FiltersClear all
Consulting services results
Showing results in consulting services.
Data Classification and labelling: 6-Months Impl.Toreon CVBAData classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
1 out of 43
Security Operations Center: 1-Months Implementationiteracon GmbHDas ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 43
Managed Microsoft Sentinel and Extended Detection and Response (XDR) implementation with CentricCentric Netherlands b.v.The SOC team's goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 43
Microsoft Defender for Endpoint: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Endpoint and deploy it to a group of devices.
+2
Applicable to:
Cloud Security
Threat Protection
4 out of 43
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
5 out of 43
SVA Microsoft Copilot for Security Readiness Workshop 1dSVA System Vertrieb Alexander GmbHIn zwei Sitzungen zu jeweils vier Stunden geben wir Ihnen eine umfassende Einführung in Copilot for Security.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
6 out of 43
Security Operation ServicesBarikat Internet guvenligi bilisim tic . A.s.Expertly manage Microsoft 365 and Azure security features. Ensure periodic monitoring, reporting, and maximize benefits. Trust us for seamless operation; focus on your core business
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 43
Managed service : EDR with Defender for EndpointCegeka NVOur EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
8 out of 43
Security Assessment2source4 B.V.Volledig Microsoft 365 Security Assessment waarbij pijnpunten in de beveiliging worden blootgelegd en adviezen worden opgesteld om pijnpunten af te dekken.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
9 out of 43
Microsoft 365 Copilot Workshop - 2 days WorkshopDEEP by POST Telecom S.A.Microsoft 365 Copilot Workshop is designed to help organizations adopt Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
10 out of 43
Secure Identities and Access Assessment, 3 daysXylosOur Identity Security Assessment is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 43
Microsoft 365 secure landing zone: 2Wk-impl.Rubicon B.V.Microsoft 365 secure landing zone compliant met CIS AVG ISO 27001 en BIO
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
12 out of 43
Microsoft 365 Security Baseline: 3-WK AssessmentMotion10A three-week assessment to create a baseline for protecting (sensitive) information, identities and devices.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
13 out of 43
5 day security (CIS controls) AssessmentUnica ICT solutionsKrijg inzicht en grip op de security van jouw organisatie middels een benchmark (nul meting) op basis van het markt gerenommeerde framework CIS Controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
14 out of 43
Microsoft 365 security baseline: 2Wk assessmentRubicon B.V.De Security Baseline Audit bevat de noodzakelijke controls (ruim 200) t.b.v. Azure & Office 365, o.a. op het gebied van Identity & Access management , inclusief de PaaS en IaaS diensten van Azure.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
15 out of 43
Security: 1-day assessmentLemontree B.V.Microsoft Azure and Microsoft 365 security Assessment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
16 out of 43
Microsoft 365 Security Scan: 3d AssessmentOrdinaThe result of the multi-day assessment will be a risk-based advise focusing on recommendations and a roadmap to increase the security posture of your Modern Workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 43
Defend against threats with SIEM plus XDR Workshop including FastTrack guidanceXylosOur 3-day Security workshop is meant to get an overview of the Security landscape, we use the Microsoft 365 security products and features to gain visibility into threats to your Microsoft 365.
+2
Applicable to:
Cloud Security
Threat Protection
18 out of 43
Cloud Security Assessment in 3 daysSCCTCloud Security Assessment in 3 days. Door middel van dit assessment wordt inzicht verschaft over de huidige security staat van uw Microsoft 365 omgeving.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 43
NextGen Windows Experiences Expert-as-a-service, 1y Mgd ServiceXylosXylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your modern endpoint management.
+2
Applicable to:
Cloud Security
Device Deployment & Management
20 out of 43
Secure Identities and Access Expert-as-a-service, 1 y, Mgd serviceXylosXylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your cloud or hybrid Identity environment based on Microsoft 365 technology.
+2
Applicable to:
Cloud Security
Identity & Access Management
21 out of 43
Microsoft 365 security: 3 days assessmentOrlox3 day security assessment of the current Microsoft 365 environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 43
Security Basics: 4-Days Implementation2source4 B.V.Organisaties voorzien van een goede basis security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 43
Microsoft Defender for Office 365: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deploy it to a group of users.
