FiltraiValyti viską
Rezultatų: Professional Services
Rodomi rezultatai professional services.
Innofactor Copilot Data Readiness Kit, 3-week workshopInnofactor FinlandInnofactor's Copilot Data Readiness Kit ensures secure and efficient use of Microsoft Copilot by mitigating risks and effectively protecting sensitive business information and data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
1 out of 49
Guest Lifecycle for Azure ADSwiss IT Security AGGuest Lifecycle for Azure AD (GL4AAD) handles maintenance and hygiene tasks for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 49
DNV Cyber Extended Detection and Response (XDR) for MicrosoftNixu OyjXDR service including 24/7 Security Operations Center (SOC) powered with Defender XDR and Sentinel
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 49
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
4 out of 49
Exobe Windows 365 PilotExobe ABWe are pleased to offer a Microsoft Windows 365 pilot that shows how to accomplish more with all the resources available in Windows 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
5 out of 49
Microsoft 365 Copilot workshop: 1-week consulting servicesUni Systems S.M.S.A.This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
6 out of 49
Intune Security ReviewmnemonicEnhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
+2
Applicable to:
Cloud Security
Mobile Device Management
7 out of 49
Insight´s Microsoft Cloud Advisory ServiceInsight Technology SolutionsProvides a 2 weeks assessment of our client’s estate across the following six areas: Microsoft 365, Azure, On-Premises, Business Critical Applications, Skills & Resourcing & Cost optimisation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
8 out of 49
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
9 out of 49
Microsoft 365 Copilot Value Discovery: 2-Week AssessmentPrimendUnlock the full potential of Microsoft Copilot. Discover high-value use cases, optimize your AI readiness, and build a robust business case for AI transformation
+2
Applicable to:
Adoption & Change Management
Cloud Security
10 out of 49
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
11 out of 49
itm8 Managed Detection and Responseitm8 Sverige ABImplementation of itm8 Managed Detection and Response based on Defender for Business
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
12 out of 49
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
13 out of 49
Get Value from Adoption of Microsoft CopilotNexer Group ABGet tools for how to measure and promote the adoption of AI tools like Microsoft 365 Copilot and agents in your organisation. Get usertrainings, champion programs etc in place with our help.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
14 out of 49
Exobe DPIA ServiceExobe ABA Data Protection Impact Assessment (DPIA) is a structured process used to ensure GDPR compliance and responsible handling of personal data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
15 out of 49
Continuous Improvement Services for Microsoft 365SCIBERSciber’s Continuous Improvement service keeps your Microsoft 365 environment aligned with updates and best practices, turning changes into tailored insights that maximize your investment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 49
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 49
Nexer Data Governance - Get ready for AINexer Group ABTo get ready for AI you need to have control of your data. Effective data governance is crucial for ensuring compliance with data privacy regulations and maintaining data integrity.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
18 out of 49
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
19 out of 49
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 49
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
21 out of 49
Innofactor Intune foundation: 2 wk implementationInnofactor NorwayMicrosoft 365 - Intune Foundation is an established framework for basic configuration and acceleration of Microsoft Endpoint Manager MEM based on best practises from Innofactor.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
22 out of 49
Microsoft 365 Tenant Setup, 1-Day ImplementationTec Networks GmbHWe provide you a good-practice configured tenant for the best experience with Microsoft 365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
23 out of 49
Zerotrust Starterkit with Onevinn, 2 days!Onevinn ABIntroduction to Zerotrust with Passwordless and YubiKeys – Get an understanding of what the Passwordless technology is and what you can achieve with YubiKeys
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
24 out of 49
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 49
Passwordless Starterkit 25 Yubikeys, 4h WorkshopOnevinn ABIntroduction to Passwordless with 25 YubiKeys – get an understanding of what the Passwordless technology is and what you can achieve with Yubikeys
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
26 out of 49
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UKManage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 49
Microsoft Endpoint Manager PoC - 4 weeksXenit ABXenit’s Proof-of-Concept (PoC) includes both a configuration in Microsoft Endpoint Manager and a strategy workshop.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
28 out of 49
Xenit Workspace - 4 weeks implementationXenit ABWith the workplace as a service, you give your employees a secure and managed client computer, filled with applications in Microsoft's user-friendly and familiar interfaces.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 49
Cyber Security Lifecycle: 12 Months ImplementationExobe ABThe goal and objective of the service is that your company should always have the best possible security posture for your Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
30 out of 49
Onevinn Information Protection: 5 day WorkshopOnevinn ABOnevinn Information Protection workshop that helps the customer utilize their investment in Microsoft 365.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
31 out of 49
Onevinn Threat Protection: 5 day WorkshopOnevinn ABOnevinn Threat Protection workshop that helps the customer utilize their investment in Microsoft 365.
+2
Applicable to:
Cloud Security
Threat Protection
32 out of 49
Microsoft 365 Security: 1-Wk AssessmentInnofactor NorwayInnofactor’s Microsoft 365 Security assessment secures organizations business operation by providing insights and recommendations to help minimizing security risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 49
Microsoft 365 Strategic Security Workshop (1day)Edgeguide ABTo establish an organization specific plan and in addition a better understanding of actual customer needs as it relates to the security, identity, and compliance portfolio in Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 49
Microsoft 365 Backup: 3 wks implementationXenit ABA complete backup plan with unlimited storage, unlimited rentention, GDPR modul and protection for malware and ransomware.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
35 out of 49
Microsoft 365 Security: 2-WK Assessment EssentialsDustin ABAn executive assessment into essential security capabilities, map against normal/high risk scenario and security hygiene
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
36 out of 49
Compliance Manager Training: 1/2 day WorkshopCloud EssentialsCompliance Manager Training - a 1/2 day training session about Microsoft 365 Compliance Manager facilitated by an experienced member of our team
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
37 out of 49
Manage and Investigate Risk: 2 weeks WorkshopCloud EssentialsA risk check followed by advisory workshop to build a sustainable strategy around insider risk within Microsoft 365 and further accelerate your compliance journey.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
38 out of 49
Discover Sensitive Data: 2 weeks WorkshopCloud EssentialsDiscover Sensitive Data Workshop - an automated data risk check to uncover dark data risks with analysis and recommendations
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
39 out of 49
Microsoft 365 Defender: 10-Day AssessmentVenzo A/SLet VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
40 out of 49
Microsoft 365 Security Assessment and Roadmap: 1 Day WorkshopCloud EssentialsAccelerating your Zero Trust strategy through a readiness assessment, workshop and roadmap
+1
Applicable to:
Cloud Security
41 out of 49
Tietoevry endpoint security 2h workshopTietoevry The purpose of the endpoint security workshop for Microsoft Defender is to help Customers understand the full potential security benefits within each of the Microsoft Defender solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 49
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 49
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse GlobalThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
44 out of 49
Microsoft 365 Governance: 1 month AssessmentCrayonCrayon Microsoft 365 Governance Assessment will assess your configuration and build recommendation report
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
45 out of 49
Modernize Endpoints (Microsoft Intune): 1 Day WorkshopCrayonThe Endpoint Management Workshop is a one-day engagement that will help you showcase the value of Microsoft Endpoint Manager and how to manage users’ devices and apps from anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
46 out of 49
Road to Microsoft 365: 1 month ImplementationCrayonCrayon Microsoft 365 migration services brings best practices and expertise to assure seamless migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
47 out of 49
Cybersecurity Fitness Roadmap: 6-Wk AssessmentHiQ Stockholm ABPlan, create and implement a strategy for improving your organizational Cyber Hygiene using Microsoft Security Technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 49
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
49 out of 49