筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
SmartStart for IntuneMobile MentorThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
1 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 60
1-Tag Microsoft 365 Health & Security AssessmentComma Soft AGAssessment Ihrer bestehenden Microsoft 365 Umgebung hinsichtlich Best-Practices und Betreibbarkeit
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Microsoft 365: Intune - Mobile Device Management (Android & iOS)Intellity GmbHUmfassendes Mobile Device Management für Android- & iOS-Geräte mit Microsoft Intune und Betriebsfokus
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
4 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
5 out of 60
Microsoft 365 Security: 3,5 Tage Tenant AssessmentAppSphere AGSicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
6 out of 60
Next Gen Endpoints 3-Day WorkshopFUJITSUProvide your employees with access to a secure desktop experience from virtually anywhere.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
7 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed CanaryGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
9 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFTBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 60
Policy Management Service Microsoft 365aConTech GmbHAutomatisierte Sicherheit & Effizienz für Microsoft 365. Mit dem Policy Management Service Microsoft 365 bekommt Ihr ein transparentes Richtlinienmanagement für mehr Datenschutz und Produktivität.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
11 out of 60
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix GlobalA 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
12 out of 60
cyber security threat analysis workshopU-BTech Solutionsthe workshop is design to discover threats and risks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Endpoint Ecosystem Technical Support: 12-month Support ImplementationMobile MentorProvide support and advice to IT administrators on Microsoft Endpoint Manager
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
14 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
15 out of 60
Windows 365 Standardized PilotMobile MentorThe Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
16 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM Systems• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Microsoft 365 Copilot Readiness WorkshopSwiss IT Security Deutschland GmbHLernen Sie über Tools und Dienste der Microsoft 365 Lizenz, wie sie Risiken minimieren können
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
18 out of 60
Microsoft 365 Assessment: 10 weeksUMB AGThe Microsoft 365 Assessment with UMB guarantees a customized use of Microsoft products, based on the customer’s need and requirements, to achieve a high user experience.
+3
Applicable to:
Adoption & Change Management
Calling for Microsoft Teams
Identity & Access Management
19 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFTIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
20 out of 60
Microsoft Cloud App Security (MCAS) Solutions for Native Apps by AVASOFTAVASOFTEnhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
21 out of 60
Intune for Android: 4-Week ImplementationMobile MentorAndroid devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
22 out of 60
Bechtle Microsoft 365 Roadmap - 1d WorkshopBechtle AGInnerhalb dieses Workshops werden Cloud-Neukunden mit der gesamtem Microsoft 365 Suite und den damit einhergehenden Services und Abhängigkeiten vertraut gemacht.
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
23 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
24 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
25 out of 60
Modern Workplace - Cloud Endpoint ManagementArxusOur Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
26 out of 60
Copilot für Microsoft 365 Ideation WorkshopCANCOM GmbHVorbereitung auf künstliche Intelligenz mit dem Copilot für Microsoft 365 Ideation Workshop von CANCOM
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Workplace Analytics
27 out of 60
Microsoft 365 Copilot - Journey and Evaluation: 1-Wk AssessmentIntellity GmbHA Microsoft 365 Copilot evaluation in four steps:
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
28 out of 60
Email Security Threat AssessmentAVASOFTConfident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
29 out of 60
M365 Security Audit: 1-Wk AuditJoker IT AGNachhaltig das Bewusstsein für die Cloud-Sicherheit verbessern
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Magenta Security for Microsoft:3 months ImplementationTelekom Deutschland GmbH Main AccountMagenta Security für Microsoft bietet das Management sowie die Integration in und kontinuierliche Analyse Ihrer Microsoft Security durch das SOC der Deutschen Telekom Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
CANCOM Microsoft Defender Lifecycle Services - Monthly recurringCANCOM GmbHDie CANCOM Microsoft Defender Lifecycle Services beinhalten Leistungen zur Unterstützung im Betrieb der Microsoft Defender Lösungen.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Microsoft Security Copilot: 2 x 3h WorkshopSkaylink GmbHUnlocking Security Excellence with Microsoft Security Copilot - 2 x 3h Workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Secure Data Management with Microsoft PurviewAVASOFTConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Quick Security Assessment für die Microsoft Cloud: 2 WochenIT-Improvement Deutschland GmbHStandortbestimmung im Security Bereich der Microsoft Cloud Umgebung und Entwicklung von Handlungsempfehlungen.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
