Pasar al contenido principal
Marketplace
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Productos
Categorías
Sectores
Asociados
Filtros
Borrar todo
Su ubicación
Su ubicación
Productos (1)
Productos (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adopción y administración de los cambios
Adopción y administración de los cambios
Llamada para Microsoft Teams
Llamada para Microsoft Teams
Seguridad en la nube
Seguridad en la nube
Servicios de asesoría de cumplimiento
Servicios de asesoría de cumplimiento
Implementación y administración de dispositivos
Implementación y administración de dispositivos
Trabajadores de primera línea
Trabajadores de primera línea
Administración de identidad y acceso
Administración de identidad y acceso
Information Protection y Gobernanza
Information Protection y Gobernanza
Riesgo interno
Riesgo interno
Conocimiento e información
Conocimiento e información
Salas de reuniones para Microsoft Teams
Salas de reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Administración de dispositivos móviles
Administración de dispositivos móviles
Power Platform for Teams
Power Platform for Teams
Soluciones personalizadas de Teams
Soluciones personalizadas de Teams
Implementación de trabajo en equipo
Implementación de trabajo en equipo
Protección contra amenazas
Protección contra amenazas
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Sectores
Sectores
Tipo de servicio
Tipo de servicio
Modelo de precios
Modelo de precios
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Enabling Secure AI Adoption with Agent 365
PwC (Global)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
PwC will help enhance visibility across the agent estate, define critical governance and security controls, and deliver an Agent 365 roadmap ready for action
1 out of 60
Microsoft 365 E7 Frontier Transformation Service
Exquitech
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Accelerate your AI journey with a secure, governed, and scalable solution—combining Microsoft 365 E7, Copilot, and Agent 365 with expert-led deployment and adoption services.
2 out of 60
Threat Protection Envisioning Workshop Marketplace Offer
Olive + Goose
+1
Applicable to:
Cloud Security
A guided security envisioning workshop that helps organizations assess current threat protection capabilities and define a practical roadmap using Microsoft security solutions.
3 out of 60
Microsoft 365 Security Confidence Accelerator
Reliance Infosystems
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
A structured Microsoft 365 security posture accelerator that identifies and reduces security risk across identity, devices, applications, and data — delivering clear outcomes.
4 out of 60
Microsoft 365 Security Readiness & Assurance Accelerator
Reliance Infosystems Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
A structured Microsoft 365 security readiness engagement that identifies, prioritises, and reduces risk across identity, devices, applications, and data — delivering audit confidence, & Clarity
5 out of 60
Hitachi Solutions – Agent 365 Governance Accelerator
Hitachi Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Establish governance, control, and operating model for AI agents using Microsoft Agent 365 to enable secure, scalable enterprise adoption.
6 out of 60
Salesforce and Microsoft Defender Integration
IT Partner LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure Salesforce with Defender to detect compromised accounts, monitor exfiltration, and automate threats. Enforce Conditional Access and Sentinel. Pricing/timeline customized post-scoping.
7 out of 60
GCCH Enclave Rapid Deployment in 2 Weeks
R3
+1
Applicable to:
Cloud Security
Deploy a secure, GCCH enclave in just two weeks with a standardized approach for rapid CMMC readiness.
8 out of 60
Salesforce and OneDrive for Business Integration
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Automate doc management by linking OneDrive files to Salesforce records securely. Cuts manual uploads, ensures version control, & maintains compliance. Pricing/timeline scoped per project.
9 out of 60
Salesforce and Microsoft Intune Integration
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Secure Salesforce access with Intune. Enforce device compliance, conditional access, and data protection for CRM. Pricing and timeline customized post-scoping.
10 out of 60
Microsoft 365 E7 Envisioning by SoftwareOne
SoftwareOne
+3
Applicable to:
Adoption & Change Management
Cloud Security
Meetings for Microsoft Teams
Microsoft E7 Envisioning is a focused, advisory-led engagement that gives you a clear, defensible path to E7 adoption.
11 out of 60
Red Teaming by H One
H One (Private) Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
By H One, powered by Axiata Cyber Fusion Center (ACFC) Simulate real-world adversaries to uncover hidden vulnerabilities and strengthen your cyber resilience.
12 out of 60
Microsoft 365 Security & Compliance Assessment
Meridian Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
4-week expert-led assessment that evaluates your Microsoft 365 security posture and compliance readiness, delivering a prioritized remediation roadmap aligned with Zero Trust and regulatory framework.
13 out of 60
Entra Global Secure Access (GSA), Private Access and Internet Access proof of value
Bridewell Consulting Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Experience the benefits of Entra Global Secure Access in order to build skills and the business case for adoption
14 out of 60
Enterprise‑Ready Security for Microsoft Copilot
EPAM Systems, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Secure Microsoft 365 Copilot adoption through identity, data protection, and governance readiness.
15 out of 60
Azure Migration Assessment by C1st
C1st Technologies LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The C1st Azure Migrate Assessment helps customers get started with or expand their use of Microsoft Azure and Microsoft 365 through expert migration guidance, cost visibility and modernization support
16 out of 60
Agent 365 Quickstart by SoftwareOne
SoftwareOne
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
From Governance to live Copilot Studio Agent. Fast, secure, and adoption ready.
17 out of 60
HCLTech Frontline Worker Digital Experience – Assessment & Implementation support for Empowering Frontline Workers
HCL America Inc_HCLT
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
HCLTech’s solution streamlines frontline communication, digital workflows, and secure device management, powered by HCLTech, Microsoft, and Zebra for a modern, sustainable frontline workplace.
