FiltresEsborra-ho tot
Professional Services resultats
Es mostren resultats a professional services.
Identity & Access Management: 1-Mth ImplementationOfficeline SAMicrosoft 365 Identity & Access Management to improve and streamline security on cloud and applications
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
1 out of 60
NEST ArenaNoibitTwo-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVASOFTEnhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbHStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdgeEndpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
5 out of 60
Identity Health CheckMobile MentorMobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
6 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Data Security & Protection: 8 weeks - ImplementationMazzy Technologies Corp.Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
8 out of 60
CS Microsoft Copilot 360°: 12-wk implementationCampana & Schott GmbHUtilize Microsoft 365 Copilot and Copilot Studio to boost your productivity with generative AI in your company.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
9 out of 60
Threat Protection: 2-Month ImplementationOfficeline SAThreat protection with Microsoft Defender products. We deliver a solution that improves and streamlines threat protection for every organization.
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 60
SYSTEX Data Security and Compliance Solution精诚(中国)企业管理有限公司通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
11 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 60
Copilot for Microsoft 365: 1-Day Data and Security WorkshopAwara IT Kazakhstan LLPUnlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
13 out of 60
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
+1
Applicable to:
Cloud Security
14 out of 60
Insight Microsoft 365 Strategy Planning ServiceInsight Technology SolutionsMicrosoft 365 strategy planning service is a consulting service supporting clients to gain understanding of current and future strategies around the adoption of Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
15 out of 60
Information Protection - 1Month ImplementationOfficeline SAAn offering of Microsoft Information Protection implementation to improve and streamline compliance across all environments.
+2
Applicable to:
Cloud Security
Information Protection & Governance
16 out of 60
Microsoft 365 Copilot for Executives WorkshopSMART business LLCJoin our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
17 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Modern Endpoint Protection as a Service Bereitstellung - 2 Daysmsg systems agModern Endpoint Protection as a Service - Vollständige EDR/XDR/MDR Services aus einer Hand powered by Microsoft 365 Defender
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
19 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Pently Microsoft 365 - AssessmentPently GmbHStructured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
22 out of 60
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
23 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
24 out of 60
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
25 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
26 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
27 out of 60
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
29 out of 60
Microsoft Security and Rapid Cyberattack Assessment: 3-tägiges AssessmentnovaCapta GmbHDas Microsoft Security Assessment hilft Ihrem Unternehmen zu verstehen, wie Sie Bedrohungen durch den Einsatz von Microsoft 365-Security-Lösungen gezielt reduzieren und sich vor Angriffen schützen.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo SoftwareThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to:
Cloud Security
32 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLPOffice 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
34 out of 60
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLCCMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
35 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
36 out of 60
Microsoft 365 Security: 2-Hour WorkshopSNOMANNFree 2-hour workshop assessment to review your Microsoft 365 environment and provide recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
37 out of 60
Insight´s Microsoft Cloud Advisory ServiceInsight Technology SolutionsProvides a 2 weeks assessment of our client’s estate across the following six areas: Microsoft 365, Azure, On-Premises, Business Critical Applications, Skills & Resourcing & Cost optimisation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
38 out of 60
DIGITALL Cyber Security: 7-Day AssessmentDIGITALL Nature Germany GmbHUNCOVER AND MITIGATE SECURITY RISKS WITH OUR COMPREHENSIVE CYBER SECURITY ASSESSMENT
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
39 out of 60
Managed Security Operations Center: 1 Month ImplementationnovaCapta GmbHWir bieten einen professionellen 24/7-Sicherheitsbetrieb Ihrer Umgebung mit unserem zertifizierten deutschen SOC-Team
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
40 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
41 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
43 out of 60
Security Operations Center: 1-Months Implementationiteracon GmbHDas ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
44 out of 60
Microsoft 365 Tenant Security Workshop: 3tägiger WorkshopnovaCapta GmbHErfahren Sie wie Sie die Microsoft Security Tools bestmöglich nutzen um Ihren Tenant zu schützen
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
45 out of 60
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/SWe can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
46 out of 60
Microsoft Purview Information Protection - Starter Workshop Duration 3 daysNTT DATA Deutschland GmbHPurview Information Protection with Azure Rights Management provides an effective technology that is already integrated with Office 365 / Azure
+2
Applicable to:
Cloud Security
Information Protection & Governance
47 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Managed Security Operation Center (SOC) as a Service - by BitHawkBitHawk AGBitHawk's SOC service is designed to constantly monitor and protect our customer's environment using Microsoft tools. We help you to build and operate a SOC with the support of BitHawk. - 9 Day Impl.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Microsoft 365 Review: 2-Day AssessmentCANCOM Austria AGGet the most out of your Microsoft 365 Tenant with our custom-tailored cloud review to improve your workloads, strengthen the security, and point out unused potentials.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
50 out of 60
ADVIA Service Implementierung & MigrationADVIA GmbHDie Cloud ist das Ziel, der Weg ist klar, doch was ist mit Ihren Daten?
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
51 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/SConscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Quick Security Assessment f ür die Microsoft Cloud: 2 WochenIT-Improvement Deutschland GmbHStandortbestimmung im Security Bereich der Microsoft Cloud Umgebung und Entwicklung von Handlungsempfehlungen.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
53 out of 60
Base-IT Managed Service Security & SOCBaseITBase-IT Managed Service Security & SOC bietet Ihnen eine PROAKTIVE und PROFESSIONELLE Betreuung, sehr gerne auf Wunsch Rund-um-die-Uhr. Wir garantieren Ihnen vollumfassenden IT-Security Schutz.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
54 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Build Intent - Security Workshops - Approx. 1 Day WorkshopBitHawk AGMCI Build Intent Workshops are engagements that enable partners to demonstrate Microsoft Products in the Security-Part to the end-customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
56 out of 60
Windows 365 Cloud PC Workshop - 2 DayaConTech GmbHDie teccle group begleitet Ihre Reise in die Virtualisierungswelt mit dem Windwos 365 Cloud PC Workshop.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
57 out of 60
M365 Security Audit: 1-Wk AuditJoker IT AGNachhaltig das Bewusstsein für die Cloud-Sicherheit verbessern
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
PRW® Compliance Set: Microsoft 365Orange Networks GmbHMit dem PRW® Compliance Set: Microsoft 365 liefern wir das perfekte Instrument, um Microsoft 365 datenschutzkonform absichern und nutzen zu können.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
59 out of 60
Next Gen Endpoint Accelerator 3wk WorkshopTrans4mation IT GmbHHelp customers to understand the benefit working with cloud endpoints
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
60 out of 60