Pasar al contenido principal
Marketplace
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Productos
Categorías
Sectores
Asociados
Filters
Clear all
Su ubicación
Su ubicación
Productos (1)
Productos (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adopción y administración de los cambios
Adopción y administración de los cambios
Llamada para Microsoft Teams
Llamada para Microsoft Teams
Seguridad en la nube
Seguridad en la nube
Servicios de asesoría de cumplimiento
Servicios de asesoría de cumplimiento
Implementación y administración de dispositivos
Implementación y administración de dispositivos
Trabajadores de primera línea
Trabajadores de primera línea
Administración de identidad y acceso
Administración de identidad y acceso
Information Protection y Gobernanza
Information Protection y Gobernanza
Riesgo interno
Riesgo interno
Conocimiento e información
Conocimiento e información
Salas de reuniones para Microsoft Teams
Salas de reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Administración de dispositivos móviles
Administración de dispositivos móviles
Power Platform for Teams
Power Platform for Teams
Soluciones personalizadas de Teams
Soluciones personalizadas de Teams
Implementación de trabajo en equipo
Implementación de trabajo en equipo
Protección contra amenazas
Protección contra amenazas
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Sectores
Sectores
Tipo de servicio
Tipo de servicio
Modelo de precios
Modelo de precios
Consulting services results
Showing results in consulting services.
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk Implementation
Neway Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Streamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
1 out of 60
Office 365 Tenant-to-Tenant Cutover Email Migration without downtime and bounced email: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Seamless Microsoft 365 tenant-to-tenant mailbox migration, essential for mergers, acquisitions, or relocations, ensuring no bounced emails, NDR, or downtime.
2 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5
Collective Insights
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Upgrade to Microsoft 365 E5 for Advanced Productivity and Security
3 out of 60
Hybrid Infrastructure Overview Workshop
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Rapid hybrid‑cloud design workshop — learn best practices, pitfalls, and licensing tips for Microsoft on‑prem + Azure/Microsoft 365.
4 out of 60
Zero Trust Security Assessment
Citrin Cooperman Advisors, LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Our Zero Trust Security Assessment will evaluate identity, email, data, and endpoint device controls, threat protection, management, and licensing to strengthen your organization's security posture.
5 out of 60
Cyderes Microsoft 365 Incident Response
Cyderes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Cyderes Digital Forensics and Incident Response (DFIR) services encompass the full security motion and emphasize your ability to respond.
6 out of 60
Implementation of Microsoft Defender for Business | Defender for Endpoint
ITX360 (Pvt) Ltd.
+2
Applicable to:
Cloud Security
Threat Protection
Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
7 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Apply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
8 out of 60
Threat Protection: 2-Week Workshop
Forsyte IT Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
9 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Multi-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
10 out of 60
Defender for Office365
Suri Services SC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Suri Services y Office 365: La alianza impenetrable en ciberseguridad.
11 out of 60
Spyglass-MXDR Managed Detection & Response: 2-week Implementation
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Spyglass-MXDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
12 out of 60
MDS - Zero Trust Assessment & Advisory
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
13 out of 60
Nanyang Bandang security operation services
上海南洋万邦软件技术有限公司
+1
Applicable to:
Cloud Security
Security operation services with Microsoft Denfender component and Sentinel
14 out of 60
Enabled Microsoft 365 Productivity: 12-MO Briefing
eGroup Enabling Technologies, LLC
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Mobile Device Management
Get the expertise needed to successfully manage Microsoft 365 with eGroup Enabling Technologies, LLC. Enabled Microsoft 365.
15 out of 60
Citrix Endpoint Management to Microsoft Intune Migration Plan
Mobile Mentor
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Mobile Mentor’s Citrix Endpoint Management to Microsoft Intune services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
16 out of 60
Incident Response Retainer
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
17 out of 60
Managed XDR Shield: 4-Week Implementation
Long View Systems
+2
Applicable to:
Cloud Security
Threat Protection
Address all your proactive security needs, engage the Managed XDR Shield plan to monitor, alert, and respond to threats effectively.
18 out of 60
Multifactor Authentication: 4-Day Implementation
FSI Strategies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
19 out of 60
Zero Trust as a Service (ZTaaS)
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital transformation and adopting AI starts with building a secure foundation.
20 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
21 out of 60
MDS - Cybersecurity Assessment
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
22 out of 60
Lenovo Cyber Resiliency as a Service Tuning
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
23 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
24 out of 60
Copilot for Microsoft 365: Taller De Seguridad Y Datos De 1 Día
Awara IT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Desbloquea el máximo potencial de Copilot for Microsoft 365 mientras refuerzas la seguridad y protección de tus datos con un taller intensivo de un día dirigido por los expertos de Awara IT.
