FilterAlle löschen
Professional Services Ergebnisse
Es werden Ergebnisse in professional services angezeigt.
Get Value from Adoption of Microsoft CopilotNexer Group ABGet tools for how to measure and promote the adoption of AI tools like Microsoft 365 Copilot and agents in your organisation. Get usertrainings, champion programs etc in place with our help.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
1 out of 28
Continuous Improvement Services for Microsoft 365SCIBERSciber’s Continuous Improvement service keeps your Microsoft 365 environment aligned with updates and best practices, turning changes into tailored insights that maximize your investment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 28
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 28
Nexer Data Governance - Get ready for AINexer Group ABTo get ready for AI you need to have control of your data. Effective data governance is crucial for ensuring compliance with data privacy regulations and maintaining data integrity.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
4 out of 28
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
5 out of 28
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
6 out of 28
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
7 out of 28
Azure MFA 4-hour workshopDanoffice IT ApS4 hour workshop focussing on Azure Multi-Factor Authentication (MFA) and Conditonal Access
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 28
Innofactor Intune foundation: 2 wk implementationInnofactor NorwayMicrosoft 365 - Intune Foundation is an established framework for basic configuration and acceleration of Microsoft Endpoint Manager MEM based on best practises from Innofactor.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
9 out of 28
Microsoft 365 Tenant Setup, 1-Day ImplementationTec Networks GmbHWe provide you a good-practice configured tenant for the best experience with Microsoft 365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
10 out of 28
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 28
Microsoft 365 Cybersikkerhed - 1-day Workshoptimengo a/s1-dags workshop incl. Roadmap rapport med anbefalinger til efterfølgende konfiguration, implementering og idriftsættelse af Microsoft 365 cybersikkerhed baseret på timengo's referencearkitektur.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
12 out of 28
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UKManage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
13 out of 28
Hybrid Work-Work is not a place: 2 wks assesmentGlobeteamCompanies need to support a hybrid workforce and support employees need for flexibility.
This offer gives you an assessment of your maturity to support hybrid work, and a plan for your implementation.
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
14 out of 28
Continuous Security Improvement: 2-mth POCGlobeteamGlobeteams Continous Security Improvement is delivered in co-operation with the customer. This means that the customer will have an active role in operation and increase their skillset over time
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
15 out of 28
Baseline Security Plus: 4-week AssessmentIT Relation A/SBaseline Security Plus enables you to protect your organization against more advanced attack with adaptive, built-in intelligence. Baseline Security is a range of security services to your company.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
16 out of 28
Microsoft 365 Security: 1-Wk AssessmentInnofactor NorwayInnofactor’s Microsoft 365 Security assessment secures organizations business operation by providing insights and recommendations to help minimizing security risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 28
Microsoft 365 Security: 2-WK Assessment EssentialsDustin ABAn executive assessment into essential security capabilities, map against normal/high risk scenario and security hygiene
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
18 out of 28
Compliance Manager Training: 1/2 day WorkshopCloud EssentialsCompliance Manager Training - a 1/2 day training session about Microsoft 365 Compliance Manager facilitated by an experienced member of our team
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
19 out of 28
Manage and Investigate Risk: 2 weeks WorkshopCloud EssentialsA risk check followed by advisory workshop to build a sustainable strategy around insider risk within Microsoft 365 and further accelerate your compliance journey.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
20 out of 28
Discover Sensitive Data: 2 weeks WorkshopCloud EssentialsDiscover Sensitive Data Workshop - an automated data risk check to uncover dark data risks with analysis and recommendations
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
21 out of 28
Microsoft 365 Defender: 10-Day AssessmentVenzo A/SLet VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 28
Windows 365: 4-Week - Proof of ConceptAPENTOThis is a 4-week proof of concept engagement for Windows 365 basic deployment in your environment for testing.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
23 out of 28
Microsoft 365 Security Assessment and Roadmap: 1 Day WorkshopCloud EssentialsAccelerating your Zero Trust strategy through a readiness assessment, workshop and roadmap
+1
Applicable to:
Cloud Security
24 out of 28
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 28
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse GlobalThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
26 out of 28
Cybersecurity Fitness Roadmap: 6-Wk AssessmentHiQ Stockholm ABPlan, create and implement a strategy for improving your organizational Cyber Hygiene using Microsoft Security Technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 28
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
28 out of 28