필터모두 지우기
결과 Professional Services개
의 결과 professional services개를 표시하는 중
Intune Security ReviewmnemonicEnhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
+2
Applicable to:
Cloud Security
Mobile Device Management
1 out of 57
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
2 out of 57
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
3 out of 57
Watchguard Managed ServiceCWSIWatchGuard helps customers understand, implement and fully utilise Microsoft Defender and Microsoft Sentinel's capabilities to deliver secure operations, all watched over by our 24x7 CSOC service.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
4 out of 57
Gestion des smartphones via Microsoft Intune : 1sem - implémentationProjetlysUne solution clé en main, sécurisée et facile à gérer pour la gestion de vos périphériques
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
5 out of 57
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
6 out of 57
Microsoft Threat Protection Engagement – Risiken sichtbar machen, Angriffe verhindernPHAT CONSULTING GmbHErkennen und beheben Sie Bedrohungen und Schwachstellen mit Microsoft Defender & Sentinel.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 57
Microsoft Entra ID Governance – In 8 Wochen zum ID Governance HeroPHAT CONSULTING GmbHMicrosoft Entra ID Governance in 8 Wochen: Lifecycle Workflows, PIM, Access Reviews & Compliance.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
8 out of 57
Get Value from Adoption of Microsoft CopilotNexer Group ABGet tools for how to measure and promote the adoption of AI tools like Microsoft 365 Copilot and agents in your organisation. Get usertrainings, champion programs etc in place with our help.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
9 out of 57
Microsoft 365 Tenant Review – Datenschutz & Sicherheit im FokusPHAT CONSULTING GmbHIdentifizieren und bewerten Sie Schwachstellen in Ihrer Microsoft 365 Umgebung – mit klarem Fokus auf Datenschutz, Zugriffskontrolle und Compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 57
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
11 out of 57
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
12 out of 57
Modern Work Audit – 1 Week Consulting EngagementConnectworks | IT Professionals1-week Microsoft 365 audit: continuity, security & license optimization by certified experts
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
13 out of 57
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 57
Nexer Data Governance - Get ready for AINexer Group ABTo get ready for AI you need to have control of your data. Effective data governance is crucial for ensuring compliance with data privacy regulations and maintaining data integrity.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
15 out of 57
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
16 out of 57
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
17 out of 57
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
18 out of 57
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 57
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
20 out of 57
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 57
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
22 out of 57
Microsoft 365 Tenant Setup, 1-Day ImplementationTec Networks GmbHWe provide you a good-practice configured tenant for the best experience with Microsoft 365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
23 out of 57
Modern WorkPlace PME:15 days ImplementationAureraMise en place d’un environnement de travail collaboratif à l’état de l’art pour les PME, comprenant une plate-forme digitale et des outils permettant une facilité de gestion et de déploiement.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
24 out of 57
Security Assessment Microsoft 365: 2day assessmentProdware GroupA service for Office 365 and Microsoft 365 protection
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
25 out of 57
Microsoft 365 Level Up: 1-Year WorkshopWAKERSPour être toujours au top des dernières nouveautés de votre environnement Microsoft 365 pendant 1 an !
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
26 out of 57
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 57
Microsoft 365 Security Scan: 3d AssessmentOrdinaThe result of the multi-day assessment will be a risk-based advise focusing on recommendations and a roadmap to increase the security posture of your Modern Workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 57
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UKManage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
29 out of 57
Secure Digital Workplace: 4 Day WorkshopDevoteam NV/SAAn assessment to quickly have an overview of your security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
30 out of 57
Modern Identity Kickstarter Workshop (3 days)The Collective Consulting BVThis workshop helps you to address and modernize your identity and access management strategy, using Microsoft 365 and Azure AD capabilities.
+2
Applicable to:
Cloud Security
Identity & Access Management
31 out of 57
5 Day Information Security AssessmentToreon CVBAAn information protection assessment to guide you towards improving your data management in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
32 out of 57
Security Priority Assessment : 2 day assessmentInetum-Realdolmen - Modern Work & Security2 day assessment to list and prioritization of your security needs resulting in step-by-step overview to tackle security projects
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 57
Get Started with SharePoint 1/2-Day WorkshopConXioN BVAfter this 1/2 day-workshop you know whatSharePoint is and how it could help improve your document structure and teamwork within your SMB or enterprise organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
34 out of 57
Defend against threats with SIEM plus XDR Workshop including FastTrack guidanceXylosOur 3-day Security workshop is meant to get an overview of the Security landscape, we use the Microsoft 365 security products and features to gain visibility into threats to your Microsoft 365.
+2
Applicable to:
Cloud Security
Threat Protection
35 out of 57
SharePoint Governance 4-Hour WorkshopConXioN BVAfter this 4-hour workshop you can optimize your SharePoint governance to further improve your security within your SMB or enterprise organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
36 out of 57
Secure Microsoft 365 Managed ServiceCWSICWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 57
Endpoint Rollout Management 4-Hour ImplementationConXioN BVDuring this 4-hour implementation we will implement Microsoft Intune within your SMB or enterprise organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 57
Sauvegarde Microsoft 365 : 2Wk - implementationProjetlysEnsemble de service permettant de mettre en place facilement une solution de backup Veeam pour Microsoft 365 ?
+2
Applicable to:
Cloud Security
Information Protection & Governance
39 out of 57
Adoptez Microsoft Edge : 2-Wk ImplementationProjetlysNotre approche pour la mise en place et l'adoption de Microsoft Edge.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
40 out of 57
Sécurisation des identités - 3-Week ImplementationEXAKIS NELITEAssurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 57
Protection des applications -4-Week ImplementationEXAKIS NELITEUne vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 57
Identity Security 1-Day ImplementationConXioN BVDuring this 1-day implementation we will implement Identity Security within you SMB or enterprise organization.
+2
Applicable to:
Cloud Security
Identity & Access Management
43 out of 57
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
44 out of 57
Move to Microsoft 365: 4-Weeks ImplementationDevoteam NV/SAAn implementation and migration offer for Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
45 out of 57
Defender for Endpoint: 5-Day WorkshopDevoteam NV/SAA 5-day engagement to improve your security posture of your endpoints with Microsoft 365 Defender.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
46 out of 57
NextGen Windows Experiences Expert-as-a-service, 1y Mgd ServiceXylosXylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your modern endpoint management.
+2
Applicable to:
Cloud Security
Device Deployment & Management
47 out of 57
Managed service : EDR with Defender for EndpointCegeka NVOur EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
48 out of 57
Secure Identities and Access Expert-as-a-service, 1 y, Mgd serviceXylosXylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your cloud or hybrid Identity environment based on Microsoft 365 technology.
+2
Applicable to:
Cloud Security
Identity & Access Management
49 out of 57
Secure Identities and Access Assessment, 3 daysXylosOur Identity Security Assessment is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 57
Data Classification and labelling: 6-Months Impl.Toreon CVBAData classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
51 out of 57
Protection de l'identité : Implémentation 1 moisROXYSVous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
+2
Applicable to:
Cloud Security
Threat Protection
52 out of 57
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 57
ModernIdentity: 3-Months ImplementationEconocom Workplace infra InnovationUnifier la gestion des identités et des accès grâce à Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
54 out of 57
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse GlobalThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
55 out of 57
Smart Services - Security - 12 months ImplementationElgon S.A.Smart Services, mise en place des bonne pratique sécurité pour vos service Microsoft 365 et Azure
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
56 out of 57
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
57 out of 57