Pasar al contenido principal
Marketplace
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Productos
Categorías
Sectores
Asociados
Filters
Clear all
Su ubicación
Su ubicación
Productos (1)
Productos (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adopción y administración de los cambios
Adopción y administración de los cambios
Llamada para Microsoft Teams
Llamada para Microsoft Teams
Seguridad en la nube
Seguridad en la nube
Servicios de asesoría de cumplimiento
Servicios de asesoría de cumplimiento
Implementación y administración de dispositivos
Implementación y administración de dispositivos
Trabajadores de primera línea
Trabajadores de primera línea
Administración de identidad y acceso
Administración de identidad y acceso
Information Protection y Gobernanza
Information Protection y Gobernanza
Riesgo interno
Riesgo interno
Conocimiento e información
Conocimiento e información
Salas de reuniones para Microsoft Teams
Salas de reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Administración de dispositivos móviles
Administración de dispositivos móviles
Power Platform for Teams
Power Platform for Teams
Soluciones personalizadas de Teams
Soluciones personalizadas de Teams
Implementación de trabajo en equipo
Implementación de trabajo en equipo
Protección contra amenazas
Protección contra amenazas
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Sectores
Sectores
Tipo de servicio
Tipo de servicio
Modelo de precios
Modelo de precios
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
Identity and Access Management Solution
H One (Private) Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Entra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
1 out of 60
Copilot for Microsoft 365: Taller De Seguridad Y Datos De 1 Día
Awara IT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Desbloquea el máximo potencial de Copilot for Microsoft 365 mientras refuerzas la seguridad y protección de tus datos con un taller intensivo de un día dirigido por los expertos de Awara IT.
2 out of 60
Vulnerability Management
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+2
Applicable to:
Cloud Security
Threat Protection
Rapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
3 out of 60
Lightstream Data Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Lightstream will Identify data security risks in your organizational data. Identify data security risks in your organizational data
4 out of 60
Copilot for Security Rapid Test Flight | 2-Wk Workshop
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
5 out of 60
Copilot for Microsoft 365 Adoption Accelerator Program - 18 Weeks
Trace3
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
This program's primary objective is to help accelerate client adoption of Copilot for Microsoft 365 and setup the client for continued maturity with their usage of Copilot for Microsoft 365.
6 out of 60
Endpoint as a Service | Assure 365
CyberOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Fully Managed Endpoint Security with 24x7 monitoring, compliance and Zero Trust enforcement—powered by Microsoft Intune.
7 out of 60
AI Security Readiness Assessment
ProArch Technologies, Inc
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
ProArch’s AI Security Readiness Assessment delivers a comprehensive evaluation of your cloud and AI environment, identifies critical security gaps, and provides a prioritized roadmap for remediation.
8 out of 60
Copilot for Micosoft 365 Readiness: 2-Day Workshop
CTGlobal A/S
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Plan adoption of Copilot for Microsoft 365 through explicit scenarios, use cases and data governance. Develop strategies for seamless onboarding and future integrations. In a safe and secure workshop.
9 out of 60
Copilot adoption for legal
Conterra
+2
Applicable to:
Adoption & Change Management
Cloud Security
Transform legal service processes with Copilot and Conterra Copilot Adoption Offer: 4-Wk Imp
10 out of 60
Spyglass-MXDR Managed Detection & Response: 2-week Implementation
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Spyglass-MXDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
11 out of 60
Nanyang Bandang security operation services
上海南洋万邦软件技术有限公司
+1
Applicable to:
Cloud Security
Security operation services with Microsoft Denfender component and Sentinel
12 out of 60
Microsoft Defender for Cloud Apps Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Microsoft Defender for Cloud Apps address security gaps in an organization's environment.
13 out of 60
Office 365 Tenant-to-Tenant Cutover Email Migration without downtime and bounced email: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Seamless Microsoft 365 tenant-to-tenant mailbox migration, essential for mergers, acquisitions, or relocations, ensuring no bounced emails, NDR, or downtime.
14 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
15 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Apply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
16 out of 60
Lightstream Complimentary Microsoft 365 Core Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
17 out of 60
Zero Trust Security Assessment
Concurrency, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess and advance your Zero Trust security posture—and accelerate or expand your Microsoft 365 security strategy with expert-led guidance.
18 out of 60
Adoption & Change Management: 10-wk Implementation
Campana & Schott GmbH
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Your way to successful implementation and adoption of the modern workplace based on Microsoft 365 and AI technologies
19 out of 60
TCS Agent Governance as a Service - Implementation - 12 weeks
TCS - Digital Workplace
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Transition from “Shadow AI” to a “governed, enterprise‑grade innovation model”—controlling agent sprawl, data leakage risks, and unvetted maker behavior.
20 out of 60
Data Security and Governance Engagement for Microsoft 365: Microsoft Purview Suite
CompuNet
+2
Applicable to:
Cloud Security
Information Protection & Governance
Intelligently investigate and take action on data security risks.
21 out of 60
MDS - Cybersecurity Assessment
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
22 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Understand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
23 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
The goal of the service is to securely remove your previous Exchange Server, ensuring it doesn't disrupt your operations and enabling a smooth transition to Exchange Online.
