FiltriCancella tutto
Professional Services risultati
Visualizzazione di risultati in professional services.
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions BeluxImplémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Copilot for Microsoft 365 with Confidence - 2 weeks agoMETSYSDéployer Microsoft Copilot for Microsoft 365 pour vos utilisateurs en toute confiance
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
2 out of 60
OCDFR - EMS E5Orange Business Services - OCD FRAdvisory and design, deployement and support about all Microsoft EMS E5 solutions
+2
Applicable to:
Cloud Security
Identity & Access Management
3 out of 60
Microsoft 365 Copilot workshop: 1-week consulting servicesUni Systems S.M.S.A.This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
4 out of 60
CS Microsoft 365 Copilot for Security 360° - ImplementationCampana & Schott GmbHUtilize Microsoft 365 Copilot for Security to leverage AI to secure your company.
+1
Applicable to:
Cloud Security
5 out of 60
BSE_Cybersecurity_Empower_CYRENProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans la sécurisation de votre SI
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Data Security Envisioning : 10-W workshopSopra Steria FranceThis workshop helps organizations identify data security risks, understand how to mitigate them, and provide structured recommendations for risk mitigation through a comprehensive process.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
7 out of 60
CS Role-Based Copilot EnvisioningCampana & Schott GmbHWe help to undersand how sales, customer service, and finance functions benefit by implenting role-based Copilots by identifying high-value scenarios, and developing a roadmap for implementation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
8 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
9 out of 60
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
10 out of 60
Gestion des smartphones via Microsoft Intune : 1sem - implémentationProjetlysUne solution clé en main, sécurisée et facile à gérer pour la gestion de vos périphériques
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
11 out of 60
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 60
Support services for Microsoft 365Senetic S.A.Our offer includes 3 support service packages for Microsoft 365 environment, where we provide support in the correct configuration and implementation of tools.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
13 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
14 out of 60
Service de sécurisation MicrosoftSTELOGYSécurisation et gouvernance des services, et données sur Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 60
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
16 out of 60
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 60
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
19 out of 60
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
21 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 60
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
23 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
25 out of 60
Microsoft 365 Tenant Setup, 1-Day ImplementationTec Networks GmbHWe provide you a good-practice configured tenant for the best experience with Microsoft 365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
26 out of 60
Intune & Configuration Manager - Co-Management (5 jours) POCInetum (HO)Inetum accompagne ses clients dans leur transformation digitale et notamment sur la partie Modern Workplace en intégrant les services Cloud Azure et notamment le Co-Management Intune
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
27 out of 60
Modern WorkPlace PME:15 days ImplementationAureraMise en place d’un environnement de travail collaboratif à l’état de l’art pour les PME, comprenant une plate-forme digitale et des outils permettant une facilité de gestion et de déploiement.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
28 out of 60
Security Assessment Microsoft 365: 2day assessmentProdware GroupA service for Office 365 and Microsoft 365 protection
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
29 out of 60
Microsoft 365 Level Up: 1-Year WorkshopWAKERSPour être toujours au top des dernières nouveautés de votre environnement Microsoft 365 pendant 1 an !
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
30 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Migration MSG vers Office 365,10J d'implémentationBSDVous souhaitez migrer depuis Lotus Domino/Gmail/Exchange vers Office 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
32 out of 60
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UKManage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
33 out of 60
Microsoft 365 - adoption: 6-Weeks ImplementationNeos-SDIAccompagner le changement vers Microsoft 365: Une approche transverse qui adresse les enjeux de gouvernance, de déploiement, d’adoption et de sécurisation des nouveaux usages Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
34 out of 60
Sauvegarde Microsoft 365 : 2Wk - implementationProjetlysEnsemble de service permettant de mettre en place facilement une solution de backup Veeam pour Microsoft 365 ?
