FiltersClear all
Professional Services results
Showing results in professional services.
Cybersecurity Awareness: 12 month implementationProdware GroupCybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
1 out of 56
Insight Discover Sensitive Data 5 Day WorkshopInsight Technology SolutionsInsight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
+2
Applicable to:
Information Protection & Governance
Threat Protection
2 out of 56
Microsoft 365 Security and Compliance ActivationNVISOOur engineering support covers every phase from planning to full implementation, of the different security and compliance solutions included in Microsoft licenses
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
3 out of 56
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
4 out of 56
Secure Microsoft 365 Managed ServiceCWSICWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 56
ITVT Modern Work Copilot ReadinesscheckITVTIdentifying the Opportunity for Customers within Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
6 out of 56
Managed Services: M(x)DR for Microsoft 365 DefenderCegeka NVIntroducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
+2
Applicable to:
Identity & Access Management
Threat Protection
7 out of 56
SVA Microsoft Copilot for Security Readiness Workshop 1dSVA System Vertrieb Alexander GmbHIn zwei Sitzungen zu jeweils vier Stunden geben wir Ihnen eine umfassende Einführung in Copilot for Security.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
8 out of 56
SecWise Assess for Workplace: 5-Day Security AssessmentSecWiseAn assessment of your modern workplace set-up to make sure it matches cyber security standards and best-practices.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
9 out of 56
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 56
Security Operations Center: 1-Months Implementationiteracon GmbHDas ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
11 out of 56
Security Operation ServicesBarikat Internet guvenligi bilisim tic . A.s.Expertly manage Microsoft 365 and Azure security features. Ensure periodic monitoring, reporting, and maximize benefits. Trust us for seamless operation; focus on your core business
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 56
Threat Protection EngagementFUJITSUIdentify and mitigate threats. Strengthen security, prioritize vulnerabilities, and improve your position.
+1
Applicable to:
Threat Protection
13 out of 56
SecWise Protect (XDR): Microsoft 365 Defender ActivationSecWiseIdentify your Microsoft Threat Protection jump-start configuration based on our security maturity predefined Microsoft 365 Defender best-practice configurations.
+1
Applicable to:
Threat Protection
14 out of 56
Threat Protection - 4 Week Security ImplementationOBVUSAccelerate your implementation of Threat Protection with the Microsoft 365 Security Accelerator onboarding Services that are designed to get you up and running fast to maximize your investment.
+1
Applicable to:
Threat Protection
15 out of 56
Microsoft 365 Security Scan: 3d AssessmentOrdinaThe result of the multi-day assessment will be a risk-based advise focusing on recommendations and a roadmap to increase the security posture of your Modern Workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 56
Managed service : EDR with Defender for EndpointCegeka NVOur EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
17 out of 56
Secure Remote Work 365: 1-Wo. ImplementierungArvato SystemsUnlock the potential of your workplace by Arvato Systems. Azure Virtual Desktop als Managed Service mit Full Service Management nach definierten SLAs
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
18 out of 56
Defend against threats with SIEM + XDR Expert-as-a-service 1 y, Mgd svcXylosXylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your Threat Protection environment based on Microsoft 365 technology.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
19 out of 56
Secure Identities and Access Assessment, 3 daysXylosOur Identity Security Assessment is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 56
Data Classification: 13-Day ImplementationInSpark BVMicrosoft Information Protection is the solution in Microsoft 365 to classify organizational data and, if necessary, encrypt data at the document level, so that only authorized people can access data.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
21 out of 56
Data Classification: 5-Day ImplementationInSpark BVMicrosoft Information Protection is the solution in Microsoft 365 to classify organizational data and, if necessary, encrypt data at the document level, so that only authorized people can access data.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
22 out of 56
Data Classification: 7-Day ImplementationInSpark BVMicrosoft Information Protection is the solution in Microsoft 365 to classify organizational data and, if necessary, encrypt data at the document level, so that only authorized people can access data.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
23 out of 56
Defend against threats with SIEM plus XDR Workshop including FastTrack guidanceXylosOur 3-day Security workshop is meant to get an overview of the Security landscape, we use the Microsoft 365 security products and features to gain visibility into threats to your Microsoft 365.
