FiltersClear all
Consulting services results
Showing results in consulting services.
Microsoft 365 Security Posture 10-days AssessmentFUJITSUSecure Microsoft 365 and maximise your investment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
1 out of 28
Insight Discover Sensitive Data 5 Day WorkshopInsight Technology SolutionsInsight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
+2
Applicable to:
Information Protection & Governance
Threat Protection
2 out of 28
DNV Cyber Extended Detection and Response (XDR) for MicrosoftNixu OyjXDR service including 24/7 Security Operations Center (SOC) powered with Defender XDR and Sentinel
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 28
Microsoft 365 Security: 1-Wk AssessmentInnofactor NorwayInnofactor’s Microsoft 365 Security assessment secures organizations business operation by providing insights and recommendations to help minimizing security risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
4 out of 28
Secure Collaboration 5 Wks implementationInnofactor NorwayEnterprises with significant number of employees and digital estates need best practice collaboration and security. Innofactor Secure Collaboration delivers that as code.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 28
Innofactor Security AssessmentInnofactor FinlandGain additional visibility to your security posture - Innofactor security assessment is a one-day technical review conducted by our experienced cybersecurity team member.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
6 out of 28
Threat Protection 3 Day WorkshopInsight Technology SolutionsInsight's Threat Protection Workshop identifies real-time threats in an organisation’s environment and helps define clear next steps to mitigate risks with Microsoft 365
+1
Applicable to:
Threat Protection
7 out of 28
SecWise Assess for Workplace: 5-Day Security AssessmentSecWiseAn assessment of your modern workplace set-up to make sure it matches cyber security standards and best-practices.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
8 out of 28
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 28
Threat Protection EngagementFUJITSUIdentify and mitigate threats. Strengthen security, prioritize vulnerabilities, and improve your position.
+1
Applicable to:
Threat Protection
10 out of 28
Microsoft 365 Defender: 10-Day AssessmentVenzo A/SLet VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 28
Security 6-hour workshopSulava OyWorkshop enables customers to gain visibility into threats in across cloud environment in order to prioritize and mitigate potential attacks. It helps to understand how Microsoft 365 products can help
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 28
SecWise Protect (XDR): Microsoft 365 Defender ActivationSecWiseIdentify your Microsoft Threat Protection jump-start configuration based on our security maturity predefined Microsoft 365 Defender best-practice configurations.
+1
Applicable to:
Threat Protection
13 out of 28
Microsoft 365 Security, 2-day WorkshopDigiaDiscover the current state of your Microsoft 365 service security setup, get actionable recommendations on how to improve and a roadmap for further development of your environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 28
Microsoft 365 Tietoturvapilotti: 2-mo Proof of ConceptAtea Finland OyMicrosoft 365 Security Proof of Concept (POC) where you get Microsoft 365 E5 technology deployed and get a security visibility to your infrastructure including knowledge and how-to sharing with Atea.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 28
Microsoft 365 Tietoturva-arviointi: 1/2 day AssessmentAtea Finland OyMicrosoft 365 Tietoturva-arviointi, jossa läpikäydään Online Tenanttinne varmistaen sen nykyaikainen konfigurointi sekä suoja-asetukset.
+2
Applicable to:
Cloud Security
Threat Protection
16 out of 28
Tietoevry endpoint security 2h workshopTietoevry The purpose of the endpoint security workshop for Microsoft Defender is to help Customers understand the full potential security benefits within each of the Microsoft Defender solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 28
Cybersecurity Fitness Roadmap: 6-Wk AssessmentHiQ Stockholm ABPlan, create and implement a strategy for improving your organizational Cyber Hygiene using Microsoft Security Technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 28
Microsoft E5 Security Solution Introduction, 2-day WorkshopDigiaDiscover the benefits of Microsoft security solutions for your organization and get actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 28
Defend Against Threats with SIEM Plus XDRNetox OyImprove your security posture with a Defend Against Threats with SIEM Plus XDR Workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 28
itm8 SOC Managed XDRitm8 Sverige ABImplementation of itm8 SOC with Microsoft Sentinel
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 28
Managed Microsoft 365: Managed ServiceAdvania Finland OyThe Managed Microsoft 365 -service covers management of your Microsoft 365 -environment for you
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
22 out of 28
Elisa CSI Security Engagements: 3-4 weeks workshopsElisa OyjElisa can offer its customers four different security workshops through Cybersecurity Incentives Program (CSI). In workshops customers learn about the products and get recommendations on next steps.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 28
XDR-Service-Finland: continuous per monthAtea Finland OyThis service offers you Atea’s trusted cybersecurity experts who will proactively help you to develop your complex security environment.
+2
Applicable to:
Cloud Security
Threat Protection
24 out of 28
itm8 Cloud Driven Workplaceitm8 Sverige ABImplementation and management of Microsoft Intune and Defender for Endpoint.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
25 out of 28
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 28
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
27 out of 28
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
28 out of 28