FiltersClear all
Consulting services results
Showing results in consulting services.
All results
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
1 out of 60
Microsoft Advisory Services ManagedSoftwareOneDrive Value and Cost Savings Throughout the Microsoft Cloud Investment Lifecycle
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
2 out of 60
Microsoft 365 Copilot Security and Compliance controlstrue org cloudMicrosoft Copilot for Security: Enhance Your Organization's Security Posture
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
3 out of 60
Ivanti (MobileIron) to Microsoft Intune Migration PlanMobile MentorMobile Mentor’s Ivanti to Microsoft Intune migration services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration to Intune.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
4 out of 60
Digital Workplace Essentials for Microsoft 365SoftwareOneDrive innovation and transformation, knowing your employees can work securely and efficiently with the CSP model and SoftwareOne’sDigital Workplace Essentials
+3
Applicable to:
Cloud Security
Information Protection & Governance
Workplace Analytics
5 out of 60
ManageEngine to Microsoft Intune Migration PlanMobile MentorMobile Mentor’s ManageEngine to Microsoft Intune migration services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
6 out of 60
Cybersecurity Managed Services for Microsoft by SoftwareOneSoftwareOneSecuring your digital landscape with SoftwareOne Cybersecurity Managed Services for Microsoft
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 60
JAMF to Intune MigrationMobile MentorMobile Mentor’s JAMF to Intune migration planning services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration to Intune.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
8 out of 60
Microsoft 365 Security AssessmentSii Sp. z o.o.We assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Microsoft 365 Security Review: AssessmentCyberOneIdentify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
10 out of 60
Citrix Endpoint Management to Microsoft Intune Migration PlanMobile MentorMobile Mentor’s Citrix Endpoint Management to Microsoft Intune services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
11 out of 60
Microsoft Purview Implementation ServiceTHREATSCAPE LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Purview while ensuring alignment with best practice for security, governance, and compliance.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 60
Security Operations Center with Microsoft SentinelAVASOFTMonitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 60
Defend Against Threats with SIEM Plus XDR: 2-W WorkshopExelegentThe Defend Against Threats with SIEM Plus XDR (with Attack Simulation) workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
15 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
17 out of 60
Copilot for Microsoft 365 Data and Security Readiness AssessmentAwara IT Kazakhstan LLPElevate Your Data and Security with Copilot for Microsoft 365 Readiness Assessment by Awara IT's experts.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
18 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
19 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバ イスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Endpoint Management WorkshopYork Telecom Corp3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
22 out of 60
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
23 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareOneImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
24 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFTEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
26 out of 60
Microsoft Endpoint Management: 3- W WorkshopExelegentMicrosoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 60
Microsoft Purview & Generative AI Synergy: Data Governance for the FutureBlack Cell Magyarország Korlatolt Felelossegu TarsasagUsage of generative AI increases day by day in enterprise environments, in some cases without control. Act in time and prevent data breaches and exfiltration activities.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
29 out of 60
Rapid Remediation of Microsoft Secure ScoreCyberOneBoost your Microsoft Secure Score, reduce risk and increase cyber resilience with expert-led rapid remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFTEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
31 out of 60
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
32 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
33 out of 60
Identity as a Service | Assure 365CyberOneFully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
34 out of 60
Data Security as a Service | Assure 365CyberOneFully Managed Data Security, governance and compliance with 24x7 monitoring—Powered by Microsoft Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 60
Secure Identities and Access: 3 W - WorkshopExelegentHelp customers find and mitigate identity risks and safeguard their organization with a seamless identity solution.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
36 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud Security
Threat Protection
37 out of 60
4security: Microsoft 365 Communication Protect4Sight Holdings4security: Microsoft 365 Communication Protect, a solution to safeguard your organisation’s communications
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
38 out of 60
Microsoft 365 Data oversharing report: 5-D Implementation and consultingReplyComprehensive Insights: Get a holistic overview of your environment and uncover overshared sites, documents, and items without the need for expensive Microsoft 365 E5 licenses.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
39 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
40 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight HoldingsStrengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
4security: Backup as a Service for Microsoft 3654Sight HoldingsProtect your data with 4Security's Microsoft 365 Backup as a Service. Seamless integration, automated backups, and reliable data recovery for businesses of all sizes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 60
AVASecure 360 Next-Gen MXDR Managed ServicesAVASOFTAt AVASOFT, we are committed to securing your digital environment through a holistic Managed Extended Detection and Response (MXDR) solution.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
44 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Windows in Cloud AssessmentInviso CorporationMaximize your Endpoints! Find out how a Cloud PC could potentially save you money!
+1
Applicable to:
Cloud Security
46 out of 60
Data Security & Protection: 8 weeks - ImplementationMazzy Technologies Corp.Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
47 out of 60
Windows 11 Assessment: 1-WKSteeves Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
48 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
49 out of 60
KMicro Rapid Incident Response & Readiness ServiceKMicro Tech, Inc.KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
50 out of 60
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDSEgyptian Data Protection Law offer aims to give you a brief description of the following:
Data Privacy Basics
The Egyptian Data Protection Law main highlights
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
51 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
53 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro LtdWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
55 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
System Center Endpoint Manager 40 hour Quick Start Proof of Concept with Co-Management with Endpoint Manager in Office 365York Telecom CorpSystem Center Endpoint Manager 40-Hour Quick Start Proof-of-Concept. Design, deploy and learn SCEM in 40-hour proof-of-concept with Co-Management with Endpoint Manager Office 365
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
57 out of 60
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology HoldingOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
58 out of 60
Threat Protection WorkshopMobile MentorDuring this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
59 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
60 out of 60