FiltersClear all
Consulting services results
Showing results in consulting services.
Microsoft Advisory Services ManagedSoftwareOneDrive Value and Cost Savings Throughout the Microsoft Cloud Investment Lifecycle
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
1 out of 60
Microsoft 365 Security Assessment and Roadmap: 1 Day WorkshopCloud EssentialsAccelerating your Zero Trust strategy through a readiness assessment, workshop and roadmap
+1
Applicable to:
Cloud Security
2 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM Systems• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Secure Microsoft 365 Managed ServiceCWSICWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Microsoft 365 Security Advisor: 1-Hour AssessmentCloud DirectA consultancy service to advise the most optimal way to manage security posture within Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
5 out of 60
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, LdaThe engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
6 out of 60
Managed Defender for Endpoint : 4-wk PoCBytes Software ServicesBytes Managed Defender for Endpoints provides proactive management with 24/7 detection and response to ensure appropriate response capabilities.
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
8 out of 60
Support services for Microsoft 365Senetic S.A.Our offer includes 3 support service packages for Microsoft 365 environment, where we provide support in the correct configuration and implementation of tools.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
9 out of 60
Microsoft 365 Security Compliance 6-Day AssessmentChorusEstablish a clear roadmap to ensure that your organisation takes full advantage of the advanced security and compliance features in Microsoft 365 to build a Zero Trust framework.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
10 out of 60
Microsoft 365 Migration 12 Hour Proof-of-ConceptNew Charter Technologies, Inc.Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
11 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 60
Managed Security Service: Half Day WorkshopTransparity Solutions LtdA workshop to provide you with an understanding of the Transparity Managed Security Service and SOC, along with the benefits of a Microsoft-based approach to your security requirements.
+2
Applicable to:
Cloud Security
Threat Protection
13 out of 60
Azure AD: Cloud Authentication 1-Day AssessmentTransparity Solutions LtdAn assessment to provide you with an overview of Cloud Identity and the capabilities within Azure AD to help you better serve and engage with your employees, including transition away from AD and ADFS
+2
Applicable to:
Cloud Security
Identity & Access Management
14 out of 60
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) LtdReadiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Microsoft 365 Incident Response - 5 Week AssessmentProtivitiAssessing the advanced security capabilities of Microsoft 365
+2
Applicable to:
Cloud Security
Threat Protection
16 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
17 out of 60
Endpoint Management WorkshopYork Telecom Corp3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
18 out of 60
Free Office 365 Review: 1hr AssessmentOutbound Solutions and Computing LtdOffice 365 review, health check, usage and overall environment summary
+3
Applicable to:
Adoption & Change Management
Calling for Microsoft Teams
Cloud Security
19 out of 60
Bytes Managed Workspace: 5 Day WorkshopBytes Software ServicesWorkshop and onboarding to provide on-going support and management of Surface, Microsoft 365 and workplace productivity applications
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
20 out of 60
Windows 365 - 3 Day Proof of Concept DeploymentCISILION LTDWindows 365 - 3-day Proof of Concept inclusive of demo, design, deployment, configuration, testing and handover.
