FiltersClear all
Consulting services results
Showing results in consulting services.
Insight Security Mini Audit: 1 Day WorkshopInsight Technology SolutionsInsight will work with you to evaluate your Microsoft 365 environment to make sure that it is in line with industry security best practices.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
1 out of 60
Cloud Identity Foundation Workshop (5-day)DexMachGet knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
+2
Applicable to:
Identity & Access Management
Threat Protection
2 out of 60
Secure & Compliant Modern Workplace: 2 weeks ImpInsight Technology SolutionsBased on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
3 out of 60
base-IT PentestingBaseITMit base-IT Pentesting stärken wir Ihre IT-Sicherheit und decken Schwachstellen auf. Durch die Integration von Microsoft 365 (Cloud Security, etc.) entsteht eine umfassende Sicherheitsarchitektur.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Data Security & Threat Protection WorkshopITVTIdentify data security risks in your organizational data & discover vulnerabilities in your environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 60
Cybersecurity Awareness: 12 month implementationProdware GroupCybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
6 out of 60
Insight Discover Sensitive Data 5 Day WorkshopInsight Technology SolutionsInsight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
+2
Applicable to:
Information Protection & Governance
Threat Protection
7 out of 60
Protection des périphériques - 4-Week ImplementionEXAKIS NELITEAssurer la sécurisation des périphériques puisqu’ils sont une porte d’entrée du système d’information pour les attaquants.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
8 out of 60
ITVT Modern Work Copilot ReadinesscheckITVTIdentifying the Opportunity for Customers within Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
9 out of 60
Audit de sécurité : 5 joursEconocom Products & Solutions BeluxEvaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
1-Day Envisioning Workshop - Microsoft XDRwater IT Security GmbHIn product dedicated sessions we will explain the different pieces of Microsoft XDR product families and show the unique value add as solution but also as security platform in the bigger picture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Microsoft 365 Security Assessment (Basic): Security and Configuration ReviewInfoGuard AGThe existing configuration of the Microsoft Tenants (Microsoft 365) is assessed according to best practice guidelines and typical security weaknesses.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 60
Base-IT Managed Service Security & SOCBaseITBase-IT Managed Service Security & SOC bietet Ihnen eine PROAKTIVE und PROFESSIONELLE Betreuung, sehr gerne auf Wunsch Rund-um-die-Uhr. Wir garantieren Ihnen vollumfassenden IT-Security Schutz.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 60
Microsoft 365 Tenant Review – Datenschutz & Sicherheit im FokusPHAT CONSULTING GmbHIdentifizieren und bewerten Sie Schwachstellen in Ihrer Microsoft 365 Umgebung – mit klarem Fokus auf Datenschutz, Zugriffskontrolle und Compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 60
Threat Protection 3 Day WorkshopInsight Technology SolutionsInsight's Threat Protection Workshop identifies real-time threats in an organisation’s environment and helps define clear next steps to mitigate risks with Microsoft 365
+1
Applicable to:
Threat Protection
15 out of 60
Managed Defender for IdentitySITS Deutschland GmbHSwiss IT Security Advanced Threat Management: Intelligenter, mehrstufiger Schutz vor Angriffen On-Premise bzw. in der Cloud
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
16 out of 60
Sécurisation des identités - 3-Week ImplementationEXAKIS NELITEAssurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Security Operations Center: 1-Months Implementationiteracon GmbHDas ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
18 out of 60
Secure Remote Work 365: 1-Wo. ImplementierungArvato SystemsUnlock the potential of your workplace by Arvato Systems. Azure Virtual Desktop als Managed Service mit Full Service Management nach definierten SLAs
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
19 out of 60
SVA Microsoft Copilot for Security Readiness Workshop 1dSVA System Vertrieb Alexander GmbHIn zwei Sitzungen zu jeweils vier Stunden geben wir Ihnen eine umfassende Einführung in Copilot for Security.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
20 out of 60
Protection des applications -4-Week ImplementationEXAKIS NELITEUne vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
22 out of 60
Microsoft Threat Protection Engagement – Risiken sichtbar machen, Angriffe verhindernPHAT CONSULTING GmbHErkennen und beheben Sie Bedrohungen und Schwachstellen mit Microsoft Defender & Sentinel.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Threat Protection EngagementFUJITSUIdentify and mitigate threats. Strengthen security, prioritize vulnerabilities, and improve your position.
