FiltersClear all
Consulting services results
Showing results in consulting services.
Cybersecurity Awareness: 12 month implementationProdware GroupCybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
1 out of 58
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
2 out of 58
Secure Microsoft 365 Managed ServiceCWSICWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 58
Protection des périphériques - 4-Week ImplementionEXAKIS NELITEAssurer la sécurisation des périphériques puisqu’ils sont une porte d’entrée du système d’information pour les attaquants.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
4 out of 58
Audit de sécurité : 5 joursEconocom Products & Solutions BeluxEvaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 58
Microsoft 365 Security and Compliance ActivationNVISOOur engineering support covers every phase from planning to full implementation, of the different security and compliance solutions included in Microsoft licenses
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 58
Sécurisation des identités - 3-Week ImplementationEXAKIS NELITEAssurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 58
Threat Protection 3 Day WorkshopInsight Technology SolutionsInsight's Threat Protection Workshop identifies real-time threats in an organisation’s environment and helps define clear next steps to mitigate risks with Microsoft 365
+1
Applicable to:
Threat Protection
8 out of 58
Protection des applications -4-Week ImplementationEXAKIS NELITEUne vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 58
Security Operations Center: 1-Months Implementationiteracon GmbHDas ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 58
Microsoft 365 Tenant Review – Datenschutz & Sicherheit im FokusPHAT CONSULTING GmbHIdentifizieren und bewerten Sie Schwachstellen in Ihrer Microsoft 365 Umgebung – mit klarem Fokus auf Datenschutz, Zugriffskontrolle und Compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 58
Managed Microsoft Sentinel and Extended Detection and Response (XDR) implementation with CentricCentric Netherlands b.v.The SOC team's goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 58
Managed Services: M(x)DR for Microsoft 365 DefenderCegeka NVIntroducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
+2
Applicable to:
Identity & Access Management
Threat Protection
13 out of 58
Microsoft Defender for Endpoint: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Endpoint and deploy it to a group of devices.
+2
Applicable to:
Cloud Security
Threat Protection
14 out of 58
SecWise Assess for Workplace: 5-Day Security AssessmentSecWiseAn assessment of your modern workplace set-up to make sure it matches cyber security standards and best-practices.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
15 out of 58
Secure Remote Work 365: 1-Wo. ImplementierungArvato SystemsUnlock the potential of your workplace by Arvato Systems. Azure Virtual Desktop als Managed Service mit Full Service Management nach definierten SLAs
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
16 out of 58
POC Securité IT : 2 semainesEconocom Products & Solutions BeluxValidation des capacités des solutions de sécurité Microsoft dans votre environnement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 58
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
18 out of 58
SVA Microsoft Copilot for Security Readiness Workshop 1dSVA System Vertrieb Alexander GmbHIn zwei Sitzungen zu jeweils vier Stunden geben wir Ihnen eine umfassende Einführung in Copilot for Security.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
19 out of 58
BSE_Cybersecurity_Empower_CYRENProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans la sécurisation de votre SI
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 58
Threat Protection EngagementFUJITSUIdentify and mitigate threats. Strengthen security, prioritize vulnerabilities, and improve your position.
+1
Applicable to:
Threat Protection
21 out of 58
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions BeluxImplémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 58
Managed service : EDR with Defender for EndpointCegeka NVOur EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
23 out of 58
Microsoft Threat Protection Engagement – Risiken sichtbar machen, Angriffe verhindernPHAT CONSULTING GmbHErkennen und beheben Sie Bedrohungen und Schwachstellen mit Microsoft Defender & Sentinel.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 58
Répondre aux attaques - 3-Week ImplementationEXAKIS NELITECadrer les différentes attaques et risques afin d’en découler des solutions de sécurité et des chantiers.
+1
Applicable to:
Threat Protection
25 out of 58
Smart Services - Security - 12 months ImplementationElgon S.A.Smart Services, mise en place des bonne pratique sécurité pour vos service Microsoft 365 et Azure
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
26 out of 58
Windows 365 Cloud PC: 4-weeks ImplementationDEEP by POST Telecom S.A.Windows 365 Cloud PC - Securely stream your Windows experience
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
27 out of 58
SecWise Protect (XDR): Microsoft 365 Defender ActivationSecWiseIdentify your Microsoft Threat Protection jump-start configuration based on our security maturity predefined Microsoft 365 Defender best-practice configurations.
+1
Applicable to:
Threat Protection
28 out of 58
Secure Identities and Access Assessment, 3 daysXylosOur Identity Security Assessment is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 58
Threat Protection - 4 Week Security ImplementationOBVUSAccelerate your implementation of Threat Protection with the Microsoft 365 Security Accelerator onboarding Services that are designed to get you up and running fast to maximize your investment.
