FilterAlle löschen
Beratungsdienste Ergebnisse
Es werden  Ergebnisse in beratungsdienste angezeigt.
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Information Protection & Governance
Information Protection & Governance
1 out of 60
Microsoft 365 Copilot for Executives WorkshopSMART business LLCJoin our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
2 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
3 out of 60
KMicro Rapid Incident Response & Readiness ServiceKMicro Tech, Inc.KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Threat Protection
Threat Protection
4 out of 60
Hybrid Infrastructure Overview WorkshopAwara IT Kazakhstan LLPRapid hybrid‑cloud design workshop — learn best practices, pitfalls, and licensing tips for Microsoft on‑prem + Azure/Microsoft 365.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management
5 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
6 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
7 out of 60
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Teamwork Deployment
Teamwork Deployment
8 out of 60
ADFS to Entra ID Migration ServiceMobile MentorMobile Mentor’s ADFS to Entra ID Migration Service offers a secure, cloud-first Single Sign-On experience that eliminates outdated infrastructure and unlocks the full potential of Microsoft Entra ID.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Identity & Access Management
Identity & Access Management
9 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance. 
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
10 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
11 out of 60
Microsoft 365 consultancyOnex GroupGet Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Teamwork Deployment
Teamwork Deployment
12 out of 60
SmartStart for IntuneMobile MentorThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management
13 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFTEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support. 
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
14 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security ServicesCognizantDefend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
15 out of 60
Ctelecoms Threat Protection EngagementConsolidated Telecoms (Ctelecoms)Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
16 out of 60
Cloud Endpoints AssessmentInviso CorporationMaximize your Endpoints! Find out how a Cloud PC could potentially save you money!
+1
Applicable to: Cloud Security
Cloud Security
17 out of 60
Microsoft 365 Copilot Onboarding WorkshopSMART business LLCJoin our interactive workshop to learn about the capabilities of Microsoft Copilot for Microsoft 365!
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Knowledge & Insights
Knowledge & Insights
18 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適 です。
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
19 out of 60
Office 365 Teamwork Security - Managed ServiceCognizantTeamwork Security provides a comprehensive security management service for Office 365 platforms
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
20 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
21 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
22 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight HoldingsStrengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
23 out of 60
4security: Microsoft 365 Communication Protect4Sight Holdings4security: Microsoft 365 Communication Protect, a solution to safeguard your organisation’s communications
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
24 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Threat Protection
Threat Protection
25 out of 60
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLPOffice 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Information Protection & Governance
Information Protection & Governance
26 out of 60
Identity as a Service | Assure 365CyberOneFully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
27 out of 60
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLPEvaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Threat Protection
Threat Protection
28 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage WorkshopCGI Inc.A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
29 out of 60
Security Operations Center with Microsoft SentinelAVASOFTMonitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
30 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to: Cloud Security
Cloud Security Insider Risk
Insider Risk Threat Protection
Threat Protection
31 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu TarsasagInspect events in your network to locate threat indicators and entities
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
32 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu TarsasagSafeguard your entire organization with Managed Security Services on Microsoft Defender
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
33 out of 60
Identity and Access Management SolutionH One (Private) LimitedEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Insider Risk
Insider Risk
34 out of 60
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
35 out of 60
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
36 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbHStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
38 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
39 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
40 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
41 out of 60
Vulnerability ManagementBlack Cell Magyarország Korlatolt Felelossegu TarsasagRapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
42 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
43 out of 60
Protect and Govern your Data in Microsoft 365 1 day workshopCloudWay ASWith data growing exponentially over time, it’s more important than ever for organisations to implement the right tools and processes to ensure data protection and governance
+2
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
44 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT LimitedCybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
45 out of 60
GDPR Assessment: 6-Week AssessmentHappiest Minds Technologies LimitedEnable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Threat Protection
Threat Protection
46 out of 60
Security Architecture Design and Implementation Service上海诺未网络科技有限公司NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
47 out of 60
Microsoft 365 Strategy, guidance and governance workshop by Nexer: 1 DayNexer Group ABWe will help you go through your Microsoft 365 implementation and make sure that you follow Microsofts Best Practices.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
48 out of 60
Defender for IoT Operational Technology: 8-Week POCITC Secure LtdITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Threat Protection
Threat Protection
49 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to: Cloud Security
Cloud Security
50 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
51 out of 60
Microsoft Intune & Autopilot in 30: Six (6)-Week ImplementationLong View SystemsDeploy Microsoft Intune and Windows Autopilot—accelerating security, compliance, and IT efficiency with a structured, expert-led implementation.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Mobile Device Management
Mobile Device Management
52 out of 60
Modern SecOps Engagement (Security Operations)PerformantaGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft SecOps Engagement
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
53 out of 60
Copilot Advanced Services: 1 Day 3 WorkshopsNess IsraelUnlock the full potential of Microsoft Copilot with our tailored AI services, enhancing security, development and productivity across Microsoft 365 applications through flexible, expert-led sessions.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Workplace Analytics
Workplace Analytics
54 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance IncYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
+3
Applicable to: Cloud Security
Cloud Security Insider Risk
Insider Risk Threat Protection
Threat Protection
55 out of 60
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, IncWe will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Insider Risk
Insider Risk
56 out of 60
Avanade Cyber Portfolio EvaluationAvanade, Inc.The Cyber Portfolio Evaluation maps your tools with Microsoft solutions, cutting costs and enhancing efficiency.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Mobile Device Management
Mobile Device Management
57 out of 60
Copilot adoption for legalConterraTransform legal service processes with Copilot and Conterra Copilot Adoption Offer: 4-Wk Imp
+2
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security
58 out of 60
Guardian 365 Managed Security Services (Microsoft MXDR Verified)Forsyte IT SolutionsGuardian 365 is the always-on security managed service offering end-to-end protection, monitoring, detection, and remediation of attacks on your infrastructure, data, users, and endpoints 24x7.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
59 out of 60
Copilot adoption for customer serviceConterraTransform customer service processes with Copilot and Conterra Copilot Adoption Offer: 4-Wk Imp
+2
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security
60 out of 60