FiltersClear all
Consulting services results
Showing results in consulting services.
Audit de sécurité : 5 joursEconocom Products & Solutions BeluxEvaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 58
Support services for Microsoft 365Senetic S.A.Our offer includes 3 support service packages for Microsoft 365 environment, where we provide support in the correct configuration and implementation of tools.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
2 out of 58
Tenant to Tenant Migration for AAD, EXO and OD4B Services Only: 1-Week ImplementationIT Partner LLCMicrosoft 365 Tenant-to-Tenant Migration Including Azure AD, Exchange Online and OneDrive for Business services and data
+2
Applicable to:
Adoption & Change Management
Cloud Security
3 out of 58
CS Microsoft Copilot 360°: 12-wk implementationCampana & Schott GmbHUtilize Microsoft 365 Copilot and Copilot Studio to boost your productivity with generative AI in your company.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
4 out of 58
Sécurisation des identités - 3-Week ImplementationEXAKIS NELITEAssurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 58
Adoptez Microsoft Edge : 2-Wk ImplementationProjetlysNotre approche pour la mise en place et l'adoption de Microsoft Edge.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
6 out of 58
ModernIdentity: 3-Months ImplementationEconocom Workplace infra InnovationUnifier la gestion des identités et des accès grâce à Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
7 out of 58
Security Operations Center: 1-Months Implementationiteracon GmbHDas ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 58
Data Classification and labelling: 6-Months Impl.Toreon CVBAData classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
9 out of 58
Protection des applications -4-Week ImplementationEXAKIS NELITEUne vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 58
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 58
POC Securité IT : 2 semainesEconocom Products & Solutions BeluxValidation des capacités des solutions de sécurité Microsoft dans votre environnement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 58
BSE_Cybersecurity_Empower_CYRENProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans la sécurisation de votre SI
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 58
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
14 out of 58
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions BeluxImplémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 58
Modern WorkPlace PME:15 days ImplementationAureraMise en place d’un environnement de travail collaboratif à l’état de l’art pour les PME, comprenant une plate-forme digitale et des outils permettant une facilité de gestion et de déploiement.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
16 out of 58
Accompagnement à la mise en œuvre de Microsoft 365 Copilot 1-Week AssessmentEXAKIS NELITE (Test)Un accompagnement sur mesure pour faciliter le déploiement et l’adoption de Microsoft 365 Copilot pour votre entreprise.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
17 out of 58
Smart Services - Security - 12 months ImplementationElgon S.A.Smart Services, mise en place des bonne pratique sécurité pour vos service Microsoft 365 et Azure
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
18 out of 58
FONDATION ZERO TRUST - 2 Days AtelierJCD GROUPEConstruire les fondations du modèle de sécurité « Zero Trust » avec la sécurité des identités
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 58
MODERN MANAGEMENT- 2 Days - AtelierJCD GROUPEGérez et protégez matériels, données et utilisateurs avec Microsoft Endpoint Manager afin d'améliorer le niveau de sécurité global de votre plateforme
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
20 out of 58
Microsoft 365 Copilot Workshop - 2 days WorkshopDEEP by POST Telecom S.A.Microsoft 365 Copilot Workshop is designed to help organizations adopt Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
21 out of 58
CS Role-Based Copilot EnvisioningCampana & Schott GmbHWe help to undersand how sales, customer service, and finance functions benefit by implenting role-based Copilots by identifying high-value scenarios, and developing a roadmap for implementation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
22 out of 58
Microsoft 365 Sécurité : 1-S implémentationEFISENSBénéficiez d’une sécurité complète et protéger votre entreprise contre les menaces avancées en temps réel
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 58
Microsoft 365 - adoption: 6-Weeks ImplementationNeos-SDIAccompagner le changement vers Microsoft 365: Une approche transverse qui adresse les enjeux de gouvernance, de déploiement, d’adoption et de sécurisation des nouveaux usages Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
24 out of 58
Intune & Configuration Manager - Co-Management (5 jours) POCInetum (HO)Inetum accompagne ses clients dans leur transformation digitale et notamment sur la partie Modern Workplace en intégrant les services Cloud Azure et notamment le Co-Management Intune
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
25 out of 58
Microsoft 365 Level Up: 1-Year WorkshopWAKERSPour être toujours au top des dernières nouveautés de votre environnement Microsoft 365 pendant 1 an !
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
26 out of 58
Migration MSG vers Office 365,10J d'implémentationBSDVous souhaitez migrer depuis Lotus Domino/Gmail/Exchange vers Office 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
27 out of 58
Cybersecurity Infrastructure - 1d WorkshopBechtle AGMission afin d’évaluer la sécurité de vos actifs Microsoft et proposer des correctifs pour mieux sécuriser votre environnement.
+1
Applicable to:
Cloud Security
28 out of 58
Frontline Workers : 3 jours - ÉvaluationALFUNDigitalisez vos métiers en fournissant des solutions adaptées à vos équipes sur le terrain !
