FiltersClear all
Professional Services results
Showing results in professional services.
SecWise Assess for Workplace: 5-Day Security AssessmentSecWiseAn assessment of your modern workplace set-up to make sure it matches cyber security standards and best-practices.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 36
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 36
Zero Trust: 4 x 3h Workshopwater IT Security GmbHStay ahead of the cyber threat wave with our Zero Trust workshop – get an overview of your Zero Trust readiness, a compact guide to today’s IT landscape, and define next steps for your organization.
+1
Applicable to:
Threat Protection
3 out of 36
BSE_Cybersecurity_Empower_CYRENProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans la sécurisation de votre SI
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 36
Managed Services: M(x)DR for Microsoft 365 DefenderCegeka NVIntroducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
+2
Applicable to:
Identity & Access Management
Threat Protection
5 out of 36
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
6 out of 36
Microsoft 365 Tenant Review – Datenschutz & Sicherheit im FokusPHAT CONSULTING GmbHIdentifizieren und bewerten Sie Schwachstellen in Ihrer Microsoft 365 Umgebung – mit klarem Fokus auf Datenschutz, Zugriffskontrolle und Compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 36
Security Operations Center: 1-Months Implementationiteracon GmbHDas ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 36
SecWise Protect (XDR): Microsoft 365 Defender ActivationSecWiseIdentify your Microsoft Threat Protection jump-start configuration based on our security maturity predefined Microsoft 365 Defender best-practice configurations.
+1
Applicable to:
Threat Protection
9 out of 36
Plan stratégique de sécurisation Workshop 1 dayJCD GROUPEConstruire ma réponse aux menaces avec Microsoft 365
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 36
Threat Protection - 4 Week Security ImplementationOBVUSAccelerate your implementation of Threat Protection with the Microsoft 365 Security Accelerator onboarding Services that are designed to get you up and running fast to maximize your investment.
+1
Applicable to:
Threat Protection
11 out of 36
Microsoft 365 Security Scan: 3d AssessmentOrdinaThe result of the multi-day assessment will be a risk-based advise focusing on recommendations and a roadmap to increase the security posture of your Modern Workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 36
Defend against threats with SIEM plus XDR Workshop including FastTrack guidanceXylosOur 3-day Security workshop is meant to get an overview of the Security landscape, we use the Microsoft 365 security products and features to gain visibility into threats to your Microsoft 365.
+2
Applicable to:
Cloud Security
Threat Protection
13 out of 36
Managed service : EDR with Defender for EndpointCegeka NVOur EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
14 out of 36
Secure Remote Work 365: 1-Wo. ImplementierungArvato SystemsUnlock the potential of your workplace by Arvato Systems. Azure Virtual Desktop als Managed Service mit Full Service Management nach definierten SLAs
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
15 out of 36
Defend against threats with SIEM + XDR Expert-as-a-service 1 y, Mgd svcXylosXylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your Threat Protection environment based on Microsoft 365 technology.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
16 out of 36
Secure Identities and Access Assessment, 3 daysXylosOur Identity Security Assessment is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 36
Protection de l'identité : Implémentation 1 moisROXYSVous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
+2
Applicable to:
Cloud Security
Threat Protection
18 out of 36
Workplace Security Maturity: 6-day assessmentResilient SecurityWorkplace security maturity assessment to get the most out of your Microsoft 365 security platform
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
19 out of 36
FONDATION ZERO TRUST - 2 Days AtelierJCD GROUPEConstruire les fondations du modèle de sécurité « Zero Trust » avec la sécurité des identités
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 36
Smart Services - Security - 12 months ImplementationElgon S.A.Smart Services, mise en place des bonne pratique sécurité pour vos service Microsoft 365 et Azure
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
21 out of 36
Microsoft 365 security: 3 days assessmentOrlox3 day security assessment of the current Microsoft 365 environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 36
Windows 365 Cloud PC: 4-weeks ImplementationDEEP by POST Telecom S.A.Windows 365 Cloud PC - Securely stream your Windows experience
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
23 out of 36
Audit de sécurité : 5 joursEconocom Products & Solutions BeluxEvaluation complète des syst èmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 36
Zero Trust Foundation Implementierungq.beyond AGDas Ziel der Zero Trust Foundation ist es, alle Zugriffe unabhängig von der Herkunft sorgfältig zu überprüfen, um die Sicherheit von Unternehmensressourcen umfassend zu gewährleisten.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 36
Advanced Endpoint Management Implementierungq.beyond AGDas Ziel ist es, alle Endgeräte im Unternehmen sicher zu verwalten, Bedrohungen abzuwehren und eine einheitliche Kontrolle über Computer und mobile Geräte zu gewährleisten.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
26 out of 36
AI Security Workshopq.beyond AGErfahren Sie, wie KI neue Bedrohungen birgt und wie Zero Trust Strategien Ihre Sicherheit erhöhen, mit Fokus auf Social Engineering, Risikomanagement und Präventionsmaßnahmen
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
27 out of 36
Microsoft Threat Protection Engagement – Risiken sichtbar machen, Angriffe verhindernPHAT CONSULTING GmbHErkennen und beheben Sie Bedrohungen und Schwachstellen mit Microsoft Defender & Sentinel.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 36
Teams Basicq.beyond AGDer Zweck von Teams Basic ist es, die Zusammenarbeit und Kommunikation innerhalb von Organisationen zu verbessern. Es bietet grundlegende Funktionen wie Chat, Videokonferenzen und Dateifreigabe.
+3
Applicable to:
Adoption & Change Management
Teamwork Deployment
Threat Protection
29 out of 36
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
30 out of 36
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
31 out of 36
Threat Protection Envisioning Workshop: Stop Advanced Threats Across Microsoft 365evoila GmbH🛡️ Discover real threats targeting your organization. 2-week Threat Protection workshop with threat analysis, Defender XDR guidance, remediation recommendations
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
32 out of 36
Data Security Envisioning Workshop: Identify Risks in Your Organizational Dataevoila GmbH🔍 Uncover data security risks in Microsoft 365. 2-week automated Data Security Check with findings, Purview roadmap, and hands-on recommendations. Expert analysis. No guesswork.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
33 out of 36
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
34 out of 36
Microsoft 365 Copilot Security Readiness AssessmentCWSISecure Microsoft 365 Copilot Adoption - making Copilot adoption safe, scalable and trusted
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
35 out of 36
Microsoft 365 Copilot Readiness assessment - 5 days - assessmentInetum BelgiumDuring this assessment, we will check whether your environment is technically ready for Microsoft 365 Copilot. We will focus on infrastructure, licenses, and your data.
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Threat Protection
36 out of 36