FilterHapus semua
Professional Services hasil
Menampilkan hasil dalam professional services
XENMDM - Monthly SoC Support for Mobile DevicesXencia Technology Solutions Pvt LtdMicrosoft Intune platform based Managed Services covering device management, control and compliance along with monitoring and remediation of issues, policies, users, devices and threats.
+1
Applicable to:
Cloud Security
1 out of 60
Microsoft Security Copilot POV & Adoption PlanBDOProve the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
3 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
4 out of 60
BCN Intranet LiteBCN Group Ltd.We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
5 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo SoftwareThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
7 out of 60
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to:
Cloud Security
9 out of 60
Pently Microsoft 365 - AssessmentPently GmbHStructured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
10 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 60
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLCCMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
13 out of 60
Security and Operations with Expert Microsoft 365 SupportAVASOFTMaximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
14 out of 60
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
15 out of 60
Trip to Microsoft 365 Copilot ImplementationSuri Services SCOfrecemos un servicio de capacitación y preparación estratégica para la adopción de Microsoft 365 Copilot, enfocado en acelerar la productividad y transformar los procesos clave
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
16 out of 60
Cybersecurity Assessment Service: 2-Day AssessmentHTGThe Cyber Security Assessment Tool (CSAT) is a software product developed by security experts to quickly assess the status of an organisation’s security with recommended improvements based on fact.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Insight´s Microsoft Cloud Advisory ServiceInsight Technology SolutionsProvides a 2 weeks assessment of our client’s estate across the following six areas: Microsoft 365, Azure, On-Premises, Business Critical Applications, Skills & Resourcing & Cost optimisation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
18 out of 60
BCN Cloud Readiness Assessment and ReportBCN Group Ltd.This assessment will help you decide whether you are ready to migrate IT systems and services to the cloud.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Meetings for Microsoft Teams
19 out of 60
Cyderes Managed Security Services for Microsoft SentinelCyderesCyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
20 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
21 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
23 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
"Threat Protection: 3 Day Workshop"Insentra Pty LtdOur Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 60
Microsoft 365 Security Design and Deployment: 1 Hour BriefingCloud EssentialsAn initial briefing to understand business requirements in advance of a design workshop and deployment of advanced Microsoft 365 cloud security features
+1
Applicable to:
Cloud Security
26 out of 60
Microsoft 365 Security: 2-Days AssessmentCloud NexusOur team will compare your Microsoft 365 tenant configuration against Best Practice security baseline
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 60
Adopt FastTrack Microsoft 365: 1hr BriefingComms-care Group LtdFastTrack helps customers adopt Microsoft 365. Customers with eligible subscriptions to Microsoft 365 can use FastTrack at no additional cost for the life of their subscription.
+3
Applicable to:
Adoption & Change Management
Calling for Microsoft Teams
Cloud Security
28 out of 60
Microsoft 365 Security Hardening: 3 Days ImplementationINFINITY TECHNOLOGY SOLUTIONS2-3 days of consultancy from a Microsoft Gold Partner to improve the security stance within your Microsoft 365 tenant, including Conditional Access, MAM, MFA, email filtering and alerts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/SWe can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
30 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/SConscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
cyber security threat analysis workshopU-BTech Solutionsthe workshop is design to discover threats and risks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Overwatch for Microsoft 365 Security: 12 Month ImplementationThreatscapeOverwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 60
365SecurityREADY for ISO 27001: 12-16 Weeks ImplementationThe Cloud Factory EMEA Ltd.Get ISO 27001 Ready with Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 60
PwC Business Aligned Zero Trust: 4-Wk AssessmentPricewaterhouseCoopers UKPwC's Zero trust proposition aims to help organisations to understand their current security state and develop a prioritised set of activities to improve their cyber maturity and resilience.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
35 out of 60
PwC UK: Governance and Risk: 4-Wk AssessmentPricewaterhouseCoopers UKPwC's Governance and Risk solutions can help organisation to create comprehensive governance, risk and control frameworks that support their organisations wider security and operational goals.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
36 out of 60
PwC Digital Identity: 4-Wk AssessmentPricewaterhouseCoopers UKPwC provides leading class Identity and Access Management advisory, assurance and delivery services that offer distinctive value and enable clients to optimise their digital services and processes.