25 out of 60
Microsoft 365 Copilot Onboarding Workshop
SMART business LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Join our interactive workshop to learn about the capabilities of Microsoft Copilot for Microsoft 365!
26 out of 60
Microsoft 365 Security Program - 10 Weeks
Trace3
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
27 out of 60
Threat Protection - 7 days Implementation
SPAN d.d.
+2
Applicable to:
Cloud Security
Threat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
28 out of 60
Copilot for Security Readiness Assessment
Invoke
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Invoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
29 out of 60
Data Loss Prevention: 3-Wk POC
FPT/Intellinet
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Discover, classify, and protect sensitive data to prevent any inadvertent exposure.
30 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-Weeks
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
31 out of 60
Microsoft Sentinel - Monitor file access and permission changes in SharePoint Implementation: 5-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Implement Microsoft Sentinel for monitoring file access and permission changes in SharePoint, ensuring prompt detection and notification of unauthorized or unwanted activities.
32 out of 60
Microsoft Endpoint Manager Baseline
SHI International Corp
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Explore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
33 out of 60
Microsoft 365 Assessment
TechNet UC LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Our assessment provides a thorough analysis of your current Microsoft 365 environment, identifying areas for improvement and offering actionable recommendations to enhance performance and security.
34 out of 60
CMMC Assessment Ready Solution
Planet Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Based off the Planet secure collaboration enclave, this provides customers with CMMC Assessment Ready artifacts.
35 out of 60
Copilot Readiness Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
36 out of 60
Aseguramiento de ciberseguridad: taller 4 semanas
Sofistic Colombia SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
37 out of 60
Modern SecOps Discovery Session
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
38 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom Demo
Mazzy Technologies Corp.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
39 out of 60
Copilot adoption for legal
Conterra
+2
Applicable to:
Adoption & Change Management
Cloud Security
Transform legal service processes with Copilot and Conterra Copilot Adoption Offer: 4-Wk Imp
40 out of 60
Neudesic's Knowledge Governance Workshop
Neudesic
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
The Neudesic Knowledge Governance Workshop is a 4–6-week session that is designed to assist customers in safeguarding their sensitive information.
41 out of 60
Microsoft 365 Copilot Data Security Assessment
Collective Insights
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Accelerate your deployment of Microsoft Copilot while ensuring comprehensive data security and compliance across the enterprise.
42 out of 60
Data Security and Governance Engagement for Microsoft 365: Microsoft Purview Suite
CompuNet
+2
Applicable to:
Cloud Security
Information Protection & Governance
Intelligently investigate and take action on data security risks.
43 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free Briefing
Netwoven
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Netwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
44 out of 60
Entra ID Governance and Guest Access
Mobile Mentor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Empower your business with Mobile Mentor’s Microsoft Entra ID Governance and Guest Access service, built on Microsoft’s cutting-edge Entra Identity Governance platform.
45 out of 60
Cloud Security Journey: 2 Hour Proof of Concept
360 Visibility Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
46 out of 60
Copilot for Security Accelerator: 2-week Implementation
abra
+2
Applicable to:
Cloud Security
Threat Protection
Neway’s Microsoft Copilot for Security Accelerator empowers security teams with enhanced protection and streamlined operations through eight key steps.
47 out of 60
Zero Trust Baseline Pilot 8-Week Implementation
Invoke
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
48 out of 60
Fortis IR Compromise Assessment
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A high-level forensics evaluation designed to identify current and past threat activity.
49 out of 60
SNP’s Approach to Copilot for Microsoft 365
SNP Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
50 out of 60
Tenant to Tenant Migration for AAD, EXO and OD4B Services Only: 1-Week Implementation
IT Partner LLC
+2
Applicable to:
Adoption & Change Management
Cloud Security
Microsoft 365 Tenant-to-Tenant Migration Including Azure AD, Exchange Online and OneDrive for Business services and data
51 out of 60
Microsoft Security: 3-Day Workshop
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
52 out of 60
MFA Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan.
53 out of 60
Microsoft Secure Score - increase to 200: 3-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
The goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
54 out of 60
Microsoft Priva Assessment: 2 Wk
Lighthouse Global
+2
Applicable to:
Cloud Security
Information Protection & Governance
Empowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
55 out of 60
Cybersecurity Assessment
CDI LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
The Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
56 out of 60
UNITE: Cyber Security Assessment_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
57 out of 60
Cyber Insurer Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Uncover gaps and strengthen your position when applying for cyber insurance
58 out of 60
Lenovo Cyber Resiliency as a Service Remediation
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
59 out of 60
CMMC Compliance with Microsoft 365: 4 wk impl.
Insight
+1
Applicable to:
Cloud Security
Insight’s CMMC services program helps clients understand DoD requirements, develop a strategy to achieve compliance in hybrid and cloud models, and execute to implementation and ongoing operations.
60 out of 60
Anterior
4
5
6
7
8
Siguiente