IragazkiakGarbitu guztiak
Professional Services emaitza
emaitza erakusten dira hemen: professional services.
Sécurisation des identités - 3-Week ImplementationEXAKIS NELITEAssurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 60
Protection des applications -4-Week ImplementationEXAKIS NELITEUne vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Protection des périphériques - 4-Week ImplementionEXAKIS NELITEAssurer la sécurisation des périphériques puisqu’ils sont une porte d’entrée du système d’information pour les attaquants.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
4 out of 60
Secure Microsoft 365 Managed ServiceCWSICWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
6 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
7 out of 60
Managed Services: M(x)DR for Microsoft 365 DefenderCegeka NVIntroducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
+2
Applicable to:
Identity & Access Management
Threat Protection
8 out of 60
BSE_Cybersecurity_Empower_CYRENProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans la sécurisation de votre SI
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Security Operations Center: 1-Months Implementationiteracon GmbHDas ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 60
Microsoft 365 security: 3 days assessmentOrlox3 day security assessment of the current Microsoft 365 environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Threat Protection with Microsoft Defender for Endpoint: 5 Week WorkshopAdvensProtéger ses terminaux avec la suite Microsoft 365 Defender
+1
Applicable to:
Threat Protection
12 out of 60
Microsoft Defender for Office 365: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deploy it to a group of users.
+2
Applicable to:
Cloud Security
Threat Protection
13 out of 60
Microsoft Defender for Endpoint: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Endpoint and deploy it to a group of devices.
+2
Applicable to:
Cloud Security
Threat Protection
14 out of 60
Microsoft Defender for Identity: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deployment of identity sensors.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 60
Microsoft Defender for Cloud Apps: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Cloud Apps and discover Cloud Apps
+2
Applicable to:
Cloud Security
Threat Protection
16 out of 60
Windows 365 Cloud PC: 4-weeks ImplementationDEEP by POST Telecom S.A.Windows 365 Cloud PC - Securely stream your Windows experience
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
17 out of 60
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Cyberdefense BelgiumOur workshop will help you designing and deploying Microsoft security technologies for your unique needs.
+1
Applicable to:
Threat Protection
18 out of 60
Managed Threat Detection [xdr] for Microsoft 365 Defender: 4 weeks implementationOrange Cyberdefense BelgiumImplementation of Microsoft Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
19 out of 60
Managed Workspace Protection for Microsoft 365 Defender: 4 weeks ImplementationOrange Cyberdefense BelgiumImplementation of Microsoft Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
20 out of 60
Managed Microsoft Sentinel and Extended Detection and Response (XDR) implementation with CentricCentric Netherlands b.v.The SOC team's goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
SMB Security ServicesSavacoIn an era where cyber threats continue to evolve, securing your digital landscape is paramount. Our services are designed to address the multifaceted challenges of IT security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Audit de sécurité : 5 joursEconocom Products & Solutions BeluxEvaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
POC Securité IT : 2 semainesEconocom Products & Solutions BeluxValidation des capacités des solutions de sécurité Microsoft dans votre environnement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions BeluxImplémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense GlobalLearn how to put next-generation Microsoft Security tools to work for you
+1
Applicable to:
Threat Protection
26 out of 60
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense GlobalUnderstand your readiness for common security threats.
+1
Applicable to:
Threat Protection
27 out of 60
Managed Microsoft Defender XDRPROXIMUS NV/SAProximus NXT Orbit Managed XDR service manages the alerts generated by Microsoft Defender. Our Security Operations Center (SOC) analyses and responds to these alerts 24/7 in Brussels, Belgium.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 60
eVri/Orlox 3 day Microsoft 365 Security AuditeVri3 day Security Assessment of the current Microsoft 365 environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
29 out of 60
Orlox Endpoint Security 6-Day WorkshopOrloxOur 6-day workshop aims to elevate the security posture of your endpoints using Microsoft 365 Defender.
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Threat Protection
30 out of 60
Watchguard Managed ServiceCWSIWatchGuard helps customers understand, implement and fully utilise Microsoft Defender and Microsoft Sentinel's capabilities to deliver secure operations, all watched over by our 24x7 CSOC service.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
31 out of 60
Threat Protection EngagementFUJITSUIdentify and mitigate threats. Strengthen security, prioritize vulnerabilities, and improve your position.
+1
Applicable to:
Threat Protection
32 out of 60
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
33 out of 60
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+1
Applicable to:
Threat Protection
34 out of 60
Microsoft Threat Protection Engagement – Risiken sichtbar machen, Angriffe verhindernPHAT CONSULTING GmbHErkennen und beheben Sie Bedrohungen und Schwachstellen mit Microsoft Defender & Sentinel.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60