FilterHapus semua
Professional Services hasil
Menampilkan hasil dalam professional services
Guest Lifecycle for Azure ADSwiss IT Security AGGuest Lifecycle for Azure AD (GL4AAD) handles maintenance and hygiene tasks for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
1 out of 60
Atech Microsoft Sentinel EngagementAtech SupportGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on premises environments with an Atech delivered, Microsoft Sentinel Workshop.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Atech Microsoft Data Security EngagementAtech SupportThe Data Security Engagement, delivered by Atech, gives you the insights you need to understand data security, privacy and compliance risks in your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Atech Microsoft Threat Protection EngagementAtech SupportThis engagement will provide the help organisations need to achieve achieve security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for EndpointCyderesCyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
5 out of 60
Managed XDR Services (1- Day Readiness Assessment)KochoCombine Microsoft Sentinel and Defender Managed Services for comprehensive coverage, cutting-edge security, and complete peace of mind.
+2
Applicable to:
Cloud Security
Threat Protection
6 out of 60
Modern Workplace Maturity: 10-day AssessmentReplyUnderstand and evolve your approach to collaboration, communication, security, and productivity with our Modern Work Maturity Assessment
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
7 out of 60
Cyderes Microsoft Security Adoption AdvisoryCyderesThe Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
8 out of 60
Cyderes Managed Security Services for Microsoft SentinelCyderesCyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
9 out of 60
Microsoft Security Copilot: Half-Day Readiness AssessmentTransparity Solutions LtdGet ready to adopt AI powered security with our Microsoft Security Copilot Readiness Assessment
+1
Applicable to:
Cloud Security
10 out of 60
Atech Copilot for Microsoft 365 Zero Trust EssentialsAtech SupportThe Atech Zero Trust Essentials Service provides a tailored approach to security and data readiness. We help organisations navigate data and security considerations to optimise Copilot possibilities
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
11 out of 60
Atech Copilot for Microsoft 365 Discovery WorkshopAtech SupportDesigned as an initial engagement, the Microsoft 365 Copilot Discovery Workshop will provide high - level visibility regarding your technical and people readiness to maximise the potential of Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
12 out of 60
Atech Copilot for Microsoft 365 Adoption Accelerator AssessmentAtech SupportAtech’s adoption accelerator for Copilot for Microsoft 365 is designed to empower organizations to deliver the new way of working that Copilot promises whilst accelerating your business goals
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
13 out of 60
Logicalis Cyber Security InitiativeLogicalis SolutionsThe Logicalis Cyber Security Initiative (CSI) helps customer adopt and deploy Microsoft security technologies and solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk AssessmentErgoServicesErgo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
15 out of 60
Audit de sécurité : 5 joursEconocom Products & Solutions BeluxEvaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
POC Securité IT : 2 semainesEconocom Products & Solutions BeluxValidation des capacités des solutions de sécurité Microsoft dans votre environnement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Fitzrovia IT - Defender for EndpointFitzrovia I.T. LtdFitzrovia IT will consult and configure and Defender for Endpoint for your business
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
18 out of 60
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions BeluxImplémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Google Workspace to Microsoft 365 Discovery and Design Service - 4-Wk EngagementCISILION LTDThis 3-wk engagement helps prepare any organisation looking to migrate from Google Workspace to Microsoft 365. This includes analysis and review of existing environment, and migration planning.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
20 out of 60
Microsoft 365 Attack SimulationWanstorMicrosoft’s cyber-security solution provides users with information on the most common and dangerous types of cyber-attacks, such as phishing, ransomware, malware, etc..
