FiltersClear all
Professional Services results
Showing results in professional services.
Microsoft Defender for Office 365: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deploy it to a group of users.
+2
Applicable to:
Cloud Security
Threat Protection
1 out of 59
Microsoft Defender for Endpoint: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Endpoint and deploy it to a group of devices.
+2
Applicable to:
Cloud Security
Threat Protection
2 out of 59
Microsoft Defender for Identity: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deployment of identity sensors.
+2
Applicable to:
Cloud Security
Threat Protection
3 out of 59
Microsoft Defender for Cloud Apps: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Cloud Apps and discover Cloud Apps
+2
Applicable to:
Cloud Security
Threat Protection
4 out of 59
Managed Microsoft Sentinel and Extended Detection and Response (XDR) implementation with CentricCentric Netherlands b.v.The SOC team's goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 59
Copilot for Microsoft 365 : 7 days Consulting ServicePROXIMUS NV/SAIn close collaboration with Microsoft 365 experts, we assist in preparing your business for Copilot, with a focus on compliance, governance and data management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
6 out of 59
SMB Security ServicesSavacoIn an era where cyber threats continue to evolve, securing your digital landscape is paramount. Our services are designed to address the multifaceted challenges of IT security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 59
Microsoft 365 Copilot Workshop - 2 days WorkshopDEEP by POST Telecom S.A.Microsoft 365 Copilot Workshop is designed to help organizations adopt Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
8 out of 59
Accompagnement à la mise en œuvre de Microsoft 365 Copilot 1-Week AssessmentEXAKIS NELITE (Test)Un accompagnement sur mesure pour faciliter le déploiement et l’adoption de Microsoft 365 Copilot pour votre entreprise.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
9 out of 59
Olinko Cybersecurity Awareness Program for End Users - 5 Steps/DaysOlinkoA 5 steps cybersecurity awareness program for end users, in which we put people at the centre, use the Microsoft 365 Attack Simulation Training and integrate the approach of change management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
10 out of 59
eVri/Olinko Cybersecurity Awareness Program for End Users - 5 Steps/DayseVriA 5 steps cybersecurity awareness program for end users, in which we put people at the centre, use the Microsoft 365 Attack Simulation Training and integrate the approach of change management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
11 out of 59
POC Securité IT : 2 semainesEconocom Products & Solutions BeluxValidation des capacités des solutions de sécurité Microsoft dans votre environnement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 59
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions BeluxImplémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 59
Managed Microsoft Defender XDRPROXIMUS NV/SAProximus NXT Orbit Managed XDR service manages the alerts generated by Microsoft Defender. Our Security Operations Center (SOC) analyses and responds to these alerts 24/7 in Brussels, Belgium.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 59
eVri/Orlox 3 day Microsoft 365 Security AuditeVri3 day Security Assessment of the current Microsoft 365 environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 59
Security Assessment2source4 B.V.Volledig Microsoft 365 Security Assessment waarbij pijnpunten in de beveiliging worden blootgelegd en adviezen worden opgesteld om pijnpunten af te dekken.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
16 out of 59
Orlox Microsoft Entra Identity and Access Management (IAM) 3-Day Review and AssessmentOrloxOur Microsoft Entra IAM Review and Assessment (3 days) offers a comprehensive analysis of your organization's Microsoft 365 identity hygiene to maintain a secure identity posture.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
17 out of 59
Orlox Microsoft XDR Accelerator ProgramOrloxOur Accelerator program helps you plan, design, deploy, and configure a pilot of Microsoft Defender XDR, with the option for a full production deployment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
18 out of 59
BSE_Cybersecurity_Empower_CYRENProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans la sécurisation de votre SI
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 59
Orlox Data Security Engagement - 4 daysOrloxOur Data Security Engagement provides you with the insights needed to identify risks related to data security, privacy, and compliance.
