FiltersClear all
Consulting services results
Showing results in consulting services.
Microsoft Advisory Services ManagedSoftwareOneDrive Value and Cost Savings Throughout the Microsoft Cloud Investment Lifecycle
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
1 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM Systems• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Security 360° by teccle - 1 wk implementationaConTech GmbHSie erhalten folgende Leistungen: Die Implementierung von Identity and Access Management, Threat Protection, Conditional Access, Microsoft 365 Defender sowie Security Monitoring.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, LdaThe engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
4 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
5 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud Security
Threat Protection
6 out of 60
Microsoft 365 Incident Response - 5 Week AssessmentProtivitiAssessing the advanced security capabilities of Microsoft 365
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 60
Microsoft Security Deployment: 5-day WorkshopCampana & Schott GmbHUnderstand your Microsoft security posture and minimize risks with the right experts
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
9 out of 60
Endpoint Management WorkshopYork Telecom Corp3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
10 out of 60
PHATremote - Secure Rem. Work: 10Wk ImplementationPHAT CONSULTING GmbHBei der Implementierung verwenden wir die Microsoft-Technik, die euer Unternehmen zum Remote-Erfolg braucht – sicher und compliant mit Microsoft 365 ( Microsoft Teams, Windows Virtual Desktop usw.).
+3
Applicable to:
Cloud Security
Mobile Device Management
Teamwork Deployment
11 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT LimitedCybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 60
Office 365 Managed Service: 1-tägiger WorkshopOrange Networks GmbHErfahren Sie mehr über Office 365 als Managed Service und wie unser Angebot Ihre Rentabilität steigert und IT-Verwaltungskosten senkt.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
13 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
14 out of 60
1-Day Envisioning Workshop - Microsoft XDRwater IT Security GmbHIn product dedicated sessions we will explain the different pieces of Microsoft XDR product families and show the unique value add as solution but also as security platform in the bigger picture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Security365 by CyberCare: 3 Wochen ImplementierungArvato SystemsConsulting Service for Microsoft 365 Defender - Tool Configuration and Secure Score Management
+2
Applicable to:
Cloud Security
Threat Protection
16 out of 60
Microsoft 365 - 4wk WKSHFUJITSUGemeinsam mit unseren Beraterteams gestalten wir kundenindividuell Microsoft 365 entlang Ihrer Geschäftsziele, Mitarbeiterbedürfnisse und technischen Anforderungen.
+2
Applicable to:
Cloud Security
Identity & Access Management
17 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
18 out of 60
Sauvegarde Microsoft 365 : 2Wk - implementationProjetlysEnsemble de service permettant de mettre en place facilement une solution de backup Veeam pour Microsoft 365 ?
+2
Applicable to:
Cloud Security
Information Protection & Governance
19 out of 60
Sécurisation des identités - 3-Week ImplementationEXAKIS NELITEAssurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Encrypt Premium Paket - 2 Tage Impl.aConTech GmbHWir unterstützen Sie bei der Einrichtung und Implementierung des Unified Labeling Clients zur Verschlüsselung von Mails und Dokumenten.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
22 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
23 out of 60
Microsoft Cloud for Sustainability: 2 T. WorkshopaConTech GmbHWir erarbieten Ihre individuelle Nachhaltigkeitsstrategie mit Microsoft Cloud for Sustainability.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
24 out of 60
1-Tag Microsoft 365 Health & Security AssessmentComma Soft AGAssessment Ihrer bestehenden Microsoft 365 Umgebung hinsichtlich Best-Practices und Betreibbarkeit
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Security Roadmap: 3-Day WorkshopbaseVISION AGA good plan today is better than a perfect plan tomorrow. So start today with our Security Roadmap Workshop.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Device Mgm and Protection - 12 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
27 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
28 out of 60
Zero Trust Architecture and Roadmap: 4 Mon Proof of ConceptBitHawk AGBitHawk support you to achieve the modern zero-trust approach with the help of Microsoft365 products
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
29 out of 60
Microsoft 365 Security: 5 Tage AssessmentControlware GmbHErkennung von potentiellen Sicherheitsmängeln, Dokumentation sicherheitsrelevanter Einstellungen und Reduktion des Risikos durch Schadsoftware innerhalb von Microsoft Office 365.
+2
Applicable to:
Cloud Security
Threat Protection
30 out of 60
Microsoft 365 Tenant Setup, 1-Day ImplementationTec Networks GmbHWe provide you a good-practice configured tenant for the best experience with Microsoft 365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
31 out of 60
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 60
10WK-Implementation Cloud Migration/MWPHAT CONSULTING GmbHMit der Implementierung von Cloud-Lösungen nutzen Sie die Potenziale von Microsoft 365 ideal für den Modern Workplace. PHAT steht für Pairing Humans and Technology – sicher & compliant!
+3
Applicable to:
Cloud Security
Identity & Access Management
Teams Custom Solutions
33 out of 60
Intelligent Shield: 1d AssessmentCorporate SoftwareAn Audit for your Microsoft 365 tenant based on Best Practices
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
34 out of 60
Modern WorkPlace PME:15 days ImplementationAureraMise en place d’un environnement de travail collaboratif à l’état de l’art pour les PME, comprenant une plate-forme digitale et des outils permettant une facilité de gestion et de déploiement.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
35 out of 60
Reg. compliance and Data Privacy Assessment: 3-wkPwC SwitzerlandFind and review relevant regulations and data privacy requirements for your company and translate it into technical requirements for Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
36 out of 60
Microsoft 365 Maturity Assessment: 1-wk AssessmentPwC SwitzerlandIs your company ready to join a digital workplace experience? What steps need to be taken and what dependencies are crucial for making your digital workplace project successful?