+2
Applicable to:
Cloud Security
Identity & Access Management
37 out of 60
PwC Portfolio RationalisationPricewaterhouseCoopers UKThe objective of PwC's portfolio rationalisation is to simplify your portfolio to reduce the cost and complexity of your environment. Many companies have redundant tools that cost them time and money.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
38 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Endpoint management with security: 4-day workshope-Plenish LimitedDemonstrating the value of Microsoft Intune, Microsoft Defender for Endpoint and the Azure AD Premium P1 features that come with Microsoft 365 E3 licensing
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Security Posture Assessment ServiceKochoSecurity Posture Service, assesses an organisation’s cloud environment against recognised security benchmarks and makes recommendations to uplift security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTDMicrosoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
+2
Applicable to:
Cloud Security
Threat Protection
42 out of 60
Microsoft 365 Security AssessmentFITTS LtdThe Microsoft 365 Security Assessment will review your businesses security posture across identity, devices, information, apps and infrastructure and provide a list of recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
43 out of 60
Protect & Govern Sensitive Data WorkshopAtech SupportThe Protect & Govern Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
+1
Applicable to:
Cloud Security
44 out of 60
Defend Against Threats with SIEM Plus XDR WorkshopAtech SupportImprove your security posture with a Defend Against Threats with SIEM Plus XDR Workshop
+1
Applicable to:
Cloud Security
45 out of 60
Secure Multi-Cloud Environments WorkshopAtech SupportThis delivers visibility to threats and vulnerabilities across Microsoft Azure, on-premises and multi-cloud environments. Support on how to improve your security posture for the long term
+1
Applicable to:
Cloud Security
46 out of 60
Microsoft Defender for Endpoint ImplementationSIX DEGREES TECHNOLOGY GROUP LTDStrengthen cyber security defences through advanced endpoint detection and response.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
47 out of 60
Microsoft 365 Security Posture 10-days AssessmentFUJITSUSecure Microsoft 365 and maximise your investment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
48 out of 60
SCC Digital Workforce WorkshopSCCThe Microsoft 365 Digital Workforce Workshop is designed to introduce and expand the value of Microsoft 365 to customers who are starting their cloud transformation to a secure hybrid work environment
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
49 out of 60
Sentinel WorkshopAtech SupportGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop delivered by Atech.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
50 out of 60
Mitigate Compliance and Privacy Risks WorkshopAtech SupportThe Mitigate Compliance and Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organisation, delivered by the Atech Certified Microsoft PS team
+1
Applicable to:
Cloud Security
51 out of 60
Microsoft 365 Security Assessment: 5-Day assessment and reviewCISILION LTDOur Security Assessment provides a holistic review of your organisations security posture and maps it against CISA baselines and recommendation to help take informed steps to secure your environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Microsoft 365 Health Check and Tenant Review - 2 day - Consultancy offeringIntelogyThe Microsoft 365 tenant review will help strengthen the security of your tenant against cyber threats, promote secure collaboration within and outside the company
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
53 out of 60
Cybersecurity AssessmentCDI LLCThe Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
54 out of 60
Microsoft Copilot Data Security Workshop: 5 day WorkshopBytes Software ServicesWork with Bytes to build a security and trust framework to ensure correct access to all of your data
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
55 out of 60
Microsoft Copilot Zero Trust Workshop: 3 Day WorkshopBytes Software ServicesBytes will help customers deploy Copilot in the most secure manner
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
56 out of 60
Microsoft Copilot Data Structure Workshop: 5 day workshopBytes Software ServicesWork with Bytes to ensure that your business critical information stays protected.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
57 out of 60
Atech Microsoft 365 Security AssessmentAtech SupportWith 10 years+ experience Atech have developed an assessment which provides us with a benchmark to design and deliver your secure journey to maximising the potential of Microsoft 365
+2
Applicable to:
Cloud Security
Threat Protection
58 out of 60
Atech Cybersecurity AssessmentAtech SupportThis assessment is designed to help you understand the importance of security and how to protect your organization from potential threats. Get to know your secure score and future-proof your posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
59 out of 60
Guest Lifecycle for Azure ADSwiss IT Security AGGuest Lifecycle for Azure AD (GL4AAD) handles maintenance and hygiene tasks for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
60 out of 60