FiltersClear all
Consulting services results
Showing results in consulting services.
All results
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
1 out of 60
Microsoft 365 Rapid Security Assessment: 1-Wk AssessmentAwara ITMicrosoft 365 Rapid Security Assessment is a quick yet comprehensive evaluation to enhance Microsoft 365 security against evolving cyber threats
+2
Applicable to:
Cloud SecurityThreat Protection
2 out of 60
KMicro's Sentinel360 MXDR with Microsoft Copilot for Security: 4-Wk POC/POVKMicro Tech, Inc.Enhance threat hunting & accelerated MXDR for Microsoft Sentinel with Copilot for Security integration
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
3 out of 60
Microsoft 365 Copilot - Adoption & Change Mgmt.CrayonUnlock the full potential of Microsoft 365 Copilot with our specialized Change Management service.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
4 out of 60
Microsoft Advisory Services ManagedSoftwareOneDrive Value and Cost Savings Throughout the Microsoft Cloud Investment Lifecycle
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
5 out of 60
Microsoft 365 Copilot - AdvisoryCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Readiness Workshop – your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
6 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY25CGI Inc.Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
7 out of 60
Copilot for Security Readiness AssessmentPerformantaFutureproof your Business Security with Microsoft Security Copilot and Performanta
+2
Applicable to:
Cloud SecurityThreat Protection
8 out of 60
Microsoft 365 Copilot Value Discovery: 2-Week AssessmentPrimendUnlock the full potential of Microsoft Copilot. Discover high-value use cases, optimize your AI readiness, and build a robust business case for AI transformation
+2
Applicable to:
Adoption & Change ManagementCloud Security
9 out of 60
Microsoft 365 Copilot Value DiscoveryCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Value Discovery Workshop – your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
10 out of 60
Digital Workplace Essentials for Microsoft 365SoftwareOneDrive innovation and transformation, knowing your employees can work securely and efficiently with the CSP model and SoftwareOne’sDigital Workplace Essentials
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceWorkplace Analytics
11 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
12 out of 60
Windows in Cloud AssessmentInviso CorporationMaximize your Endpoints! Find out how a Cloud PC could potentially save you money!
+1
Applicable to:
Cloud Security
13 out of 60
AVASecure 360 Next-Gen MXDR Managed ServicesAVASOFTAt AVASOFT, we are committed to securing your digital environment through a holistic Managed Extended Detection and Response (MXDR) solution.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
14 out of 60
Citrix Endpoint Management to Intune Migration PlanMobile MentorMobile Mentor’s Citrix Endpoint Management to Intune migration services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityDevice Deployment & Management
15 out of 60
Microsoft 365 Copilot - Extensibility SolutionsCrayonEnhance your Microsoft 365 Copilot experience and boost your productivity through customizations tailored to your organization's specific needs.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
16 out of 60
MDS - Microsoft Copilot for Security WorkshopMaureen Data SystemsDiscover how Microsoft Copilot for Security can enhance your security operations, streamline incident response, and empower your security teams
+3
Applicable to:
Adoption & Change ManagementCloud SecurityThreat Protection
17 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to:
Cloud Security
18 out of 60
Ivanti (MobileIron) to Intune Migration PlanMobile MentorMobile Mentor’s Ivanti (MobileIron) Intune migration services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration to Intune.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityDevice Deployment & Management
19 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFTEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
20 out of 60
Microsoft 365 Security: 3,5 Tage Tenant AssessmentAppSphere AGSicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementKnowledge & Insights
21 out of 60
ManageEngine to Intune Migration PlanMobile MentorMobile Mentor’s ManageEngine Intune migration planning services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration to Intune.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityDevice Deployment & Management
22 out of 60
Intune Managed ServiceMobile MentorYour endpoint ecosystem is constantly evolving and needs proactive management, so we designed the Intune Managed Service to help customers unlock the full potential of Intune.