35 out of 60
Intranet & Data Migration SharePoint: 3 Days ImplementationACS Data SystemsImplementazione di SharePoint come intranet aziendale e migrazione dei dati online su Microsoft 365
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
36 out of 60
Managed Services: M(x)DR for Microsoft 365 DefenderCegeka NVIntroducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
+2
Applicable to:
Identity & Access Management
Threat Protection
37 out of 60
Infra & Network Monitoring with Microsoft SentinelAVASOFTBoost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
38 out of 60
Manage Corporate Data on Devices with IntuneAVASOFTCan you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
39 out of 60
Endpoint Management Solutions: 4-Wk ImplementationSignal Alliance Technology HoldingDiscover how Signal Alliance Consulting enables users in your organization to be productive, on any device, without compromising IT security by leveraging Microsoft Endpoint Management.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
40 out of 60
Windows 365 Assessment - 1 dayCC Bilgi TeknolojileriHybrid Windows for a hybrid world
Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
41 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies LtdMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro LtdWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Managed Security Operations Center: 1 Month ImplementationnovaCapta GmbHWir bieten einen professionellen 24/7-Sicherheitsbetrieb Ihrer Umgebung mit unserem zertifizierten deutschen SOC-Team
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
44 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementationCloudshift3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
45 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
46 out of 60
Windows 365: 3-Wk Proof of Concept "Der Windows PC aus der Cloud"PHAT CONSULTING GmbHWindows 365 ist der PC aus der Cloud. Wir erarbeiten gemeinsam einen ersten Windows 365 Prototypen in Ihrer Umgebung und klären so Ihre UseCases.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
47 out of 60
Microsoft Security Services:5-Wk ImplementationEnergy Time LLCDeploy&Configure Microsoft Security Services: Azure AD Premium features, Microsoft Defender Family, Endpoint Management, Information Protection
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
48 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbHStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Modern Workplace: 1 hour Briefing SessionAutomizeThis 1 hours briefing session provides a complete overview of our Modern Workplace concept of Endpoint Management, Identity & Access Management and Collaboration Solutions in context to your business.
+3
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device Management
50 out of 60
Intranet & Data Optimization for SharePoint: 1 Day AssessmentACS Data SystemsAssessment rivolto alle aziende che vogliono ottimizzare i processi interni con l'uso di SharePoint e Microsoft 365
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
51 out of 60
Microsoft 365 Review: 2-Day AssessmentCANCOM Austria AGGet the most out of your Microsoft 365 Tenant with our custom-tailored cloud review to improve your workloads, strengthen the security, and point out unused potentials.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
52 out of 60
SharePoint Intranet: 2 Hours BriefingACS Data SystemsBriefing di presentazione della soluzione SharePoint e prima analisi delle esigenze e conoscenze di Microsoft 365
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
53 out of 60
Intranet & Data Optimization: 4 Hours WorkshopACS Data SystemsWorkshop di introduzione pratica alle potenzialità della soluzione SharePoint di Microsoft 365
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
54 out of 60
Intranet & Data Optimization: 1 Day Proof of ConceptACS Data SystemsProof of Concept (POC) per provare in modo pratico la soluzione SharePoint nella propria infrastruttura
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
55 out of 60
Mitigate Compliance and Privacy Risks - 3 Day WorkshopProtivitiMicrosoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
56 out of 60
Modern Secure Workplace: 10-days ImplementationAbtis GmbHOne-Stop-Offering: 24/7/365 Managed Security Service für den Mittelstand mit M365 Defender und Microsoft Sentinel.
Zero Trust, Security Monitoring, SIEM/SOC, XDR, Threat Detection, Incident Response.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
ADVIA Service Implementierung & MigrationADVIA GmbHDie Cloud ist das Ziel, der Weg ist klar, doch was ist mit Ihren Daten?
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
58 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/SConscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Defender for Endpoint: 5-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
60 out of 60