FilterAlle löschen
Professional Services Ergebnisse
Es werden Ergebnisse in professional services angezeigt.
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 60
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLPOffice 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
3 out of 60
Copilot for Microsoft 365: 1-Day Data and Security WorkshopAwara IT Kazakhstan LLPUnlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
4 out of 60
Data Protection Impact Assessment: 8 WkLighthouse GlobalEmpowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
5 out of 60
Threat Protection: 2-Month ImplementationOfficeline SAThreat protection with Microsoft Defender products. We deliver a solution that improves and streamlines threat protection for every organization.
+2
Applicable to:
Cloud Security
Threat Protection
6 out of 60
Data Security & Protection: 8 weeks - ImplementationMazzy Technologies Corp.Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
7 out of 60
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLCCMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
8 out of 60
NEST ArenaNoibitTwo-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbHStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Information Protection - 1Month ImplementationOfficeline SAAn offering of Microsoft Information Protection implementation to improve and streamline compliance across all environments.
+2
Applicable to:
Cloud Security
Information Protection & Governance
12 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Insight Microsoft 365 Strategy Planning ServiceInsight Technology SolutionsMicrosoft 365 strategy planning service is a consulting service supporting clients to gain understanding of current and future strategies around the adoption of Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
15 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
16 out of 60
Microsoft 365 Copilot for Executives WorkshopSMART business LLCJoin our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
17 out of 60
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
18 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
21 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
22 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to:
Cloud Security
26 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
27 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo SoftwareThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
29 out of 60
base-IT PentestingBaseITMit base-IT Pentesting stärken wir Ihre IT-Sicherheit und decken Schwachstellen auf. Durch die Integration von Microsoft 365 (Cloud Security, etc.) entsteht eine umfassende Sicherheitsarchitektur.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
31 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeksPlain ConceptsThe objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
+2
Applicable to:
Cloud Security
Information Protection & Governance
32 out of 60
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/SWe can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
33 out of 60
Implementazione Microsoft Endpoint ManagerInside TechnologiesImplementazione della piattaforma MDM per gestire gli endpoint aziendali e personali
+2
Applicable to:
Cloud Security
Identity & Access Management
34 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/SConscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Microsoft 365 Cybersecurity: 4-days implementationPROJECT INFORMATICA SRLMicrosoft 365 cybersecurity assessment. We will analyze how secure your on-premises and cloud environment is and guide you on how to improve it.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Identity Access Hardening: 5-days implementationPROJECT INFORMATICA SRLWith Identity Access Services Hardening the goal is to prepare your most mission-critical workloads by configuring either your identity management service through best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Defender for Office 365: 5-days implementationPROJECT INFORMATICA SRLMicrosoft Defender for Office 365 protects your organization from threats that can come through Microsoft 365 collaboration solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft Defender for Business: 6-days implementationPROJECT INFORMATICA SRLMicrosoft Defender for Business is an enterprise-grade device security solution, designed to protect businesses with up to 300 employees against sophisticated cyber threats
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Move to Microsoft Business Premium: 5-days implementationPROJECT INFORMATICA SRLMicrosoft 365 Business Premium is a subscription service that lets you manage your organization in the cloud while Microsoft takes care of IT for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Azure Active Directory Premium: 8-days implementationPROJECT INFORMATICA SRLIncrease Microsoft 365 security by implementing Azure MFA and Conditional Access solutions available on the Microsoft 365 platform
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Microsoft 365 MFA-Conditional Access: 4-days implementationPROJECT INFORMATICA SRLThe goal is to increase security by implementing Azure MFA and Conditional Access solutions available on the Microsoft 365 platform
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 60
Microsoft 365 E5 - AssessmentAgic Cloud SrlMicrosoft 365 E5 - 3 Weeks Assessment (Security, Compliance, Analytics)
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
43 out of 60
Security Assessment JourneyAgic Cloud SrlCloud Security - 10 days Assessment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Compliance Assessment JourneyAgic Cloud SrlCompliance - 10 Days Assessment (Microsoft 365 Compliance)
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
45 out of 60
4ward srl - Assessment Microsoft 365 Copilot4WARD S.R.L.Are you ready for Microsoft 365 Copilot? Let’s check if all the technical and business prerequisites are set up at their best!
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
46 out of 60
4wardPRO - IA generativa in Microsoft 3654WARD S.R.L.IA generativa in Microsoft 365 - Bing Chat Enterprise e Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
47 out of 60
4ward srl - Classificazione dati per Microsoft 365 Copilot4WARD S.R.L.Strumenti e strategie per la classificazione e protezione dei dati non strutturati
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
48 out of 60
4ward srl - Preparazione files per Microsoft 365 Copilot4WARD S.R.L.Migrazione dei file su Microsoft Onedrive e Microsoft Sharepoint per essere utilizzabili e fruibili da Microsoft Copilot per massimizzarne il valore
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
49 out of 60
4ward srl - Copilot Extension Proof of Concept4WARD S.R.L.Microsoft 365 Copilot Extensibility Proof of Concept - plugin personalizzati ed estensioni Microsoft Graph per l'integrazione con applicativi aziendali
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
50 out of 60
4ward srl - Deployment Microsoft 365 Copilot4WARD S.R.L.Attivazione e Implementazione di Microsoft 365 Copilot, configurazione di Microsoft Loop e del nuovo Microsoft Outlook come prerequisiti alla attivazione di Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
51 out of 60
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
52 out of 60
base-IT Copilot für Microsoft 365 Readiness WorkshopBaseITBereiten Sie sich mit dem base-IT Copilot für Microsoft 365 - Readiness Workshop auf die Zukunft vor. Copilot ist Ihr KI-Assistent, der Ihre täglichen Anwendungen smarter macht.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Teamwork Deployment
53 out of 60
Security Assessment: 4-Wk AssessmentAvvale S.p.A.Examine your organization's security posture, focusing on Microsoft 365 and Azure
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
54 out of 60
Audit de sécurité : 5 joursEconocom Products & Solutions BeluxEvaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
POC Securité IT : 2 semainesEconocom Products & Solutions BeluxValidation des capacités des solutions de sécurité Microsoft dans votre environnement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions BeluxImplémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Microsoft 365 Copilot workshop: 1-week consulting servicesUni Systems S.M.S.A.This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
58 out of 60
Insight´s Microsoft Cloud Advisory ServiceInsight Technology SolutionsProvides a 2 weeks assessment of our client’s estate across the following six areas: Microsoft 365, Azure, On-Premises, Business Critical Applications, Skills & Resourcing & Cost optimisation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
59 out of 60
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
60 out of 60