+1
Applicable to:
Cloud Security
20 out of 59
Intune Security ReviewmnemonicEnhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
+2
Applicable to:
Cloud Security
Mobile Device Management
21 out of 59
Watchguard Managed ServiceCWSIWatchGuard helps customers understand, implement and fully utilise Microsoft Defender and Microsoft Sentinel's capabilities to deliver secure operations, all watched over by our 24x7 CSOC service.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 59
Gestion des smartphones via Microsoft Intune : 1sem - implémentationProjetlysUne solution clé en main, sécurisée et facile à gérer pour la gestion de vos périphériques
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
23 out of 59
Microsoft Threat Protection Engagement – Risiken sichtbar machen, Angriffe verhindernPHAT CONSULTING GmbHErkennen und beheben Sie Bedrohungen und Schwachstellen mit Microsoft Defender & Sentinel.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 59
Microsoft Entra ID Governance – In 8 Wochen zum ID Governance HeroPHAT CONSULTING GmbHMicrosoft Entra ID Governance in 8 Wochen: Lifecycle Workflows, PIM, Access Reviews & Compliance.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
25 out of 59
Microsoft 365 Tenant Review – Datenschutz & Sicherheit im FokusPHAT CONSULTING GmbHIdentifizieren und bewerten Sie Schwachstellen in Ihrer Microsoft 365 Umgebung – mit klarem Fokus auf Datenschutz, Zugriffskontrolle und Compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 59
Modern Work Audit – 1 Week Consulting EngagementConnectworks | IT Professionals1-week Microsoft 365 audit: continuity, security & license optimization by certified experts
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 59
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
28 out of 59
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
29 out of 59
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
30 out of 59
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
31 out of 59
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
32 out of 59
Orbid - GSOC Managed ServicesORBID NVWe correlate signals at scale, combine analyst expertise with automation, and contain threats fast so your business can move with confidence.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 59
Zero Trust Identity Security Implementation with EntraID by ReplyReplyReply’s security approach with Microsoft Entra ID helps organizations reduce identity-driven risk, support compliance requirements, and accelerate secure adoption of Microsoft cloud services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 59
Microsoft Sentinel SOC Managed Service by H OneH One (Private) LimitedAs a Microsoft-certified partner with deep Sentinel expertise, our Managed SOC gives you round-the-clock monitoring, rapid threat response, and complete visibility across your cloud environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 59
Beyondsoft Segurança Ambiente CloudBeyondsoftOferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
36 out of 59
HCLTech Frontline Worker Digital Experience – Assessment & Implementation support for Empowering Frontline WorkersHCL America Inc_HCLTHCLTech’s solution streamlines frontline communication, digital workflows, and secure device management, powered by HCLTech, Microsoft, and Zebra for a modern, sustainable frontline workplace.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
37 out of 59
Modern WorkPlace PME:15 days ImplementationAureraMise en place d’un environnement de travail collaboratif à l’état de l’art pour les PME, comprenant une plate-forme digitale et des outils permettant une facilité de gestion et de déploiement.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
38 out of 59
Microsoft 365 Level Up: 1-Year WorkshopWAKERSPour être toujours au top des dernières nouveautés de votre environnement Microsoft 365 pendant 1 an !
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
39 out of 59
Microsoft 365 Security Scan: 3d AssessmentOrdinaThe result of the multi-day assessment will be a risk-based advise focusing on recommendations and a roadmap to increase the security posture of your Modern Workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 59
Secure Digital Workplace: 4 Day WorkshopDevoteam NV/SAAn assessment to quickly have an overview of your security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
41 out of 59
Modern Identity Kickstarter Workshop (3 days)The Collective Consulting BVThis workshop helps you to address and modernize your identity and access management strategy, using Microsoft 365 and Azure AD capabilities.
+2
Applicable to:
Cloud Security
Identity & Access Management
42 out of 59
5 Day Information Security AssessmentToreon CVBAAn information protection assessment to guide you towards improving your data management in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
43 out of 59
Security Priority Assessment : 2 day assessmentInetum-Realdolmen - Modern Work & Security2 day assessment to list and prioritization of your security needs resulting in step-by-step overview to tackle security projects
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 59
Get Started with SharePoint 1/2-Day WorkshopConXioN BVAfter this 1/2 day-workshop you know whatSharePoint is and how it could help improve your document structure and teamwork within your SMB or enterprise organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
45 out of 59
Defend against threats with SIEM plus XDR Workshop including FastTrack guidanceXylosOur 3-day Security workshop is meant to get an overview of the Security landscape, we use the Microsoft 365 security products and features to gain visibility into threats to your Microsoft 365.
+2
Applicable to:
Cloud Security
Threat Protection
46 out of 59
SharePoint Governance 4-Hour WorkshopConXioN BVAfter this 4-hour workshop you can optimize your SharePoint governance to further improve your security within your SMB or enterprise organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
47 out of 59
Endpoint Rollout Management 4-Hour ImplementationConXioN BVDuring this 4-hour implementation we will implement Microsoft Intune within your SMB or enterprise organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 59
Adoptez Microsoft Edge : 2-Wk ImplementationProjetlysNotre approche pour la mise en place et l'adoption de Microsoft Edge.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
49 out of 59
Identity Security 1-Day ImplementationConXioN BVDuring this 1-day implementation we will implement Identity Security within you SMB or enterprise organization.
+2
Applicable to:
Cloud Security
Identity & Access Management
50 out of 59
Move to Microsoft 365: 4-Weeks ImplementationDevoteam NV/SAAn implementation and migration offer for Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
51 out of 59
Defender for Endpoint: 5-Day WorkshopDevoteam NV/SAA 5-day engagement to improve your security posture of your endpoints with Microsoft 365 Defender.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
52 out of 59
NextGen Windows Experiences Expert-as-a-service, 1y Mgd ServiceXylosXylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your modern endpoint management.
+2
Applicable to:
Cloud Security
Device Deployment & Management
53 out of 59
Managed service : EDR with Defender for EndpointCegeka NVOur EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
54 out of 59
Secure Identities and Access Expert-as-a-service, 1 y, Mgd serviceXylosXylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your cloud or hybrid Identity environment based on Microsoft 365 technology.
+2
Applicable to:
Cloud Security
Identity & Access Management
55 out of 59
Secure Identities and Access Assessment, 3 daysXylosOur Identity Security Assessment is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 59
Data Classification and labelling: 6-Months Impl.Toreon CVBAData classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
57 out of 59
Protection de l'identité : Implémentation 1 moisROXYSVous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
+2
Applicable to:
Cloud Security
Threat Protection
58 out of 59
Smart Services - Security - 12 months ImplementationElgon S.A.Smart Services, mise en place des bonne pratique sécurité pour vos service Microsoft 365 et Azure
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
59 out of 59