Passer au contenu principal
Marketplace
Envoyer des commentaires
Aide et support
Éléments enregistrés
Plans privés
Juste un moment, connexion en cours...
Tout
Produits
Catégories
Secteurs d’activité
Partenaires
Filtres
Tout effacer
Votre position
Votre position
Produits (1)
Produits (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Gestion de l'adoption et des modifications
Gestion de l'adoption et des modifications
Appel pour Microsoft Teams
Appel pour Microsoft Teams
Cloud Security
Cloud Security
Services de conseil pour la conformité
Services de conseil pour la conformité
Déploiement et gestion de l’appareil
Déploiement et gestion de l’appareil
Employés de première ligne
Employés de première ligne
Gestion des identités et des accès
Gestion des identités et des accès
Protection des informations et gouvernance
Protection des informations et gouvernance
Risque d’initié
Risque d’initié
Connaissances et insights
Connaissances et insights
Meeting Rooms pour Microsoft Teams
Meeting Rooms pour Microsoft Teams
Meetings pour Microsoft Teams
Meetings pour Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Gestion des périphériques mobiles
Gestion des périphériques mobiles
Power Platform for Teams
Power Platform for Teams
Solutions personnalisées Teams
Solutions personnalisées Teams
Déploiement de travail d'équipe
Déploiement de travail d'équipe
Protection contre les menaces
Protection contre les menaces
Analyse du temps de travail
Analyse du temps de travail
Power Platform
Power Platform
Secteurs d'activité
Secteurs d'activité
Type de service
Type de service
Modèle de tarification
Modèle de tarification
Services de conseil résultats
Affichage des résultats dans services de conseil.
Vue
résultats associés dans clouds du secteur d’activité
.
Microsoft Cloud Application for 3rd Party Apps
AVASOFT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
1 out of 60
Microsoft 365 threat protection assessment
AVASOFT
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Identify vulnerabilities and threats in Microsoft 365. Use advanced protection, intelligence, detection, and response to safeguard data. Enhance security with real-time insights and monitoring.
2 out of 60
AVASecure 360 Next-Gen MXDR Managed Services
AVASOFT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
At AVASOFT, we are committed to securing your digital environment through a holistic Managed Extended Detection and Response (MXDR) solution.
3 out of 60
Enhanced Data Privacy with Microsoft Purview
AVASOFT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
4 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 Weeks
Wipro Ltd
+2
Applicable to:
Identity & Access Management
Threat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
5 out of 60
MDS - Microsoft Security Copilot Workshop
Maureen Data Systems
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Discover how Microsoft Security Copilot can enhance your security operations, streamline incident response, and empower your security teams
6 out of 60
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed Service
Invoke
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Provide cross-domain threat protection and simplify breach prevention
7 out of 60
SoftwareOne Cybersecurity MXDR Managed Services for Microsoft
SoftwareOne
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure your IT Environment with Microsoft Services and on-call Cyber-security Analysts with end-to-end MDR and optimise costs
8 out of 60
Endpoint Management Advisory Service: 6-Wk Implementation
Wragby Business Solutions & Technologies Limited
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
This advisory service enables organizations efficiently manage end points leveraging Microsoft Intune & Configuration Manager through assessments, 1-day workshops and six weeks deployment
9 out of 60
Infosys Intelligent Security Solution
Infosys Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Infosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
10 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
11 out of 60
DORA act assessment and implementation
Sii Sp. z o.o.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
12 out of 60
Copilot for Security Readiness Assessment
Performanta
+2
Applicable to:
Cloud Security
Threat Protection
Futureproof your Business Security with Microsoft Security Copilot and Performanta
13 out of 60
Active Directory Security on Demand
Comtrade System Integration
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
14 out of 60
Threatscape CSI Engagements
THREATSCAPE LIMITED
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
15 out of 60
Avanade Microsoft Copilot for Security
Avanade, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
16 out of 60
Microsoft 365 Security Assessment
Sii Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
17 out of 60
Threat Protection - 2 Days Workshop
Mayasoft Bilgi Sistemleri A.S.
+2
Applicable to:
Cloud Security
Threat Protection
We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
18 out of 60
Synergy Advisors Microsoft Security Copilot E-mmersion Experience
Synergy Advisors LLC
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
AI-powered security for rapid, scalable, and effective defense
19 out of 60
Proof of Concept Solution Microsoft 365 Copilot
KPCS CZ, s.r.o.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
Embark on a transformative journey with KPCS's 4 weeks PoC for Microsoft 365 Copilot. Uncover tailored use-cases and maximize the value for your business. Revolutionize your approach to innovation.
20 out of 60
MDS - Modern Security Operations Engagement
Maureen Data Systems
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
A 2-day engagement to demonstrate how intelligent security analytics and threat intelligence can detect and stop active threats, encouraging organizations to deploy and adopt Modern SecOps solutions.
21 out of 60
CASB (MCAS) Advisory: 2-week Workshop Series
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
22 out of 60
KMicro MXDR for SMB
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
KMicro MXDR for SMB helps businesses reduce operational complexity and strengthen cybersecurity defenses by managing their Microsoft Defender XDR environment.
