FilterAlle löschen
Professional Services Ergebnisse
Es werden Ergebnisse in professional services angezeigt.
Elisa Windows 365 POCElisa OyjWindows 365 Cloud PC allows your company to get access to different applications from various locations and it also allows your employees to work productively and securely from anywhere
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
1 out of 30
Managed security servicesSulava OyOffering that protect your organization’s digital assets, mitigates cyber security threats, and enhances your overall security posture using Microsoft Defender extended detection and response
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 30
Getting ready for Microsoft 365 Copilot with FellowmindFellowmind Denmark A/SFellowmind’s ‘Getting ready’ for Microsoft 365 Copilot helps organizations prepare for a pilot in a secure and structured manner, laying the foundation for a successful roll-out.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
3 out of 30
Innofactor Copilot Data Readiness Kit, 3-week workshopInnofactor FinlandInnofactor's Copilot Data Readiness Kit ensures secure and efficient use of Microsoft Copilot by mitigating risks and effectively protecting sensitive business information and data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
4 out of 30
DNV Cyber Extended Detection and Response (XDR) for MicrosoftNixu OyjXDR service including 24/7 Security Operations Center (SOC) powered with Defender XDR and Sentinel
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 30
Elisa CSI Security Engagements: 3-4 weeks workshopsElisa OyjElisa can offer its customers four different security workshops through Cybersecurity Incentives Program (CSI). In workshops customers learn about the products and get recommendations on next steps.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 30
XDR-Service-Finland: continuous per monthAtea Finland OyThis service offers you Atea’s trusted cybersecurity experts who will proactively help you to develop your complex security environment.
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 30
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
8 out of 30
Microsoft 365 Copilot Value Discovery: 2-Week AssessmentPrimendUnlock the full potential of Microsoft Copilot. Discover high-value use cases, optimize your AI readiness, and build a robust business case for AI transformation
+2
Applicable to:
Adoption & Change Management
Cloud Security
9 out of 30
Data Assessment Workshop PackageAdvania Finland OyAdvania helps realize the added value and security status of existing data sources, and to formulate proposals for leveraging new data sources for organizational benefit.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
10 out of 30
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
11 out of 30
Get Value from Adoption of Microsoft CopilotNexer Group ABGet tools for how to measure and promote the adoption of AI tools like Microsoft 365 Copilot and agents in your organisation. Get usertrainings, champion programs etc in place with our help.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
12 out of 30
Nexer Data Governance - Get ready for AINexer Group ABTo get ready for AI you need to have control of your data. Effective data governance is crucial for ensuring compliance with data privacy regulations and maintaining data integrity.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
13 out of 30
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
14 out of 30
Tietokeskus SOC - Security Operations CenterTietokeskusManaged SOC / MDR service based on Microsoft Sentinel and Defender.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 30
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
16 out of 30
Innofactor Intune foundation: 2 wk implementationInnofactor NorwayMicrosoft 365 - Intune Foundation is an established framework for basic configuration and acceleration of Microsoft Endpoint Manager MEM based on best practises from Innofactor.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
17 out of 30
Microsoft 365 Security, 2-day WorkshopDigiaDiscover the current state of your Microsoft 365 service security setup, get actionable recommendations on how to improve and a roadmap for further development of your environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 30
Passwordless Starterkit 25 Yubikeys, 4h WorkshopOnevinn ABIntroduction to Passwordless with 25 YubiKeys – get an understanding of what the Passwordless technology is and what you can achieve with Yubikeys
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
19 out of 30
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UKManage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
20 out of 30
Security 6-hour workshopSulava OyWorkshop enables customers to gain visibility into threats in across cloud environment in order to prioritize and mitigate potential attacks. It helps to understand how Microsoft 365 products can help
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 30
Microsoft 365 Security Hardening: 2-day WorkshopAdvania Finland OyMicrosoft 365 Security Hardening is an assessment workshop for evaluating customer's Microsoft 365 security posture and providing a security plan for improvement
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
22 out of 30
Microsoft 365 Security: 1-Wk AssessmentInnofactor NorwayInnofactor’s Microsoft 365 Security assessment secures organizations business operation by providing insights and recommendations to help minimizing security risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 30
Microsoft 365 Defender: 10-Day AssessmentVenzo A/SLet VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
24 out of 30
Microsoft 365 Security Assessment and Roadmap: 1 Day WorkshopCloud EssentialsAccelerating your Zero Trust strategy through a readiness assessment, workshop and roadmap
+1
Applicable to:
Cloud Security
25 out of 30
Microsoft 365 Tietoturvapilotti: 2-mo Proof of ConceptAtea Finland OyMicrosoft 365 Security Proof of Concept (POC) where you get Microsoft 365 E5 technology deployed and get a security visibility to your infrastructure including knowledge and how-to sharing with Atea.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 30
Microsoft 365 Tietoturva-arviointi: 1/2 day AssessmentAtea Finland OyMicrosoft 365 Tietoturva-arviointi, jossa läpikäydään Online Tenanttinne varmistaen sen nykyaikainen konfigurointi sekä suoja-asetukset.
+2
Applicable to:
Cloud Security
Threat Protection
27 out of 30
Tietoevry endpoint security 2h workshopTietoevry The purpose of the endpoint security workshop for Microsoft Defender is to help Customers understand the full potential security benefits within each of the Microsoft Defender solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 30
Microsoft 365 Health Check: One Week assessmentTelia Inmics-Nebula OyThe Microsoft 365 Health check provides the customer with a comprehensive view of the current state of the environment
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
29 out of 30
Cybersecurity Fitness Roadmap: 6-Wk AssessmentHiQ Stockholm ABPlan, create and implement a strategy for improving your organizational Cyber Hygiene using Microsoft Security Technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 30