FiltersClear all
Consulting services results
Showing results in consulting services.
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
1 out of 27
Microsoft 365 Defender: 10-Day AssessmentVenzo A/SLet VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 27
Innofactor Intune foundation: 2 wk implementationInnofactor NorwayMicrosoft 365 - Intune Foundation is an established framework for basic configuration and acceleration of Microsoft Endpoint Manager MEM based on best practises from Innofactor.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
3 out of 27
Microsoft 365 Security, 2-day WorkshopDigiaDiscover the current state of your Microsoft 365 service security setup, get actionable recommendations on how to improve and a roadmap for further development of your environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 27
Passwordless Starterkit 25 Yubikeys, 4h WorkshopOnevinn ABIntroduction to Passwordless with 25 YubiKeys – get an understanding of what the Passwordless technology is and what you can achieve with Yubikeys
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
5 out of 27
Security 6-hour workshopSulava OyWorkshop enables customers to gain visibility into threats in across cloud environment in order to prioritize and mitigate potential attacks. It helps to understand how Microsoft 365 products can help
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 27
Microsoft 365 Security Hardening: 2-day WorkshopAdvania Finland OyMicrosoft 365 Security Hardening is an assessment workshop for evaluating customer's Microsoft 365 security posture and providing a security plan for improvement
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
7 out of 27
Microsoft 365 Tietoturvapilotti: 2-mo Proof of ConceptAtea Finland OyMicrosoft 365 Security Proof of Concept (POC) where you get Microsoft 365 E5 technology deployed and get a security visibility to your infrastructure including knowledge and how-to sharing with Atea.
+2
Applicable to:
Cloud Security
Threat Protection
8 out of 27
Microsoft 365 Tietoturva-arviointi: 1/2 day AssessmentAtea Finland OyMicrosoft 365 Tietoturva-arviointi, jossa läpikäydään Online Tenanttinne varmistaen sen nykyaikainen konfigurointi sekä suoja-asetukset.
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 27
Tietoevry endpoint security 2h workshopTietoevry The purpose of the endpoint security workshop for Microsoft Defender is to help Customers understand the full potential security benefits within each of the Microsoft Defender solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 27
Microsoft 365 Health Check: One Week assessmentTelia Inmics-Nebula OyThe Microsoft 365 Health check provides the customer with a comprehensive view of the current state of the environment
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
11 out of 27
Cybersecurity Fitness Roadmap: 6-Wk AssessmentHiQ Stockholm ABPlan, create and implement a strategy for improving your organizational Cyber Hygiene using Microsoft Security Technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 27
Microsoft E5 Security Solution Introduction, 2-day WorkshopDigiaDiscover the benefits of Microsoft security solutions for your organization and get actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 27
Telia Cloud Managed Windows Endpoints with AutopilotTelia CompanyRemote or on-site consulting services to build your Windows Autopilot environment
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
14 out of 27
Defend Against Threats with SIEM Plus XDRNetox OyImprove your security posture with a Defend Against Threats with SIEM Plus XDR Workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 27
itm8 SOC Managed XDRitm8 Sverige ABImplementation of itm8 SOC with Microsoft Sentinel
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
16 out of 27
Managed Microsoft 365: Managed ServiceAdvania Finland OyThe Managed Microsoft 365 -service covers management of your Microsoft 365 -environment for you
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
17 out of 27
Elisa Windows 365 POCElisa OyjWindows 365 Cloud PC allows your company to get access to different applications from various locations and it also allows your employees to work productively and securely from anywhere
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
18 out of 27
Managed security servicesSulava OyOffering that protect your organization’s digital assets, mitigates cyber security threats, and enhances your overall security posture using Microsoft Defender extended detection and response
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
19 out of 27
Getting ready for Microsoft 365 Copilot with FellowmindFellowmind Denmark A/SFellowmind’s ‘Getting ready’ for Microsoft 365 Copilot helps organizations prepare for a pilot in a secure and structured manner, laying the foundation for a successful roll-out.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
20 out of 27
Innofactor Copilot Data Readiness Kit, 3-week workshopInnofactor FinlandInnofactor's Copilot Data Readiness Kit ensures secure and efficient use of Microsoft Copilot by mitigating risks and effectively protecting sensitive business information and data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
21 out of 27
Elisa CSI Security Engagements: 3-4 weeks workshopsElisa OyjElisa can offer its customers four different security workshops through Cybersecurity Incentives Program (CSI). In workshops customers learn about the products and get recommendations on next steps.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 27
XDR-Service-Finland: continuous per monthAtea Finland OyThis service offers you Atea’s trusted cybersecurity experts who will proactively help you to develop your complex security environment.
+2
Applicable to:
Cloud Security
Threat Protection
23 out of 27
Data Assessment Workshop PackageAdvania Finland OyAdvania helps realize the added value and security status of existing data sources, and to formulate proposals for leveraging new data sources for organizational benefit.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
24 out of 27
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 27
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 27
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
27 out of 27