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
37 out of 60
Microsoft 365 Protect your Workplace AssessmentPwC SwitzerlandIncreasingly complex cyber-attacks and are pushing companies’ cybersecurity capabilities to the limits. Traditional strategies to protect your environment need to be replaced
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
38 out of 60
Modern-Workplace Program Mgmt: 10wk implementationPwC SwitzerlandRun your digital workplace projects efficiently, as integral part of a business transformation based on Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
39 out of 60
Microsoft Cloud App Security Workshopscopewyse gmbhNach dem Workshop verfügen die Teilnehmer über die notwendigen Basiskenntnisse für die Konfiguration und Nutzung von Microsoft Cloud App Security.
+2
Applicable to:
Cloud Security
Identity & Access Management
40 out of 60
Security Assessment: 1-D WorkshopatworkThe Security Assessment Workshop will support you in focusing on your priorities and security strategy, discovering current threats, learning about Microsoft's security tools and planning next steps.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
41 out of 60
Microsoft 365 Security Workshop 8 daysComputacenter AG & Co. oHGDas Microsoft 365 Security Konzept verfolgt die Erstellung und Umsetzung eines ganzheitlichen Security Konzeptes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
42 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days ImplementationHCL Technologies Limited.HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
44 out of 60
Cloud Solutions for Schools : 2-hr AssessmentScheuss & Partner AGSchool+ ist ein Lösungsangebot basierend auf Microsoft 365, dazu können zusätzliche Module kombiniert werden.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
45 out of 60
Secure Live Workspace - 8 Weeks AssessmentLTIMindtree LimitedOur Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
+3
Applicable to:
Cloud Security
Power Platform for Teams
Teams Custom Solutions
46 out of 60
Adoptez Microsoft Edge : 2-Wk ImplementationProjetlysNotre approche pour la mise en place et l'adoption de Microsoft Edge.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
47 out of 60
Protection des applications -4-Week ImplementationEXAKIS NELITEUne vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Cloud Solutions for Institutions : 1-hr AssessmentScheuss & Partner AGCura360 - die moderne IT-Gesamtlösung für soziale Institutionen bietet sichere, datenschutzkonforme Cloud-Lösungen aus Schweizer Rechenzentren
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
49 out of 60
Transition to Cloud: 1-day Workshopthinformatics AGZiel des Workshops ist die gemeinsame Erarbeitung eines Fahrplans für Ihre Cloud Transition!
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
50 out of 60
Identity & Access Management: 1-Mth ImplementationOfficeline SAMicrosoft 365 Identity & Access Management to improve and streamline security on cloud and applications
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
51 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
52 out of 60
Microsoft 365: 1-wöchiges Proof-of-Concept (PoC)Orange Networks GmbHUnsere Consultants erarbeiten in Workshops gemeinsam mit Ihnen ein Proof-of-Concept für den Einsatz von Microsoft 365 in Ihrem Unternehmen.
+2
Applicable to:
Cloud Security
Teamwork Deployment
53 out of 60
Microsoft 365: 2-tägiges AssessmentOrange Networks GmbHUnsere Consultants stellen Ihnen Microsoft 365 im Detail vor und bewerten die Readiness Ihrer jetzigen IT-Umgebung für eine Migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
54 out of 60
HomeRun mit Microsoft 365: 1-tägiges AssessmentOrange Networks GmbHMit HomeRun haben wir eine integrierte Lösung auf Basis von Microsoft 365 entwickelt, mit der sichere Zusammenarbeit für Ihre Mitarbeiter im Homeoffice im Handumdrehen funktioniert.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
55 out of 60
Microsoft 365 Security Assessment - 4wk AssessmentProtivitiEffective Analysis of CIS & NIST Benchmarking, Active Directory to Azure and Microsoft 365 Configurations
+1
Applicable to:
Cloud Security
56 out of 60
Information Protection - 1Month ImplementationOfficeline SAAn offering of Microsoft Information Protection implementation to improve and streamline compliance across all environments.
+2
Applicable to:
Cloud Security
Information Protection & Governance
57 out of 60
Threat Protection: 2-Month ImplementationOfficeline SAThreat protection with Microsoft Defender products. We deliver a solution that improves and streamlines threat protection for every organization.
+2
Applicable to:
Cloud Security
Threat Protection
58 out of 60
Microsoft 365 Migration: 6-wöchige ImplementierungOrange Networks GmbHUnsere Consultants begleiten die Migration Ihrer Umgebung auf Microsoft 365 und unterstützen Sie bei der Einführung eines Managed-Services-Modells.
+2
Applicable to:
Cloud Security
Teamwork Deployment
59 out of 60
Microsoft Teams Kompakt 3-Tage WorkshopFUJITSU3-Tägiger Workshop als Teams Einführung mit dem Ergebniss einer dedizierten Testumgebung und eines Mitarbeitertrainings.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
60 out of 60