FiltersAlles wissen
Professional Services resultaten
resultaten worden weergegeven in professional services.
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 26
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 26
Modernize Endpoints (Microsoft Intune): 1 Day WorkshopCrayonThe Endpoint Management Workshop is a one-day engagement that will help you showcase the value of Microsoft Endpoint Manager and how to manage users’ devices and apps from anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
3 out of 26
Cloud Workplace: 8-Months ImplementationRapid CircleThe implementation of a cloud workplace gives an organization the opportunity to offer employees a workplace that can be used independently of place and time and with the most modern Microsoft tools.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
4 out of 26
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
5 out of 26
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLCCMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
6 out of 26
Quadra BluForge Managed XDRQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 26
Neudesic's Knowledge Governance WorkshopNeudesicThe Neudesic Knowledge Governance Workshop is a 4–6-week session that is designed to assist customers in safeguarding their sensitive information.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
8 out of 26
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
9 out of 26
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 26
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
11 out of 26
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
12 out of 26
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 26
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 26
XENMDM - Monthly SoC Support for Mobile DevicesXencia Technology Solutions Pvt LtdMicrosoft Intune platform based Managed Services covering device management, control and compliance along with monitoring and remediation of issues, policies, users, devices and threats.
+1
Applicable to:
Cloud Security
15 out of 26
XENSHIELD365 - Managed Detection and Response (MDR)Xencia Technology Solutions Pvt Ltd24x7 Managed Security Operations SoC through shared team of Security experts Defender XDR
+2
Applicable to:
Cloud Security
Threat Protection
16 out of 26
Microsoft Intune-Security Consulting Offer: 5-days Proof of ConceptPower Centre Pvt LimitedFree 5 day Proof of Concept to show how organizations can leverage the power of Microsoft Intune and Microsoft 365 security services to manage and secure all their devices - EndPoint, mobile, BYOD.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
17 out of 26
Google Workspace to Microsoft 365 Migration: 2 weeksTech Data Advanced Solutions (India) Private LimitService deployment and configuration.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
18 out of 26
Cybersecurity AssessmentCDI LLCThe Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
19 out of 26
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
20 out of 26
Microsoft 365 Copilot Readiness Assessment - CRATechPlus TalentThrough this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
21 out of 26
Microsoft 365 Security AssessmentTechPlus TalentThis Microsoft 365 Security Assessment evaluates your entire Microsoft 365 environment to identify security gaps and misconfigurations, delivering risk-rated findings and prioritized recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
22 out of 26
Inspira Microsoft Threat Protection Envisioning WorkshopInspira Enterprise Inc.Learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 26
Inspira Microsoft Data Security Envisioning WorkshopInspira Enterprise Inc.Identify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
24 out of 26
Frontier Firm LiveSulava OyFrontier Firm Live is Sulava MEA’s flagship subscription service designed to help organisations transition into AI-native enterprises.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
25 out of 26
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
26 out of 26