FiltreRyd alle
Professional Services resultater
Viser resultater i professional services.
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
2 out of 60
Threat Protection: 2-Month ImplementationOfficeline SAThreat protection with Microsoft Defender products. We deliver a solution that improves and streamlines threat protection for every organization.
+2
Applicable to:
Cloud Security
Threat Protection
3 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbHStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Data Security & Protection: 8 weeks - ImplementationMazzy Technologies Corp.Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
5 out of 60
Copilot for Microsoft 365: 1-Day Data and Security WorkshopAwara IT Kazakhstan LLPUnlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
6 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
7 out of 60
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
8 out of 60
Pently Microsoft 365 - AssessmentPently GmbHStructured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
9 out of 60
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
10 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 60
Microsoft 365 Copilot for Executives WorkshopSMART business LLCJoin our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
12 out of 60
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Information Protection - 1Month ImplementationOfficeline SAAn offering of Microsoft Information Protection implementation to improve and streamline compliance across all environments.
+2
Applicable to:
Cloud Security
Information Protection & Governance
14 out of 60
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLPOffice 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
15 out of 60
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
+1
Applicable to:
Cloud Security
16 out of 60
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLCCMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
17 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
18 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to:
Cloud Security
22 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
23 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
24 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
SEC01 - Defender for Endpoint: 3-Wk Proof of Concept (PoC)MindcoreExplore Microsoft Defender for Endpoint through a focused Proof of Concept to assess benefits, user experience and technical fit
+2
Applicable to:
Cloud Security
Identity & Access Management
26 out of 60
SEC03- Conditional Access, Rask Based Controls: 3-Wk Proof of Concept (PoC)MindcoreExplore Microsoft Conditional Access - Risk Based Controls through a focused Proof of Concept to assess benefits, user experience and technical fit
+2
Applicable to:
Cloud Security
Identity & Access Management
27 out of 60
SEC02 - Defender for Identity: 3-Wk Proof of Concept (PoC)MindcoreExplore Microsoft Defender for Identity through a focused Proof of Concept to assess benefits, user experience and technical fit
+2
Applicable to:
Cloud Security
Identity & Access Management
28 out of 60
SEC04 - Sikre filer med Teams for Education: 3-Wk Proof of Concept (PoC)MindcoreUdforsk mulighederne for at sikre filer med Microsoft Teams for Education gennem et fokuseret Proof of Concept for at vurdere fordele, brugeroplevelse og teknisk pasform.
+2
Applicable to:
Cloud Security
Identity & Access Management
29 out of 60
Microsoft 365 Security Design and Deployment: 1 Hour BriefingCloud EssentialsAn initial briefing to understand business requirements in advance of a design workshop and deployment of advanced Microsoft 365 cloud security features
+1
Applicable to:
Cloud Security
30 out of 60
Managed Detection and Response;2-Wk ImplementationDustin ABWith Managed Detection and Response we implement Microsoft 365 E5 security features with focus on Defender for Endpoint and preform threat surveillance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Evergreen Service - Månedsabonnement, Managed servicetimengo a/sÅrligt abonnement på rådgivning og services til opdatering og vedligehold af din Microsoft 365 platform, så den altid er opdateret og sikker.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
32 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
33 out of 60
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/SWe can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
34 out of 60
Microsoft365 Assessment: 2-weeks AssessmentGlobeteamGlobeteams Microsoft 365 Assesment gives you a business driven approach to the implementation of Microsoft 365, to ensure full value of your investment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
35 out of 60
Mail Security ManagementJDM A/SMail Security Management er en service til din Microsoft 365, der sikrer dig en velfungerende mailløsning er både er sikker og troværdig
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
36 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/SConscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Devoteam M Cloud - Microsoft Defender 365 - 2 months implementationCloudeon A/SProtect your cloud estate - we enable and tune your Microsoft XDR solution (Microsoft Defender suite) according to your needs.
+2
Applicable to:
Cloud Security
Threat Protection
39 out of 60
Microsoft 365 Security Posture 10-days AssessmentFUJITSUSecure Microsoft 365 and maximise your investment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
40 out of 60
itm8 SOC Managed XDRitm8 Sverige ABImplementation of itm8 SOC with Microsoft Sentinel
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
41 out of 60
Windows 365: 10-day proof of conceptGlobeteamProof of concept to show the value of the Windows 365 cloud pc
+2
Applicable to:
Cloud Security
Device Deployment & Management
42 out of 60
Getting ready for Microsoft 365 Copilot with FellowmindFellowmind Denmark A/SFellowmind’s ‘Getting ready’ for Microsoft 365 Copilot helps organizations prepare for a pilot in a secure and structured manner, laying the foundation for a successful roll-out.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
43 out of 60
Innofactor Copilot Data Readiness Kit, 3-week workshopInnofactor FinlandInnofactor's Copilot Data Readiness Kit ensures secure and efficient use of Microsoft Copilot by mitigating risks and effectively protecting sensitive business information and data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
44 out of 60
Guest Lifecycle for Azure ADSwiss IT Security AGGuest Lifecycle for Azure AD (GL4AAD) handles maintenance and hygiene tasks for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
45 out of 60
DNV Cyber Extended Detection and Response (XDR) for MicrosoftNixu OyjXDR service including 24/7 Security Operations Center (SOC) powered with Defender XDR and Sentinel
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
47 out of 60
Microsoft 365 Copilot workshop: 1-week consulting servicesUni Systems S.M.S.A.This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
48 out of 60
Microsoft 365 Copilot roadmap 1-day WorkshopDanoffice IT ApSGet ready to start your Copilot journey with the right foundation
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
49 out of 60
Get started with Microsoft 365 CopilotAPENTOAPENTO - Microsoft 365 Copilot Adoptions a service that helps ensures your people are ready, enabled and engaged to start using Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
50 out of 60
Intune Security ReviewmnemonicEnhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
+2
Applicable to:
Cloud Security
Mobile Device Management
51 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
52 out of 60
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
53 out of 60
Microsoft 365 Copilot Value Discovery: 2-Week AssessmentPrimendUnlock the full potential of Microsoft Copilot. Discover high-value use cases, optimize your AI readiness, and build a robust business case for AI transformation
+2
Applicable to:
Adoption & Change Management
Cloud Security
54 out of 60
Workshop of Copilot Tech Ready with timengotimengo a/sDenne workshop forbereder og udmønter en klar plan for en sikker teknisk implementering af Microsoft 365 Copilot.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
55 out of 60
itm8 Managed Detection and Responseitm8 Sverige ABImplementation of itm8 Managed Detection and Response based on Defender for Business
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
56 out of 60
Get Value from Adoption of Microsoft CopilotNexer Group ABGet tools for how to measure and promote the adoption of AI tools like Microsoft 365 Copilot and agents in your organisation. Get usertrainings, champion programs etc in place with our help.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
57 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
58 out of 60
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
59 out of 60
Continuous Improvement Services for Microsoft 365SCIBERSciber’s Continuous Improvement service keeps your Microsoft 365 environment aligned with updates and best practices, turning changes into tailored insights that maximize your investment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60