Pasar al contenido principal
Marketplace
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Productos
Categorías
Sectores
Asociados
Filtros
Borrar todo
Su ubicación
Su ubicación
Productos (1)
Productos (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adopción y administración de los cambios
Adopción y administración de los cambios
Llamada para Microsoft Teams
Llamada para Microsoft Teams
Seguridad en la nube
Seguridad en la nube
Servicios de asesoría de cumplimiento
Servicios de asesoría de cumplimiento
Implementación y administración de dispositivos
Implementación y administración de dispositivos
Trabajadores de primera línea
Trabajadores de primera línea
Administración de identidad y acceso
Administración de identidad y acceso
Information Protection y Gobernanza
Information Protection y Gobernanza
Riesgo interno
Riesgo interno
Conocimiento e información
Conocimiento e información
Salas de reuniones para Microsoft Teams
Salas de reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Administración de dispositivos móviles
Administración de dispositivos móviles
Power Platform for Teams
Power Platform for Teams
Soluciones personalizadas de Teams
Soluciones personalizadas de Teams
Implementación de trabajo en equipo
Implementación de trabajo en equipo
Protección contra amenazas
Protección contra amenazas
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Sectores
Sectores
Tipo de servicio
Tipo de servicio
Modelo de precios
Modelo de precios
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Defend Against Threats with SIEM Plus XDR Workshop
The Tech Mavericks
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Defend Against Threats with SIEM Plus XDR Workshop will help you achieve broader security objectives—and identify current and real threats.
1 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Multi-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
2 out of 60
Cutover Google Workspace to Office 365 migration (IMAP migration). Just email and email folders: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Migration of email data and email folders from G Suite (Google Apps) to Microsoft 365 / Exchange Online.
3 out of 60
Data Loss Prevention: 3-Wk POC
FPT/Intellinet
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Discover, classify, and protect sensitive data to prevent any inadvertent exposure.
4 out of 60
Copilot adoption for customer service
Conterra
+2
Applicable to:
Adoption & Change Management
Cloud Security
Transform customer service processes with Copilot and Conterra Copilot Adoption Offer: 4-Wk Imp
5 out of 60
GoDaddy to Office 365 Migration
SkyTerra Technologies LLC
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
If you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
6 out of 60
Data Protection Impact Assessment: 8 Wk
Lighthouse Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Empowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
7 out of 60
Secure Your Productivity 3-Day Workshop
Hitachi Solutions
+2
Applicable to:
Cloud Security
Device Deployment & Management
Organizations are challenged with integrating their remote workforce, and to how best increase collaboration, productivity, and security.
8 out of 60
Fortis IR Active Recovery
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
9 out of 60
SNP’s Approach to Copilot for Microsoft 365
SNP Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
10 out of 60
Cybersecurity: Protect Your Operations with Henson Group
The Henson Group
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Henson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
11 out of 60
Advanced Email Security: 4-Day Implementation
FSI Strategies
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Leverage Microsoft Defender for Office 365 to implement best in class email security
12 out of 60
Copilot Preparedness and Planning Workshop
CDI LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
The Copilot workshop will prepare your organization to utilize copilot by identifying key scenarios and gaps in current configuration to improve ROI of using Copilot.
13 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for Endpoint
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
14 out of 60
Cybersecurity Assessment Engagement
adaQuest
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Get a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
15 out of 60
Microsoft Purview QuickStart: Implementation
Kraft Kennedy
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Kraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
16 out of 60
Defend Against Threats with SIEM Plus XDR: 8H Workshop
adaQuest
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
17 out of 60
Virtual Desktop - Health and Configuration 1 Week Assessment
CDI LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
CDI provides a review of a customer's Virtual Desktop environment and identify opportunities to improve the performance, stability, security and manageability.
18 out of 60
Advanced Threat Analytics: 7-Day Installation
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Advanced Threat Analytics (ATA) is a complex system that allows you to protect your IT infrastructure from a variety of information threats and cyberattacks.
19 out of 60
Threat Protection Engagement
Neway Technologies
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance your organization's security stance with a Neway Threat Protection Engagement.
20 out of 60
Healthcare Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
21 out of 60
Microsoft Security Immersion: 1 Day Briefing
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Knowing that your time is valuable, we have developed a true to life, hands-on, interactive session designed to give you a deep understanding of the Microsoft 365 Security suite of products.
22 out of 60
Security für den Einsatz von Microsoft 365 Copilot
novaCapta GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Eine sichere Basis schaffen und technische Hindernisse aus dem Weg räumen für den Einsatz von Copilot for Microsoft 365
23 out of 60
Olive + Goose Data Security Workshop
Olive + Goose
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Enhance Your Organization’s Security with a Comprehensive Data Security Workshop
24 out of 60
Microsoft Secure Cloud Business Applications (SCuBA) Workshop 2-Day Workshop
CDI LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
An assessment of your Microsoft 365 security in accordance with the Cybersecurity and Infrastructure Security Agency which could lead to appropriate adoption of your existing security licensing.
