FiltersClear all
Professional Services results
Showing results in professional services.
Data Security & Protection: 8 weeks - ImplementationMazzy Technologies Corp.Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
1 out of 60
Threat Protection: 2-Month ImplementationOfficeline SAThreat protection with Microsoft Defender products. We deliver a solution that improves and streamlines threat protection for every organization.
+2
Applicable to:
Cloud Security
Threat Protection
2 out of 60
SYSTEX Data Security and Compliance Solution精诚(中国)企业管理有限公司通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
3 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
4 out of 60
Copilot for Microsoft 365: 1-Day Data and Security WorkshopAwara IT Kazakhstan LLPUnlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
5 out of 60
Insight Microsoft 365 Strategy Planning ServiceInsight Technology SolutionsMicrosoft 365 strategy planning service is a consulting service supporting clients to gain understanding of current and future strategies around the adoption of Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
6 out of 60
Information Protection - 1Month ImplementationOfficeline SAAn offering of Microsoft Information Protection implementation to improve and streamline compliance across all environments.
+2
Applicable to:
Cloud Security
Information Protection & Governance
7 out of 60
Microsoft 365 Copilot for Executives WorkshopSMART business LLCJoin our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
8 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Modern Endpoint Protection as a Service Bereitstellung - 2 Daysmsg systems agModern Endpoint Protection as a Service - Vollständige EDR/XDR/MDR Services aus einer Hand powered by Microsoft 365 Defender
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
10 out of 60
Tenant to Tenant Migration for AAD, EXO and OD4B Services Only: 1-Week ImplementationIT Partner LLCMicrosoft 365 Tenant-to-Tenant Migration Including Azure AD, Exchange Online and OneDrive for Business services and data
+2
Applicable to:
Adoption & Change Management
Cloud Security
11 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Pently Microsoft 365 - AssessmentPently GmbHStructured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
14 out of 60
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
15 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
16 out of 60
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
17 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
18 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 60
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Microsoft Security and Rapid Cyberattack Assessment: 3-tägiges AssessmentnovaCapta GmbHDas Microsoft Security Assessment hilft Ihrem Unternehmen zu verstehen, wie Sie Bedrohungen durch den Einsatz von Microsoft 365-Security-Lösungen gezielt reduzieren und sich vor Angriffen schützen.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo SoftwareThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to:
Cloud Security
23 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLPOffice 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
25 out of 60
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLCCMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
26 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 60
Insight´s Microsoft Cloud Advisory ServiceInsight Technology SolutionsProvides a 2 weeks assessment of our client’s estate across the following six areas: Microsoft 365, Azure, On-Premises, Business Critical Applications, Skills & Resourcing & Cost optimisation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
28 out of 60
DIGITALL Cyber Security: 7-Day AssessmentDIGITALL Nature Germany GmbHUNCOVER AND MITIGATE SECURITY RISKS WITH OUR COMPREHENSIVE CYBER SECURITY ASSESSMENT
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
29 out of 60
Cloud Workplace: 8-Months ImplementationRapid CircleThe implementation of a cloud workplace gives an organization the opportunity to offer employees a workplace that can be used independently of place and time and with the most modern Microsoft tools.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
30 out of 60
Managed Security Operations Center: 1 Month ImplementationnovaCapta GmbHWir bieten einen professionellen 24/7-Sicherheitsbetrieb Ihrer Umgebung mit unserem zertifizierten deutschen SOC-Team
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
31 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
32 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
34 out of 60
Security Operations Center: 1-Months Implementationiteracon GmbHDas ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 60
Microsoft 365 Tenant Security Workshop: 3tägiger WorkshopnovaCapta GmbHErfahren Sie wie Sie die Microsoft Security Tools bestmöglich nutzen um Ihren Tenant zu schützen
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
36 out of 60
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/SWe can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
37 out of 60
Microsoft Purview Information Protection - Starter Workshop Duration 3 daysNTT DATA Deutschland GmbHPurview Information Protection with Azure Rights Management provides an effective technology that is already integrated with Office 365 / Azure
+2
Applicable to:
Cloud Security
Information Protection & Governance
38 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Microsoft 365 Review: 2-Day AssessmentCANCOM Austria AGGet the most out of your Microsoft 365 Tenant with our custom-tailored cloud review to improve your workloads, strengthen the security, and point out unused potentials.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
40 out of 60
ADVIA Service Implementierung & MigrationADVIA GmbHDie Cloud ist das Ziel, der Weg ist klar, doch was ist mit Ihren Daten?
