FiltersClear all
Consulting services results
Showing results in consulting services.
M365 Security Audit: 1-Wk AuditJoker IT AGNachhaltig das Bewusstsein für die Cloud-Sicherheit verbessern
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 47
Microsoft 365 Security Posture 10-days AssessmentFUJITSUSecure Microsoft 365 and maximise your investment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
2 out of 47
Magenta Security for Microsoft:3 months ImplementationTelekom Deutschland GmbH Main AccountMagenta Security für Microsoft bietet das Management sowie die Integration in und kontinuierliche Analyse Ihrer Microsoft Security durch das SOC der Deutschen Telekom Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 47
Managed Services: M(x)DR for Microsoft 365 DefenderCegeka NVIntroducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
+2
Applicable to:
Identity & Access Management
Threat Protection
4 out of 47
Zero Trust: 4 x 3h Workshopwater IT Security GmbHStay ahead of the cyber threat wave with our Zero Trust workshop – get an overview of your Zero Trust readiness, a compact guide to today’s IT landscape, and define next steps for your organization.
+1
Applicable to:
Threat Protection
5 out of 47
CANCOM Microsoft Defender Lifecycle Services - Monthly recurringCANCOM GmbHDie CANCOM Microsoft Defender Lifecycle Services beinhalten Leistungen zur Unterstützung im Betrieb der Microsoft Defender Lösungen.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 47
Starterpaket Managed Modern Endpoint: 7-wöchige ImplementierungnovaCapta GmbHDen Modern Workplace mit all seinen Vorteilen für die Benutzer:innen auf standardisierte, automatisierte und sichere Weise bereitstellen
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
7 out of 47
CxO Modern Work & Copilot: 1 Tag Briefing | Arvato SystemsArvato SystemsZielkorridor und Rahmen für den wirkungsvollen Einsatz Ihres Modern-Work-Konzeptes festlegen
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Threat Protection
8 out of 47
Modern Work Security: 1 Tag Briefing | Arvato SystemsArvato SystemsKreieren Sie mit dem Microsoft 365 Toolstack den geschützten Arbeitsplatz der Zukunft!
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 47
Microsoft 365 Security and Compliance ActivationNVISOOur engineering support covers every phase from planning to full implementation, of the different security and compliance solutions included in Microsoft licenses
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 47
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
11 out of 47
Net at Work Security Assessment für Microsoft 365Net at Work GmbHMit dem Microsoft 365 Security Assessment ermitteln wir den Security Reifegrades Ihres Unternehmens und geben Ihnen Maßnahmen zur Verbesserung an die Hand.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 47
base-IT PentestingBaseITMit base-IT Pentesting stärken wir Ihre IT-Sicherheit und decken Schwachstellen auf. Durch die Integration von Microsoft 365 (Cloud Security, etc.) entsteht eine umfassende Sicherheitsarchitektur.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 47
Managed Defender for IdentitySITS Deutschland GmbHSwiss IT Security Advanced Threat Management: Intelligenter, mehrstufiger Schutz vor Angriffen On-Premise bzw. in der Cloud
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
14 out of 47
Microsoft Security Copilot: 2 x 3h WorkshopSkaylink GmbHUnlocking Security Excellence with Microsoft Security Copilot - 2 x 3h Workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 47
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense GlobalLearn how to put next-generation Microsoft Security tools to work for you
+1
Applicable to:
Threat Protection
16 out of 47
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense GlobalUnderstand your readiness for common security threats.