25 out of 60
Threat Protection - 7 days Implementation
SPAN d.d.
+2
Applicable to:
Cloud Security
Threat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
26 out of 60
discover-sensitive-data-workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
27 out of 60
Microsoft 365 Security Assessment up to 6 weeks
ACTS
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
ACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
28 out of 60
Endpoint Management: 2-Week Implementation
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Maintain control over your devices and the data stored on them to stay protected in a cloud-focused environment.
29 out of 60
Zero Trust Security: 3-day Workshop
Oxford Computer Group LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
30 out of 60
Intune and Defender - Zero Trust Implementation by C1st
C1st Technologies LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
C1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
31 out of 60
Microsoft 365 Copilot Readiness Assessment & Adoption
Heartland Business Systems, LLC
+3
Applicable to:
Cloud Security
Knowledge & Insights
Teamwork Deployment
Microsoft 365 Copilot enhances business intelligence, processes, and data analysis. A Readiness Assessment prepares for AI integration with a customized plan, tailored recommendations & training.
32 out of 60
BCN Intranet Lite
BCN Group Ltd.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
33 out of 60
Securing Identities and Access: 3-day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
34 out of 60
Exchange Online Migration
DataVox
+3
Applicable to:
Adoption & Change Management
Cloud Security
Mobile Device Management
Migrating emails to Office 365 includes assessing the environment, choosing a method (Cutover, Staged, Hybrid, or IMAP), migrating data, updating DNS, configuring devices, and user training.
35 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
The goal of the service is to securely remove your previous Exchange Server, ensuring it doesn't disrupt your operations and enabling a smooth transition to Exchange Online.
36 out of 60
Microsoft 365 Security: 90 Days Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Establish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
37 out of 60
iT1's Security Assessment
It1 Source LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Improve your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
38 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Apply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
39 out of 60
Microsoft 365 Security Workshop
Olive + Goose
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Improve your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
40 out of 60
Compliance Managed Services
Forsyte IT Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Organizations everywhere are experiencing the benefits of Compliance Managed Services. Work with our Microsoft Gold Partner team to establish governance and manage user access and data security.
41 out of 60
Microsoft Secure Score - increase to 200: 3-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
The goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
42 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Strengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
43 out of 60
Agent 365 Implementation Program
Anthrowiz
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Govern, secure, and operationalize AI agents across your Microsoft tenant in 5 days - from shadow AI discovery to production-ready deployment.
44 out of 60
Microsoft 365: 2-Week Assessment
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
Establish a clear roadmap and change management plan for your journey to a modern workplace.
45 out of 60
Microsoft Security: 3-Day Workshop
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
46 out of 60
Copilot Advanced Services: 1 Day 3 Workshops
Ness Israel
+3
Applicable to:
Adoption & Change Management
Cloud Security
Workplace Analytics
Unlock the full potential of Microsoft Copilot with our tailored AI services, enhancing security, development and productivity across Microsoft 365 applications through flexible, expert-led sessions.
47 out of 60
MXDR Consultation
CBTS Technology Solutions LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
48 out of 60
UNITE: Cyber Security Assessment_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
49 out of 60
Zero Trust Security Assessment
Citrin Cooperman Advisors, LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Our Zero Trust Security Assessment will evaluate identity, email, data, and endpoint device controls, threat protection, management, and licensing to strengthen your organization's security posture.
50 out of 60
Managed Services Provider
SkyTerra Technologies LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
SkyTerra delivers seamless integration with your existing Microsoft ecosystem, from Azure infrastructure to Microsoft 365 productivity suites.
51 out of 60
Microsoft Sentinel Workshop and Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
52 out of 60
Microsoft Cybersecurity Assessment
Akins IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
53 out of 60
Microsoft Security Copilot POV & Adoption Plan
BDO
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Prove the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
54 out of 60
TS As a Services (TSaaS): 5-day Implementation
E-Level Cloud Services S.A. de C.V.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
55 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeks
Plain Concepts
+2
Applicable to:
Cloud Security
Information Protection & Governance
The objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
56 out of 60
Fortis Assessment Microsoft Online Security
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
57 out of 60
Avanade Cybersecurity Services Global offerings FY23
Avanade, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
58 out of 60
Microsoft 365 Tenant Security Assessment
Daymark Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Strengthen the Security of Your Microsoft 365 Environment.
59 out of 60
Aseguramiento de ciberseguridad: taller 4 semanas
Sofistic Colombia SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
60 out of 60
Anterior
6
7
8
9
10
Siguiente