+2
Applicable to:
Cloud Security
Device Deployment & Management
21 out of 60
Microsoft 365 Security: 9-Day ImplementationCloud DirectAn engagement that will setup Microsoft 365 with enterprise-level security & compliance policies to provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT LimitedCybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
24 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 60
Zero Trust Adoption: 6-Day AssessmentPowerONPlatforms LimitedThe Solution Alignment is designed to support your understanding and plan your Secure Organisations future with Microsoft services. Looking across Data, Apps, Infra, Network, Identities and Endpoints.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
26 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
27 out of 60
CCPA CPRA: 6 - Wk AssessmentHappiest Minds Technologies LimitedEnable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
28 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Security and Compliance AssessmentAgilisys LtdOur Security & Compliance assessment helps you understand the threats you might be facing, reduce the risk of your business being interrupted, and as a result allow you to gain speed and efficiency.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
30 out of 60
Compliance Manager Training: 1/2 day WorkshopCloud EssentialsCompliance Manager Training - a 1/2 day training session about Microsoft 365 Compliance Manager facilitated by an experienced member of our team
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
31 out of 60
Discover Sensitive Data: 2 weeks WorkshopCloud EssentialsDiscover Sensitive Data Workshop - an automated data risk check to uncover dark data risks with analysis and recommendations
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
32 out of 60
Manage and Investigate Risk: 2 weeks WorkshopCloud EssentialsA risk check followed by advisory workshop to build a sustainable strategy around insider risk within Microsoft 365 and further accelerate your compliance journey.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
33 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
34 out of 60
Security Accelerator: 5-Day WorkshopRicoh UK LimitedProvides insight and rates risk to existing security posture & delivers a roadmap to improvement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Device Mgm and Protection - 12 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
37 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
38 out of 60
Microsoft 365 Tenant Setup, 1-Day ImplementationTec Networks GmbHWe provide you a good-practice configured tenant for the best experience with Microsoft 365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
39 out of 60
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
40 out of 60
Microsoft 365 Security: 2-Day ImplementationCloud DirectA quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Microsoft 365 Security: 6-Day ImplementationCloud DirectA quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Microsoft 365 Security assessment - 3 day848 GroupMicrosoft 365 Security assessment to benchmark Office 365 implementation against CIS and Microsoft Security best practice, and deliver a road map for resolving security risks
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 60
Security Threat Check: 5-Day Assessment & WorkshopChorusOur security assessment identifies active and potential security threats and gives you a clear breakdown of which Microsoft 365 security products can be used to remediate active threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Zero Trust Security Assessment: 10-Day AssessmentChorusOur zero trust security assessment reviews your security posture to give you a clear roadmap to adopt Microsoft 365 security solutions to remove vulnerabilities and improve your posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Mobile Threat Defence 3 Week AssessmentBT BusinessMTD risk assessment using Microsoft 365 and Zimperium zIPS
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
46 out of 60
Always on VPN - Implementation Service - 2 WeeksPowerONPlatforms LimitedHave a secure Microsoft Always On VPN Environment deployed quickly and effectively to support your remote working needs
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
47 out of 60
Intelligent Shield: 1d AssessmentCorporate SoftwareAn Audit for your Microsoft 365 tenant based on Best Practices
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
48 out of 60
Modern Work Security Strategy & Assessment BriefRISUAL LTDCall with risual's Architecture team to discuss how assessment offering can support your organisation to define security strategy for modern work (Office 365) services : 3-Hour Briefing Call
+2
Applicable to:
Cloud Security
Identity & Access Management
49 out of 60
Peace of Mind for Microsoft 365: ImplementationAvaelgoManaged service offer: monthly proactive maintenance for Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
50 out of 60
Security Assessment Microsoft 365: 2day assessmentProdware GroupA service for Office 365 and Microsoft 365 protection
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
51 out of 60
Microsoft Cloud App Security (MCAS) WorkshopAdvaniaThis MCAS workshop guides an organisation through the high level design considerations applicate to Cloud Discovery, Connect App and session proxy policy capabilities and related integrations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
52 out of 60
Microsoft 365 Security: 5-Day AssessmentSynergi Software LtdTargeted for Small and Mid Sized Business the offer provides a strategic review and output assessment detailing clear guidance on security improvements across your Microsoft 365 and Azure Estate
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
53 out of 60
Microsoft 365 Security 1-Day AssessmentValtoA security assessment of the Microsoft 365 Environment checking all services within the platform and covering off additional tools available in your organisation to assist with the security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Microsoft 365 Security: 3 Day AssessmentDaisy Corporate Services Trading LimitedDaisy's Microsoft 365 Security Assessment is a three-day consultancy service delivering a current state assessment of your Microsoft 365 environment, security controls and security requirements.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
55 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days ImplementationHCL Technologies Limited.HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
56 out of 60
Cloud Security Review: 4-Day AssessmentRISUAL LTDWe can assess the security configuration of Microsoft Office 365, Microsoft Azure IaaS and PaaS and Dynamics 365 together or we can review them individually if you have particular concerns.
+2
Applicable to:
Cloud Security
Compliance Advisory Services
57 out of 60
Microsoft 365 Security Audit: 3-Day AssessmentMarathon Managed ServicesMicrosoft 365 Security Health Check and Report. Analysis of Secure Score and adherence to the NCSC 14 security principles. Presentation of report to customer detailing Microsoft 365 security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Modern Work Strategy: 3-hour Briefing SessionRISUAL LTDThis engagement is a 3 hour briefing session with an Enterprise Architect to go through two primary elements of Microsoft 365, our Modern Work Strategy & out Modern Work assessments.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
59 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
60 out of 60