Gå til hovedinnhold
Marketplace
Give feedback
Help & support
Saved items
Private plans
Just a moment, logging you in...
All
Products
Categories
Industries
Partners
Filters
Clear all
Plasseringen din
Plasseringen din
Produkter (1)
Produkter (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Innføring og endringsadministrasjon
Innføring og endringsadministrasjon
Microsoft Teams-samtaler
Microsoft Teams-samtaler
Skysikkerhet
Skysikkerhet
Tjenester for rådgivning om forskriftssamsvar
Tjenester for rådgivning om forskriftssamsvar
Utrulling og administrasjon av enhet
Utrulling og administrasjon av enhet
Frontlinjearbeidere
Frontlinjearbeidere
Administrasjon av identitet og tilgang
Administrasjon av identitet og tilgang
Informasjonsbeskyttelse og styring
Informasjonsbeskyttelse og styring
Intern risiko
Intern risiko
Kunnskap og innsikt
Kunnskap og innsikt
Møterom for Microsoft Teams
Møterom for Microsoft Teams
Møter for Microsoft Teams
Møter for Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Administrasjon av mobilenhet
Administrasjon av mobilenhet
Power Platform for Teams
Power Platform for Teams
Egendefinerte gruppeløsninger
Egendefinerte gruppeløsninger
Distribusjon av teamarbeid
Distribusjon av teamarbeid
Trusselbeskyttelse
Trusselbeskyttelse
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Bransjer
Bransjer
Tjenestetype
Tjenestetype
Prismodell
Prismodell
Consulting services results
Showing results in consulting services.
Modern Frontline Work Acceleration 2 days Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
LiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
1 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process Adoption
Vitalyst
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
2 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and Planning
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Shorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
3 out of 60
Application Monitoring Solution with Microsoft Sentinel
AVASOFT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
4 out of 60
Threat Protection Engagement
adaQuest
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
5 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
6 out of 60
Cloud Endpoints Assessment
Inviso Corporation
+1
Applicable to:
Cloud Security
Maximize your Endpoints! Find out how a Cloud PC could potentially save you money!
7 out of 60
Defender for IoT Enterprise: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understanding risk with unmanaged IoT devices can be difficult. Our Defender for Enterprise IoT Proof of Concept helps you visualise and understand the threats to your environment.
8 out of 60
Lightstream Data Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Lightstream will Identify data security risks in your organizational data. Identify data security risks in your organizational data
9 out of 60
Secure Remote Workplace: 1-Wk Workshop
FSI Strategies
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
10 out of 60
MDS - Threat Protection Engagement
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
11 out of 60
Lenovo Cyber Resiliency as a Service Deployment
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
12 out of 60
Security Operations Center with Microsoft Sentinel
AVASOFT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Monitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
13 out of 60
Microsoft Cloud App Security Data Access Control Solutions by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
14 out of 60
Windows 11 Pilot: 3 Weeks POC
Steeves
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
15 out of 60
Identity and Access Management Solution
H One (Private) Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Entra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
16 out of 60
Cloud App Security – Advanced CASB Solution for Cloud Data Protection
ITX360 (Pvt) Ltd.
+1
Applicable to:
Cloud Security
Secure your cloud apps with real-time monitoring, Shadow IT discovery, and automated data protection. Integrated with Microsoft Information Protection for enhanced compliance and threat detection.
17 out of 60
Copilot for Microsoft 365: 1-Day Data and Security Workshop
Awara IT Kazakhstan LLP
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Unlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
18 out of 60
Microsoft Sentinel Proof of Concept: 4 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand how prepared is your Microsoft infrastructure when adversaries attack
19 out of 60
Microsoft Copilot Readiness Assessment
Inviso Corporation
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Get ready for Microsoft Copilot, by identifying best-in-class Microsoft 365 security solutions that will protect data and users by establishing a secure foundation, control content
20 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
21 out of 60
Mergers, Acquisitions, and Divestitures: 5-Month Implementation
Cyclotron Inc.
+2
Applicable to:
Adoption & Change Management
Cloud Security
Cyclotron helps organizations overcome the technical challenges of consolidating or divesting organization assets using Microsoft 365, Azure, and third-party migration tools.
