FiltersClear all
Consulting services results
Showing results in consulting services.
Guest Lifecycle for Azure ADSwiss IT Security AGGuest Lifecycle for Azure AD (GL4AAD) handles maintenance and hygiene tasks for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
1 out of 54
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
2 out of 54
Microsoft 365 Copilot Value Discovery: 2-Week AssessmentPrimendUnlock the full potential of Microsoft Copilot. Discover high-value use cases, optimize your AI readiness, and build a robust business case for AI transformation
+2
Applicable to:
Adoption & Change Management
Cloud Security
3 out of 54
Microsoft 365 Security Assessment and Roadmap: 1 Day WorkshopCloud EssentialsAccelerating your Zero Trust strategy through a readiness assessment, workshop and roadmap
+1
Applicable to:
Cloud Security
4 out of 54
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
5 out of 54
Atea 365 Healthcheck: 2-days AssessmentATEA SWEDEN ABAtea 365 Healtcheck helps you get a clear overview of your Microsoft 365 environment.
+1
Applicable to:
Cloud Security
6 out of 54
Microsoft 365 Security: 4-WK Assessment AdvancedDustin ABAn executive assessment into advanced E5 security capabilities that helps you to get an overview of your threat landscape and the capabilities of E5 cyber security tools
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 54
Managed Detection and Response;2-Wk ImplementationDustin ABWith Managed Detection and Response we implement Microsoft 365 E5 security features with focus on Defender for Endpoint and preform threat surveillance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 54
Telia Cloud Managed Windows Endpoints with AutopilotTelia CompanyRemote or on-site consulting services to build your Windows Autopilot environment
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
9 out of 54
Microsoft Defender for Office 365: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deploy it to a group of users.
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 54
Microsoft Defender for Endpoint: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Endpoint and deploy it to a group of devices.
+2
Applicable to:
Cloud Security
Threat Protection
11 out of 54
Microsoft Defender for Identity: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deployment of identity sensors.
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 54
Microsoft Defender for Cloud Apps: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Cloud Apps and discover Cloud Apps
+2
Applicable to:
Cloud Security
Threat Protection
13 out of 54
Managed Microsoft Sentinel and Extended Detection and Response (XDR) implementation with CentricCentric Netherlands b.v.The SOC team's goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 54
Devoteam M Cloud - Microsoft Defender 365 - 2 months implementationCloudeon A/SProtect your cloud estate - we enable and tune your Microsoft XDR solution (Microsoft Defender suite) according to your needs.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 54
Defend Against Threats with SIEM Plus XDRNetox OyImprove your security posture with a Defend Against Threats with SIEM Plus XDR Workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 54
itm8 SOC Managed XDRitm8 Sverige ABImplementation of itm8 SOC with Microsoft Sentinel
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 54
Secure path to Microsoft 365 and AzureATEA SWEDEN ABWith "Secure Path to Microsoft 365 and Azure" an experienced information security consultant systematically guides the client's management through the process.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
18 out of 54
Atea Cloud Update for Microsoft 365ATEA SWEDEN ABExplore Atea Cloud Update: Get expert insights from Microsoft 365 updates, turning them into actionable benefits for your organization's success.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Microsoft 365 Live Events
19 out of 54
Getting ready for Microsoft 365 Copilot with FellowmindFellowmind Denmark A/SFellowmind’s ‘Getting ready’ for Microsoft 365 Copilot helps organizations prepare for a pilot in a secure and structured manner, laying the foundation for a successful roll-out.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
20 out of 54
Innofactor Copilot Data Readiness Kit, 3-week workshopInnofactor FinlandInnofactor's Copilot Data Readiness Kit ensures secure and efficient use of Microsoft Copilot by mitigating risks and effectively protecting sensitive business information and data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
21 out of 54
DNV Cyber Extended Detection and Response (XDR) for MicrosoftNixu OyjXDR service including 24/7 Security Operations Center (SOC) powered with Defender XDR and Sentinel
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 54
Exobe Windows 365 PilotExobe ABWe are pleased to offer a Microsoft Windows 365 pilot that shows how to accomplish more with all the resources available in Windows 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
23 out of 54
itm8 Managed Detection and Responseitm8 Sverige ABImplementation of itm8 Managed Detection and Response based on Defender for Business
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
24 out of 54
Get Value from Adoption of Microsoft CopilotNexer Group ABGet tools for how to measure and promote the adoption of AI tools like Microsoft 365 Copilot and agents in your organisation. Get usertrainings, champion programs etc in place with our help.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
25 out of 54
Exobe DPIA ServiceExobe ABA Data Protection Impact Assessment (DPIA) is a structured process used to ensure GDPR compliance and responsible handling of personal data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
26 out of 54
Continuous Improvement Services for Microsoft 365SCIBERSciber’s Continuous Improvement service keeps your Microsoft 365 environment aligned with updates and best practices, turning changes into tailored insights that maximize your investment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 54
