FiltersClear all
Consulting services results
Showing results in consulting services.
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
1 out of 60
Information Protection & DLP PilotAwara IT Kazakhstan LLPInformation Protection & DLP Pilot — secure your data with sensitivity labels, automated classification, and DLP policy testing.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
2 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo SoftwareThe Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFTIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
4 out of 60
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
5 out of 60
Sichere Endpunkte: 3-stündiger StarterworkshopnovaCapta GmbHErfahren Sie, wie Sie mithilfe des Defender for Endpoint wirkungsvoll gegen Cyberangriffe auf Endpunkte vorgehen können.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
6 out of 60
Security Configuration Maintenance 2-Wks ImpInsight Technology SolutionsA monthly Security Configuration Maintenance Service. This service will help to secure end-user devices more effectively based on Insight and Microsoft Security best practices.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
7 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Defend Against Threats with SIEM Plus XDR - 4 Day WorkshopaConTech GmbHGet a deep understanding of Security solutions like Microsoft 365 Defender, Endpoint Protection and more. We will review your security goals and objectives to create a personalized security plan.
+1
Applicable to:
Threat Protection
9 out of 60
Teams & SharePoint Security HardeningAVASOFTTeams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Data Leak DetectionAwara IT Kazakhstan LLPRapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Threat Protection
11 out of 60
base-IT PentestingBaseITMit base-IT Pentesting stärken wir Ihre IT-Sicherheit und decken Schwachstellen auf. Durch die Integration von Microsoft 365 (Cloud Security, etc.) entsteht eine umfassende Sicherheitsarchitektur.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Cloud Identity Foundation Workshop (5-day)DexMachGet knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
+2
Applicable to:
Identity & Access Management
Threat Protection
14 out of 60
sepago Envisioning Workshopsepago GmbHGet a deeper insight into Microsoft Defender 365 Portfolio and why it should be your future security solution!
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
1-Day Envisioning Workshop - Microsoft XDRwater IT Security GmbHIn product dedicated sessions we will explain the different pieces of Microsoft XDR product families and show the unique value add as solution but also as security platform in the bigger picture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Security365 by CyberCare: 3 Wochen ImplementierungArvato SystemsConsulting Service for Microsoft 365 Defender - Tool Configuration and Secure Score Management
+2
Applicable to:
Cloud Security
Threat Protection
18 out of 60
Microsoft 365 Security 360° WorkshopNTT Germany AG & Co. KGEstablish a modern security framework across identities, devices, apps, access and data based on Zero Trust with our Microsoft 365 Security 360° offering
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
19 out of 60
Security 360° by teccle - 1 wk implementationaConTech GmbHSie erhalten folgende Leistungen: Die Implementierung von Identity and Access Management, Threat Protection, Conditional Access, Microsoft 365 Defender sowie Security Monitoring.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
1-Tag Microsoft 365 Health & Security AssessmentComma Soft AGAssessment Ihrer bestehenden Microsoft 365 Umgebung hinsichtlich Best-Practices und Betreibbarkeit
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Skaylink Securing Identities: 2-Day WorkhopSkaylink GmbHIdentitäten virtuell verifizieren & Risiken senken mit einem Microsoft 365-Workshop von Skaylink
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
23 out of 60
Microsoft 365 Security: 5 Tage AssessmentControlware GmbHErkennung von potentiellen Sicherheitsmängeln, Dokumentation sicherheitsrelevanter Einstellungen und Reduktion des Risikos durch Schadsoftware innerhalb von Microsoft Office 365.
+2
Applicable to:
Cloud Security
Threat Protection
24 out of 60
Micorsoft 365 Security Workshop: 1-Day, WorkshopAll for One Group SESie erhalten technische Einblicke zur Erhöhung der Sicherheit in Microsoft 365: von der Identitätsverwaltung und dem Authentifizierungsprozess bis hin zum Schutz der individuellen Information.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
25 out of 60
Mobile Endpoint Security: 5 Day, WorkshopAll for One Group SESicherheit für Unternehmen, die mobile Endgeräte einsetzen, auf denen Unternehmensdaten sowie persönliche bzw. personenbezogene Daten bearbeitet werden.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
26 out of 60
Secure & Compliant Modern Workplace: 2 weeks ImpInsight Technology SolutionsBased on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
27 out of 60
Threat Protection - 4 Week Security ImplementationOBVUSAccelerate your implementation of Threat Protection with the Microsoft 365 Security Accelerator onboarding Services that are designed to get you up and running fast to maximize your investment.
+1
Applicable to:
Threat Protection
28 out of 60
Sycor.ManagedSecurity: 4-hr Implementation ServiceSycorIT-Sicherheit heute - Make or buy?
Mit unseren standardisierten Leistungspaketen des Sycor.ManagedSecurity steigern Sie dauerhaft die IT-Sicherheit in Ihrem Unternehmen.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
29 out of 60
Microsoft 365 Security Assessment (3 days)*PlanB. GmbHGet an actionable security roadmap based on evaluated and prioritized security recommendations for your organization.
+2
Applicable to:
Cloud Security
Threat Protection
30 out of 60
Microsoft Attack Simulation Training - 9 wk implsepago GmbHMicrosoft Attack Simulation Training powered by sepago can increase your employees’ resilience against cyber-crime up to 45%!