+2
Applicable to:
Cloud Security
Threat Protection
24 out of 56
Cloud Security Assessment in 3 daysSCCTCloud Security Assessment in 3 days. Door middel van dit assessment wordt inzicht verschaft over de huidige security staat van uw Microsoft 365 omgeving.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 56
Data Classification: 10-Day ImplementationInSpark BVMicrosoft Information Protection is the solution in Microsoft 365 to classify organizational data and, if necessary, encrypt data at the document level, so that only authorized people have access.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
26 out of 56
Workplace Security Maturity: 6-day assessmentResilient SecurityWorkplace security maturity assessment to get the most out of your Microsoft 365 security platform
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
27 out of 56
[Threat Management: 5-Days Assessment]Computacenter PlcCustomer security assessment in regards of Threat management: 5 day offer
+1
Applicable to:
Threat Protection
28 out of 56
Microsoft 365 Security Assessment: 6-day AssessmentPerformantaPerformanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 56
Microsoft 365 security: 3 days assessmentOrlox3 day security assessment of the current Microsoft 365 environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 56
Security Basics: 4-Days Implementation2source4 B.V.Organisaties voorzien van een goede basis security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 56
Microsoft Defender for Endpoint: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Endpoint and deploy it to a group of devices.
+2
Applicable to:
Cloud Security
Threat Protection
32 out of 56
Microsoft Defender for Office 365: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deploy it to a group of users.
+2
Applicable to:
Cloud Security
Threat Protection
33 out of 56
Microsoft Defender for Identity: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deployment of identity sensors.
+2
Applicable to:
Cloud Security
Threat Protection
34 out of 56
Microsoft Defender for Cloud Apps: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Cloud Apps and discover Cloud Apps
+2
Applicable to:
Cloud Security
Threat Protection
35 out of 56
Managed Workspace Protection for Microsoft 365 Defender: 4 weeks implementationOrange Cyber Defense NL BVImplementation of Microsoft 365 Defender for optimizing threat protection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
36 out of 56
Managed Threat Detection [xdr] for Microsoft Sentinel: 4 weeks ImplementationOrange Cyber Defense NL BVImplementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
37 out of 56
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Cyber Defense NL BVOur workshop will help you designing and deploying Microsoft security technologies for your unique needs.
+1
Applicable to:
Threat Protection
38 out of 56
Managed Microsoft Sentinel and Extended Detection and Response (XDR) implementation with CentricCentric Netherlands b.v.The SOC team's goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 56
DNV Cyber Extended Detection and Response (XDR) for MicrosoftNixu OyjXDR service including 24/7 Security Operations Center (SOC) powered with Defender XDR and Sentinel
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 56
DTX | MDR-SOC for Microsoft DefenderDTXExpand and Establish your SMB's digital assets with Managed Defender, a specialized MDR-SOC service by Dutch Technology eXperts. Designed specifically for small-to-medium businesses (SMB's).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 56
Managed Microsoft Defender XDRPROXIMUS NV/SAProximus NXT Orbit Managed XDR service manages the alerts generated by Microsoft Defender. Our Security Operations Center (SOC) analyses and responds to these alerts 24/7 in Brussels, Belgium.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 56
Microsoft Threat Protection EngagementRawWorksLeer snel met de nieuwste Microsoft technologieën om te gaan zoals Defender, Purview en Sentinel
+1
Applicable to:
Threat Protection
43 out of 56
yellowSECUREyellow arrowThrough powerful 24/7 monitoring of the Microsoft 365 environment, its solutions, and the information contained within, we detect (potential) threats and, when necessary, isolate them.
+2
Applicable to:
Cloud Security
Threat Protection
44 out of 56
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
45 out of 56
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
46 out of 56
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
47 out of 56
TSG Security Risk AssessmentTechnology Service Group LtdOur Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
48 out of 56
Intune Implementation ServiceTHREATSCAPE SECURITY SOLUTIONS LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Intune in alignment with Zero Trust principles, security best practice, and business productivity goals.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
49 out of 56
Intune Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
50 out of 56
Accelerate your Microsoft 365 Copilot adoptionColumbus GlobalThe Microsoft 365 Copilot Jumpstart Program is designed for business and IT leaders who want to move beyond experimentation and unlock real productivity gains from AI.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Threat Protection
51 out of 56
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 56
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
53 out of 56
Microsoft 365 Copilot Security Readiness AssessmentCWSISecure Microsoft 365 Copilot Adoption - making Copilot adoption safe, scalable and trusted
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
54 out of 56
Microsoft 365 Copilot Readiness assessment - 5 days - assessmentInetum BelgiumDuring this assessment, we will check whether your environment is technically ready for Microsoft 365 Copilot. We will focus on infrastructure, licenses, and your data.
+3
Applicable to:
Device Deployment & Management
Information Protection & Governance
Threat Protection
55 out of 56
Orbid - GSOC Managed ServicesORBID NVWe correlate signals at scale, combine analyst expertise with automation, and contain threats fast so your business can move with confidence.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 56