FiltersClear all
Consulting services results
Showing results in consulting services.
Microsoft 365 Security Posture 10-days AssessmentFUJITSUSecure Microsoft 365 and maximise your investment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
1 out of 28
Insight Discover Sensitive Data 5 Day WorkshopInsight Technology SolutionsInsight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
+2
Applicable to:
Information Protection & Governance
Threat Protection
2 out of 28
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
3 out of 28
DNV Cyber Extended Detection and Response (XDR) for MicrosoftNixu OyjXDR service including 24/7 Security Operations Center (SOC) powered with Defender XDR and Sentinel
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 28
Microsoft 365 Security: 1-Wk AssessmentInnofactor NorwayInnofactor’s Microsoft 365 Security assessment secures organizations business operation by providing insights and recommendations to help minimizing security risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 28
Microsoft 365 Security and Compliance ActivationNVISOOur engineering support covers every phase from planning to full implementation, of the different security and compliance solutions included in Microsoft licenses
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 28
Secure Collaboration 5 Wks implementationInnofactor NorwayEnterprises with significant number of employees and digital estates need best practice collaboration and security. Innofactor Secure Collaboration delivers that as code.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
7 out of 28
Innofactor Security AssessmentInnofactor FinlandGain additional visibility to your security posture - Innofactor security assessment is a one-day technical review conducted by our experienced cybersecurity team member.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 28
Threat Protection 3 Day WorkshopInsight Technology SolutionsInsight's Threat Protection Workshop identifies real-time threats in an organisation’s environment and helps define clear next steps to mitigate risks with Microsoft 365
+1
Applicable to:
Threat Protection
9 out of 28
SecWise Assess for Workplace: 5-Day Security AssessmentSecWiseAn assessment of your modern workplace set-up to make sure it matches cyber security standards and best-practices.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 28
Continuous Improvement Services for Microsoft 365SCIBERSciber’s Continuous Improvement service keeps your Microsoft 365 environment aligned with updates and best practices, turning changes into tailored insights that maximize your investment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 28
Microsoft 365 Defender: 10-Day AssessmentVenzo A/SLet VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 28
SecWise Protect (XDR): Microsoft 365 Defender ActivationSecWiseIdentify your Microsoft Threat Protection jump-start configuration based on our security maturity predefined Microsoft 365 Defender best-practice configurations.
+1
Applicable to:
Threat Protection
13 out of 28
Azure MFA 4-hour workshopDanoffice IT ApS4 hour workshop focussing on Azure Multi-Factor Authentication (MFA) and Conditonal Access
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 28
Continuous Security Improvement: 2-mth POCGlobeteamGlobeteams Continous Security Improvement is delivered in co-operation with the customer. This means that the customer will have an active role in operation and increase their skillset over time
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
15 out of 28
Cybersecurity Fitness Roadmap: 6-Wk AssessmentHiQ Stockholm ABPlan, create and implement a strategy for improving your organizational Cyber Hygiene using Microsoft Security Technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 28
Managed Detection and Response;2-Wk ImplementationDustin ABWith Managed Detection and Response we implement Microsoft 365 E5 security features with focus on Defender for Endpoint and preform threat surveillance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 28
Mail Security ManagementJDM A/SMail Security Management er en service til din Microsoft 365, der sikrer dig en velfungerende mailløsning er både er sikker og troværdig
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
18 out of 28
Managed Threat Detection [xdr] for Microsoft 365 Defender: 4 weeks implementationOrange Cyberdefense Denmark (SecureLink Denmark A/S)Implementation of Microsoft Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
19 out of 28
Managed Workspace Protection for Microsoft 365 Defender: 4 weeks implementationOrange Cyberdefense Denmark (SecureLink Denmark A/S)Implementation of Microsoft Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
20 out of 28
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Cyberdefense Denmark (SecureLink Denmark A/S)Our workshop will help you designing and deploying Microsoft security technologies for your unique needs.
+1
Applicable to:
Threat Protection
21 out of 28
Devoteam M Cloud - Microsoft Defender 365 - 2 months implementationCloudeon A/SProtect your cloud estate - we enable and tune your Microsoft XDR solution (Microsoft Defender suite) according to your needs.
+2
Applicable to:
Cloud Security
Threat Protection
22 out of 28
itm8 SOC Managed XDRitm8 Sverige ABImplementation of itm8 SOC with Microsoft Sentinel
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 28
itm8 Managed Detection and Responseitm8 Sverige ABImplementation of itm8 Managed Detection and Response based on Defender for Business
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
24 out of 28
itm8 Cloud Driven Workplaceitm8 Sverige ABImplementation and management of Microsoft Intune and Defender for Endpoint.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
25 out of 28
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 28
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
27 out of 28
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
28 out of 28