FiltersClear all
Consulting services results
Showing results in consulting services.
All results
Ivanti (MobileIron) to Microsoft Intune Migration PlanMobile MentorMobile Mentor’s Ivanti to Microsoft Intune migration services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration to Intune.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
1 out of 60
Performanta Safe XDRPerformantaUtilising Microsoft Sentinel and Copilot for Security, reduce response times from hours to seconds utilising Microsoft Sentinel, Microsoft Copilot for Security and Microsoft security toolsets
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
2 out of 60
Microsoft 365 Rapid Security Assessment: 1-Wk AssessmentAwara ITMicrosoft 365 Rapid Security Assessment is a quick yet comprehensive evaluation to enhance Microsoft 365 security against evolving cyber threats
+2
Applicable to:
Cloud Security
Threat Protection
3 out of 60
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
4 out of 60
Cybersecurity Managed Services for Microsoft by SoftwareOneSoftwareOneSecuring your digital landscape with SoftwareOne Cybersecurity Managed Services for Microsoft
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 60
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
6 out of 60
Microsoft Advisory Services ManagedSoftwareOneDrive Value and Cost Savings Throughout the Microsoft Cloud Investment Lifecycle
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
7 out of 60
Microsoft 365 Copilot Security and Compliance controlstrue org cloudMicrosoft Copilot for Security: Enhance Your Organization's Security Posture
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
8 out of 60
Microsoft 365 Copilot - Adoption & Change Mgmt.CrayonUnlock the full potential of Microsoft 365 Copilot with our specialized Change Management service.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
9 out of 60
ManageEngine to Microsoft Intune Migration PlanMobile MentorMobile Mentor’s ManageEngine to Microsoft Intune migration services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
10 out of 60
Microsoft 365 Copilot - AdvisoryCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Readiness Workshop – your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
11 out of 60
Copilot for Security Readiness AssessmentPerformantaFutureproof your Business Security with Microsoft Security Copilot and Performanta
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Intune Managed ServiceMobile MentorYour endpoint ecosystem is constantly evolving and needs proactive management, so we designed the Intune Managed Service to help customers unlock the full potential of Intune.
+2
Applicable to:
Cloud Security
Identity & Access Management
14 out of 60
KMicro Rapid Incident Response & Readiness ServiceKMicro Tech, Inc.KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
15 out of 60
JAMF to Intune MigrationMobile MentorMobile Mentor’s JAMF to Intune migration planning services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration to Intune.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
16 out of 60
Red Canary MSSP FastTrack for SecurityRed CanaryLeverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, LdaThe engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
18 out of 60
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology HoldingOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
19 out of 60
Microsoft 365 Security and Compliance AssessmentAVASOFTMicrosoft 365 Security and Compliance Assessment evaluates your current security posture, identifies vulnerabilities, and offers tailored solutions to enhance your data security and compliance.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
20 out of 60
KMicro MXDR for SMBKMicro Tech, Inc.KMicro MXDR for SMB helps businesses reduce operational complexity and strengthen cybersecurity defenses by managing their Microsoft Defender XDR environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 60
Microsoft Purview & Generative AI Synergy: Data Governance for the FutureBlack Cell Magyarország Korlatolt Felelossegu TarsasagUsage of generative AI increases day by day in enterprise environments, in some cases without control. Act in time and prevent data breaches and exfiltration activities.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
22 out of 60
MDS Managed MXDR EngagementMaureen Data SystemsDesigned to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Microsoft 365 Security: 3,5 Tage Tenant AssessmentAppSphere AGSicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
24 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und AusarbeitungAppSphere AGVom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
25 out of 60
Copilot for Microsoft 365: Security AcceleratorKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Accelerator: Tailored insights and guided deployments.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
Windows in Cloud AssessmentInviso CorporationMaximize your Endpoints! Find out how a Cloud PC could potentially save you money!
