FiltersClear all
Professional Services results
Showing results in professional services.
Zero Trust Foundation Implementierungq.beyond AGDas Ziel der Zero Trust Foundation ist es, alle Zugriffe unabhängig von der Herkunft sorgfältig zu überprüfen, um die Sicherheit von Unternehmensressourcen umfassend zu gewährleisten.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 14
Advanced Endpoint Management Implementierungq.beyond AGDas Ziel ist es, alle Endgeräte im Unternehmen sicher zu verwalten, Bedrohungen abzuwehren und eine einheitliche Kontrolle über Computer und mobile Geräte zu gewährleisten.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
2 out of 14
AI Security Workshopq.beyond AGErfahren Sie, wie KI neue Bedrohungen birgt und wie Zero Trust Strategien Ihre Sicherheit erhöhen, mit Fokus auf Social Engineering, Risikomanagement und Präventionsmaßnahmen
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 14
Microsoft Threat Protection Engagement – Risiken sichtbar machen, Angriffe verhindernPHAT CONSULTING GmbHErkennen und beheben Sie Bedrohungen und Schwachstellen mit Microsoft Defender & Sentinel.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 14
Teams Basicq.beyond AGDer Zweck von Teams Basic ist es, die Zusammenarbeit und Kommunikation innerhalb von Organisationen zu verbessern. Es bietet grundlegende Funktionen wie Chat, Videokonferenzen und Dateifreigabe.
+3
Applicable to:
Adoption & Change Management
Teamwork Deployment
Threat Protection
5 out of 14
Threat Protection via Defender and Sentinel4WARD S.R.L.4ward implements Microsoft Defender and Sentinel to deliver unified threat protection, automated detection, and rapid response across cloud, hybrid, and on-premises environments.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 14
Identity and security Management through Entra and Intune4WARD S.R.L.4ward implements Microsoft Entra and Intune to secure identities, control access, manage devices, enabling Zero Trust, compliance, and seamless user experiences across hybrid and cloud environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 14
Data security governance compliance and privacy via Purview4WARD S.R.L.4ward implements Microsoft Purview to govern, protect, and classify data, ensuring security, compliance, privacy, and risk reduction across hybrid and multi-cloud environments
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
8 out of 14
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 14
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 14
Threat Protection Envisioning Workshop: Stop Advanced Threats Across Microsoft 365evoila GmbH🛡️ Discover real threats targeting your organization. 2-week Threat Protection workshop with threat analysis, Defender XDR guidance, remediation recommendations
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
11 out of 14
Data Security Envisioning Workshop: Identify Risks in Your Organizational Dataevoila GmbH🔍 Uncover data security risks in Microsoft 365. 2-week automated Data Security Check with findings, Purview roadmap, and hands-on recommendations. Expert analysis. No guesswork.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
12 out of 14
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 14
Microsoft 365 Copilot Readiness assessment - 5 days - assessmentInetum BelgiumDuring this assessment, we will check whether your environment is technically ready for Microsoft 365 Copilot. We will focus on infrastructure, licenses, and your data.
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Threat Protection
14 out of 14