عوامل التصفيةإلغاء تطبيق الكل
نتائج Professional Services
يتم الآن عرض من النتائج في professional services
Microsoft 365 Security Design and Deployment: 1 Hour BriefingCloud EssentialsAn initial briefing to understand business requirements in advance of a design workshop and deployment of advanced Microsoft 365 cloud security features
+1
Applicable to:
Cloud Security
1 out of 49
Managed Detection and Response;2-Wk ImplementationDustin ABWith Managed Detection and Response we implement Microsoft 365 E5 security features with focus on Defender for Endpoint and preform threat surveillance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 49
Telia Cloud Managed Windows Endpoints with AutopilotTelia CompanyRemote or on-site consulting services to build your Windows Autopilot environment
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
3 out of 49
Microsoft Defender for Office 365: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deploy it to a group of users.
+2
Applicable to:
Cloud Security
Threat Protection
4 out of 49
Microsoft Defender for Endpoint: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Endpoint and deploy it to a group of devices.
+2
Applicable to:
Cloud Security
Threat Protection
5 out of 49
Microsoft Defender for Identity: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deployment of identity sensors.
+2
Applicable to:
Cloud Security
Threat Protection
6 out of 49
Microsoft Defender for Cloud Apps: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Cloud Apps and discover Cloud Apps
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 49
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
+1
Applicable to:
Cloud Security
8 out of 49
Managed Microsoft Sentinel and Extended Detection and Response (XDR) implementation with CentricCentric Netherlands b.v.The SOC team's goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 49
Devoteam M Cloud - Microsoft Defender 365 - 2 months implementationCloudeon A/SProtect your cloud estate - we enable and tune your Microsoft XDR solution (Microsoft Defender suite) according to your needs.
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 49
Defend Against Threats with SIEM Plus XDRNetox OyImprove your security posture with a Defend Against Threats with SIEM Plus XDR Workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 49
itm8 SOC Managed XDRitm8 Sverige ABImplementation of itm8 SOC with Microsoft Sentinel
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 49
Secure path to Microsoft 365 and AzureATEA SWEDEN ABWith "Secure Path to Microsoft 365 and Azure" an experienced information security consultant systematically guides the client's management through the process.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
13 out of 49
Atea Cloud Update for Microsoft 365ATEA SWEDEN ABExplore Atea Cloud Update: Get expert insights from Microsoft 365 updates, turning them into actionable benefits for your organization's success.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Microsoft 365 Live Events
14 out of 49
Getting ready for Microsoft 365 Copilot with FellowmindFellowmind Denmark A/SFellowmind’s ‘Getting ready’ for Microsoft 365 Copilot helps organizations prepare for a pilot in a secure and structured manner, laying the foundation for a successful roll-out.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
15 out of 49
Innofactor Copilot Data Readiness Kit, 3-week workshopInnofactor FinlandInnofactor's Copilot Data Readiness Kit ensures secure and efficient use of Microsoft Copilot by mitigating risks and effectively protecting sensitive business information and data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
16 out of 49
Guest Lifecycle for Azure ADSwiss IT Security AGGuest Lifecycle for Azure AD (GL4AAD) handles maintenance and hygiene tasks for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
17 out of 49
DNV Cyber Extended Detection and Response (XDR) for MicrosoftNixu OyjXDR service including 24/7 Security Operations Center (SOC) powered with Defender XDR and Sentinel
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 49
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
19 out of 49
Exobe Windows 365 PilotExobe ABWe are pleased to offer a Microsoft Windows 365 pilot that shows how to accomplish more with all the resources available in Windows 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
20 out of 49
Intune Security ReviewmnemonicEnhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
+2
Applicable to:
Cloud Security
Mobile Device Management
21 out of 49
Insight´s Microsoft Cloud Advisory ServiceInsight Technology SolutionsProvides a 2 weeks assessment of our client’s estate across the following six areas: Microsoft 365, Azure, On-Premises, Business Critical Applications, Skills & Resourcing & Cost optimisation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
22 out of 49
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
23 out of 49
Microsoft 365 Copilot Value Discovery: 2-Week AssessmentPrimendUnlock the full potential of Microsoft Copilot. Discover high-value use cases, optimize your AI readiness, and build a robust business case for AI transformation
+2
Applicable to:
Adoption & Change Management
Cloud Security
24 out of 49
itm8 Managed Detection and Responseitm8 Sverige ABImplementation of itm8 Managed Detection and Response based on Defender for Business
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
