FiltresEsborra-ho tot
Professional Services resultats
Es mostren resultats a professional services.
Veiligheidsregio Security Assessment Microsoft 365RawWorksHoe secure is jouw Microsoft 365 omgeving ingericht? Wij zorgen voor het juiste inzicht
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
1 out of 45
Waterschap Cloud Landing ZoneRawWorksWaar begin je met je roadmap naar de Cloud? RawWorks heeft voor de waterschappen in Nederland een Cloud Landing Zone klaar staan
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 45
Waterschap Security Assessment Microsoft 365RawWorksBaseline analyse voor de waterschappen op de Microsoft 365 inrichting inclusief gebruiksanalyse licenties
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
3 out of 45
Cloud Landing Zone veiligheidsregio BasisRawWorksAzure Cloud Landing zone veiligheidsregio basisinrichting voor een goede start van de cloud journey en toets Microsoft 365 (gebruik) inrichting en optimalisatie van de cloud omgevingen
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
4 out of 45
Microsoft 365 security assessment NIS 2.0RawWorksEen blinde vlek in je omgeving. Wordt je datasecuritybeleid goed uitgevoerd? Wij helpen inzicht te geven in het gebruik van de Microsoft 365 omgeving en geven advies over waar je kunt verbeteren
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
5 out of 45
Data Protection Workshop voor gemeente met Microsoft 365RawWorksOnbewust gevoelige data delen is eenvoudiger dan ooit. Alle systemen staan open, maar hoe voorkom je deze potentiële lekken? Tijdens de workshop bespreken we wat (on)mogelijk is met Microsoft 365.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
6 out of 45
Getting ready for Microsoft 365 Copilot with FellowmindFellowmind Denmark A/SFellowmind’s ‘Getting ready’ for Microsoft 365 Copilot helps organizations prepare for a pilot in a secure and structured manner, laying the foundation for a successful roll-out.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
7 out of 45
DNV Cyber Extended Detection and Response (XDR) for MicrosoftNixu OyjXDR service including 24/7 Security Operations Center (SOC) powered with Defender XDR and Sentinel
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 45
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
9 out of 45
Microsoft 365 Copilot Workshop - 2 days WorkshopDEEP by POST Telecom S.A.Microsoft 365 Copilot Workshop is designed to help organizations adopt Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
10 out of 45
Microsoft 365 Copilot Implementation and AdoptionCTAC B.V.Implementation and adoption of Microsoft 365 Copilot - a powerful solution designed to streamline your workflows and maximize the potential of your Microsoft 365 environment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
11 out of 45
DTX | MDR-SOC for Microsoft DefenderDTXExpand and Establish your SMB's digital assets with Managed Defender, a specialized MDR-SOC service by Dutch Technology eXperts. Designed specifically for small-to-medium businesses (SMB's).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 45
Security Operation ServicesBarikat Internet guvenligi bilisim tic . A.s.Expertly manage Microsoft 365 and Azure security features. Ensure periodic monitoring, reporting, and maximize benefits. Trust us for seamless operation; focus on your core business
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 45
Managed Microsoft Defender XDRPROXIMUS NV/SAProximus NXT Orbit Managed XDR service manages the alerts generated by Microsoft Defender. Our Security Operations Center (SOC) analyses and responds to these alerts 24/7 in Brussels, Belgium.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 45
Security Assessment2source4 B.V.Volledig Microsoft 365 Security Assessment waarbij pijnpunten in de beveiliging worden blootgelegd en adviezen worden opgesteld om pijnpunten af te dekken.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
15 out of 45
Intune Security ReviewmnemonicEnhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
+2
Applicable to:
Cloud Security
Mobile Device Management
16 out of 45
ITVT Modern Work Copilot ReadinesscheckITVTIdentifying the Opportunity for Customers within Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
17 out of 45
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
18 out of 45
Watchguard Managed ServiceCWSIWatchGuard helps customers understand, implement and fully utilise Microsoft Defender and Microsoft Sentinel's capabilities to deliver secure operations, all watched over by our 24x7 CSOC service.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 45
Adoption Accelerator for Copilot for Microsoft 365RawWorksWe offer you a roadmap to get started with Microsoft Copilot for Microsoft 365 and accelerate your adoption
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
20 out of 45