+1
Applicable to:
Threat Protection
30 out of 58
Microsoft 365 Security Scan: 3d AssessmentOrdinaThe result of the multi-day assessment will be a risk-based advise focusing on recommendations and a roadmap to increase the security posture of your Modern Workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 58
Security Priority Assessment : 2 day assessmentInetum-Realdolmen - Modern Work & Security2 day assessment to list and prioritization of your security needs resulting in step-by-step overview to tackle security projects
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 58
Defend against threats with SIEM plus XDR Workshop including FastTrack guidanceXylosOur 3-day Security workshop is meant to get an overview of the Security landscape, we use the Microsoft 365 security products and features to gain visibility into threats to your Microsoft 365.
+2
Applicable to:
Cloud Security
Threat Protection
33 out of 58
Endpoint Rollout Management 4-Hour ImplementationConXioN BVDuring this 4-hour implementation we will implement Microsoft Intune within your SMB or enterprise organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 58
Proximus Microsoft 365 Security AssessmentPROXIMUS NV/SAWith the Microsoft 365 Security Assessment, Proximus gives you a comprehensive insight offering you consistent information across different security risks.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
35 out of 58
Microsoft 365 Secure Score: 1-Week AssessmentWAKERSMesurez en 1 semaine le niveau de sécurité de votre environnement Microsoft 365
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 58
Protection de l'identité : Implémentation 1 moisROXYSVous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
+2
Applicable to:
Cloud Security
Threat Protection
37 out of 58
Defend against threats with SIEM + XDR Expert-as-a-service 1 y, Mgd svcXylosXylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your Threat Protection environment based on Microsoft 365 technology.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
38 out of 58
Workplace Security Maturity: 6-day assessmentResilient SecurityWorkplace security maturity assessment to get the most out of your Microsoft 365 security platform
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
39 out of 58
Roadmap to Zero Trust: 4-Wk AssessmentDevoteam NV/SAA pragmatic approach to a better security posture with Microsoft 365
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
40 out of 58
[Threat Management: 5-Days Assessment]Computacenter PlcCustomer security assessment in regards of Threat management: 5 day offer
+1
Applicable to:
Threat Protection
41 out of 58
Microsoft Zero Trust Security Assessment and Recommendations (5 days)NETWORK RESEARCH BELGIUMNRB assists you in defining and identifying areas of effort to move towards a Zero Trust architecture based on Azure AD identities.
+2
Applicable to:
Identity & Access Management
Threat Protection
42 out of 58
Microsoft Defender for Endpoint deployment service 2 months Implementation (elapsed time)NETWORK RESEARCH BELGIUMIncrease the security on your laptops with Microsoft Defender for EndPoint using NRB deployment services
+1
Applicable to:
Threat Protection
43 out of 58
Microsoft 365 security: 3 days assessmentOrlox3 day security assessment of the current Microsoft 365 environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 58
Threat Protection with Microsoft Defender for Endpoint: 5 Week WorkshopAdvensProtéger ses terminaux avec la suite Microsoft 365 Defender
+1
Applicable to:
Threat Protection
45 out of 58
Microsoft Defender for Office 365: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deploy it to a group of users.
+2
Applicable to:
Cloud Security
Threat Protection
46 out of 58
Microsoft Defender for Identity: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deployment of identity sensors.
+2
Applicable to:
Cloud Security
Threat Protection
47 out of 58
Microsoft Defender for Cloud Apps: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Cloud Apps and discover Cloud Apps
+2
Applicable to:
Cloud Security
Threat Protection
48 out of 58
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Cyberdefense BelgiumOur workshop will help you designing and deploying Microsoft security technologies for your unique needs.
+1
Applicable to:
Threat Protection
49 out of 58
Managed Threat Detection [xdr] for Microsoft 365 Defender: 4 weeks implementationOrange Cyberdefense BelgiumImplementation of Microsoft Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
50 out of 58
Managed Workspace Protection for Microsoft 365 Defender: 4 weeks ImplementationOrange Cyberdefense BelgiumImplementation of Microsoft Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
51 out of 58
SMB Security ServicesSavacoIn an era where cyber threats continue to evolve, securing your digital landscape is paramount. Our services are designed to address the multifaceted challenges of IT security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 58
Managed Microsoft Defender XDRPROXIMUS NV/SAProximus NXT Orbit Managed XDR service manages the alerts generated by Microsoft Defender. Our Security Operations Center (SOC) analyses and responds to these alerts 24/7 in Brussels, Belgium.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
53 out of 58
eVri/Orlox 3 day Microsoft 365 Security AuditeVri3 day Security Assessment of the current Microsoft 365 environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
54 out of 58
Orlox Endpoint Security 6-Day WorkshopOrloxOur 6-day workshop aims to elevate the security posture of your endpoints using Microsoft 365 Defender.
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Threat Protection
55 out of 58
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
56 out of 58
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
57 out of 58
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
58 out of 58