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
31 out of 60
sepago adapt:impl Microsoft 365 processes in 9 wkssepago GmbHsepago adapt ensures that your security team can follow processes fitting your organization at each point in time. This makes sure that Microsoft 365 solutions can unfold their full potential.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Threat Protection
32 out of 60
Cybersecurity Awareness: 12 month implementationProdware GroupCybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
33 out of 60
Managed service : EDR with Defender for EndpointCegeka NVOur EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
34 out of 60
Secure Remote Work 365: 1-Wo. ImplementierungArvato SystemsUnlock the potential of your workplace by Arvato Systems. Azure Virtual Desktop als Managed Service mit Full Service Management nach definierten SLAs
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
35 out of 60
Bechtle Microsoft 365 E5 Security - 2d WorkshopBechtle AGIn this workshop we will talk about today's cyber security risks and show you how you can use the Microsoft 365 E5 Security Suite to initiate a zero trust approach.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
Microsoft 365 Security: 5-Days WorkshopDeutsche Telekom MMS GmbHDas Microsoft 365 Security Assessment bietet einen kompakten Einstieg zur Analyse des aktuellen Sicherheitsniveaus und Konfiguration der Einstellungen.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
37 out of 60
Schatten-IT Analyse: 1 Day, WorkshopAll for One Group SEGezielt die „dunklen IT-Flecken“ entdecken und abbauen sowie sichere Alternativen anbieten.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
38 out of 60
Microsoft 365 Defender: 10-Day AssessmentVenzo A/SLet VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 60
Microsoft Endpoint Manager: 90 minütiger WorkshopnovaCapta GmbHClient Management: Zentralisiert und kostenoptimiert. Der Workshop zur Bewältigung des Balanceaktes zwischen Usability und IT-Security.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
40 out of 60
Zero Touch Provisioning: 5-tägiger WorkshopnovaCapta GmbHClient Management optimieren: Lernen Sie in unserem 5-tägigen Workshop den Windows Autopiloten kennen, erfassen Sie seine Vorteile und machen Sie die ersten Schritte mit uns
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
41 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
[Threat Management: 5-Days Assessment]Computacenter PlcCustomer security assessment in regards of Threat management: 5 day offer
+1
Applicable to:
Threat Protection
43 out of 60
Insight Discover Sensitive Data 5 Day WorkshopInsight Technology SolutionsInsight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
+2
Applicable to:
Information Protection & Governance
Threat Protection
44 out of 60
Managed Security Services für den Microsoft Defender for Endpoint: 12-Mon ImplementationTelekom Deutschland GmbH Main AccountInbetriebnahme und Betrieb der kundenspezifischen Lösung auf Basis des Microsoft Defender for Endpoint inkl. Integration in das Security Operation Center der Deutschen Telekom Security
+2
Applicable to:
Information Protection & Governance
Threat Protection
45 out of 60
Managed Security Services for Microsoft Defender for Endpoint DACH: 12 Mon ImplementationTelekom Deutschland GmbH Main AccountConfiguration and operation of customer specific solution based on Microsoft Defender for Endpoint incl. integration into the Security Operation Center of Deutsche Telekom Security
+2
Applicable to:
Information Protection & Governance
Threat Protection
46 out of 60
Security Operations Center: 1-Months Implementationiteracon GmbHDas ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
47 out of 60
Microsoft 365 Advanced Security 360°: 6-Wk Implementationdatac Kommunikationssysteme GmbHDieses Offering bietet ein Komplettpaket um schnelle Mehrwerte für den Einsatz von Microsoft 365 E5 Security zu generieren
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
48 out of 60
Microsoft 365 Tenant Security Workshop: 3tägiger WorkshopnovaCapta GmbHErfahren Sie wie Sie die Microsoft Security Tools bestmöglich nutzen um Ihren Tenant zu schützen
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
49 out of 60
Managed EDR with Microsoft Defender for Endpoint - 2 hours Best Practices WorkshopNTT DATA Deutschland GmbHFind the right level of endpoint security for your business with Microsoft 365 Defender
+2
Applicable to:
Information Protection & Governance
Threat Protection
50 out of 60
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/SWe can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
51 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Microsoft 365 Advanced Security 360°: 6-Wk Impl. (datac)q.beyond AGDieses Offering bietet ein Komplettpaket um schnelle Mehrwerte für den Einsatz von Microsoft 365 E5 Security zu generieren
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
53 out of 60
Modern Secure Workplace: 10-days ImplementationAbtis GmbHOne-Stop-Offering: 24/7/365 Managed Security Service für den Mittelstand mit M365 Defender und Microsoft Sentinel.
Zero Trust, Security Monitoring, SIEM/SOC, XDR, Threat Detection, Incident Response.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/SConscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
cyber security threat analysis workshopU-BTech Solutionsthe workshop is design to discover threats and risks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Intune Endpoint Management: 4-Days ImplementationSPIRIT/21 GmbHAssessment of your requirements as well as the preparation and configuration of the Intune instance. This offering includes the support of knowledge transfer.
+2
Applicable to:
Mobile Device Management
Threat Protection
57 out of 60
Secure Multi Cloud environments - 4 Day workshopaConTech GmbHGet a customized threat & vulnerability analysis of your hybrid and multi-cloud environment and learn how to build a more robust cloud security system with Microsoft 365.
+1
Applicable to:
Threat Protection
58 out of 60
Base-IT Managed Service Security & SOCBaseITBase-IT Managed Service Security & SOC bietet Ihnen eine PROAKTIVE und PROFESSIONELLE Betreuung, sehr gerne auf Wunsch Rund-um-die-Uhr. Wir garantieren Ihnen vollumfassenden IT-Security Schutz.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
59 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60