FilterAlle löschen
Professional Services Ergebnisse
Es werden Ergebnisse in professional services angezeigt.
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
1 out of 28
Managed Services: M(x)DR for Microsoft 365 DefenderCegeka NVIntroducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
+2
Applicable to:
Identity & Access Management
Threat Protection
2 out of 28
Microsoft 365 Cybersecurity: 4-days implementationPROJECT INFORMATICA SRLMicrosoft 365 cybersecurity assessment. We will analyze how secure your on-premises and cloud environment is and guide you on how to improve it.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 28
Identity Access Hardening: 5-days implementationPROJECT INFORMATICA SRLWith Identity Access Services Hardening the goal is to prepare your most mission-critical workloads by configuring either your identity management service through best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 28
Defender for Office 365: 5-days implementationPROJECT INFORMATICA SRLMicrosoft Defender for Office 365 protects your organization from threats that can come through Microsoft 365 collaboration solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 28
Microsoft Defender for Business: 6-days implementationPROJECT INFORMATICA SRLMicrosoft Defender for Business is an enterprise-grade device security solution, designed to protect businesses with up to 300 employees against sophisticated cyber threats
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 28
Microsoft Unified Endpoint Manager: 6-days implementationPROJECT INFORMATICA SRLThe use of Microsoft Endpoint Manager as a modern management tool, allows the structured updating of corporate assets, simplifies the work of system administrators
+3
Applicable to:
Mobile Device Management
Teamwork Deployment
Threat Protection
7 out of 28
Microsoft 365 MFA-Conditional Access: 4-days implementationPROJECT INFORMATICA SRLThe goal is to increase security by implementing Azure MFA and Conditional Access solutions available on the Microsoft 365 platform
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 28
Security Assessment JourneyAgic Cloud SrlCloud Security - 10 days Assessment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 28
Security Assessment: 4-Wk AssessmentAvvale S.p.A.Examine your organization's security posture, focusing on Microsoft 365 and Azure
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 28
Audit de sécurité : 5 joursEconocom Products & Solutions BeluxEvaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 28
POC Securité IT : 2 semainesEconocom Products & Solutions BeluxValidation des capacités des solutions de sécurité Microsoft dans votre environnement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 28
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions BeluxImplémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 28
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+1
Applicable to:
Threat Protection
14 out of 28
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 28
Threat Protection via Defender and Sentinel4WARD S.R.L.4ward implements Microsoft Defender and Sentinel to deliver unified threat protection, automated detection, and rapid response across cloud, hybrid, and on-premises environments.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 28
Identity and security Management through Entra and Intune4WARD S.R.L.4ward implements Microsoft Entra and Intune to secure identities, control access, manage devices, enabling Zero Trust, compliance, and seamless user experiences across hybrid and cloud environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 28
Data security governance compliance and privacy via Purview4WARD S.R.L.4ward implements Microsoft Purview to govern, protect, and classify data, ensuring security, compliance, privacy, and risk reduction across hybrid and multi-cloud environments
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
18 out of 28
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
19 out of 28
Threat Protection Envisioning Workshop: Stop Advanced Threats Across Microsoft 365evoila GmbH🛡️ Discover real threats targeting your organization. 2-week Threat Protection workshop with threat analysis, Defender XDR guidance, remediation recommendations
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
20 out of 28
Data Security Envisioning Workshop: Identify Risks in Your Organizational Dataevoila GmbH🔍 Uncover data security risks in Microsoft 365. 2-week automated Data Security Check with findings, Purview roadmap, and hands-on recommendations. Expert analysis. No guesswork.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
21 out of 28
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
22 out of 28
Defender for Office365 QuickStart: 5-Day ImpVar GroupWe have created a service to cover these topics within your company. We have developed a service to easily implement Microsoft Defender for Office 365 within your company.
+2
Applicable to:
Cloud Security
Threat Protection
23 out of 28
MFA Conditional Access QuickStart: 4-Day ImpVar GroupWe know that a username and password is a weak model. We have developed a service to easily implement Azure Active directory feature as a Conditional Access and MFA within your company.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 28
Microsoft 365 CyberSecurity: 5-Day AssessmentVar GroupAfter quickly enabling employees to work from home, many companies are taking the time to securitize their remote work environments.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 28
Security Services: 1-Hour BriefingiCubediCubed's Security offering derive from a deep investigation of company needs combined with the main Microsoft deliverables. The offering is introduced through a meeting with iCubed's representatives.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
26 out of 28
Microsoft Security - 4 Hrs BriefingReplyOur briefing will provide the information needed to empower employees to stay productive, while ICT maintain sure security and control
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
27 out of 28
Managed service : EDR with Defender for EndpointCegeka NVOur EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
28 out of 28