+2
Applicable to:
Cloud SecurityIdentity & Access Management
23 out of 60
Microsoft 365 Security and Compliance AssessmentAVASOFTMicrosoft 365 Security and Compliance Assessment evaluates your current security posture, identifies vulnerabilities, and offers tailored solutions to enhance your data security and compliance.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
24 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
25 out of 60
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
26 out of 60
MDR for Microsoft DefenderADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
+2
Applicable to:
Cloud SecurityThreat Protection
27 out of 60
Microsoft Intune ServiceSii Sp. z o.o.Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementInsider Risk
28 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayonEvaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
29 out of 60
Copilot for Microsoft 365 WorkshopINOVASYS FOR SYSTEMSCopilot for Microsoft 365 Workshop, delivered by certified Microsoft partner Inovasys, is a comprehensive three-phase engagement.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
30 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
31 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
32 out of 60
Copilot for Microsoft 365: Security AcceleratorKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Accelerator: Tailored insights and guided deployments.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
33 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
34 out of 60
Secure Identities and Access: 3 W - WorkshopExelegentHelp customers find and mitigate identity risks and safeguard their organization with a seamless identity solution.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
35 out of 60
Microsoft 365 Copilot - Technical ReadinessCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Technical Readiness - your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
36 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM Systems• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
37 out of 60
Performanta Safe XDRPerformantaUtilising Microsoft Sentinel and Copilot for Security, reduce response times from hours to seconds utilising Microsoft Sentinel, Microsoft Copilot for Security and Microsoft security toolsets
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
38 out of 60
Microsoft 365 consultancyOnex GroupGet Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementTeamwork Deployment
39 out of 60
4 Weeks Microsoft 365 Security AssessmentArmis, Sistemas de Informação, LdaThe Microsoft 365 Assessment engagement will help customers evaluate their current security and compliance posture and create a roadmap to meet the organizational needs.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
40 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
41 out of 60
Windows 365 Pilot: 5 Days Proof of ConceptDelphi ConsultingDelphi Consulting will help you get started with Windows 365 Cloud-PC with its Pilot offering with the program running over 5 days.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementMobile Device Management
42 out of 60
Overwatch Microsoft 365 Security: 12 Month ImplementationTHREATSCAPE LIMITEDOverwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
43 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareOneImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementInformation Protection & Governance
44 out of 60
KMicro MXDR for SMBKMicro Tech, Inc.KMicro MXDR for SMB helps businesses reduce operational complexity and strengthen cybersecurity defenses by managing their Microsoft Defender XDR environment.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
45 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
46 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
47 out of 60
Nixu Managed Extended Detection and Response (XDR) with MicrosoftNixu OyjManaged XDR service including 24/7 Security Operations Center (SOC) powered with Defender XDR and Sentinel
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
48 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
49 out of 60
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
50 out of 60
Avanade Microsoft Security Service Edge Quick StartAvanade, Inc.Microsoft’s new Security Service Edge (SSE) capability empowers organizations on their Zero Trust journey though unique in the market integration with Microsoft Entra.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
51 out of 60
Defend, Protect, Secure with Microsoft Defender XDRComtrade System IntegrationTake the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
+2
Applicable to:
Cloud SecurityThreat Protection
52 out of 60
Mentoring ServiceMobile MentorOur mentoring service helps customers leverage Microsoft 365 to improve endpoint security & user experience. We help accelerate the learning curve & reduce risk by deploying Microsoft 365 optimally.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityDevice Deployment & Management
53 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
54 out of 60
NVISO Microsoft 365 Security AssessmentNVISOThe goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
+3
Applicable to:
Cloud SecurityMobile Device ManagementThreat Protection
55 out of 60
TGS Windows 11TEKsystems Global Services LLCTEKsystems partners with you to navigate the transition to Windows 11
+3
Applicable to:
Adoption & Change ManagementCloud SecurityDevice Deployment & Management
56 out of 60
Avanade Modern Sec OpsAvanade, Inc.To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
57 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, IncTrustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud SecurityThreat Protection
58 out of 60
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityTeamwork Deployment
59 out of 60
Shadow IT discovery with Microsoft cloud app securityAVASOFTKnow your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
60 out of 60