FilterHapus semua
Professional Services hasil
Menampilkan hasil dalam professional services
Get Value from Adoption of Microsoft CopilotNexer Group ABGet tools for how to measure and promote the adoption of AI tools like Microsoft 365 Copilot and agents in your organisation. Get usertrainings, champion programs etc in place with our help.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
1 out of 17
Continuous Improvement Services for Microsoft 365SCIBERSciber’s Continuous Improvement service keeps your Microsoft 365 environment aligned with updates and best practices, turning changes into tailored insights that maximize your investment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 17
Nexer Data Governance - Get ready for AINexer Group ABTo get ready for AI you need to have control of your data. Effective data governance is crucial for ensuring compliance with data privacy regulations and maintaining data integrity.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
3 out of 17
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
4 out of 17
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
5 out of 17
Innofactor Intune foundation: 2 wk implementationInnofactor NorwayMicrosoft 365 - Intune Foundation is an established framework for basic configuration and acceleration of Microsoft Endpoint Manager MEM based on best practises from Innofactor.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
6 out of 17
Passwordless Starterkit 25 Yubikeys, 4h WorkshopOnevinn ABIntroduction to Passwordless with 25 YubiKeys – get an understanding of what the Passwordless technology is and what you can achieve with Yubikeys
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
7 out of 17
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UKManage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
8 out of 17
Microsoft 365 Security: 1-Wk AssessmentInnofactor NorwayInnofactor’s Microsoft 365 Security assessment secures organizations business operation by providing insights and recommendations to help minimizing security risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 17
Microsoft 365 Security: 2-WK Assessment EssentialsDustin ABAn executive assessment into essential security capabilities, map against normal/high risk scenario and security hygiene
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
10 out of 17
Manage and Investigate Risk: 2 weeks WorkshopCloud EssentialsA risk check followed by advisory workshop to build a sustainable strategy around insider risk within Microsoft 365 and further accelerate your compliance journey.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
11 out of 17
Discover Sensitive Data: 2 weeks WorkshopCloud EssentialsDiscover Sensitive Data Workshop - an automated data risk check to uncover dark data risks with analysis and recommendations
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
12 out of 17
Microsoft 365 Defender: 10-Day AssessmentVenzo A/SLet VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 17
Microsoft 365 Security Assessment and Roadmap: 1 Day WorkshopCloud EssentialsAccelerating your Zero Trust strategy through a readiness assessment, workshop and roadmap
+1
Applicable to:
Cloud Security
14 out of 17
Tietoevry endpoint security 2h workshopTietoevry The purpose of the endpoint security workshop for Microsoft Defender is to help Customers understand the full potential security benefits within each of the Microsoft Defender solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 17
Cloud app security 1-day workshopMove ASMoves consultants can help you get an overview and an understanding of Cloud Application Security.
+1
Applicable to:
Cloud Security
16 out of 17
Cybersecurity Fitness Roadmap: 6-Wk AssessmentHiQ Stockholm ABPlan, create and implement a strategy for improving your organizational Cyber Hygiene using Microsoft Security Technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 17