Pasar al contenido principal
Marketplace
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Productos
Categorías
Sectores
Asociados
Filtros
Borrar todo
Su ubicación
Su ubicación
Productos (1)
Productos (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adopción y administración de los cambios
Adopción y administración de los cambios
Llamada para Microsoft Teams
Llamada para Microsoft Teams
Seguridad en la nube
Seguridad en la nube
Servicios de asesoría de cumplimiento
Servicios de asesoría de cumplimiento
Implementación y administración de dispositivos
Implementación y administración de dispositivos
Trabajadores de primera línea
Trabajadores de primera línea
Administración de identidad y acceso
Administración de identidad y acceso
Information Protection y Gobernanza
Information Protection y Gobernanza
Riesgo interno
Riesgo interno
Conocimiento e información
Conocimiento e información
Salas de reuniones para Microsoft Teams
Salas de reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Administración de dispositivos móviles
Administración de dispositivos móviles
Power Platform for Teams
Power Platform for Teams
Soluciones personalizadas de Teams
Soluciones personalizadas de Teams
Implementación de trabajo en equipo
Implementación de trabajo en equipo
Protección contra amenazas
Protección contra amenazas
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Sectores
Sectores
Tipo de servicio
Tipo de servicio
Modelo de precios
Modelo de precios
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
1 out of 60
Zero-Trust: 3-Day Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
2 out of 60
Zero Trust Security 10-Hour Assessment
JourneyTEAM
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
JourneyTeam’s Zero Trust Security Assessment is designed to provide a clear, actionable strategy for strengthening your organization’s Microsoft 365 security posture.
3 out of 60
Windows 365 Rapid Deploy
Ivision, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
The ivision Windows 365 Rapid Deployment approach will accelerates the adoption and use case development of Windows 365 virtual desktops.
4 out of 60
Automatic In-Place Upgrade to Windows 10 or 11: 3-Wk Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Seamlessly upgrade PCs from Windows 7, 8, or 8.1 to Windows 10 or 11, ensuring compatibility and minimal user disruption, particularly suited for organizations with more than 25 PCs.
5 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Advanced endpoint security and threat protection: detect, investigate, and respond to attacks.
6 out of 60
Device Mgm and Protection - 12 days Implementation
SPAN d.d.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
7 out of 60
Microsoft 365 HIPAA/HITECH 20 Hour Implementation
New Charter Technologies, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Implementation of Microsoft 365 to include compliance policies and templates for health care.
8 out of 60
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week Implementation
Quisitive
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Quisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
9 out of 60
Company Document Migration to SharePoint Online or Teams: 7-Days Consulting Service
IT Partner LLC
+2
Applicable to:
Cloud Security
Teamwork Deployment
Migration of file shares, folders and documents from your file server or a third-party service like Box, Dropbox, or Google Drive to SharePoint Online or Teams.
10 out of 60
Defend Against Threats with SIEM Plus XDR
Netrix Global
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
11 out of 60
cyber security threat analysis workshop
U-BTech Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
the workshop is design to discover threats and risks
12 out of 60
Data Security & Threat Protection Workshop
ITVT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Identify data security risks in your organizational data & discover vulnerabilities in your environment
13 out of 60
Foundations Agent 365 Assessment & Roadmap
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Executive-ready strategy engagement for Microsoft Agent 365 that helps organizations learn how to prepare for and govern AI agents as a ‘digital workforce,’ with visibility, security, and audit-ready
14 out of 60
Microsoft Defender for 365 Implementation by C1st
C1st Technologies LLC
+2
Applicable to:
Cloud Security
Threat Protection
Enhance email security for businesses by implementing Defender for Office 365 with Exchange Online Protection (EOP). Our goal is to protect organizational email from spam, phishing, and sophisticated
15 out of 60
Threat Protection Engagement: 3-Day Assessment
PSM Partners
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Do more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
16 out of 60
ECF Data Threat Protection: 3-Day Workshop
ECF Data LLC
+2
Applicable to:
Cloud Security
Threat Protection
The Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
17 out of 60
Manage Compliance Obligations & Risks with Microsoft Purview
BDO
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Enhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
18 out of 60
Microsoft 365 Backup Readiness Assessment
ABTechnologies
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Evaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
19 out of 60
MicroAge ManageWise Microsoft 365 Assessment & Services
MicroAge
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Comprehensive assessment of our clients Microsoft 365 tenant providing an Executive summary detailed report to reduce vulnerabilities improving Secure Score with 40 hours of Engineer time
20 out of 60
Security Architecture Design and Implementation Service
上海诺未网络科技有限公司
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
21 out of 60
Threat Protection and Cloud Security: 3 Day Workshop
Netwoven
+2
Applicable to:
Cloud Security
Threat Protection
Improve your security posture with a Microsoft Threat Protection Assessment Workshop
22 out of 60
Managed Extended Detection & Response (MXDR) for Workplace: 2 Hr Workshop
Netwoven
+2
Applicable to:
Cloud Security
Threat Protection
Learn how to put next generation Microsoft security tools to work for you.
