FilterAlle löschen
Professional Services Ergebnisse
Es werden Ergebnisse in professional services angezeigt.
Insight´s Microsoft Cloud Advisory ServiceInsight Technology SolutionsProvides a 2 weeks assessment of our client’s estate across the following six areas: Microsoft 365, Azure, On-Premises, Business Critical Applications, Skills & Resourcing & Cost optimisation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
1 out of 26
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
2 out of 26
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
3 out of 26
Support services for Microsoft 365Senetic S.A.Our offer includes 3 support service packages for Microsoft 365 environment, where we provide support in the correct configuration and implementation of tools.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
4 out of 26
Microsoft 365 for Copilot: 6 hours tenant assessmentVar GroupAssessment per una configurazione del tenat Microsoft 365 per una adozione consapevole e sicura di Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
5 out of 26
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 26
Threat Protection via Defender and Sentinel4WARD S.R.L.4ward implements Microsoft Defender and Sentinel to deliver unified threat protection, automated detection, and rapid response across cloud, hybrid, and on-premises environments.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 26
Identity and security Management through Entra and Intune4WARD S.R.L.4ward implements Microsoft Entra and Intune to secure identities, control access, manage devices, enabling Zero Trust, compliance, and seamless user experiences across hybrid and cloud environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 26
Active Directory: analisi e reportPORINIOttieni una panoramica completa delle potenziali vulnerabilità della tua infrastruttura AD e migliora la sicurezza operativa con il pacchetto di analisi e report di stato di salute di Active Directory
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
9 out of 26
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 26
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
11 out of 26
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 26
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 26
Microsoft 365 Tenant Setup, 1-Day ImplementationTec Networks GmbHWe provide you a good-practice configured tenant for the best experience with Microsoft 365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
14 out of 26
Defender for Office365 QuickStart: 5-Day ImpVar GroupWe have created a service to cover these topics within your company. We have developed a service to easily implement Microsoft Defender for Office 365 within your company.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 26
MFA Conditional Access QuickStart: 4-Day ImpVar GroupWe know that a username and password is a weak model. We have developed a service to easily implement Azure Active directory feature as a Conditional Access and MFA within your company.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 26
Microsoft Information Protection: 6-Day ImpVar GroupMicrosoft information Protection helps your organization to discovering, managing confidential information and to repond to regulations such as GDPR.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
17 out of 26
Microsoft Teams Governance Quick Start: 4-Day ImpVar GroupThe growth in the adoption of Microsoft Teams solution has been exponential in recent months. We know that the implementation of the Microsoft Teams has not always been done with governance in mind.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
18 out of 26
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UKManage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
19 out of 26
Microsoft 365 CyberSecurity: 5-Day AssessmentVar GroupAfter quickly enabling employees to work from home, many companies are taking the time to securitize their remote work environments.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 26
Teams Governance - 4 weeks ImplementationSoftJam S.p.A.We analyze the usage patterns of your team organization and define guidelines and automatism to govern Microsoft Teams
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
21 out of 26
Security Services: 1-Hour BriefingiCubediCubed's Security offering derive from a deep investigation of company needs combined with the main Microsoft deliverables. The offering is introduced through a meeting with iCubed's representatives.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
22 out of 26
Managed service : EDR with Defender for EndpointCegeka NVOur EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
23 out of 26
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 26
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse GlobalThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
25 out of 26
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
26 out of 26