FiltresTout effacer
Professional Services résultats
Affichage des résultats dans professional services.
Microsoft 365 Tenant security assessmentIntellity GmbHThe Microsoft 365 Tenant Security Assessment identifies vulnerabilities, optimizes configurations, and ensures compliance with industry standards
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
1 out of 60
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
2 out of 60
Microsoft 365 Copilot Value Discovery: 2-Week AssessmentPrimendUnlock the full potential of Microsoft Copilot. Discover high-value use cases, optimize your AI readiness, and build a robust business case for AI transformation
+2
Applicable to:
Adoption & Change Management
Cloud Security
3 out of 60
adesso Managed Security Serviceadesso SEOptimierung der Sicherheitslandschaft durch Microsoft Managed Services
+2
Applicable to:
Cloud Security
Threat Protection
4 out of 60
Enthus Microsoft 365 Tenant Analyseenthus GmbHAnalyse/Grundkonfiguration ihres Microsoft 365 Tenants nach Best Practices. Erfordert: Global Admin-Rechte. Leistungen: Admin Center, Kollaboration, Apps, Branding, Teams, MFA. Ergebnis: Dokumentation
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
5 out of 60
Data Security & Threat Protection WorkshopITVTIdentify data security risks in your organizational data & discover vulnerabilities in your environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 60
Zero Trust Foundation Implementierungq.beyond AGDas Ziel der Zero Trust Foundation ist es, alle Zugriffe unabhängig von der Herkunft sorgfältig zu überprüfen, um die Sicherheit von Unternehmensressourcen umfassend zu gewährleisten.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
AI Security Workshopq.beyond AGErfahren Sie, wie KI neue Bedrohungen birgt und wie Zero Trust Strategien Ihre Sicherheit erhöhen, mit Fokus auf Social Engineering, Risikomanagement und Präventionsmaßnahmen
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 60
Support services for Microsoft 365Senetic S.A.Our offer includes 3 support service packages for Microsoft 365 environment, where we provide support in the correct configuration and implementation of tools.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
9 out of 60
Microsoft Threat Protection Engagement – Risiken sichtbar machen, Angriffe verhindernPHAT CONSULTING GmbHErkennen und beheben Sie Bedrohungen und Schwachstellen mit Microsoft Defender & Sentinel.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Microsoft Entra ID Governance – In 8 Wochen zum ID Governance HeroPHAT CONSULTING GmbHMicrosoft Entra ID Governance in 8 Wochen: Lifecycle Workflows, PIM, Access Reviews & Compliance.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
11 out of 60
Microsoft 365 Tenant Review – Datenschutz & Sicherheit im FokusPHAT CONSULTING GmbHIdentifizieren und bewerten Sie Schwachstellen in Ihrer Microsoft 365 Umgebung – mit klarem Fokus auf Datenschutz, Zugriffskontrolle und Compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 60
SVA Microsoft 365 Tenant Baseline WorkshopSVA System Vertrieb Alexander GmbHIm Rahmen des Workshops werden die Basiskonfigurationen eines Microsoft 365 Tenants analysiert, mit dem Kunden besprochen und bei Bedarf angepasst
+2
Applicable to:
Cloud Security
Device Deployment & Management
13 out of 60
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 60
Modern Work Audit – 1 Week Consulting EngagementConnectworks | IT Professionals1-week Microsoft 365 audit: continuity, security & license optimization by certified experts
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
15 out of 60
Nexer Data Governance - Get ready for AINexer Group ABTo get ready for AI you need to have control of your data. Effective data governance is crucial for ensuring compliance with data privacy regulations and maintaining data integrity.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
16 out of 60
Copilot with Data Security - Empowering Teams, Securing Data – Copilot Done Rightpco GmbH & Co. KGMicrosoft Copilot and Data Security (Purview) in Harmony.
We connect both worlds to ensure your Copilot implementation is secure and sustainable.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
17 out of 60
SVA Active Directory Security AssessmentSVA System Vertrieb Alexander GmbHDer Active Directory Security Workshop liefert ein klares Bild über den aktuellen Status des Verzeichnisdienstes.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
18 out of 60
IT Operations für Microsoft 365SVA System Vertrieb Alexander GmbHDer Workshop zielt darauf ab, Prozesse und Verantwortlichkeiten im Betrieb von Microsoft 365 zu definieren und zu optimieren
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
19 out of 60
Microsoft 365 Technologie WorkshopSVA System Vertrieb Alexander GmbHVermittlung eines ganzheitlichen Überblicks über das Microsoft 365 Technologie-Portfolio
+3
Applicable to:
Cloud Security
Knowledge & Insights
Teamwork Deployment
20 out of 60
ADN Copilot Envisioning WorkshopADN Advanced Digital Network Distribution GmbHCollaboratively define clear AI goals: focus on strategy, execution, and measurable outcomes.