23 out of 60
Hyperbolt Secure Deploy
Delphi Consulting
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
Hyperbolt Secure Deploy offers automated Microsoft 365 Security implementation, delivering enterprise-grade protection in weeks using industry-standard policies.
24 out of 60
Microsoft Purview Implementation Service
THREATSCAPE LIMITED
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Service is designed to accelerate the deployment and adoption of Microsoft Purview while ensuring alignment with best practice for security, governance, and compliance.
25 out of 60
Email Security Threat Assessment
AVASOFT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
26 out of 60
DXC Managed Extended Detection & Response (MXDR) for Workplace - Implementation
DXC
+1
Applicable to:
Threat Protection
Secure your business with Managed XDR for Workplace
27 out of 60
Microsoft 365 Security Assurance Service: Assessment
Performanta
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
28 out of 60
Copilot for Microsoft 365: Security Accelerator
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security with KMicro's Copilot For Microsoft 365 Security Accelerator: Tailored insights and guided deployments.
29 out of 60
4-Day Security Assesment
HSO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
30 out of 60
Zero Trust Assessment - 3 Weeks
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Set Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Assessment
31 out of 60
Introducing Microsoft Entra: 2 Hour Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn about how Microsoft Entra will help your business step into tomorrow with modern identity and access solutions by introducing you to modern access security across a broad range of products.
32 out of 60
Microsoft 365 Rapid Security Assessment: 1-Wk Assessment
Awara IT
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft 365 Rapid Security Assessment is a quick yet comprehensive evaluation to enhance Microsoft 365 security against evolving cyber threats
33 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)
THREATSCAPE LIMITED
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Conditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
34 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
35 out of 60
Onesec Digital Identity
Secure Nextgen Systems
+2
Applicable to:
Identity & Access Management
Threat Protection
Having a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
36 out of 60
Endpoint Management Workshop
York Telecom Corp
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
37 out of 60
Cloud Security Operations Center
Reply
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Verified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
38 out of 60
Microsoft Defender for Server:5-day Implementation
Delphi Consulting
+2
Applicable to:
Cloud Security
Threat Protection
Delphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
39 out of 60
Insider Risk Management: 8-Wk implementation
PwC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
40 out of 60
Synergy Advisor POC-in-a-box for Microsoft Security Copilot
Synergy Advisors LLC
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
Enhance your security posture with Synergy Advisors POC-in-a-box for Microsoft Security Copilot
41 out of 60
AVASecure 360 - Microsoft 365 Security & Governance Solutions by AVASOFT
AVASOFT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Aware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
42 out of 60
Modern Workplace Security 10-Wk Implementation
Wipro Ltd
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
43 out of 60
Copilot For Microsoft 365 Readiness Assessment
THREATSCAPE LIMITED
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Threatscape’s Copilot for Microsoft 365 Readiness Assessment (CRA) service can help you understand, and begin to address, the risks of Copilot for Microsoft 365 adoption.
44 out of 60
Microsoft 365 Defender - MXDR Service - 1 Year Implementation
CGI Inc.
+1
Applicable to:
Threat Protection
Unleash your Microsoft Defender 365 capabilities. Automatically detect & correlate threat signals across your endpoints, email, cloud applications, identities, cloud and on-premises workloads.
45 out of 60
Bulletproof Managed AI Ready (MXDR) Security Elite
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
AI-Ready Managed Security (MXDR) Service That Goes Beyond Traditional MDR/SOC
46 out of 60
KMicro's MXDR with Microsoft Copilot for Security: 4-Wk POC/POV
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance threat hunting & accelerated MXDR for Microsoft Sentinel with Copilot for Security integration
47 out of 60
Onesec’s Secure Access to Microsoft 365 with Zscaler
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
48 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefing
SMART business LLC
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
49 out of 60
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessment
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
The engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
50 out of 60
4security: Microsoft 365 Communication Protect
4Sight Holdings
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
4security: Microsoft 365 Communication Protect, a solution to safeguard your organisation’s communications
51 out of 60
SecureBlu MDR Service for Microsoft 365 Defender
New Era Technology
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
52 out of 60
Microsoft Sentinel Security Consulting Service
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
53 out of 60
Defender for Endpoint Managed Service
e2e-assure Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
54 out of 60
Barracuda Office 365 email-based security
Crayon
+1
Applicable to:
Threat Protection
Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defense, API-based inbox defense, incident response, data protection, and compliance capabilities.
55 out of 60
Data Protection and Governance with Microsoft Purview
AVASOFT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
56 out of 60
Cybersecurity: 3-Wks Quick-Assessment
Unipartner IT Services, S.A.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
57 out of 60
Microsoft Intune Quickstart Implementation
TechNet UC LLC
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
The purpose of TechNet UC’s Microsoft Intune Quick Start offer is to provide organizations with expert guidance and support for the efficient deployment and management of Intune.
58 out of 60
Entra ID Identity and Application Governance Solutions by AVASOFT
AVASOFT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Our solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
59 out of 60
Secure Identities using Microsoft Entra ID with AVASOFT
AVASOFT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Entra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
60 out of 60
1
2
3
4
5
Suivant