+2
Applicable to:
Cloud Security
Information Protection & Governance
35 out of 60
Adoptez Microsoft Edge : 2-Wk ImplementationProjetlysNotre approche pour la mise en place et l'adoption de Microsoft Edge.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
36 out of 60
Sécurisation des identités - 3-Week ImplementationEXAKIS NELITEAssurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Protection des applications -4-Week ImplementationEXAKIS NELITEUne vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
39 out of 60
Cybersecurity Infrastructure - 1d WorkshopBechtle AGMission afin d’évaluer la sécurité de vos actifs Microsoft et proposer des correctifs pour mieux sécuriser votre environnement.
+1
Applicable to:
Cloud Security
40 out of 60
Frontline Workers : 3 jours - ÉvaluationALFUNDigitalisez vos métiers en fournissant des solutions adaptées à vos équipes sur le terrain !
+3
Applicable to:
Cloud Security
Frontline Workers
Power Platform for Teams
41 out of 60
Microsoft 365 Sécurité : 1-S implémentationEFISENSBénéficiez d’une sécurité complète et protéger votre entreprise contre les menaces avancées en temps réel
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Audit de Sécurité Microsoft 365: 4-days WorkshopDEEPDEFAudit de sécurité d'un tenant Microsoft 365 avec des licences EMS E3 ou E5 avec plan de remédiation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Data Classification and labelling: 6-Months Impl.Toreon CVBAData classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
44 out of 60
Protection de l'identité : Implémentation 1 moisROXYSVous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
+2
Applicable to:
Cloud Security
Threat Protection
45 out of 60
Secure Your SaaS/IaaS: 1-Mth Proof of ConceptVorstoneProof of Concept on how you can secure your Saas and/or IaaS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Risk analysis Office 365, Azure: 3-Wk AssessmentVorstoneAssessment to understand the risks exposure and how enhance your security posture
+1
Applicable to:
Cloud Security
47 out of 60
Shadow IT: 6-Wk Proof of Concept.VorstoneProof of Concept in order to identify applications not controlled by your IT department
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
48 out of 60
Passwordless: 3-Wk Proof of ConceptVorstoneRemove the use of password on your Information System
+2
Applicable to:
Cloud Security
Identity & Access Management
49 out of 60
Audit SSI: 1-Wk AssessmentVorstoneAssessment in order to identify the weaknesses of your IaaS/SaaS
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
50 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
ModernIdentity: 3-Months ImplementationEconocom Workplace infra InnovationUnifier la gestion des identités et des accès grâce à Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
52 out of 60
Evaluation Outils sécurité Microsoft 365: 5-D AssessmentELIADISEvaluez vos menaces et découvrez les outils sécurité Microsoft 365, à destination des DSI de sociétés de 300 à 5000 users. Découvrez, améliorez votre sécurité, élaborez un plan sécurité avec un expert
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Sécurisation-terminaux- Microsoft 365: 5-D AssessmentELIADISDécouvrir, apprendre, protéger, sécuriser les identités de l'ensemble des terminaux avec Endoint manager. Obtenir des recommandations expertes sur les prochaines étapes de sécurisation des appareils.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
FONDATION ZERO TRUST - 2 Days AtelierJCD GROUPEConstruire les fondations du modèle de sécurité « Zero Trust » avec la sécurité des identités
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse GlobalThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
56 out of 60
Claranet - EDR Managé : 1-Hr Briefing.ClaranetSolution EDR Managé par Claranet : Réunion d’information. Devenir proactif de la sécurité opérationnelle de vos endpoints !
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
57 out of 60
Microsoft 365 Governance: 1 month AssessmentCrayonCrayon Microsoft 365 Governance Assessment will assess your configuration and build recommendation report
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
58 out of 60
Modernize Endpoints (Microsoft Intune): 1 Day WorkshopCrayonThe Endpoint Management Workshop is a one-day engagement that will help you showcase the value of Microsoft Endpoint Manager and how to manage users’ devices and apps from anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
59 out of 60
Road to Microsoft 365: 1 month ImplementationCrayonCrayon Microsoft 365 migration services brings best practices and expertise to assure seamless migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
60 out of 60