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
41 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/SConscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Quick Security Assessment für die Microsoft Cloud: 2 WochenIT-Improvement Deutschland GmbHStandortbestimmung im Security Bereich der Microsoft Cloud Umgebung und Entwicklung von Handlungsempfehlungen.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
43 out of 60
Base-IT Managed Service Security & SOCBaseITBase-IT Managed Service Security & SOC bietet Ihnen eine PROAKTIVE und PROFESSIONELLE Betreuung, sehr gerne auf Wunsch Rund-um-die-Uhr. Wir garantieren Ihnen vollumfassenden IT-Security Schutz.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
44 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Windows 365 Cloud PC Workshop - 2 DayaConTech GmbHDie teccle group begleitet Ihre Reise in die Virtualisierungswelt mit dem Windwos 365 Cloud PC Workshop.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
46 out of 60
M365 Security Audit: 1-Wk AuditJoker IT AGNachhaltig das Bewusstsein für die Cloud-Sicherheit verbessern
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
PRW® Compliance Set: Microsoft 365Orange Networks GmbHMit dem PRW® Compliance Set: Microsoft 365 liefern wir das perfekte Instrument, um Microsoft 365 datenschutzkonform absichern und nutzen zu können.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
48 out of 60
Magenta Security Services for Microsoft DACH:3 months ImplementationTelekom Deutschland GmbH Main AccountMagenta Security for Microsoft provides the management and the integration in as well as the continuous monitoring of your Microsoft Security by the SOC of Deutsche Telekom
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Intune Mobile Device Management: 7-tägige ImplementierungnovaCapta GmbHMobile Geräte mit Microsoft Intune und den Security Best Practices der novaCapta einrichten, verwalten und schützen
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
50 out of 60
CANCOM Microsoft Defender Lifecycle Services - Monthly recurringCANCOM GmbHDie CANCOM Microsoft Defender Lifecycle Services beinhalten Leistungen zur Unterstützung im Betrieb der Microsoft Defender Lösungen.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Microsoft 365 Copilot-Ready: 2 Wochen Assessment | Arvato SystemsArvato SystemsInnovative Best Practices für Fachbreiche und Führungskräfte auf dem Weg zur effizienten Organisation mit Microsoft 365 sowie dem neuen Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
52 out of 60
Modern Work Security: 1 Tag Briefing | Arvato SystemsArvato SystemsKreieren Sie mit dem Microsoft 365 Toolstack den geschützten Arbeitsplatz der Zukunft!
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
53 out of 60
Guest Lifecycle for Azure ADSwiss IT Security AGGuest Lifecycle for Azure AD (GL4AAD) handles maintenance and hygiene tasks for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
54 out of 60
Modern Managed Services: 2-tägiges AssessmentnovaCapta GmbHIhre Optionen für Managed Services rund um Endpunkte, Microsoft Azure, Microsoft 365 und Security am Modern Workplace entdecken
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
55 out of 60
base-IT Copilot für Microsoft 365 Readiness WorkshopBaseITBereiten Sie sich mit dem base-IT Copilot für Microsoft 365 - Readiness Workshop auf die Zukunft vor. Copilot ist Ihr KI-Assistent, der Ihre täglichen Anwendungen smarter macht.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Teamwork Deployment
56 out of 60
ACP Microsoft 365 Tenant Check (2 Halbtage)ACP IT Solutions GmbHStellen Sie sicher, dass Ihre Microsoft 365 Umgebung jederzeit optimal konfiguriert und sicher ist! In unserem ACP Tenant Check überprüfen wir die Einstellungen Ihres Microsoft 365 Tenants.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
57 out of 60
Net at Work Security Assessment für Microsoft 365Net at Work GmbHMit dem Microsoft 365 Security Assessment ermitteln wir den Security Reifegrades Ihres Unternehmens und geben Ihnen Maßnahmen zur Verbesserung an die Hand.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
base-IT PentestingBaseITMit base-IT Pentesting stärken wir Ihre IT-Sicherheit und decken Schwachstellen auf. Durch die Integration von Microsoft 365 (Cloud Security, etc.) entsteht eine umfassende Sicherheitsarchitektur.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Microsoft 365 Security Assessment (Basic): Security and Configuration ReviewInfoGuard AGThe existing configuration of the Microsoft Tenants (Microsoft 365) is assessed according to best practice guidelines and typical security weaknesses.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
60 out of 60