Pasar al contenido principal
Marketplace
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Productos
Categorías
Sectores
Asociados
Filters
Clear all
Su ubicación
Su ubicación
Productos (1)
Productos (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adopción y administración de los cambios
Adopción y administración de los cambios
Llamada para Microsoft Teams
Llamada para Microsoft Teams
Seguridad en la nube
Seguridad en la nube
Servicios de asesoría de cumplimiento
Servicios de asesoría de cumplimiento
Implementación y administración de dispositivos
Implementación y administración de dispositivos
Trabajadores de primera línea
Trabajadores de primera línea
Administración de identidad y acceso
Administración de identidad y acceso
Information Protection y Gobernanza
Information Protection y Gobernanza
Riesgo interno
Riesgo interno
Conocimiento e información
Conocimiento e información
Salas de reuniones para Microsoft Teams
Salas de reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Administración de dispositivos móviles
Administración de dispositivos móviles
Power Platform for Teams
Power Platform for Teams
Soluciones personalizadas de Teams
Soluciones personalizadas de Teams
Implementación de trabajo en equipo
Implementación de trabajo en equipo
Protección contra amenazas
Protección contra amenazas
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Sectores
Sectores
Tipo de servicio
Tipo de servicio
Modelo de precios
Modelo de precios
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
Implementing Defender for Endpoint & Cloud App Security
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
1 out of 60
MDS - Cybersecurity Assessment
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
2 out of 60
Olive + Goose Data Security Workshop
Olive + Goose
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Enhance Your Organization’s Security with a Comprehensive Data Security Workshop
3 out of 60
Lightstream Threat Protection Assessment and Deployment Roadmap
Lightstream
+2
Applicable to:
Cloud Security
Threat Protection
Leveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
4 out of 60
Hybrid Infrastructure Overview Workshop
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Rapid hybrid‑cloud design workshop — learn best practices, pitfalls, and licensing tips for Microsoft on‑prem + Azure/Microsoft 365.
5 out of 60
MDS - Zero Trust Assessment & Advisory
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
6 out of 60
Microsoft Sentinel - Monitor file access and permission changes in SharePoint Implementation: 5-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Implement Microsoft Sentinel for monitoring file access and permission changes in SharePoint, ensuring prompt detection and notification of unauthorized or unwanted activities.
7 out of 60
Microsoft 365 Copilot Adoption: 2-3 Week Assessment
Coretek Services
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Evaluate the current customer Microsoft investments adoption of Microsoft Cloud Services and overall Security posture in an effort to develop a "Art of the Possible" to Adopt Microsoft 365 Copilot.
8 out of 60
Microsoft 365 Migration 12 Hour Proof-of-Concept
New Charter Technologies, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
9 out of 60
Defender for Office365
Suri Services SC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Suri Services y Office 365: La alianza impenetrable en ciberseguridad.
10 out of 60
UNITE: Cyber Security Assessment_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
11 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and Planning
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Shorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
12 out of 60
Sentinel Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
13 out of 60
Inviso KickStarter - Microsoft 365 E3 Adoption
Inviso Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Helping customers KickStart features in Microsoft 365 E3 Subscription
14 out of 60
AvePoint Policies & Insights: 10-Days Assesments
IT-Dev sp. z o.o.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Assesment's outcomes: • Enable centralized reporting on Microsoft 365 security. • Discover potential risks and exposed content. • Enforce policies and automatically remediate security breaches!
15 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom Demo
Mazzy Technologies Corp.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
16 out of 60
Protect 365 App - 1 hour implementation
Cloud Life
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
17 out of 60
Security Modernization: 3 Day Workshop
Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Safeguard your business with a three-step security modernization solution from Netwoven
18 out of 60
Enabled Microsoft 365 Productivity: 12-MO Briefing
eGroup Enabling Technologies, LLC
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Mobile Device Management
Get the expertise needed to successfully manage Microsoft 365 with eGroup Enabling Technologies, LLC. Enabled Microsoft 365.
19 out of 60
Lightstream Complimentary Microsoft 365 Core Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
20 out of 60
Lenovo Cyber Resiliency as a Service Tuning
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
21 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
22 out of 60
Microsoft 365 Security Program - 10 Weeks
Trace3
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
23 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers detect, investigate, and take action to mitigate risk and ensure compliance in their modern workplace.
24 out of 60
Copilot for Micosoft 365 Readiness: 2-Day Workshop
CTGlobal A/S
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Plan adoption of Copilot for Microsoft 365 through explicit scenarios, use cases and data governance. Develop strategies for seamless onboarding and future integrations. In a safe and secure workshop.
