FiltersClear all
Consulting services results
Showing results in consulting services.
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense GlobalUnderstand your readiness for common security threats.
+1
Applicable to:
Threat Protection
2 out of 60
Cloud Identity Foundation Workshop (5-day)DexMachGet knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
+2
Applicable to:
Identity & Access Management
Threat Protection
3 out of 60
Secure & Compliant Modern Workplace: 2 weeks ImpInsight Technology SolutionsBased on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
4 out of 60
Insight Security Mini Audit: 1 Day WorkshopInsight Technology SolutionsInsight will work with you to evaluate your Microsoft 365 environment to make sure that it is in line with industry security best practices.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
5 out of 60
Microsoft 365 Security Posture 10-days AssessmentFUJITSUSecure Microsoft 365 and maximise your investment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
6 out of 60
Insight Discover Sensitive Data 5 Day WorkshopInsight Technology SolutionsInsight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
+2
Applicable to:
Information Protection & Governance
Threat Protection
7 out of 60
Cybersecurity Awareness: 12 month implementationProdware GroupCybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
8 out of 60
Microsoft 365 Defender: 2-Wk AssessmentAlithya Fullscope Solutions, Inc.Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Protection des périphériques - 4-Week ImplementionEXAKIS NELITEAssurer la sécurisation des périphériques puisqu’ils sont une porte d’entrée du système d’information pour les attaquants.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
10 out of 60
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
11 out of 60
Cyderes Microsoft 365 Incident ResponseCyderesCyderes Digital Forensics and Incident Response (DFIR) services encompass the full security motion and emphasize your ability to respond.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
12 out of 60
Cyderes Microsoft Security Adoption AdvisoryCyderesThe Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
13 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for EndpointCyderesCyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
14 out of 60
Microsoft 365 Security and Compliance ActivationNVISOOur engineering support covers every phase from planning to full implementation, of the different security and compliance solutions included in Microsoft licenses
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
15 out of 60
Audit de sécurité : 5 joursEconocom Products & Solutions BeluxEvaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Sécurisation des identités - 3-Week ImplementationEXAKIS NELITEAssurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Threat Protection 3 Day WorkshopInsight Technology SolutionsInsight's Threat Protection Workshop identifies real-time threats in an organisation’s environment and helps define clear next steps to mitigate risks with Microsoft 365
+1
Applicable to:
Threat Protection
18 out of 60
Security Operations Center: 1-Months Implementationiteracon GmbHDas ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 60
Protection des applications -4-Week ImplementationEXAKIS NELITEUne vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 60
Managed Services: M(x)DR for Microsoft 365 DefenderCegeka NVIntroducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
+2
Applicable to:
Identity & Access Management
Threat Protection
22 out of 60
POC Securité IT : 2 semainesEconocom Products & Solutions BeluxValidation des capacités des solutions de sécurité Microsoft dans votre environnement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
BSE_Cybersecurity_Empower_CYRENProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans la sécurisation de votre SI
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Threat Protection EngagementFUJITSUIdentify and mitigate threats. Strengthen security, prioritize vulnerabilities, and improve your position.
+1
Applicable to:
Threat Protection
25 out of 60
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 60
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions BeluxImplémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Plan stratégique de sécurisation Workshop 1 dayJCD GROUPEConstruire ma réponse aux menaces avec Microsoft 365
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
28 out of 60
Smart Services - Security - 12 months ImplementationElgon S.A.Smart Services, mise en place des bonne pratique sécurité pour vos service Microsoft 365 et Azure
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
29 out of 60
FONDATION ZERO TRUST - 2 Days AtelierJCD GROUPEConstruire les fondations du modèle de sécurité « Zero Trust » avec la sécurité des identités
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Windows 365 Cloud PC: 4-weeks ImplementationDEEP by POST Telecom S.A.Windows 365 Cloud PC - Securely stream your Windows experience
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
31 out of 60
Répondre aux attaques - 3-Week ImplementationEXAKIS NELITECadrer les différentes attaques et risques afin d’en découler des solutions de sécurité et des chantiers.
+1
Applicable to:
Threat Protection
32 out of 60
Microsoft 365 Sécurité : 1-S implémentationEFISENSBénéficiez d’une sécurité complète et protéger votre entreprise contre les menaces avancées en temps réel
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Database Security : 10 days Proof of ConceptELIADELes accès aux données et aux applications de votre entreprise sont-ils sécurisés ?
Protégez vos données, gérez vos équipements mobiles et gagnez en flexibilité !
