and respond to attacks.
34 out of 60
Quick Start Accelerator for Microsoft Intune
WIZARD GROUP LIMITED
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
35 out of 60
Mergers & Acquisitions Integration Services in 90: Three (3) Month Transition
Long View Systems
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Support a seamless user experience and align business operations from Day One of any merger, acquisition, or system migration.
36 out of 60
Hybrid Identity Security Quick Start 12-wk Implementation
Edgile, Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
37 out of 60
Quisitive Agentic AI Security Foundation
Quisitive
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Agentic AI Security Foundation & Readiness offering is a focused, execution‑led engagement designed to help enterprises establish early control and visibility across agentic AI systems.
38 out of 60
Remote Access to On-Prem Apps: 3 Wk Implementation
Invoke
+2
Applicable to:
Cloud Security
Identity & Access Management
Surface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
39 out of 60
SYSTEX Data Security and Compliance Solution
精诚(中国)企业管理有限公司
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
40 out of 60
Threat Protection Engagement FY25
The Tech Mavericks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
41 out of 60
Protect and Govern Sensitive Data: 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
42 out of 60
ECF Data Threat Protection: 3-Day Workshop
ECF Data LLC
+2
Applicable to:
Cloud Security
Threat Protection
The Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
43 out of 60
Avanade Cybersecurity Services Global offerings FY23
Avanade, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
44 out of 60
Multi-Factor Authentication - Initial Setup: 3-Professional service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
The goal of the service is to make Microsoft 365 accounts safer by adding an extra layer of security, so only authorized users can access them.
45 out of 60
Modern SecOps Engagement (Security Operations)
Performanta
+2
Applicable to:
Cloud Security
Threat Protection
Get an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft SecOps Engagement
46 out of 60
Digital Workplace Program: 4-week Assessment
Quisitive
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
The Digital Workplace Foundations Assessment helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tool
47 out of 60
Managed Extended Detection & Response (MXDR) for Workplace: 2 Hr Workshop
Netwoven
+2
Applicable to:
Cloud Security
Threat Protection
Learn how to put next generation Microsoft security tools to work for you.
48 out of 60
Defend Against Threats with SIEM Plus XDR Workshop
The Tech Mavericks
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Defend Against Threats with SIEM Plus XDR Workshop will help you achieve broader security objectives—and identify current and real threats.
49 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
50 out of 60
Assessment-Implementation Plan for Information Protection: 3-Months Assesment
Cipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
51 out of 60
Copilot for Microsoft 365 Data Security QuickStart
Softchoice
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Setting the foundation for data security and governance in preparation for Copilot for Microsoft 365
52 out of 60
Microsoft Security Assessment
DataVox
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
This assessment provides a comprehensive review of the Microsoft 365 environment, focusing on configuration, security posture, identity management, and data governance.
53 out of 60
discover-sensitive-data-workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
54 out of 60
Healthcare Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
55 out of 60
Cyderes Microsoft Security Adoption Advisory
Cyderes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
The Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
56 out of 60
Zero Trust Model - 4h assessment
Reply
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Zero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
57 out of 60
KK_Exchange_Migration Consulting Services
Kraft Kennedy
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Moving to Exchange Online significantly extends the use of Microsoft 365 by modernizing communication infrastructure, enhancing security, and unlocking integrated productivity features.
58 out of 60
Data Security & Protection: 8 weeks - Implementation
Mazzy Technologies Corp.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
59 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementation
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
60 out of 60
Anterior
7
8
9
10
11
Siguiente