18 out of 60
Endpoint Management: 3-Day Workshop
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Begin the steps to manage and protect your devices, your apps, and your users
19 out of 60
Microsoft 365 Identity & Security: 2-Wk Assessment
PSM Partners
+2
Applicable to:
Cloud Security
Identity & Access Management
Customized identity and security assessment focused on the Microsoft 365 platform
20 out of 60
Security Assessment: 2-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
21 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
22 out of 60
Hybrid Identity and Security Expert Consulting Imp
Ravenswood Technology Group, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ravenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
23 out of 60
Remote Access to On-Prem Apps: 3 Wk Implementation
Invoke
+2
Applicable to:
Cloud Security
Identity & Access Management
Surface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
24 out of 60
Big Green IT Security Assessment: 3-Week
Big Green IT - Dev
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
25 out of 60
CMMC Data Enclave Dplymt: 4-Wk Implementation
C3 Integrated Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Deploy Microsoft 365 to meet CMMC Requirements
26 out of 60
Managed Security for Compliance: 1 yr Mgd Service
Insight
+2
Applicable to:
Cloud Security
Compliance Advisory Services
Discover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
27 out of 60
Microsoft 365 License Optimization:1-hr Assessment
Frontier Technology, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Review current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
28 out of 60
Office 365 Security: 1-Day Assessment
Netrix Global
+1
Applicable to:
Cloud Security
Security assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
29 out of 60
Secure Workspace: 1 Day Workshop
Watserv Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
30 out of 60
Mail Airlift: Exchange Online Implementation
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Our Mail Airlift engagement will get you up and running with Microsoft Exchange online in the fastest, most secure manner.
31 out of 60
Document Airlift-OneDrive Implementation
Synergy Technical, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Our Document Airlift will enable and configure your organization’s environment to use OneDrive for Business services in your Office 365 tenant.
32 out of 60
1-Day Security & Identity Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Tailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
33 out of 60
Ransomware Protection: 1 Day-Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
34 out of 60
Windows 365 Quick Start: 4-Day Proof of Concept
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
The Windows 365 Quick Start engagement is designed to give you everything you need to deploy Windows 365. Included are a solution overview, planning services, as well as a proof of concept engagement
35 out of 60
Security Maturity Assessment - 4 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
36 out of 60
Microsoft 365 Defender Threat Check: 4-wk assess
Interlink Cloud Advisors, Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
37 out of 60
Office 365 Protection: Design & Pilot 1-Wk POC
Managed Solution
+2
Applicable to:
Cloud Security
Threat Protection
Protect Your Employees from External Email Threats with Defender for Office 365 Protection
38 out of 60
Secure Live Workspace - 8 Weeks Assessment
LTIMindtree Limited
+3
Applicable to:
Cloud Security
Power Platform for Teams
Teams Custom Solutions
Our Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
39 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk Assessment
Apex Digital Solutions
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
40 out of 60
Microsoft Advisory Services Managed
SoftwareOne
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Drive Value and Cost Savings Throughout the Microsoft Cloud Investment Lifecycle
41 out of 60
Device Mgm and Protection - 12 days Implementation
SPAN d.d.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
42 out of 60
Threat Protection - 7 days Implementation
SPAN d.d.
+2
Applicable to:
Cloud Security
Threat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
43 out of 60
Modern Identity Workshop | 4 Weeks | Workshop
Enterprise It Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Enable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
44 out of 60
Microsoft 365 Security Alignment Workshop: 10 Days
Sirius Computer Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
45 out of 60
discover-sensitive-data-workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
46 out of 60
ECF Data Threat Protection: 3-Day Workshop
ECF Data LLC
+2
Applicable to:
Cloud Security
Threat Protection
The Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
47 out of 60
Securing Identities and Access: 3-day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
48 out of 60
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
49 out of 60
Managing and Identifying Risk: 3-Day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
50 out of 60
Microsoft 365 Plan for Success:3-d Assessment
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
51 out of 60
Non-Profit Security Essentials : 1 Day Workshop
true org cloud
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
True.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
52 out of 60
Security Assessment: 2 Week Assessment
Tallan
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
53 out of 60
Threat Protection and Cloud Security: 3 Day Workshop
Netwoven
+2
Applicable to:
Cloud Security
Threat Protection
Improve your security posture with a Microsoft Threat Protection Assessment Workshop
54 out of 60
Data Security and Governance: 3 Day Workshop
Netwoven
+2
Applicable to:
Cloud Security
Information Protection & Governance
Netwoven Data Security and Governance workshop will get you started on the path to discover, protect, and govern your sensitive corporate data
55 out of 60
Defender for Office 365: 3-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
56 out of 60
Microsoft 365 Security: 4-hour Assessment
Catapult Systems, LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Catapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
57 out of 60
Change Management 6-Months Implementation
Supremo Sp. z o.o.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Bądź pewny, że zaangażowanie użytkowników i przyjęcie nowych rozwiązań przyczyni się do sukcesu wdrożenia, sukcesu całej organizacji.
58 out of 60
Enhance IT Security: 1-2-Wk Implementation
FMT Consultants
+2
Applicable to:
Cloud Security
Identity & Access Management
FMT offers a smart security solution that protects your business, your employees, and your clients while providing a reliable, scalable, and durable approach to keeping your business up and running.
59 out of 60
Windows 365 QuickStart : 4 Day PoC + Surface Go
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
The Windows 365 Quick Start engagement is designed to show you how Windows 365 + SurfaceGo keeps you productive. Included are a Surface Go, planning services, as well as a proof of concept.engagement
60 out of 60
Anterior
9
10
11
12
13
Siguiente