FiltriCancella tutto
Professional Services risultati
Visualizzazione di risultati in professional services.
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
1 out of 30
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 30
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 30
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
4 out of 30
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/SWe can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
5 out of 30
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 30
Ctelecoms Defend Against Threats with SIEM Plus XDR WorkshopConsolidated Telecoms (Ctelecoms)Defend Against Threats with SIEM Plus XDR Workshop Learn how to put next-generation Microsoft security tools to work for you.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
7 out of 30
Ctelecoms Protect and Govern Sensitive Data WorkshopConsolidated Telecoms (Ctelecoms)The Protect & Govern Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 30
Ctelecoms Mitigate Compliance and Privacy Risks WorkshopConsolidated Telecoms (Ctelecoms)The Mitigate Compliance & Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organization.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
9 out of 30
Ctelecoms Secure Identities and Access WorkshopConsolidated Telecoms (Ctelecoms)Secure Identities and Access Workshop helps you find and mitigate identity risks and safeguard their organizations with a seamless identity solution.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 30
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/SConscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 30
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 30
Microsoft Copilot Solutions: 4 Weeks ImplementationQatar Datamation SystemsProvide Assessment and Implementation of Copilot for Microsoft 365 and Copilot for Security
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
13 out of 30
CISA Microsoft security Assessment- 1 day AssessmentGLOBAL BRANDSThe CISA Microsoft 365 Security Assessment (C-MSA) is an advanced, automated tool designed to evaluate and enhance the security posture of Microsoft 365 environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 30
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
15 out of 30
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
16 out of 30
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
17 out of 30
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
18 out of 30
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 30
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
20 out of 30
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
21 out of 30
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 30
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
23 out of 30
Inspira Microsoft Threat Protection Envisioning WorkshopInspira Enterprise Inc.Learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 30
Inspira Microsoft Data Security Envisioning WorkshopInspira Enterprise Inc.Identify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
25 out of 30
Frontier Firm LiveSulava OyFrontier Firm Live is Sulava MEA’s flagship subscription service designed to help organisations transition into AI-native enterprises.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
26 out of 30
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
27 out of 30
Microsoft 365 Solutions: 4 Weeks ImplementationQatar Datamation SystemsAssess and Implement Modern Workplace and Security Portfolio with Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
28 out of 30
Windows 365 PoC: 3 wk deploymentSulava OyPlanning and building the Proof of Concept of Windows 365 cloud PC to customer
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
29 out of 30
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 30