+1
Applicable to:
Cloud Security
27 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
28 out of 60
MDS - Microsoft Security Copilot WorkshopMaureen Data SystemsDiscover how Microsoft Security Copilot can enhance your security operations, streamline incident response, and empower your security teams
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
29 out of 60
Microsoft Purview Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Purview while ensuring alignment with best practice for security, governance, and compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 60
Dedalus Implementation and Adoption of Copilot for Microsoft 365DedalusDedalus provides a Microsoft 365 Copilot implementation and adoption solution for your business.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
31 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareOneImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
32 out of 60
Microsoft 365 Copilot Value DiscoveryCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Value Discovery Workshop – your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
33 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
34 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLCIntroducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
36 out of 60
System Center Endpoint Manager 40 hour Quick Start Proof of Concept with Co-Management with Endpoint Manager in Office 365York Telecom CorpSystem Center Endpoint Manager 40-Hour Quick Start Proof-of-Concept. Design, deploy and learn SCEM in 40-hour proof-of-concept with Co-Management with Endpoint Manager Office 365
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
37 out of 60
Microsoft 365 Data oversharing report: 5-D Implementation and consultingReplyComprehensive Insights: Get a holistic overview of your environment and uncover overshared sites, documents, and items without the need for expensive Microsoft 365 E5 licenses.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
38 out of 60
Microsoft 365 Copilot - Technical ReadinessCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Technical Readiness - your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
39 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFTEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
40 out of 60
MDS - Modern Security Operations EngagementMaureen Data SystemsA 2-day engagement to demonstrate how intelligent security analytics and threat intelligence can detect and stop active threats, encouraging organizations to deploy and adopt Modern SecOps solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
41 out of 60
Microsoft 365 Security AssessmentSii Sp. z o.o.We assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
43 out of 60
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
44 out of 60
4Sight's Microsoft Data Security Engagement4Sight HoldingsIdentify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
45 out of 60
SmartStart for IntuneMobile MentorThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
46 out of 60
Mentoring ServiceMobile MentorOur mentoring service helps customers leverage Microsoft 365 to improve endpoint security & user experience. We help accelerate the learning curve & reduce risk by deploying Microsoft 365 optimally.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
47 out of 60
Enterprise Mobility + Security Quickstart for NonprofitSoftwareOneSecure, compliant, and adaptable productivity for mission-driven work
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
48 out of 60
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
49 out of 60
Endpoint Management WorkshopYork Telecom Corp3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
50 out of 60
Digital Workplace Essentials for Microsoft 365SoftwareOneDrive innovation and transformation, knowing your employees can work securely and efficiently with the CSP model and SoftwareOne’sDigital Workplace Essentials
+3
Applicable to:
Cloud Security
Information Protection & Governance
Workplace Analytics
51 out of 60
Copilot For Microsoft 365 Readiness AssessmentTHREATSCAPE LIMITEDThreatscape’s Copilot for Microsoft 365 Readiness Assessment (CRA) service can help you understand, and begin to address, the risks of Copilot for Microsoft 365 adoption.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
52 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
54 out of 60
SecureBlu MDR Service for Microsoft 365 DefenderNew Era TechnologySecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
55 out of 60
Adopción de Copilot chat Enterprise - Bing Chat Enterprise: 3-WkENCAMINA S.L.Adopta Copilot Chat Enterptise para multiplicar la productividad de tus empleados protegiendo los datos en tu empresa
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
56 out of 60
IN - Microsoft 365 Barracuda Cloud to Cloud BackupCrayonSecure, easy-to-use SaaS backup for your Microsoft 365 data
+1
Applicable to:
Cloud Security
57 out of 60
Protect 365 App - 1 hour implementationCloud LifeThe Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
58 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
59 out of 60
Citrix Endpoint Management to Microsoft Intune Migration PlanMobile MentorMobile Mentor’s Citrix Endpoint Management to Microsoft Intune services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
60 out of 60