+3
Applicable to:
Cloud Security
Frontline Workers
Power Platform for Teams
29 out of 58
Audit de Sécurité Microsoft 365: 4-days WorkshopDEEPDEFAudit de sécurité d'un tenant Microsoft 365 avec des licences EMS E3 ou E5 avec plan de remédiation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 58
Protection de l'identité : Implémentation 1 moisROXYSVous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
+2
Applicable to:
Cloud Security
Threat Protection
31 out of 58
Secure Your SaaS/IaaS: 1-Mth Proof of ConceptVorstoneProof of Concept on how you can secure your Saas and/or IaaS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 58
Risk analysis Office 365, Azure: 3-Wk AssessmentVorstoneAssessment to understand the risks exposure and how enhance your security posture
+1
Applicable to:
Cloud Security
33 out of 58
Passwordless: 3-Wk Proof of ConceptVorstoneRemove the use of password on your Information System
+2
Applicable to:
Cloud Security
Identity & Access Management
34 out of 58
Shadow IT: 6-Wk Proof of Concept.VorstoneProof of Concept in order to identify applications not controlled by your IT department
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
35 out of 58
Audit SSI: 1-Wk AssessmentVorstoneAssessment in order to identify the weaknesses of your IaaS/SaaS
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
36 out of 58
Evaluation Outils sécurité Microsoft 365: 5-D AssessmentELIADISEvaluez vos menaces et découvrez les outils sécurité Microsoft 365, à destination des DSI de sociétés de 300 à 5000 users. Découvrez, améliorez votre sécurité, élaborez un plan sécurité avec un expert
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 58
Sécurisation-terminaux- Microsoft 365: 5-D AssessmentELIADISDécouvrir, apprendre, protéger, sécuriser les identités de l'ensemble des terminaux avec Endoint manager. Obtenir des recommandations expertes sur les prochaines étapes de sécurisation des appareils.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 58
Claranet - EDR Managé : 1-Hr Briefing.ClaranetSolution EDR Managé par Claranet : Réunion d’information. Devenir proactif de la sécurité opérationnelle de vos endpoints !
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 58
CLOUD PC - 3 Days - AtelierJCD GROUPEOffrez à vos employés l'accès à une expérience de bureau sécurisée, où qu'ils soient
+2
Applicable to:
Cloud Security
Identity & Access Management
40 out of 58
EverGreen: Weekly meeting for 1 year BriefingASIAccompagner les clients dans la mise en œuvre d’une veille r écurrente autour des technologies Microsoft.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
41 out of 58
Audit sécurité Microsoft 365 : 7 weeks AssessmentASIDans un contexte de recrudescence des risques CYBER, vous souhaitez effectuer un audit de votre tenant Microsoft 365 et disposer d’un plan de remédiation au regard des risques potentiels.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 58
Threat Management – Modern SIEM & xDR : 3 Weeks PiloteMETSYSNotre ambition : un device sécurisé pour nos clients
Résistance aux menaces de type ransomware, solution de xDR avec Microsoft Defender for EndPoint pour les devices iOS/Android/Windows 10/11/Windows
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
43 out of 58
Device management with Intune: 2 Day WorkshopCrayonGestion des appareils et ordinateurs grâce à Microsoft Intune
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
44 out of 58
Microsoft 365 Security - 5-Day ImplementationSCC FRANCEDefine and Deploy all MIcrosoft 365 features
Azure AD Premium, MFA et Accès conditionnel
Defender for Office 365
Microsoft Intune
Defender for Endpoint
Information Protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 58
Azure AD Premium - 5-day - ImplementationSCC FRANCEConfiguration et sécurisation d'un Tenant Azure AD. Mise en place des bonnes pratiques de synchronisation, d'authentification et de sécurisation via Azure AD Premium.
+2
Applicable to:
Cloud Security
Identity & Access Management
46 out of 58
Protect devices : 4 days assessmentSopra Steria France4 days of assessment focused on device / EDR protection.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
47 out of 58
Protect Data : 4 days assessmentSopra Steria France4 days of assessment focused on data protection in Azure & Microsoft 365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
48 out of 58
Microsoft 365: 3-Week Security Configuration DiagnosisAdvensVérifier les paramétrages de sécurité des composants du tenant Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
49 out of 58
Mise en oeuvre Information Protection : 4 semaines ImplémentationArtemysSécuriser vos données à l'aide d'une solution robuste et intégrée permettant de protéger les informations sensibles et confidentielles de l'organisation
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
50 out of 58
Copilot for Microsoft 365 with Confidence - 2 weeks agoMETSYSDéployer Microsoft Copilot for Microsoft 365 pour vos utilisateurs en toute confiance
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
51 out of 58
OCDFR - EMS E5Orange Business Services - OCD FRAdvisory and design, deployement and support about all Microsoft EMS E5 solutions
+2
Applicable to:
Cloud Security
Identity & Access Management
52 out of 58
CS Microsoft 365 Copilot for Security 360° - ImplementationCampana & Schott GmbHUtilize Microsoft 365 Copilot for Security to leverage AI to secure your company.
+1
Applicable to:
Cloud Security
53 out of 58
Data Security Envisioning : 10-W workshopSopra Steria FranceThis workshop helps organizations identify data security risks, understand how to mitigate them, and provide structured recommendations for risk mitigation through a comprehensive process.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
54 out of 58
Service de sécurisation MicrosoftSTELOGYSécurisation et gouvernance des services, et données sur Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
55 out of 58
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
56 out of 58
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
57 out of 58
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
58 out of 58