FiltersClear all
Consulting services results
Showing results in consulting services.
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
1 out of 60
Ivanti (MobileIron) to Microsoft Intune Migration PlanMobile MentorMobile Mentor’s Ivanti to Microsoft Intune migration services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration to Intune.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
2 out of 60
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
3 out of 60
Cybersecurity Managed Services for Microsoft by SoftwareOneSoftwareOneSecuring your digital landscape with SoftwareOne Cybersecurity Managed Services for Microsoft
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
4 out of 60
ManageEngine to Microsoft Intune Migration PlanMobile MentorMobile Mentor’s ManageEngine to Microsoft Intune migration services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
5 out of 60
Microsoft 365 Copilot Security and Compliance controlstrue org cloudMicrosoft Copilot for Security: Enhance Your Organization's Security Posture
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
6 out of 60
JAMF to Intune MigrationMobile MentorMobile Mentor’s JAMF to Intune migration planning services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration to Intune.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
7 out of 60
Microsoft 365 Security and Compliance AssessmentAVASOFTMicrosoft 365 Security and Compliance Assessment evaluates your current security posture, identifies vulnerabilities, and offers tailored solutions to enhance your data security and compliance.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
8 out of 60
Microsoft Purview Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Purview while ensuring alignment with best practice for security, governance, and compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 60
Defend, Protect, Secure with Microsoft Defender XDRComtrade System IntegrationTake the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
+2
Applicable to:
Cloud Security
Threat Protection
10 out of 60
KMicro Rapid Incident Response & Readiness ServiceKMicro Tech, Inc.KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
11 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
12 out of 60
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology HoldingOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
13 out of 60
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
14 out of 60
Copilot For Microsoft 365 Readiness AssessmentTHREATSCAPE LIMITEDThreatscape’s Copilot for Microsoft 365 Readiness Assessment (CRA) service can help you understand, and begin to address, the risks of Copilot for Microsoft 365 adoption.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
15 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFTEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
16 out of 60
KMicro's Sentinel360 MXDR with Microsoft Copilot for Security: 4-Wk POC/POVKMicro Tech, Inc.Enhance threat hunting & accelerated MXDR for Microsoft Sentinel with Copilot for Security integration
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 60
Windows in Cloud AssessmentInviso CorporationMaximize your Endpoints! Find out how a Cloud PC could potentially save you money!
+1
Applicable to:
Cloud Security
18 out of 60
Microsoft 365 Data oversharing report: 5-D Implementation and consultingReplyComprehensive Insights: Get a holistic overview of your environment and uncover overshared sites, documents, and items without the need for expensive Microsoft 365 E5 licenses.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
19 out of 60
Microsoft 365 Security AssessmentSii Sp. z o.o.We assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Security Operations Center with Microsoft SentinelAVASOFTMonitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
21 out of 60
4security: Backup as a Service for Microsoft 3654Sight HoldingsProtect your data with 4Security's Microsoft 365 Backup as a Service. Seamless integration, automated backups, and reliable data recovery for businesses of all sizes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
22 out of 60
KMicro MXDR for SMBKMicro Tech, Inc.KMicro MXDR for SMB helps businesses reduce operational complexity and strengthen cybersecurity defenses by managing their Microsoft Defender XDR environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Citrix Endpoint Management to Microsoft Intune Migration PlanMobile MentorMobile Mentor’s Citrix Endpoint Management to Microsoft Intune services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
25 out of 60
Threat Protection WorkshopMobile MentorDuring this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
26 out of 60
4Sight's Microsoft Data Security Engagement4Sight HoldingsIdentify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
27 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight HoldingsStrengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Copilot for Microsoft 365: Security AcceleratorKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Accelerator: Tailored insights and guided deployments.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 60
4security: Microsoft 365 Communication Protect4Sight Holdings4security: Microsoft 365 Communication Protect, a solution to safeguard your organisation’s communications
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
31 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
33 out of 60
Microsoft Sentinel Integration with Carbon Black by AVASOFTAVASOFTImprove endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
34 out of 60
Microsoft Purview & Generative AI Synergy: Data Governance for the FutureBlack Cell Magyarország Korlatolt Felelossegu TarsasagUsage of generative AI increases day by day in enterprise environments, in some cases without control. Act in time and prevent data breaches and exfiltration activities.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
35 out of 60
Copilot for Microsoft 365 WorkshopINOVASYS FOR SYSTEMSCopilot for Microsoft 365 Workshop, delivered by certified Microsoft partner Inovasys, is a comprehensive three-phase engagement.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
36 out of 60
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
37 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFTEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
38 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVASOFTEnhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
40 out of 60
Microsoft Purview Data Loss Prevention: 4-Wk Implementation ServiceUNIFY Solutions Pty. Ltd.UNIFY Solutions will implement Microsoft Purview Data Loss Prevention (DLP) to protect your organisation's sensitive information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
41 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Copilot for Microsoft 365 Data and Security Readiness AssessmentAwara IT Kazakhstan LLPElevate Your Data and Security with Copilot for Microsoft 365 Readiness Assessment by Awara IT's experts.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
43 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
44 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
45 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
47 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
48 out of 60
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
49 out of 60
Intelligent Shield: 1d AssessmentCorporate SoftwareAn Audit for your Microsoft 365 tenant based on Best Practices
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
50 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud Security
Threat Protection
51 out of 60
Endpoint Management WorkshopYork Telecom Corp3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
52 out of 60
Secure Live Workspace - 8 Weeks AssessmentLTIMindtree LimitedOur Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
+3
Applicable to:
Cloud Security
Power Platform for Teams
Teams Custom Solutions
53 out of 60
Microsoft Advisory Services ManagedSoftwareOneDrive Value and Cost Savings Throughout the Microsoft Cloud Investment Lifecycle
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
54 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Office 365 Teamwork Security - Managed ServiceCognizantTeamwork Security provides a comprehensive security management service for Office 365 platforms
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
56 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareOneImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
57 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
58 out of 60
Modern Frontline Work Acceleration 2 days WorkshopLiveRoute FZ-LLCLiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
59 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
60 out of 60