+2
Applicable to:
Cloud Security
Threat Protection
24 out of 43
Microsoft Defender for Identity: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deployment of identity sensors.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 43
Microsoft Defender for Cloud Apps: 4 days implementationCentric Netherlands b.v.Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Cloud Apps and discover Cloud Apps
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 43
Microsoft 365 Security assessment ook gericht op NIS 2.0RawWorksEen baseline check op de bestaande Microsoft 365 inrichting en daaraan gekoppeld Azure Active Directory met ook toetsing naar NIS 2.0
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
27 out of 43
Veiligheidsregio Security Assessment Microsoft 365RawWorksHoe secure is jouw Microsoft 365 omgeving ingericht? Wij zorgen voor het juiste inzicht
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
28 out of 43
Waterschap Cloud Landing ZoneRawWorksWaar begin je met je roadmap naar de Cloud? RawWorks heeft voor de waterschappen in Nederland een Cloud Landing Zone klaar staan
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
29 out of 43
Cloud Landing Zone veiligheidsregio BasisRawWorksAzure Cloud Landing zone veiligheidsregio basisinrichting voor een goede start van de cloud journey en toets Microsoft 365 (gebruik) inrichting en optimalisatie van de cloud omgevingen
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
30 out of 43
Waterschap Security Assessment Microsoft 365RawWorksBaseline analyse voor de waterschappen op de Microsoft 365 inrichting inclusief gebruiksanalyse licenties
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
31 out of 43
Microsoft 365 security assessment NIS 2.0RawWorksEen blinde vlek in je omgeving. Wordt je datasecuritybeleid goed uitgevoerd? Wij helpen inzicht te geven in het gebruik van de Microsoft 365 omgeving en geven advies over waar je kunt verbeteren
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
32 out of 43
Data Protection Workshop voor gemeente met Microsoft 365RawWorksOnbewust gevoelige data delen is eenvoudiger dan ooit. Alle systemen staan open, maar hoe voorkom je deze potentiële lekken? Tijdens de workshop bespreken we wat (on)mogelijk is met Microsoft 365.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
33 out of 43
Getting ready for Microsoft 365 Copilot with FellowmindFellowmind Denmark A/SFellowmind’s ‘Getting ready’ for Microsoft 365 Copilot helps organizations prepare for a pilot in a secure and structured manner, laying the foundation for a successful roll-out.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
34 out of 43
Microsoft 365 Copilot Implementation and AdoptionCTAC B.V.Implementation and adoption of Microsoft 365 Copilot - a powerful solution designed to streamline your workflows and maximize the potential of your Microsoft 365 environment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
35 out of 43
DTX | MDR-SOC for Microsoft DefenderDTXExpand and Establish your SMB's digital assets with Managed Defender, a specialized MDR-SOC service by Dutch Technology eXperts. Designed specifically for small-to-medium businesses (SMB's).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 43
Managed Microsoft Defender XDRPROXIMUS NV/SAProximus NXT Orbit Managed XDR service manages the alerts generated by Microsoft Defender. Our Security Operations Center (SOC) analyses and responds to these alerts 24/7 in Brussels, Belgium.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
37 out of 43
Adoption Accelerator for Copilot for Microsoft 365RawWorksWe offer you a roadmap to get started with Microsoft Copilot for Microsoft 365 and accelerate your adoption
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
38 out of 43
Modern Work Audit – 1 Week Consulting EngagementConnectworks | IT Professionals1-week Microsoft 365 audit: continuity, security & license optimization by certified experts
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
39 out of 43
yellowSECUREyellow arrowThrough powerful 24/7 monitoring of the Microsoft 365 environment, its solutions, and the information contained within, we detect (potential) threats and, when necessary, isolate them.
+2
Applicable to:
Cloud Security
Threat Protection
40 out of 43
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
41 out of 43
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 43
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
43 out of 43