25 out of 60
Security and Operations with Expert Microsoft 365 Support
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Maximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
26 out of 60
CMMC Implementation for Microsoft 365 (8 Wk Proj)
Summit 7 Systems, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Summit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) technical control practices associated with Level 2 for Microsoft 365, as well as Azure and AAD
27 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-Weeks
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
28 out of 60
Purview Information Protection: setup and adoption
Dev4Side
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Protect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
29 out of 60
Zero Trust Baseline Pilot 8-Week Implementation
Invoke
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
30 out of 60
Microsoft 365 Copilot Implementation Readiness Assessment
Collective Insights
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Actionable recommendations in data security, technical infrastructure, user adoption, and workflow integration, ensuring preparation to adopt and integrate new technologies.
31 out of 60
Tenant to Tenant Migration for AAD, EXO and OD4B Services Only: 1-Week Implementation
IT Partner LLC
+2
Applicable to:
Adoption & Change Management
Cloud Security
Microsoft 365 Tenant-to-Tenant Migration Including Azure AD, Exchange Online and OneDrive for Business services and data
32 out of 60
Microsoft 365 Copilot Onboarding Workshop
SMART business LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Join our interactive workshop to learn about the capabilities of Microsoft Copilot for Microsoft 365!
33 out of 60
Intune and Defender - Zero Trust Implementation by C1st
C1st Technologies LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
C1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
34 out of 60
Microsoft Secure Score - increase to 200: 3-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
The goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
35 out of 60
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour Assessment
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
36 out of 60
Microsoft 365 Assessment
TechNet UC LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Our assessment provides a thorough analysis of your current Microsoft 365 environment, identifying areas for improvement and offering actionable recommendations to enhance performance and security.
37 out of 60
Data Loss Prevention: 3-Wk POC
FPT/Intellinet
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Discover, classify, and protect sensitive data to prevent any inadvertent exposure.
38 out of 60
Microsoft 365 Security: 4-Week Assessment
Apex Digital Solutions
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most and improving your security maturity over time.
39 out of 60
Incident Response Retainer
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
40 out of 60
Zero Trust as a Service (ZTaaS)
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital transformation and adopting AI starts with building a secure foundation.
41 out of 60
Unified Access & Protection with Microsoft Entra Global Secure Access
Mobile Mentor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Step confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
42 out of 60
Microsoft 365 E5 Zero Trust Security Assessment
SHI International Corp
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Explore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
43 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Multi-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
44 out of 60
Cybersecurity Assessment Engagement
adaQuest
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Get a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
45 out of 60
Microsoft Sentinel Workshop and Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
46 out of 60
Microsoft Defender for Endpoint: 4-Week Implementation
Invoke
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understand your current use cases for antimalware / endpoint detection and response, map those use cases to Defender, and execute on a migration and rollout to Defender for Endpoint.
47 out of 60
Change Management 6-Months Implementation
Supremo Sp. z o.o.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Bądź pewny, że zaangażowanie użytkowników i przyjęcie nowych rozwiązań przyczyni się do sukcesu wdrożenia, sukcesu całej organizacji.
48 out of 60
Fortis IR Compromise Assessment
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A high-level forensics evaluation designed to identify current and past threat activity.
49 out of 60
Cyber Security Assessment
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
50 out of 60
Endpoint Management: 3 Days Workshop
INOVASYS FOR SYSTEMS
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Microsoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
51 out of 60
Modern SecOps Engagement (Security Operations)
Performanta
+2
Applicable to:
Cloud Security
Threat Protection
Get an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft SecOps Engagement
52 out of 60
Copilot Readiness Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
53 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
54 out of 60
Cloud Security Journey: 2 Hour Proof of Concept
360 Visibility Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
55 out of 60
Threat Protection - 7 days Implementation
SPAN d.d.
+2
Applicable to:
Cloud Security
Threat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
56 out of 60
Microsoft Cloud PC - 4 Day Proof of Concept Engagement
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Our Microsoft Cloud PC offering is designed to help organizations simplify desktop management, increase security, streamline application delivery and increase end user satisfaction.
57 out of 60
Comprehensive Threat Protection: Free Workshop
Long View Systems
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Protect against advanced threats with Long View’s Threat Protection, leveraging Microsoft Defender for full security.
58 out of 60
Aseguramiento de ciberseguridad: taller 4 semanas
Sofistic Colombia SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
59 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free Briefing
Netwoven
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Netwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
60 out of 60
Anterior
4
5
6
7
8
Siguiente