+1
Applicable to:
Threat Protection
24 out of 60
Windows 365 Cloud PC: 4-weeks ImplementationDEEP by POST Telecom S.A.Windows 365 Cloud PC - Securely stream your Windows experience
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
25 out of 60
Security für den Einsatz von Microsoft 365 CopilotnovaCapta GmbHEine sichere Basis schaffen und technische Hindernisse aus dem Weg räumen für den Einsatz von Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
Sichere Endpunkte: 3-stündiger StarterworkshopnovaCapta GmbHErfahren Sie, wie Sie mithilfe des Defender for Endpoint wirkungsvoll gegen Cyberangriffe auf Endpunkte vorgehen können.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
27 out of 60
Bechtle Microsoft 365 E5 Security - 2d WorkshopBechtle AGIn this workshop we will talk about today's cyber security risks and show you how you can use the Microsoft 365 E5 Security Suite to initiate a zero trust approach.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
28 out of 60
AI Security Workshopq.beyond AGErfahren Sie, wie KI neue Bedrohungen birgt und wie Zero Trust Strategien Ihre Sicherheit erhöhen, mit Fokus auf Social Engineering, Risikomanagement und Präventionsmaßnahmen
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
29 out of 60
Smart Services - Security - 12 months ImplementationElgon S.A.Smart Services, mise en place des bonne pratique sécurité pour vos service Microsoft 365 et Azure
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
30 out of 60
Répondre aux attaques - 3-Week ImplementationEXAKIS NELITECadrer les différentes attaques et risques afin d’en découler des solutions de sécurité et des chantiers.
+1
Applicable to:
Threat Protection
31 out of 60
Security 360° by teccle - 1 wk implementationaConTech GmbHSie erhalten folgende Leistungen: Die Implementierung von Identity and Access Management, Threat Protection, Conditional Access, Microsoft 365 Defender sowie Security Monitoring.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
CANCOM Microsoft Defender Lifecycle Services - Monthly recurringCANCOM GmbHDie CANCOM Microsoft Defender Lifecycle Services beinhalten Leistungen zur Unterstützung im Betrieb der Microsoft Defender Lösungen.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Advanced Endpoint Management Implementierungq.beyond AGDas Ziel ist es, alle Endgeräte im Unternehmen sicher zu verwalten, Bedrohungen abzuwehren und eine einheitliche Kontrolle über Computer und mobile Geräte zu gewährleisten.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
34 out of 60
M365 Security Audit: 1-Wk AuditJoker IT AGNachhaltig das Bewusstsein für die Cloud-Sicherheit verbessern
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Security365 by CyberCare: 3 Wochen ImplementierungArvato SystemsConsulting Service for Microsoft 365 Defender - Tool Configuration and Secure Score Management
+2
Applicable to:
Cloud Security
Threat Protection
36 out of 60
1-Tag Microsoft 365 Health & Security AssessmentComma Soft AGAssessment Ihrer bestehenden Microsoft 365 Umgebung hinsichtlich Best-Practices und Betreibbarkeit
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Security Roadmap: 3-Day WorkshopbaseVISION AGA good plan today is better than a perfect plan tomorrow. So start today with our Security Roadmap Workshop.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
sepago adapt:impl Microsoft 365 processes in 9 wkssepago GmbHsepago adapt ensures that your security team can follow processes fitting your organization at each point in time. This makes sure that Microsoft 365 solutions can unfold their full potential.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Threat Protection
39 out of 60
Security Workshop - 1 DayBitHawk AGLearn how to protect your business against threats with Microsoft 365 in our interactive Security Workshop.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
40 out of 60
Microsoft 365 Security: 5 Tage AssessmentControlware GmbHErkennung von potentiellen Sicherheitsmängeln, Dokumentation sicherheitsrelevanter Einstellungen und Reduktion des Risikos durch Schadsoftware innerhalb von Microsoft Office 365.
