FiltersClear all
Consulting services results for Energy & Resources
Showing results in consulting services.
All results
Transform your operations: 2 Days assessmentMinsaitIn this proposal, we demonstrate the differential value that Minsait offers in the implementation of Power Platform projects.
+2
Applicable to:
Power AutomatePower Apps
1 out of 8
PowerApps Project Accelerator:5-Day ImplementationGLMS Australia Pty LtdProject Accelerator Implementation and customisation
+1
Applicable to:
Power Apps
2 out of 8
Project Operations & proMX 365 Base: 2-hr BriefingproMX AGA powerful combination to help you build a unique solution
+1
Applicable to:
Project Operations
3 out of 8
Plan your Digital Workplace: 5-Weeks WorkshopIT-Dev sp. z o.o.Functional Roadmapping helps to design a roadmap for Digital Workplace. The roadmap allows the achievement of significant business benefits and boosts Microsoft 365 ROI.
+3
Applicable to:
Adoption & Change ManagementKnowledge & InsightsPower Platform for Teams
4 out of 8
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
5 out of 8
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/SWe can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityThreat Protection
6 out of 8
Power BI Embedded for Energy: 1-Hr BriefingPBI Lab IncAn overview of how Power BI Embedded can help your organization improve business performance. Designed to let you embed your Power BI items in a web application or in a website.
+1
Applicable to:
Power BI apps
7 out of 8
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/SConscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
8 out of 8