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Windows 365 Proof of ConceptWanstorWanstor’s Windows 365 solution is designed to meet the standard requirements for building out a robust, secure, and efficient digital workspace for our customers.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
22 out of 60
Microsoft Defender for Endpoints - Proof of ConceptWanstorBusinesses may decide to use Managed Defender to help keep them more secure from cyber threats, but they won’t all have the necessary resource to make optimum use out of this valuable tool.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Microsoft Intune & Autopilot POCWanstorWanstor implements its management infrastructure based on Microsoft’s Intune, which provides IT services, apps, protection, and configuration, combining these services and tools in one location
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
24 out of 60
Copilot for Microsoft 365 - Readiness Engagement: 2 Week-ImplementationHTGAfter assessing data availability and quality, we will provide and implement a robust set of recommendations for enhancing your security posture ahead of a Copilot deployment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
25 out of 60
Secure AILogicalis SolutionsComprehensive security for generative AI applications, ensuring safe usage and protection of sensitive data
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
26 out of 60
Microsoft 365 Copilot workshop: 1-week consulting servicesUni Systems S.M.S.A.This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
27 out of 60
HTG Overwatch - Security Managed ServiceHTGA Security Managed Service that aligns with the industry recognised zero trust security model
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
28 out of 60
Copilot Advanced Services: 1 Day 3 WorkshopsNess IsraelUnlock the full potential of Microsoft Copilot with our tailored AI services, enhancing security, development and productivity across Microsoft 365 applications through flexible, expert-led sessions.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Workplace Analytics
29 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
30 out of 60
Intune Security ReviewmnemonicEnhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
+2
Applicable to:
Cloud Security
Mobile Device Management
31 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
32 out of 60
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
33 out of 60
Watchguard Managed ServiceCWSIWatchGuard helps customers understand, implement and fully utilise Microsoft Defender and Microsoft Sentinel's capabilities to deliver secure operations, all watched over by our 24x7 CSOC service.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 60
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
35 out of 60
Threat Protection EngagementNitec Solutions LtdLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITEDProfessional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
39 out of 60
Support services for Microsoft 365Senetic S.A.Our offer includes 3 support service packages for Microsoft 365 environment, where we provide support in the correct configuration and implementation of tools.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
40 out of 60
Microsoft 365 Copilot Readiness Assessment - CRATechPlus TalentThrough this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
41 out of 60
Microsoft 365 Security AssessmentNviron LimitedNviron’s Microsoft 365 Security Assessment provides an in-depth analysis of your organisation's existing security posture and recommends Microsoft 365 security capabilities to mitigate any risks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Microsoft 365 Backup Readiness AssessmentABTechnologiesEvaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
43 out of 60
Microsoft 365 Secure Productivity WorkshopABTechnologiesEnable your team to work securely and productively using Microsoft 365 best practices.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
44 out of 60
secure365™ MDRSoftwerx Ltd.secure365™ works with Microsoft Sentinel and Microsoft Defender to provide SMB’s with a managed 24x7 security solution that offers enterprise-grade protection at an affordable price.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
45 out of 60
Microsoft 365 Copilot Readiness AssessmentQuorumAccelerate your AI journey with a Microsoft 365 Copilot Readiness Assessment
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
46 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
47 out of 60
Manage Compliance Obligations & Risks with Microsoft PurviewBDOEnhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
48 out of 60
Data Security with Microsoft Purview SolutionsBDOEnhance data security control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
49 out of 60
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
50 out of 60
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
51 out of 60
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Nexer Data Governance - Get ready for AINexer Group ABTo get ready for AI you need to have control of your data. Effective data governance is crucial for ensuring compliance with data privacy regulations and maintaining data integrity.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
53 out of 60
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360 ™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
54 out of 60
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
55 out of 60
Free Data Security & Threat Protection Immersion BriefingIT Partner LLCDiscover how to strengthen your Microsoft 365 environment with real-time insights, proactive threat detection, and intelligent data protection — guided by certified experts from IT Partner LLC.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
56 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
57 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
58 out of 60
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
59 out of 60
Threat Protection Immersion BriefingJUMPSEC LIMITEDMicrosoft funded-Briefings. Make fast, low risk progress on Microsoft security.
+2
Applicable to:
Cloud Security
Threat Protection
60 out of 60