Pasar al contenido principal
Marketplace
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Productos
Categorías
Sectores
Asociados
Filters
Clear all
Su ubicación
Su ubicación
Productos (1)
Productos (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adopción y administración de los cambios
Adopción y administración de los cambios
Llamada para Microsoft Teams
Llamada para Microsoft Teams
Seguridad en la nube
Seguridad en la nube
Servicios de asesoría de cumplimiento
Servicios de asesoría de cumplimiento
Implementación y administración de dispositivos
Implementación y administración de dispositivos
Trabajadores de primera línea
Trabajadores de primera línea
Administración de identidad y acceso
Administración de identidad y acceso
Information Protection y Gobernanza
Information Protection y Gobernanza
Riesgo interno
Riesgo interno
Conocimiento e información
Conocimiento e información
Salas de reuniones para Microsoft Teams
Salas de reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Administración de dispositivos móviles
Administración de dispositivos móviles
Power Platform for Teams
Power Platform for Teams
Soluciones personalizadas de Teams
Soluciones personalizadas de Teams
Implementación de trabajo en equipo
Implementación de trabajo en equipo
Protección contra amenazas
Protección contra amenazas
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Sectores
Sectores
Tipo de servicio
Tipo de servicio
Modelo de precios
Modelo de precios
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
Copilot for Security Rapid Test Flight | 2-Wk Workshop
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
1 out of 60
Microsoft Priva Assessment: 2 Wk
Lighthouse Global
+2
Applicable to:
Cloud Security
Information Protection & Governance
Empowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
2 out of 60
Copilot for Microsoft 365: Taller De Seguridad Y Datos De 1 Día
Awara IT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Desbloquea el máximo potencial de Copilot for Microsoft 365 mientras refuerzas la seguridad y protección de tus datos con un taller intensivo de un día dirigido por los expertos de Awara IT.
3 out of 60
Endpoint as a Service | Assure 365
CyberOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Fully Managed Endpoint Security with 24x7 monitoring, compliance and Zero Trust enforcement—powered by Microsoft Intune.
4 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
5 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
6 out of 60
Microsoft Copilot for Security: 2 x 4h Workshop
water IT Security GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Get ready for Microsoft’s Copilot for Security and learn how generative AI can strengthen your organization’s IT. We cover everything you need to know – from the implementation to proper prompting.
7 out of 60
Avanade Security Business Value 4-Wk Assessment
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
8 out of 60
Lightstream Data Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Lightstream will Identify data security risks in your organizational data. Identify data security risks in your organizational data
9 out of 60
Microsoft 365 Manage Service–12 mth Implementation
Alfa Connections Pte Ltd
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
Alfa Connections providing Microsoft 365 Managed service is designed to enhance your workforce experience by supporting your organization on planning, enablement, implementation, and adoption.
10 out of 60
TCS Agent Governance as a Service - Implementation - 12 weeks
TCS - Digital Workplace
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Transition from “Shadow AI” to a “governed, enterprise‑grade innovation model”—controlling agent sprawl, data leakage risks, and unvetted maker behavior.
11 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
12 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
13 out of 60
IN - Microsoft 365 Barracuda Cloud to Cloud Backup
Crayon
+1
Applicable to:
Cloud Security
Secure, easy-to-use SaaS backup for your Microsoft 365 data
14 out of 60
Zones Intune Device Endpoint Management Implementation
Zones Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Mobile Device Management
Elevate your mobile device and application management with Intune—a robust solution offering advanced security features like conditional access, multi-factor authentication, and data encryption.
15 out of 60
AI Security Readiness Assessment
ProArch Technologies, Inc
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
ProArch’s AI Security Readiness Assessment delivers a comprehensive evaluation of your cloud and AI environment, identifies critical security gaps, and provides a prioritized roadmap for remediation.
16 out of 60
Dell Implementation Services for Copilot Security
Dell Technologies Services
+1
Applicable to:
Cloud Security
Readiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
17 out of 60
Managed XDR Shield: 4-Week Implementation
Long View Systems
+2
Applicable to:
Cloud Security
Threat Protection
Address all your proactive security needs, engage the Managed XDR Shield plan to monitor, alert, and respond to threats effectively.
18 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
19 out of 60
Microsoft 365: 3 Week Solution Assessment
First National Technology Solutions, Inc.
+3
Applicable to:
Cloud Security
Meetings for Microsoft Teams
Teamwork Deployment
Partner with FNTS to conduct a 3 week workplace modernization solution assessment to build a TOC analysis & evaluate current purchasing structure to make recommendations for adoption of Microsoft 365.
20 out of 60
Multifactor Authentication: 4-Day Implementation
FSI Strategies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
21 out of 60
Implementation of Microsoft Defender for Business | Defender for Endpoint
ITX360 (Pvt) Ltd.
+2
Applicable to:
Cloud Security
Threat Protection
Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
22 out of 60
Identity as a Service | Assure 365
CyberOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Fully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
23 out of 60
Copilot for Microsoft 365: Data Governance Workshop
Reply
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Secure and Enhance Your Microsoft 365 Experience with WM Reply's One-Day Copilot Data Governance Workshop
24 out of 60
Copilot for Microsoft 365 Adoption Accelerator Program - 18 Weeks
Trace3
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
This program's primary objective is to help accelerate client adoption of Copilot for Microsoft 365 and setup the client for continued maturity with their usage of Copilot for Microsoft 365.