25 out of 49
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 49
Get Value from Adoption of Microsoft CopilotNexer Group ABGet tools for how to measure and promote the adoption of AI tools like Microsoft 365 Copilot and agents in your organisation. Get usertrainings, champion programs etc in place with our help.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
27 out of 49
Exobe DPIA ServiceExobe ABA Data Protection Impact Assessment (DPIA) is a structured process used to ensure GDPR compliance and responsible handling of personal data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
28 out of 49
Continuous Improvement Services for Microsoft 365SCIBERSciber’s Continuous Improvement service keeps your Microsoft 365 environment aligned with updates and best practices, turning changes into tailored insights that maximize your investment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 49
Nexer Data Governance - Get ready for AINexer Group ABTo get ready for AI you need to have control of your data. Effective data governance is crucial for ensuring compliance with data privacy regulations and maintaining data integrity.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
30 out of 49
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
31 out of 49
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
32 out of 49
Innofactor Intune foundation: 2 wk implementationInnofactor NorwayMicrosoft 365 - Intune Foundation is an established framework for basic configuration and acceleration of Microsoft Endpoint Manager MEM based on best practises from Innofactor.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
33 out of 49
Zerotrust Starterkit with Onevinn, 2 days!Onevinn ABIntroduction to Zerotrust with Passwordless and YubiKeys – Get an understanding of what the Passwordless technology is and what you can achieve with YubiKeys
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
34 out of 49
Passwordless Starterkit 25 Yubikeys, 4h WorkshopOnevinn ABIntroduction to Passwordless with 25 YubiKeys – get an understanding of what the Passwordless technology is and what you can achieve with Yubikeys
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
35 out of 49
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UKManage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
36 out of 49
Microsoft Endpoint Manager PoC - 4 weeksXenit ABXenit’s Proof-of-Concept (PoC) includes both a configuration in Microsoft Endpoint Manager and a strategy workshop.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
37 out of 49
Xenit Workspace - 4 weeks implementationXenit ABWith the workplace as a service, you give your employees a secure and managed client computer, filled with applications in Microsoft's user-friendly and familiar interfaces.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 49
Cyber Security Lifecycle: 12 Months ImplementationExobe ABThe goal and objective of the service is that your company should always have the best possible security posture for your Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
39 out of 49
Onevinn Information Protection: 5 day WorkshopOnevinn ABOnevinn Information Protection workshop that helps the customer utilize their investment in Microsoft 365.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
40 out of 49
Onevinn Threat Protection: 5 day WorkshopOnevinn ABOnevinn Threat Protection workshop that helps the customer utilize their investment in Microsoft 365.
+2
Applicable to:
Cloud Security
Threat Protection
41 out of 49
Microsoft 365 Security: 1-Wk AssessmentInnofactor NorwayInnofactor’s Microsoft 365 Security assessment secures organizations business operation by providing insights and recommendations to help minimizing security risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 49
Microsoft 365 Strategic Security Workshop (1day)Edgeguide ABTo establish an organization specific plan and in addition a better understanding of actual customer needs as it relates to the security, identity, and compliance portfolio in Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 49
Microsoft 365 Backup: 3 wks implementationXenit ABA complete backup plan with unlimited storage, unlimited rentention, GDPR modul and protection for malware and ransomware.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
44 out of 49
Microsoft 365 Security: 2-WK Assessment EssentialsDustin ABAn executive assessment into essential security capabilities, map against normal/high risk scenario and security hygiene
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
45 out of 49
Microsoft 365 Defender: 10-Day AssessmentVenzo A/SLet VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
46 out of 49
Microsoft 365 Security Assessment and Roadmap: 1 Day WorkshopCloud EssentialsAccelerating your Zero Trust strategy through a readiness assessment, workshop and roadmap
+1
Applicable to:
Cloud Security
47 out of 49
Tietoevry endpoint security 2h workshopTietoevry The purpose of the endpoint security workshop for Microsoft Defender is to help Customers understand the full potential security benefits within each of the Microsoft Defender solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
48 out of 49
Cybersecurity Fitness Roadmap: 6-Wk AssessmentHiQ Stockholm ABPlan, create and implement a strategy for improving your organizational Cyber Hygiene using Microsoft Security Technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 49