24 out of 60
Microsoft Sentinel Proof of Concept: 4 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand how prepared is your Microsoft infrastructure when adversaries attack
25 out of 60
Lightstream Threat Protection Assessment and Deployment Roadmap
Lightstream
+2
Applicable to:
Cloud Security
Threat Protection
Leveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
26 out of 60
Microsoft 365 Security Review: Assessment
CyberOne
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Identify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
27 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
28 out of 60
Softchoice Security Platformization Assessment and Design
Softchoice
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
29 out of 60
Licensing Microsoft 365: 1-day Assessment
Informatika a.d.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
30 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-Weeks
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
31 out of 60
Unifying Microsoft Sentinel with Cloud Services
AVASOFT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
32 out of 60
Implementation of Microsoft Defender for Business | Defender for Endpoint
ITX360 (Pvt) Ltd.
+2
Applicable to:
Cloud Security
Threat Protection
Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
33 out of 60
Microsoft 365: 3 Week Solution Assessment
First National Technology Solutions, Inc.
+3
Applicable to:
Cloud Security
Meetings for Microsoft Teams
Teamwork Deployment
Partner with FNTS to conduct a 3 week workplace modernization solution assessment to build a TOC analysis & evaluate current purchasing structure to make recommendations for adoption of Microsoft 365.
34 out of 60
Microsoft Security Deployment: 5-day Workshop
Campana & Schott GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand your Microsoft security posture and minimize risks with the right experts
35 out of 60
Zero Trust Security Assessment
Citrin Cooperman Advisors, LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Our Zero Trust Security Assessment will evaluate identity, email, data, and endpoint device controls, threat protection, management, and licensing to strengthen your organization's security posture.
36 out of 60
Endpoint Management with Security Workshop
The Tech Mavericks
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
The Endpoint Management with Security Workshop enables partners to lead customer conversations around modernizing their endpoint management and security capabilities by leveraging Microsoft 365.
37 out of 60
Copilot for Microsoft 365: Data Governance Workshop
Reply
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Secure and Enhance Your Microsoft 365 Experience with WM Reply's One-Day Copilot Data Governance Workshop
38 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom Demo
Mazzy Technologies Corp.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
39 out of 60
Protect 365 App - 1 hour implementation
Cloud Life
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
40 out of 60
Managed XDR Shield: 4-Week Implementation
Long View Systems
+2
Applicable to:
Cloud Security
Threat Protection
Address all your proactive security needs, engage the Managed XDR Shield plan to monitor, alert, and respond to threats effectively.
41 out of 60
Microsoft 365 Tenant-to-Tenant Migration
Olive + Goose
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
This offering provides assessment, migration, and post-migration support for transitioning Microsoft 365 workloads and endpoint management from a source Microsoft 365 tenant to a target tenant.
42 out of 60
Microsoft 365 Security: 4-hour Assessment
Catapult Systems, LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Catapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
43 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers detect, investigate, and take action to mitigate risk and ensure compliance in their modern workplace.
44 out of 60
Cloud Security Assessment - 3 Day Workshop
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
45 out of 60
Implementing Defender for Endpoint & Cloud App Security
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
46 out of 60
Security and Operations with Expert Microsoft 365 Support
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Maximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
47 out of 60
CMMC Implementation for Microsoft 365 (8 Wk Proj)
Summit 7 Systems, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Summit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) technical control practices associated with Level 2 for Microsoft 365, as well as Azure and AAD
48 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5
Collective Insights
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Upgrade to Microsoft 365 E5 for Advanced Productivity and Security
49 out of 60
Threat Protection Workshop
Mobile Mentor
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
During this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
50 out of 60
Sentinel Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
51 out of 60
Hybrid Infrastructure Overview Workshop
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Rapid hybrid‑cloud design workshop — learn best practices, pitfalls, and licensing tips for Microsoft on‑prem + Azure/Microsoft 365.
52 out of 60
Microsoft 365 Copilot Onboarding Workshop
SMART business LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Join our interactive workshop to learn about the capabilities of Microsoft Copilot for Microsoft 365!
53 out of 60
Inviso KickStarter - Microsoft 365 E3 Adoption
Inviso Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Helping customers KickStart features in Microsoft 365 E3 Subscription
54 out of 60
Fortis IR Compromise Assessment
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A high-level forensics evaluation designed to identify current and past threat activity.
55 out of 60
Intune and Defender - Zero Trust Implementation by C1st
C1st Technologies LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
C1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
56 out of 60
Threat Protection: 2-Week Workshop
Forsyte IT Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
57 out of 60
Microsoft 365 Copilot Adoption: 2-3 Week Assessment
Coretek Services
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Evaluate the current customer Microsoft investments adoption of Microsoft Cloud Services and overall Security posture in an effort to develop a "Art of the Possible" to Adopt Microsoft 365 Copilot.
58 out of 60
Cloud Security Journey: 2 Hour Proof of Concept
360 Visibility Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
59 out of 60
Unified Access & Protection with Microsoft Entra Global Secure Access
Mobile Mentor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Step confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
60 out of 60
Anterior
3
4
5
6
7
Siguiente