25 out of 60
Citrix Endpoint Management to Microsoft Intune Migration Plan
Mobile Mentor
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Mobile Mentor’s Citrix Endpoint Management to Microsoft Intune services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
26 out of 60
Cyber Portfolio Rationalization: 3-Day Workshop
PwC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Simplify your cybersecurity portfolio to reduce the cost and complexity of your Microsoft 365 and Microsoft Azure environment
27 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-Weeks
myCloudDoor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Assess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
28 out of 60
Microsoft 365 Security: 4-hour Assessment
Catapult Systems, LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Catapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
29 out of 60
Cyderes Microsoft 365 Incident Response
Cyderes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Cyderes Digital Forensics and Incident Response (DFIR) services encompass the full security motion and emphasize your ability to respond.
30 out of 60
Unifying Microsoft Sentinel with Cloud Services
AVASOFT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
31 out of 60
Implementation of Copilot readiness assessment
Dev4Side
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
32 out of 60
Threat Protection Workshop
Mobile Mentor
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
During this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
33 out of 60
MDR Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
“MDR Shield” is Long View’s cyber security managed detection and response service.
34 out of 60
Data Security Engagement with Microsoft Purview
Inviso Corporation
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Our Data Security engagement will look over your data estate and establish areas of Security Risk. We will show you the benefits to Microsoft Purview to help protect your environment from risks.
35 out of 60
Endpoint Management with Security Workshop
The Tech Mavericks
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
The Endpoint Management with Security Workshop enables partners to lead customer conversations around modernizing their endpoint management and security capabilities by leveraging Microsoft 365.
36 out of 60
Softchoice Security Platformization Assessment and Design
Softchoice
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
37 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Understand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
38 out of 60
Microsoft 365 Security Review: Assessment
CyberOne
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Identify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
39 out of 60
Microsoft Security: 4-Week Implementation
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Establish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
40 out of 60
Adoption & Change Management: 10-wk Implementation
Campana & Schott GmbH
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Your way to successful implementation and adoption of the modern workplace based on Microsoft 365 and AI technologies
41 out of 60
Microsoft 365 Tenant-to-Tenant Migration
Olive + Goose
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
This offering provides assessment, migration, and post-migration support for transitioning Microsoft 365 workloads and endpoint management from a source Microsoft 365 tenant to a target tenant.
42 out of 60
Microsoft 365 Copilot Readiness Assessment - CRA
TechPlus Talent
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Through this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
43 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5
Collective Insights
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Upgrade to Microsoft 365 E5 for Advanced Productivity and Security
44 out of 60
Microsoft 365 Security Assessment: 3-Week Assessment
Spyglass MTG, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
45 out of 60
Zero Trust Security Assessment
Citrin Cooperman Advisors, LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Our Zero Trust Security Assessment will evaluate identity, email, data, and endpoint device controls, threat protection, management, and licensing to strengthen your organization's security posture.
46 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
47 out of 60
Cloud Security Envisioning Workshop for Microsoft 365
Synechron Technologies
+1
Applicable to:
Cloud Security
Expert-led workshop to assess, adopt, and extend Microsoft 365 security using Defender XDR, Entra ID, Defender for Endpoint, Defender for Office 365, and Defender for Cloud Apps
48 out of 60
Threat Protection: 2-Week Workshop
Forsyte IT Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
49 out of 60
Copilot adoption for legal
Conterra
+2
Applicable to:
Adoption & Change Management
Cloud Security
Transform legal service processes with Copilot and Conterra Copilot Adoption Offer: 4-Wk Imp
50 out of 60
Cloud Security Assessment - 3 Day Workshop
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
51 out of 60
Spyglass-MXDR Managed Detection & Response: 2-week Implementation
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Spyglass-MXDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
52 out of 60
Microsoft Security Deployment: 5-day Workshop
Campana & Schott GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand your Microsoft security posture and minimize risks with the right experts
53 out of 60
Nanyang Bandang security operation services
上海南洋万邦软件技术 有限公司
+1
Applicable to:
Cloud Security
Security operation services with Microsoft Denfender component and Sentinel
54 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
55 out of 60
Microsoft 365 Copilot Accelerator: 12Wk Implementation
BDO Canada
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Leveraging BDO’s Microsoft 365 Copilot Framework, we'll quickly help you assess your readiness and then accelerate your deployment of Microsoft 365 Copilot in just 12 weeks.
56 out of 60
Zero Trust Security Assessment
Concurrency, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess and advance your Zero Trust security posture—and accelerate or expand your Microsoft 365 security strategy with expert-led guidance.
57 out of 60
Hybrid Cloud Security Workshop - 1-Day
Zones, LLC
+1
Applicable to:
Cloud Security
Identify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
58 out of 60
Data Security and Governance Engagement for Microsoft 365: Microsoft Purview Suite
CompuNet
+2
Applicable to:
Cloud Security
Information Protection & Governance
Intelligently investigate and take action on data security risks.
59 out of 60
Copilot for Security Accelerator: 2-week Implementation
abra
+2
Applicable to:
Cloud Security
Threat Protection
Neway’s Microsoft Copilot for Security Accelerator empowers security teams with enhanced protection and streamlined operations through eight key steps.
60 out of 60
Anterior
3
4
5
6
7
Siguiente