+2
Applicable to:
Cloud Security
Threat Protection
41 out of 60
Microsoft Endpoint Manager: 90 minütiger WorkshopnovaCapta GmbHClient Management: Zentralisiert und kostenoptimiert. Der Workshop zur Bewältigung des Balanceaktes zwischen Usability und IT-Security.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
42 out of 60
Zero Touch Provisioning: 5-tägiger WorkshopnovaCapta GmbHClient Management optimieren: Lernen Sie in unserem 5-tägigen Workshop den Windows Autopiloten kennen, erfassen Sie seine Vorteile und machen Sie die ersten Schritte mit uns
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
43 out of 60
Managed Security Services for Microsoft Defender for Endpoint DACH: 12 Mon ImplementationTelekom Deutschland GmbH Main AccountConfiguration and operation of customer specific solution based on Microsoft Defender for Endpoint incl. integration into the Security Operation Center of Deutsche Telekom Security
+2
Applicable to:
Information Protection & Governance
Threat Protection
44 out of 60
Microsoft Security and Rapid Cyberattack Assessment: 3-tägiges AssessmentnovaCapta GmbHDas Microsoft Security Assessment hilft Ihrem Unternehmen zu verstehen, wie Sie Bedrohungen durch den Einsatz von Microsoft 365-Security-Lösungen gezielt reduzieren und sich vor Angriffen schützen.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
45 out of 60
Microsoft 365 Tenant Security Workshop: 3tägiger WorkshopnovaCapta GmbHErfahren Sie wie Sie die Microsoft Security Tools bestmöglich nutzen um Ihren Tenant zu schützen
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
46 out of 60
Managed EDR with Microsoft Defender for Endpoint - 2 hours Best Practices WorkshopNTT DATA Deutschland GmbHFind the right level of endpoint security for your business with Microsoft 365 Defender
+2
Applicable to:
Information Protection & Governance
Threat Protection
47 out of 60
Managed Security Operation Center (SOC) as a Service - by BitHawkBitHawk AGBitHawk's SOC service is designed to constantly monitor and protect our customer's environment using Microsoft tools. We help you to build and operate a SOC with the support of BitHawk. - 9 Day Impl.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Intune Endpoint Management: 4-Days ImplementationSPIRIT/21 GmbHAssessment of your requirements as well as the preparation and configuration of the Intune instance. This offering includes the support of knowledge transfer.
+2
Applicable to:
Mobile Device Management
Threat Protection
49 out of 60
Secure Multi Cloud environments - 4 Day workshopaConTech GmbHGet a customized threat & vulnerability analysis of your hybrid and multi-cloud environment and learn how to build a more robust cloud security system with Microsoft 365.
+1
Applicable to:
Threat Protection
50 out of 60
Defend Against Threats with SIEM Plus XDR - 4 Day WorkshopaConTech GmbHGet a deep understanding of Security solutions like Microsoft 365 Defender, Endpoint Protection and more. We will review your security goals and objectives to create a personalized security plan.
+1
Applicable to:
Threat Protection
51 out of 60
Smart Workplace with Mobile Device Management - 1-hr AssessmentScheuss & Partner AGFree 1 hour requirement analysis on how the Services of Workplace360 can facilitate the IT in your organisation
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
52 out of 60
Magenta Security Services for Microsoft DACH:3 months ImplementationTelekom Deutschland GmbH Main AccountMagenta Security for Microsoft provides the management and the integration in as well as the continuous monitoring of your Microsoft Security by the SOC of Deutsche Telekom
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Zero Trust: 4 x 3h Workshopwater IT Security GmbHStay ahead of the cyber threat wave with our Zero Trust workshop – get an overview of your Zero Trust readiness, a compact guide to today’s IT landscape, and define next steps for your organization.
+1
Applicable to:
Threat Protection
54 out of 60
Starterpaket Managed Modern Endpoint: 7-wöchige ImplementierungnovaCapta GmbHDen Modern Workplace mit all seinen Vorteilen für die Benutzer:innen auf standardisierte, automatisierte und sichere Weise bereitstellen
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
55 out of 60
Net at Work Security Assessment für Microsoft 365Net at Work GmbHMit dem Microsoft 365 Security Assessment ermitteln wir den Security Reifegrades Ihres Unternehmens und geben Ihnen Maßnahmen zur Verbesserung an die Hand.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Swisscom MDR with Microsoft Defender XDRSwisscom (Schweiz) AGMDR with Microsoft Defender XDR is a cloud-based managed security service from Swisscom
+2
Applicable to:
Cloud Security
Threat Protection
57 out of 60
Copilot Foundation - Information Protection & GovernanceAveniq AGIPG forms the foundation for Copilot. In 6 workshops, we provide advice on important topics such as data classification, labeling, Data Loss Prevention (DLP), etc., and prepare the company for Copilot
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
58 out of 60
InfoGuard Hardening ServiceInfoGuard AGHardening is an important aspect to increasing a company's cyber resilience. We offer hardening modules to address specific areas (Endpoint, Active Directory, and Cloud) as individual building blocks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
59 out of 60
Modern Security Operationsfernao somnitec AGOptimaler Schutz durch Erkennen und Reagieren auf Sicherheitsvorfälle, Entlastung Ihres IT-Teams und aufschlussreiche Insights zur IT-Sicherheitslage.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60