FiltresTout effacer
Professional Services résultats
Affichage des résultats dans professional services.
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/SWe can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
1 out of 59
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 59
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/SConscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 59
Intune Endpoint Management: 4-Days ImplementationSPIRIT/21 GmbHAssessment of your requirements as well as the preparation and configuration of the Intune instance. This offering includes the support of knowledge transfer.
+2
Applicable to:
Mobile Device Management
Threat Protection
4 out of 59
Secure Multi Cloud environments - 4 Day workshopaConTech GmbHGet a customized threat & vulnerability analysis of your hybrid and multi-cloud environment and learn how to build a more robust cloud security system with Microsoft 365.
+1
Applicable to:
Threat Protection
5 out of 59
Base-IT Managed Service Security & SOCBaseITBase-IT Managed Service Security & SOC bietet Ihnen eine PROAKTIVE und PROFESSIONELLE Betreuung, sehr gerne auf Wunsch Rund-um-die-Uhr. Wir garantieren Ihnen vollumfassenden IT-Security Schutz.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
6 out of 59
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 59
M365 Security Audit: 1-Wk AuditJoker IT AGNachhaltig das Bewusstsein für die Cloud-Sicherheit verbessern
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 59
Magenta Security Services for Microsoft DACH:3 months ImplementationTelekom Deutschland GmbH Main AccountMagenta Security for Microsoft provides the management and the integration in as well as the continuous monitoring of your Microsoft Security by the SOC of Deutsche Telekom
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 59
Managed Services: M(x)DR for Microsoft 365 DefenderCegeka NVIntroducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
+2
Applicable to:
Identity & Access Management
Threat Protection
10 out of 59
Zero Trust: 4 x 3h Workshopwater IT Security GmbHStay ahead of the cyber threat wave with our Zero Trust workshop – get an overview of your Zero Trust readiness, a compact guide to today’s IT landscape, and define next steps for your organization.
+1
Applicable to:
Threat Protection
11 out of 59
CANCOM Microsoft Defender Lifecycle Services - Monthly recurringCANCOM GmbHDie CANCOM Microsoft Defender Lifecycle Services beinhalten Leistungen zur Unterstützung im Betrieb der Microsoft Defender Lösungen.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 59
Starterpaket Managed Modern Endpoint: 7-wöchige ImplementierungnovaCapta GmbHDen Modern Workplace mit all seinen Vorteilen für die Benutzer:innen auf standardisierte, automatisierte und sichere Weise bereitstellen
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
13 out of 59
CxO Modern Work & Copilot: 1 Tag Briefing | Arvato SystemsArvato SystemsZielkorridor und Rahmen für den wirkungsvollen Einsatz Ihres Modern-Work-Konzeptes festlegen
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Threat Protection
14 out of 59
Modern Work Security: 1 Tag Briefing | Arvato SystemsArvato SystemsKreieren Sie mit dem Microsoft 365 Toolstack den geschützten Arbeitsplatz der Zukunft!
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 59
Net at Work Security Assessment für Microsoft 365Net at Work GmbHMit dem Microsoft 365 Security Assessment ermitteln wir den Security Reifegrades Ihres Unternehmens und geben Ihnen Maßnahmen zur Verbesserung an die Hand.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 59
Managed Defender for IdentitySITS Deutschland GmbHSwiss IT Security Advanced Threat Management: Intelligenter, mehrstufiger Schutz vor Angriffen On-Premise bzw. in der Cloud
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
17 out of 59
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense GlobalLearn how to put next-generation Microsoft Security tools to work for you
+1
Applicable to:
Threat Protection
18 out of 59
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense GlobalUnderstand your readiness for common security threats.
+1
Applicable to:
Threat Protection
19 out of 59
Microsoft 365 Security Assessment (Basic): Security and Configuration ReviewInfoGuard AGThe existing configuration of the Microsoft Tenants (Microsoft 365) is assessed according to best practice guidelines and typical security weaknesses.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
20 out of 59
Microsoft Defender for Office 365 security assessment: 1-Day AssessmentIntellity GmbHIntellity assesses current Microsoft Defender for Office 365 settings, securing organizations against email threats by implementing best practices and innovative protection methods
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
21 out of 59
InfoGuard Hardening ServiceInfoGuard AGHardening is an important aspect to increasing a company's cyber resilience. We offer hardening modules to address specific areas (Endpoint, Active Directory, and Cloud) as individual building blocks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 59
ITVT Modern Work Copilot ReadinesscheckITVTIdentifying the Opportunity for Customers within Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
23 out of 59
adesso Managed Security Serviceadesso SEOptimierung der Sicherheitslandschaft durch Microsoft Managed Services
+2
Applicable to:
Cloud Security
Threat Protection
24 out of 59
Data Security & Threat Protection WorkshopITVTIdentify data security risks in your organizational data & discover vulnerabilities in your environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 59
Zero Trust Foundation Implementierungq.beyond AGDas Ziel der Zero Trust Foundation ist es, alle Zugriffe unabhängig von der Herkunft sorgfältig zu überprüfen, um die Sicherheit von Unternehmensressourcen umfassend zu gewährleisten.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 59
Advanced Endpoint Management Implementierungq.beyond AGDas Ziel ist es, alle Endgeräte im Unternehmen sicher zu verwalten, Bedrohungen abzuwehren und eine einheitliche Kontrolle über Computer und mobile Geräte zu gewährleisten.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
27 out of 59
AI Security Workshopq.beyond AGErfahren Sie, wie KI neue Bedrohungen birgt und wie Zero Trust Strategien Ihre Sicherheit erhöhen, mit Fokus auf Social Engineering, Risikomanagement und Präventionsmaßnahmen
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 59
Microsoft Threat Protection Engagement – Risiken sichtbar machen, Angriffe verhindernPHAT CONSULTING GmbHErkennen und beheben Sie Bedrohungen und Schwachstellen mit Microsoft Defender & Sentinel.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 59
Microsoft 365 Tenant Review – Datenschutz & Sicherheit im FokusPHAT CONSULTING GmbHIdentifizieren und bewerten Sie Schwachstellen in Ihrer Microsoft 365 Umgebung – mit klarem Fokus auf Datenschutz, Zugriffskontrolle und Compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 59
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
31 out of 59
Teams Basicq.beyond AGDer Zweck von Teams Basic ist es, die Zusammenarbeit und Kommunikation innerhalb von Organisationen zu verbessern. Es bietet grundlegende Funktionen wie Chat, Videokonferenzen und Dateifreigabe.