Nexer Data Governance - Get ready for AINexer Group ABTo get ready for AI you need to have control of your data. Effective data governance is crucial for ensuring compliance with data privacy regulations and maintaining data integrity.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
28 out of 54
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
29 out of 54
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
30 out of 54
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
31 out of 54
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLCCMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
32 out of 54
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
33 out of 54
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
34 out of 54
Microsoft 365 Security Assessment - 4 DaysMatrix3D Infocom Private Ltd.This Assessment is a comprehensive evaluation of your Microsoft 365 environment, designed to identify misconfigurations, security gaps, compliance risks, and underutilized Microsoft security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
35 out of 54
Microsoft Sentinel SOC Managed Service by H OneH One (Private) LimitedAs a Microsoft-certified partner with deep Sentinel expertise, our Managed SOC gives you round-the-clock monitoring, rapid threat response, and complete visibility across your cloud environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 54
Beyondsoft Segurança Ambiente CloudBeyondsoftOferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 54
Netox MXDR / SOC 24/7Netox OyFinnish-built 24/7 MXDR & SOC for Microsoft environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 54
HCLTech Frontline Worker Digital Experience – Assessment & Implementation support for Empowering Frontline WorkersHCL America Inc_HCLTHCLTech’s solution streamlines frontline communication, digital workflows, and secure device management, powered by HCLTech, Microsoft, and Zebra for a modern, sustainable frontline workplace.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
39 out of 54
Innofactor Intune foundation: 2 wk implementationInnofactor NorwayMicrosoft 365 - Intune Foundation is an established framework for basic configuration and acceleration of Microsoft Endpoint Manager MEM based on best practises from Innofactor.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
40 out of 54
Zerotrust Starterkit with Onevinn, 2 days!Onevinn ABIntroduction to Zerotrust with Passwordless and YubiKeys – Get an understanding of what the Passwordless technology is and what you can achieve with YubiKeys
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
41 out of 54
Passwordless Starterkit 25 Yubikeys, 4h WorkshopOnevinn ABIntroduction to Passwordless with 25 YubiKeys – get an understanding of what the Passwordless technology is and what you can achieve with Yubikeys
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
42 out of 54
Microsoft Endpoint Manager PoC - 4 weeksXenit ABXenit’s Proof-of-Concept (PoC) includes both a configuration in Microsoft Endpoint Manager and a strategy workshop.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
43 out of 54
Xenit Workspace - 4 weeks implementationXenit ABWith the workplace as a service, you give your employees a secure and managed client computer, filled with applications in Microsoft's user-friendly and familiar interfaces.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 54
Cyber Security Lifecycle: 12 Months ImplementationExobe ABThe goal and objective of the service is that your company should always have the best possible security posture for your Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
45 out of 54
Onevinn Information Protection: 5 day WorkshopOnevinn ABOnevinn Information Protection workshop that helps the customer utilize their investment in Microsoft 365.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
46 out of 54
Onevinn Threat Protection: 5 day WorkshopOnevinn ABOnevinn Threat Protection workshop that helps the customer utilize their investment in Microsoft 365.
+2
Applicable to:
Cloud Security
Threat Protection
47 out of 54
Microsoft 365 Security: 1-Wk AssessmentInnofactor NorwayInnofactor’s Microsoft 365 Security assessment secures organizations business operation by providing insights and recommendations to help minimizing security risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
48 out of 54
Microsoft 365 Strategic Security Workshop (1day)Edgeguide ABTo establish an organization specific plan and in addition a better understanding of actual customer needs as it relates to the security, identity, and compliance portfolio in Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 54
Microsoft 365 Backup: 3 wks implementationXenit ABA complete backup plan with unlimited storage, unlimited rentention, GDPR modul and protection for malware and ransomware.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
50 out of 54
Microsoft 365 Security: 2-WK Assessment EssentialsDustin ABAn executive assessment into essential security capabilities, map against normal/high risk scenario and security hygiene
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
51 out of 54
Microsoft 365 Defender: 10-Day AssessmentVenzo A/SLet VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
52 out of 54
Tietoevry endpoint security 2h workshopTietoevry The purpose of the endpoint security workshop for Microsoft Defender is to help Customers understand the full potential security benefits within each of the Microsoft Defender solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
53 out of 54
Cybersecurity Fitness Roadmap: 6-Wk AssessmentHiQ Stockholm ABPlan, create and implement a strategy for improving your organizational Cyber Hygiene using Microsoft Security Technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 54