+2
Applicable to:
Adoption & Change Management
Cloud Security
21 out of 60
Microsoft Copilot Adoption Accelleratorq.beyond AGDer Zweck des Microsoft Copilot Adoption Accelerator-Programms besteht darin, Organisationen dabei zu unterstützen, Microsoft Copilot erfolgreich zu implementieren und die Nutzung zu fördern.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teams Custom Solutions
22 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
23 out of 60
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
24 out of 60
Microsoft 365 Security: 5 Tage AssessmentControlware GmbHErkennung von potentiellen Sicherheitsmängeln, Dokumentation sicherheitsrelevanter Einstellungen und Reduktion des Risikos durch Schadsoftware innerhalb von Microsoft Office 365.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 60
Microsoft 365 Security Assessment:1-Day, WorkshopAll for One Group SEStellen Sie die richtigen Stellschrauben um die Systemsicherheit Ihrer Office 365 / Microsoft 365 Umgebung zu erhöhen. Microsoft 365 Security Assessment via Secure-Score (eintägiger Workshop)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
26 out of 60
Mobile Endpoint Security: 5 Day, WorkshopAll for One Group SESicherheit für Unternehmen, die mobile Endgeräte einsetzen, auf denen Unternehmensdaten sowie persönliche bzw. personenbezogene Daten bearbeitet werden.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
27 out of 60
Schatten-IT Analyse: 1 Day, WorkshopAll for One Group SEGezielt die „dunklen IT-Flecken“ entdecken und abbauen sowie sichere Alternativen anbieten.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 60
Datenklassifizierung mit AIP: 1 Day, WorkshopAll for One Group SEDurch die Klassifizierung mit Azure Information Protection können sie Ihre Daten über Unternehmensgrenzen hinweg sichern und zusätzlich ihre gesamten E-Mail Kommunikation schützen
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
29 out of 60
Security 360° by teccle - 1 wk implementationaConTech GmbHSie erhalten folgende Leistungen: Die Implementierung von Identity and Access Management, Threat Protection, Conditional Access, Microsoft 365 Defender sowie Security Monitoring.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
10WK-Implementation Cloud Migration/MWPHAT CONSULTING GmbHMit der Implementierung von Cloud-Lösungen nutzen Sie die Potenziale von Microsoft 365 ideal für den Modern Workplace. PHAT steht für Pairing Humans and Technology – sicher & compliant!
+3
Applicable to:
Cloud Security
Identity & Access Management
Teams Custom Solutions
31 out of 60
sepago Envisioning Workshopsepago GmbHGet a deeper insight into Microsoft Defender 365 Portfolio and why it should be your future security solution!
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Microsoft Cloud App Security Workshopscopewyse gmbhNach dem Workshop verfügen die Teilnehmer über die notwendigen Basiskenntnisse für die Konfiguration und Nutzung von Microsoft Cloud App Security.
+2
Applicable to:
Cloud Security
Identity & Access Management
33 out of 60
Security Assessment Microsoft 365: 2day assessmentProdware GroupA service for Office 365 and Microsoft 365 protection
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
34 out of 60
Security Assessment: 1-D WorkshopatworkThe Security Assessment Workshop will support you in focusing on your priorities and security strategy, discovering current threats, learning about Microsoft's security tools and planning next steps.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
35 out of 60
Microsoft 365 Security Assessment (3 days)*PlanB. GmbHGet an actionable security roadmap based on evaluated and prioritized security recommendations for your organization.
+2
Applicable to:
Cloud Security
Threat Protection
36 out of 60
Secure Work from Anywhere (2day workshop)NTT Germany AG & Co. KGRemote Work ermöglicht es Millionen von Nutzern angesichts der globalen Gesundheitskrise produktiv zu bleiben, um ihre Organisation bei der Aufrechterhaltung des Geschäftsbetriebes zu unterstützen.