23 out of 60
Password-less Authentication: 2-Wk Implemetation
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
24 out of 60
MDR Workshop
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
25 out of 60
Security Audit and Recommendations: 3-Days Consulting Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Goal: help organizations review their security settings, configurations, and policies to identify any potential vulnerabilities and ensure that the tenant is properly secured against external threats.
26 out of 60
Windows Virtual Desktop Implementation: 5-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Provide a streamlined solution using Windows Virtual Desktop (WVD) on Microsoft Azure, offering efficient remote workstations, cost-effective licensing, and Windows 365 in a terminal server format.
27 out of 60
Hybrid Office 365 Migration from your own Exchange Server: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Hybrid migration integrates on-premises Exchange with Microsoft 365, facilitating migration or serving as a permanent state for both organizations.
28 out of 60
Identity and Access Control Implementation
SMART business LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Cybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
29 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk Assessment
Apex Digital Solutions
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
30 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Seamlessly transfer email data and mailboxes between Office 365 tenants during mergers or separations. Ensure continuity for users, minimize disruptions, and enables a smooth transition.
31 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
32 out of 60
Windows 365 QuickStart : 4 Day PoC + Surface Go
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
The Windows 365 Quick Start engagement is designed to show you how Windows 365 + SurfaceGo keeps you productive. Included are a Surface Go, planning services, as well as a proof of concept.engagement
33 out of 60
Comprehensive Exchange Online Security Configuration
TechNet UC LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Unmatched Security and Compliance for Your Exchange Online Environment
34 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementation
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
35 out of 60
Threat Protection: 3-Wk POC
FPT/Intellinet
+2
Applicable to:
Cloud Security
Threat Protection
Identify security threats and begin to respond and mitigate.
36 out of 60
TSG Microsoft Security Risk Assessment
Technology Service Group Ltd
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Assess your true cyber risk. Get a practical roadmap built on the Microsoft Security stack.
37 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Establish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
38 out of 60
Implementation of Microsoft Defender for Cloud Apps
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
39 out of 60
Threat Protection Envisioning Workshop Marketplace Offer
Olive + Goose
+1
Applicable to:
Cloud Security
A guided security envisioning workshop that helps organizations assess current threat protection capabilities and define a practical roadmap using Microsoft security solutions.
40 out of 60
SMB Cloud Evaluation Program: 2-Wk Assessment
Maureen Data Systems
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Identifying ways to modernize & optimize IT assets, mitigate security risks, and reduce cost & complexity. See how the cloud can help, estimated costs, and what to do next.
41 out of 60
Microsoft Managed Security Services
Netrix Global
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Netrix’s 24x7x365 virtual Security Operations Center (SOC) leverages Microsoft’s enterprise-grade security software to monitor and respond to incidents as well as proactively hunt threats.
42 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
43 out of 60
Cyderes Managed Security Services for Microsoft Sentinel
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
44 out of 60
Security Foundations Email: Assessment and Implementation
ProServeIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Protect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
45 out of 60
Microsoft Security and Defender Hardening: 2-week accelerator
White Hat IT Security Kft
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Review and harden Microsoft Security configurations based on industry best practices
46 out of 60
Microsoft Defender for End Points Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
47 out of 60
Microsoft Value Calculator: One Hour Assessment
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Cost Takeout Opportunity shows the potential cost reductions from consolidating third party solutions with Microsoft 365.
48 out of 60
Centric Threat Protection Engagement
Centric Consulting, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Learn how to put next-generation Microsoft Security tools to work for you
49 out of 60
Securing Identities Workshop
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
50 out of 60
SYSTEX Data Security and Compliance Solution
精诚(中国)企业管理有限公司
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
51 out of 60
Protect and Govern Sensitive Data: 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
52 out of 60
CMMC Compliance: 4 week Workshop
Sirius Computer Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
The U.S. Department of Defense (DoD) is implementing the Cybersecurity Maturity Model Certification (CMMC) to verify the cybersecurity of its supply chain, our Workshop will help you ensure compliance
53 out of 60
Secure and Maximize Your Microsoft 365 Tenant with Manage & Protect
All Covered, a division of Konica Minolta
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Microsoft 365 tenant management to provide you with continuous security & compliance, enhanced administration, and actionable insights.
54 out of 60
Threat Protection Envisioning Engagement Sentinel
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Organizations today are managing a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Get help achieving your broader security objectives.
55 out of 60
Implementation of Microsoft Defender for Endpoint
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
56 out of 60
Licensing Optimization: 1-Wk Workshop
eGroup Enabling Technologies
+3
Applicable to:
Adoption & Change Management
Calling for Microsoft Teams
Cloud Security
Gain confidence in your level of control with your Microsoft 365 licensing.
57 out of 60
"Threat Protection: 3 Day Workshop"
Insentra Pty Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
58 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day Workshop
eGroup Enabling Technologies, LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
With Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
59 out of 60
Office 365 Migration 3-Month Implementation
RKON TECHNOLOGIES
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
Leverage RKON's consulting expertise for a smooth and seamless migration to Microsoft's Office 365 suite of products including SharePoint, OneDrive, and Teams
60 out of 60
Anterior
7
8
9
10
11
Siguiente