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
34 out of 60
Microsoft 365 Defender - 2Wk AssessmentMETSYSAudit et recommandations pour la sécurisation de vos environnements collaboratifs avec Microsoft 365 Defender
+2
Applicable to:
Identity & Access Management
Threat Protection
35 out of 60
Microsoft 365 Secure Score: 1-Week AssessmentWAKERSMesurez en 1 semaine le niveau de sécurité de votre environnement Microsoft 365
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
Audit de Sécurité Microsoft 365: 4-days WorkshopDEEPDEFAudit de sécurité d'un tenant Microsoft 365 avec des licences EMS E3 ou E5 avec plan de remédiation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Protection de l'identité : Implémentation 1 moisROXYSVous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
+2
Applicable to:
Cloud Security
Threat Protection
38 out of 60
Secure Your SaaS/IaaS: 1-Mth Proof of ConceptVorstoneProof of Concept on how you can secure your Saas and/or IaaS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Modern Workplace: 6-Wk Proof of ConceptVorstoneProof of Concept on how to improve security by eliminating perimeter barriers, take a proactive approach to security by identifying and eliminating advanced threats before data is compromised
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
40 out of 60
Evaluation Outils sécurité Microsoft 365: 5-D AssessmentELIADISEvaluez vos menaces et découvrez les outils sécurité Microsoft 365, à destination des DSI de sociétés de 300 à 5000 users. Découvrez, améliorez votre sécurité, élaborez un plan sécurité avec un expert
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Sécurisation-terminaux- Microsoft 365: 5-D AssessmentELIADISDécouvrir, apprendre, protéger, sécuriser les identités de l'ensemble des terminaux avec Endoint manager. Obtenir des recommandations expertes sur les prochaines étapes de sécurisation des appareils.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
[Threat Management: 5-Days Assessment]Computacenter PlcCustomer security assessment in regards of Threat management: 5 day offer
+1
Applicable to:
Threat Protection
43 out of 60
Claranet - EDR Managé : 1-Hr Briefing.ClaranetSolution EDR Managé par Claranet : Réunion d’information. Devenir proactif de la sécurité opérationnelle de vos endpoints !
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
44 out of 60
Threat Protection: 3-day AssessmentDEVENSYSProtection contre les menances par le biais d'un assessment de 3 jours autour de Microsoft 365 Defender
+1
Applicable to:
Threat Protection
45 out of 60
Audit sécurité Microsoft 365 : 7 weeks AssessmentASIDans un contexte de recrudescence des risques CYBER, vous souhaitez effectuer un audit de votre tenant Microsoft 365 et disposer d’un plan de remédiation au regard des risques potentiels.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Threat Management – Modern SIEM & xDR : 3 Weeks PiloteMETSYSNotre ambition : un device sécurisé pour nos clients
Résistance aux menaces de type ransomware, solution de xDR avec Microsoft Defender for EndPoint pour les devices iOS/Android/Windows 10/11/Windows
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
47 out of 60
Threat Protection with Microsoft Defender for Endpoint: 5 Week WorkshopAdvensProtéger ses terminaux avec la suite Microsoft 365 Defender
+1
Applicable to:
Threat Protection
48 out of 60
Device management with Intune: 2 Day WorkshopCrayonGestion des appareils et ordinateurs grâce à Microsoft Intune
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
49 out of 60
Microsoft 365 Security - 5-Day ImplementationSCC FRANCEDefine and Deploy all MIcrosoft 365 features
Azure AD Premium, MFA et Accès conditionnel
Defender for Office 365
Microsoft Intune
Defender for Endpoint
Information Protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Microsoft 365 Assisto: 12 mois implémentationArtemysNous vous accompagnons dans l'exploitation, le maintien en condition opérationnel et les évolutions de votre plateforme Microsoft 365
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
51 out of 60
Managed Threat Detection [xdr] for Microsoft 365 DefenderOrange Business Services - OCD FRUn service tout-en-un offrant une gestion des incidents de sécurité, une réponse à distance, une chasse aux menaces dans tous les modules de Microsoft 365 Defender.
+1
Applicable to:
Threat Protection
52 out of 60
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Business Services - OCD FRNotre workshop vous aidera à concevoir et à déployer les technologies de sécurité Microsoft en fonction de vos besoins uniques.
+1
Applicable to:
Threat Protection
53 out of 60
Microsoft 365: 3-Week Security Configuration DiagnosisAdvensVérifier les paramétrages de sécurité des composants du tenant Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
54 out of 60
Devensys Cybersecurity - Engagement - MXDRDEVENSYSDécouverte du service de management de la plateforme XDR Microsoft (MXDR) par le biais d'un engagement de 3 jours
+1
Applicable to:
Threat Protection
55 out of 60
Get prepared for Copilot for Microsoft 365 : 4-Wk Proof of ConceptSopra Steria FranceA pragmatical approach to secure your data in your Microsoft 365 environment that will let you deploy Copilot for Microsoft 365 with confidence.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
56 out of 60
Service de sécurisation MicrosoftSTELOGYSécurisation et gouvernance des services, et données sur Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
57 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
58 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
59 out of 60
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
60 out of 60