AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
Security Configuration Maintenance 2-Wks Imp
Insight Technology Solutions
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
A monthly Security Configuration Maintenance Service. This service will help to secure end-user devices more effectively based on Insight and Microsoft Security best practices.
1 out of 38
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
2 out of 38
SecWise Assess for Workplace: 5-Day Security Assessment
SecWise
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
An assessment of your modern workplace set-up to make sure it matches cyber security standards and best-practices.
3 out of 38
SecWise Protect (XDR): Microsoft 365 Defender Activation
SecWise
+1
Applicable to:
Threat Protection
Identify your Microsoft Threat Protection jump-start configuration based on our security maturity predefined Microsoft 365 Defender best-practice configurations.
4 out of 38
Secure & Compliant Modern Workplace: 2 weeks Imp
Insight Technology Solutions
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
Based on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
5 out of 38
Microsoft 365 Security Envisioning - 1day workshop
Officeline SA
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Learn how to improve your organization’s security posture with Office Line’s Microsoft 365 Security 1-day Workshop.
6 out of 38
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
7 out of 38
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
8 out of 38
Security Priority Assessment : 2 day assessment
Inetum-Realdolmen - Modern Work & Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 day assessment to list and prioritization of your security needs resulting in step-by-step overview to tackle security projects
9 out of 38
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
10 out of 38
Defend against threats with SIEM plus XDR Workshop including FastTrack guidance
Xylos
+2
Applicable to:
Cloud Security
Threat Protection
Our 3-day Security workshop is meant to get an overview of the Security landscape, we use the Microsoft 365 security products and features to gain visibility into threats to your Microsoft 365.
11 out of 38
Endpoint Rollout Management 4-Hour Implementation
ConXioNOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
During this 4-hour implementation we will implement Microsoft Intune within your SMB or enterprise organization.
12 out of 38
Protection des périphériques - 4-Week Implemention
EXAKIS NELITE
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Assurer la sécurisation des périphériques puisqu’ils sont une porte d’entrée du système d’information pour les attaquants.
13 out of 38
Proximus Microsoft 365 Security Assessment
PROXIMUS NV/SA
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
With the Microsoft 365 Security Assessment, Proximus gives you a comprehensive insight offering you consistent information across different security risks.
14 out of 38
Discover Sensitive Data: 5-Week Workshop
Rackspace
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
15 out of 38
Sécurisation des identités - 3-Week Implementation
EXAKIS NELITE
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
16 out of 38
Protection des applications -4-Week Implementation
EXAKIS NELITE
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Une vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
17 out of 38
Cybersecurity Awareness: 12 month implementation
Prodware Group
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
Cybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
18 out of 38
Microsoft 365 Secure Score: 1-Week Assessment
WAKERS
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Mesurez en 1 semaine le niveau de sécurité de votre environnement Microsoft 365
19 out of 38
Répondre aux attaques - 3-Week Implementation
EXAKIS NELITE
+1
Applicable to:
Threat Protection
Cadrer les différentes attaques et risques afin d’en découler des solutions de sécurité et des chantiers.
20 out of 38
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
21 out of 38
Defend against threats with SIEM + XDR Expert-as-a-service 1 y, Mgd svc
Xylos
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Xylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your Threat Protection environment based on Microsoft 365 technology.
22 out of 38
Secure Identities and Access Assessment, 3 days
Xylos
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our Identity Security Assessment is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
23 out of 38
Protection de l'identité : Implémentation 1 mois
ROXYS
+2
Applicable to:
Cloud Security
Threat Protection
Vous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
24 out of 38
Workplace Security Maturity: 6-day assessment
Resilient Security
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workplace security maturity assessment to get the most out of your Microsoft 365 security platform
25 out of 38
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
26 out of 38
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Nil d.o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
27 out of 38
Neway Security proposition: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
28 out of 38
Roadmap to Zero Trust: 4-Wk Assessment
Devoteam NV/SA
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
A pragmatic approach to a better security posture with Microsoft 365
29 out of 38
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
30 out of 38
[Threat Management: 5-Days Assessment]
Computacenter Plc
+1
Applicable to:
Threat Protection
Customer security assessment in regards of Threat management: 5 day offer
31 out of 38
Insight Discover Sensitive Data 5 Day Workshop
Insight Technology Solutions
+2
Applicable to:
Information Protection & Governance
Threat Protection
Insight's Discover Sensitive Data Workshop provides the guidance organisations need to better discover, protect, and govern corporate data with Microsoft 365
32 out of 38
Insight Security Mini Audit: 1 Day Workshop
Insight Technology Solutions
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Insight will work with you to evaluate your Microsoft 365 environment to make sure that it is in line with industry security best practices.
33 out of 38
Smart Services - Security - 12 months Implementation
Elgon S.A.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Smart Services, mise en place des bonne pratique sécurité pour vos service Microsoft 365 et Azure
34 out of 38
Threat Protection 3 Day Workshop
Insight Technology Solutions
+1
Applicable to:
Threat Protection
Insight's Threat Protection Workshop identifies real-time threats in an organisation’s environment and helps define clear next steps to mitigate risks with Microsoft 365
35 out of 38
Endpoint Management Advisory Service: 6-Wk Implementation
Wragby Business Solutions & Technologies Limited
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
This advisory service enables organizations efficiently manage end points leveraging Microsoft Intune & Configuration Manager through assessments, 1-day workshops and six weeks deployment
36 out of 38
Microsoft Zero Trust Security Assessment and Recommendations (5 days)
NETWORK RESEARCH BELGIUM
+2
Applicable to:
Identity & Access Management
Threat Protection
NRB assists you in defining and identifying areas of effort to move towards a Zero Trust architecture based on Azure AD identities.
37 out of 38
Microsoft Defender for Endpoint deployment service 2 months Implementation (elapsed time)
NETWORK RESEARCH BELGIUM
+1
Applicable to:
Threat Protection
Increase the security on your laptops with Microsoft Defender for EndPoint using NRB deployment services
38 out of 38
Previous
1
2
3