+1
Applicable to:
Threat Protection
17 out of 47
Microsoft 365 Security Assessment (Basic): Security and Configuration ReviewInfoGuard AGThe existing configuration of the Microsoft Tenants (Microsoft 365) is assessed according to best practice guidelines and typical security weaknesses.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
18 out of 47
Microsoft Defender for Office 365 security assessment: 1-Day AssessmentIntellity GmbHIntellity assesses current Microsoft Defender for Office 365 settings, securing organizations against email threats by implementing best practices and innovative protection methods
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
19 out of 47
InfoGuard Hardening ServiceInfoGuard AGHardening is an important aspect to increasing a company's cyber resilience. We offer hardening modules to address specific areas (Endpoint, Active Directory, and Cloud) as individual building blocks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
20 out of 47
Modern Security Operationsfernao somnitec AGOptimaler Schutz durch Erkennen und Reagieren auf Sicherheitsvorfälle, Entlastung Ihres IT-Teams und aufschlussreiche Insights zur IT-Sicherheitslage.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 47
ITVT Modern Work Copilot ReadinesscheckITVTIdentifying the Opportunity for Customers within Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
22 out of 47
Microsoft 365 Tenant security assessmentIntellity GmbHThe Microsoft 365 Tenant Security Assessment identifies vulnerabilities, optimizes configurations, and ensures compliance with industry standards
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
23 out of 47
adesso Managed Security Serviceadesso SEOptimierung der Sicherheitslandschaft durch Microsoft Managed Services
+2
Applicable to:
Cloud Security
Threat Protection
24 out of 47
Data Security & Threat Protection WorkshopITVTIdentify data security risks in your organizational data & discover vulnerabilities in your environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 47
Zero Trust Foundation Implementierungq.beyond AGDas Ziel der Zero Trust Foundation ist es, alle Zugriffe unabhängig von der Herkunft sorgfältig zu überprüfen, um die Sicherheit von Unternehmensressourcen umfassend zu gewährleisten.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 47
Advanced Endpoint Management Implementierungq.beyond AGDas Ziel ist es, alle Endgeräte im Unternehmen sicher zu verwalten, Bedrohungen abzuwehren und eine einheitliche Kontrolle über Computer und mobile Geräte zu gewährleisten.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
27 out of 47
AI Security Workshopq.beyond AGErfahren Sie, wie KI neue Bedrohungen birgt und wie Zero Trust Strategien Ihre Sicherheit erhöhen, mit Fokus auf Social Engineering, Risikomanagement und Präventionsmaßnahmen
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 47
Microsoft Threat Protection Engagement – Risiken sichtbar machen, Angriffe verhindernPHAT CONSULTING GmbHErkennen und beheben Sie Bedrohungen und Schwachstellen mit Microsoft Defender & Sentinel.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 47
Microsoft 365 Tenant Review – Datenschutz & Sicherheit im FokusPHAT CONSULTING GmbHIdentifizieren und bewerten Sie Schwachstellen in Ihrer Microsoft 365 Umgebung – mit klarem Fokus auf Datenschutz, Zugriffskontrolle und Compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 47
Data Leak DetectionAwara IT Kazakhstan LLPRapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Threat Protection
31 out of 47
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
32 out of 47
SVA SharePoint Health CheckSVA System Vertrieb Alexander GmbHDer SharePoint Health Check analysiert den Zustand und die Performance einer SharePoint-Umgebung, identifiziert Schwachstellen und zeigt Optimierungspotenziale auf
+3
Applicable to:
Insider Risk
Knowledge & Insights
Threat Protection
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 47
Cloud Endpoint Security Implementationq.beyond AGZu den Zielen von Cloud Endpoint Security gehören der Schutz sensibler Daten, die Einhaltung von Sicherheitsvorschriften und die Wahrung der Integrität von Cloud-Umgebungen.
+2
Applicable to:
Identity & Access Management
Threat Protection
35 out of 47
Teams Basicq.beyond AGDer Zweck von Teams Basic ist es, die Zusammenarbeit und Kommunikation innerhalb von Organisationen zu verbessern. Es bietet grundlegende Funktionen wie Chat, Videokonferenzen und Dateifreigabe.
+3
Applicable to:
Adoption & Change Management
Teamwork Deployment
Threat Protection
36 out of 47
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 47
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
38 out of 47
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
39 out of 47
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
40 out of 47
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
41 out of 47
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
42 out of 47
Accelerate your Microsoft 365 Copilot adoptionColumbus GlobalThe Microsoft 365 Copilot Jumpstart Program is designed for business and IT leaders who want to move beyond experimentation and unlock real productivity gains from AI.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Threat Protection
43 out of 47
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 47
Threat Protection Envisioning Workshop: Stop Advanced Threats Across Microsoft 365evoila GmbH🛡️ Discover real threats targeting your organization. 2-week Threat Protection workshop with threat analysis, Defender XDR guidance, remediation recommendations
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
45 out of 47
Data Security Envisioning Workshop: Identify Risks in Your Organizational Dataevoila GmbH🔍 Uncover data security risks in Microsoft 365. 2-week automated Data Security Check with findings, Purview roadmap, and hands-on recommendations. Expert analysis. No guesswork.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
46 out of 47
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
47 out of 47