Data Security & Threat Protection WorkshopITVTIdentify data security risks in your organizational data & discover vulnerabilities in your environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 45
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
22 out of 45
Data Security with Microsoft Purview SolutionsBDOEnhance data security control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
23 out of 45
Modern Work Audit – 1 Week Consulting EngagementConnectworks | IT Professionals1-week Microsoft 365 audit: continuity, security & license optimization by certified experts
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
24 out of 45
Nexer Data Governance - Get ready for AINexer Group ABTo get ready for AI you need to have control of your data. Effective data governance is crucial for ensuring compliance with data privacy regulations and maintaining data integrity.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
25 out of 45
yellowSECUREyellow arrowThrough powerful 24/7 monitoring of the Microsoft 365 environment, its solutions, and the information contained within, we detect (potential) threats and, when necessary, isolate them.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 45
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
27 out of 45
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
28 out of 45
Security Assessment Microsoft 365: 2day assessmentProdware GroupA service for Office 365 and Microsoft 365 protection
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
29 out of 45
Microsoft 365 secure landing zone: 2Wk-impl.Rubicon B.V.Microsoft 365 secure landing zone compliant met CIS AVG ISO 27001 en BIO
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
30 out of 45
Microsoft 365 Security Baseline: 3-WK AssessmentMotion10A three-week assessment to create a baseline for protecting (sensitive) information, identities and devices.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
31 out of 45
5 day security (CIS controls) AssessmentUnica ICT solutionsKrijg inzicht en grip op de security van jouw organisatie middels een benchmark (nul meting) op basis van het markt gerenommeerde framework CIS Controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
32 out of 45
Microsoft 365 security baseline: 2Wk assessmentRubicon B.V.De Security Baseline Audit bevat de noodzakelijke controls (ruim 200) t.b.v. Azure & Office 365, o.a. op het gebied van Identity & Access management , inclusief de PaaS en IaaS diensten van Azure.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
33 out of 45
Security: 1-day assessmentLemontree B.V.Microsoft Azure and Microsoft 365 security Assessment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
34 out of 45
Microsoft 365 Security Scan: 3d AssessmentOrdinaThe result of the multi-day assessment will be a risk-based advise focusing on recommendations and a roadmap to increase the security posture of your Modern Workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 45
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UKManage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
36 out of 45
Defend against threats with SIEM plus XDR Workshop including FastTrack guidanceXylosOur 3-day Security workshop is meant to get an overview of the Security landscape, we use the Microsoft 365 security products and features to gain visibility into threats to your Microsoft 365.
+2
Applicable to:
Cloud Security
Threat Protection
37 out of 45
Secure Microsoft 365 Managed ServiceCWSICWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 45
Cloud Security Assessment in 3 daysSCCTCloud Security Assessment in 3 days. Door middel van dit assessment wordt inzicht verschaft over de huidige security staat van uw Microsoft 365 omgeving.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 45
NextGen Windows Experiences Expert-as-a-service, 1y Mgd ServiceXylosXylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your modern endpoint management.
+2
Applicable to:
Cloud Security
Device Deployment & Management
40 out of 45
Managed service : EDR with Defender for EndpointCegeka NVOur EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
41 out of 45
Secure Identities and Access Expert-as-a-service, 1 y, Mgd serviceXylosXylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your cloud or hybrid Identity environment based on Microsoft 365 technology.
+2
Applicable to:
Cloud Security
Identity & Access Management
42 out of 45
Secure Identities and Access Assessment, 3 daysXylosOur Identity Security Assessment is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 45
Data Classification and labelling: 6-Months Impl.Toreon CVBAData classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
44 out of 45
Microsoft 365 Security Assessment: 6-day AssessmentPerformantaPerformanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 45