+3
Applicable to:
Adoption & Change Management
Teamwork Deployment
Threat Protection
32 out of 59
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 59
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
34 out of 59
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
35 out of 59
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
36 out of 59
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
37 out of 59
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
38 out of 59
Threat Protection Envisioning Workshop: Stop Advanced Threats Across Microsoft 365evoila GmbH🛡️ Discover real threats targeting your organization. 2-week Threat Protection workshop with threat analysis, Defender XDR guidance, remediation recommendations
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
39 out of 59
Data Security Envisioning Workshop: Identify Risks in Your Organizational Dataevoila GmbH🔍 Uncover data security risks in Microsoft 365. 2-week automated Data Security Check with findings, Purview roadmap, and hands-on recommendations. Expert analysis. No guesswork.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
40 out of 59
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
41 out of 59
Microsoft 365 Security: 5 Tage AssessmentControlware GmbHErkennung von potentiellen Sicherheitsmängeln, Dokumentation sicherheitsrelevanter Einstellungen und Reduktion des Risikos durch Schadsoftware innerhalb von Microsoft Office 365.
+2
Applicable to:
Cloud Security
Threat Protection
42 out of 59
Security 360° by teccle - 1 wk implementationaConTech GmbHSie erhalten folgende Leistungen: Die Implementierung von Identity and Access Management, Threat Protection, Conditional Access, Microsoft 365 Defender sowie Security Monitoring.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 59
Secure & Compliant Modern Workplace: 2 weeks ImpInsight Technology SolutionsBased on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
44 out of 59
Cloud Identity Foundation Workshop (5-day)DexMachGet knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
+2
Applicable to:
Identity & Access Management
Threat Protection
45 out of 59
Security365 by CyberCare: 3 Wochen ImplementierungArvato SystemsConsulting Service for Microsoft 365 Defender - Tool Configuration and Secure Score Management
+2
Applicable to:
Cloud Security
Threat Protection
46 out of 59
1-Day Envisioning Workshop - Microsoft XDRwater IT Security GmbHIn product dedicated sessions we will explain the different pieces of Microsoft XDR product families and show the unique value add as solution but also as security platform in the bigger picture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 59
sepago adapt:impl Microsoft 365 processes in 9 wkssepago GmbHsepago adapt ensures that your security team can follow processes fitting your organization at each point in time. This makes sure that Microsoft 365 solutions can unfold their full potential.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Threat Protection
48 out of 59
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
49 out of 59
Cybersecurity Awareness: 12 month implementationProdware GroupCybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
50 out of 59
Secure Remote Work 365: 1-Wo. ImplementierungArvato SystemsUnlock the potential of your workplace by Arvato Systems. Azure Virtual Desktop als Managed Service mit Full Service Management nach definierten SLAs
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
51 out of 59
Bechtle Microsoft 365 E5 Security - 2d WorkshopBechtle AGIn this workshop we will talk about today's cyber security risks and show you how you can use the Microsoft 365 E5 Security Suite to initiate a zero trust approach.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
52 out of 59
1-Tag Microsoft 365 Health & Security AssessmentComma Soft AGAssessment Ihrer bestehenden Microsoft 365 Umgebung hinsichtlich Best-Practices und Betreibbarkeit
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 59
Microsoft Endpoint Manager: 90 minütiger WorkshopnovaCapta GmbHClient Management: Zentralisiert und kostenoptimiert. Der Workshop zur Bewältigung des Balanceaktes zwischen Usability und IT-Security.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
54 out of 59
Zero Touch Provisioning: 5-tägiger WorkshopnovaCapta GmbHClient Management optimieren: Lernen Sie in unserem 5-tägigen Workshop den Windows Autopiloten kennen, erfassen Sie seine Vorteile und machen Sie die ersten Schritte mit uns
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
55 out of 59
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 59
[Threat Management: 5-Days Assessment]Computacenter PlcCustomer security assessment in regards of Threat management: 5 day offer
+1
Applicable to:
Threat Protection
57 out of 59
Insight Discover Sensitive Data 5 Day WorkshopInsight Technology SolutionsInsight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
+2
Applicable to:
Information Protection & Governance
Threat Protection
58 out of 59
Managed Security Services for Microsoft Defender for Endpoint DACH: 12 Mon ImplementationTelekom Deutschland GmbH Main AccountConfiguration and operation of customer specific solution based on Microsoft Defender for Endpoint incl. integration into the Security Operation Center of Deutsche Telekom Security
+2
Applicable to:
Information Protection & Governance
Threat Protection
59 out of 59