22 out of 60
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
23 out of 60
Microsoft Defender for Cloud Apps: 2-Hr Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
24 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
25 out of 60
1-Tages KI Praxis Update Workshop (inkl. Copilot): Ihr Kompass durch die Welt der Künstlichen Intelligenz
AppSphere AG
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Mit dem KI Praxis Update Workshop statten wir Ihr Team mit dem neuesten Wissen über KI aus. Lernen Sie, wie Sie KI zielgerichtet und profitabel in Ihrer Organisation nutzen können.
26 out of 60
Modern Management for Endpoints
Ivision, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
27 out of 60
Microsoft 365 E5 CMMC L3 8 Week Implementation
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
28 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Our approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
29 out of 60
Data Protection Impact Assessment: 8 Wk
Lighthouse Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Empowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
30 out of 60
AvePoint Policies & Insights: 10-Days Assesments
IT-Dev sp. z o.o.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Assesment's outcomes: • Enable centralized reporting on Microsoft 365 security. • Discover potential risks and exposed content. • Enforce policies and automatically remediate security breaches!
31 out of 60
Darktrace Managed Network Sensor
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
32 out of 60
Identity as a Service | Assure 365
CyberOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Fully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
33 out of 60
Copilot for Security Rapid Test Flight | 2-Wk Workshop
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
34 out of 60
Managed Detection and Response [Threat Hunting]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Inspect events in your network to locate threat indicators and entities
35 out of 60
CMMC Implementation for Microsoft 365 (8 Wk Proj)
Summit 7 Systems, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Summit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) technical control practices associated with Level 2 for Microsoft 365, as well as Azure and AAD
36 out of 60
Microsoft 365 Copilot Readiness Assessment - CRA
TechPlus Talent
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Through this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
37 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und Ausarbeitung
AppSphere AG
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Vom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
38 out of 60
GDPR Assessment: 6-Week Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
39 out of 60
Fortis IR Table Top Exercises
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
40 out of 60
Microsoft 365 Copilot Implementation Readiness Assessment
Collective Insights
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Actionable recommendations in data security, technical infrastructure, user adoption, and workflow integration, ensuring preparation to adopt and integrate new technologies.
41 out of 60
Licensing Microsoft 365: 1-day Assessment
Informatika a.d.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
42 out of 60
Microsoft Copilot for Security: 2-Day Workshop
Planet Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
This 2-day workshop covers the essential aspects you need to effectively and efficiently leverage Microsoft Copilot for Security for your organization's security operations and needs.
43 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
44 out of 60
IN - Microsoft 365 Barracuda Cloud to Cloud Backup
Crayon
+1
Applicable to:
Cloud Security
Secure, easy-to-use SaaS backup for your Microsoft 365 data
45 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
46 out of 60
CCPA CPRA: 6 - Wk Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
47 out of 60
Lightstream Threat Protection Assessment and Deployment Roadmap
Lightstream
+2
Applicable to:
Cloud Security
Threat Protection
Leveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
48 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
49 out of 60
Microsoft Security: 4-Week Implementation
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Establish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
50 out of 60
Lenovo Cyber Resiliency as a Service EDA
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Environment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
51 out of 60
KMicro Rapid Incident Response & Readiness Service
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
52 out of 60
Implementation of Copilot readiness assessment
Dev4Side
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
53 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
54 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
55 out of 60
Microsoft Security Deployment: 5-day Workshop
Campana & Schott GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand your Microsoft security posture and minimize risks with the right experts
56 out of 60
AI Security Readiness Assessment
ProArch Technologies, Inc
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
ProArch’s AI Security Readiness Assessment delivers a comprehensive evaluation of your cloud and AI environment, identifies critical security gaps, and provides a prioritized roadmap for remediation.
57 out of 60
MDR Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
“MDR Shield” is Long View’s cyber security managed detection and response service.
58 out of 60
Microsoft 365 Secure Score Assessment
Daymark Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Improve your environment’s security posture using Microsoft Secure Score.
59 out of 60
Dell Implementation Services for Copilot Security
Dell Technologies Services
+1
Applicable to:
Cloud Security
Readiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
60 out of 60
Forrige
2
3
4
5
6
Neste