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Teamwork Deployment
37 out of 60
Microsoft Teams: Two-Weeks-ImplementationDatagroup SEDATAGROUP experts will find the most appropriate Microsoft Teams solution for your company
Die DATAGROUP Cloud & Collaboration-Experten finden gemeinsam mit Ihnen die passende Microsoft Teams-Lösung
+3
Applicable to:
Cloud Security
Meetings for Microsoft Teams
Teamwork Deployment
38 out of 60
Microsoft 365 Security Workshop 8 daysComputacenter AG & Co. oHGDas Microsoft 365 Security Konzept verfolgt die Erstellung und Umsetzung eines ganzheitlichen Security Konzeptes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
39 out of 60
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UKManage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
40 out of 60
Security365 by CyberCare: 3 Wochen ImplementierungArvato SystemsConsulting Service for Microsoft 365 Defender - Tool Configuration and Secure Score Management
+2
Applicable to:
Cloud Security
Threat Protection
41 out of 60
Cloud Security 360° - 10wk ImplementationNTT Germany AG & Co. KGEvaluate, assess and optimize your Cloud Security with our 360° offer
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
42 out of 60
Security Readiness Assessment | 5 D | AssessmentInSys AGAssessment zur Überprüfung, Herstellung oder Verbesserung der Security in Infrastrukturen zur sicheren Anwendung von Microsoft 365 und Azure
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
43 out of 60
1-Day Envisioning Workshop - Microsoft XDRwater IT Security GmbHIn product dedicated sessions we will explain the different pieces of Microsoft XDR product families and show the unique value add as solution but also as security platform in the bigger picture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Encrypt Premium Paket - 2 Tage Impl.aConTech GmbHWir unterstützen Sie bei der Einrichtung und Implementierung des Unified Labeling Clients zur Verschlüsselung von Mails und Dokumenten.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
45 out of 60
Domino Office 365 Migration: 4-Wk ImplementationSupremo Sp. z o.o.Consultation on how to increase the efficiency of your work by migrating from IBM Lotus Domino to Office 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
46 out of 60
Transition to Cloud: 1-day Workshopthinformatics AGZiel des Workshops ist die gemeinsame Erarbeitung eines Fahrplans für Ihre Cloud Transition!
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
47 out of 60
Office 365 Managed Service: 1-tägiger WorkshopOrange Networks GmbHErfahren Sie mehr über Office 365 als Managed Service und wie unser Angebot Ihre Rentabilität steigert und IT-Verwaltungskosten senkt.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
48 out of 60
Microsoft 365 Migration: 6-wöchige ImplementierungOrange Networks GmbHUnsere Consultants begleiten die Migration Ihrer Umgebung auf Microsoft 365 und unterstützen Sie bei der Einführung eines Managed-Services-Modells.
+2
Applicable to:
Cloud Security
Teamwork Deployment
49 out of 60
Microsoft 365: 1-wöchiges Proof-of-Concept (PoC)Orange Networks GmbHUnsere Consultants erarbeiten in Workshops gemeinsam mit Ihnen ein Proof-of-Concept für den Einsatz von Microsoft 365 in Ihrem Unternehmen.
+2
Applicable to:
Cloud Security
Teamwork Deployment
50 out of 60
Microsoft 365: 2-tägiges AssessmentOrange Networks GmbHUnsere Consultants stellen Ihnen Microsoft 365 im Detail vor und bewerten die Readiness Ihrer jetzigen IT-Umgebung für eine Migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
51 out of 60
HomeRun mit Microsoft 365: 1-tägiges AssessmentOrange Networks GmbHMit HomeRun haben wir eine integrierte Lösung auf Basis von Microsoft 365 entwickelt, mit der sichere Zusammenarbeit für Ihre Mitarbeiter im Homeoffice im Handumdrehen funktioniert.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
52 out of 60
Microsoft Teams Kompakt 3-Tage WorkshopFUJITSU3-Tägiger Workshop als Teams Einführung mit dem Ergebniss einer dedizierten Testumgebung und eines Mitarbeitertrainings.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
53 out of 60
Microsoft 365: 1-wöchige Pilotierung (PoC)Orange Networks GmbHUnsere Consultants setzen in enger Zusammenarbeit mit Ihnen einen Piloten für den Einsatz von Microsoft 365 in Ihrem Unternehmen auf.
+2
Applicable to:
Cloud Security
Teamwork Deployment
54 out of 60
Managed service : EDR with Defender for EndpointCegeka NVOur EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
55 out of 60
Microsoft 365 - 4wk WKSHFUJITSUGemeinsam mit unseren Beraterteams gestalten wir kundenindividuell Microsoft 365 entlang Ihrer Geschäftsziele, Mitarbeiterbedürfnisse und technischen Anforderungen.
+2
Applicable to:
Cloud Security
Identity & Access Management
56 out of 60
Skaylink Endpoint Management: 2-Day WorkshopSkaylink GmbHDevices, Apps & Nutzer sicher organisieren mit einem Microsoft 365-Workshop von Skaylink
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
57 out of 60
Skaylink Securing Identities: 2-Day WorkhopSkaylink GmbHIdentitäten virtuell verifizieren & Risiken senken mit einem Microsoft 365-Workshop von Skaylink
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Microsoft 365 Defender: 10-Day AssessmentVenzo A/SLet VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
59 out of 60
Data Classification and labelling: 6-Months Impl.Toreon CVBAData classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
60 out of 60