FiltersClear all
Consulting services results
Showing results in consulting services.
All results
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLCIntroducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
1 out of 60
Deploying Purview Data Security - Labels and DLPBulletproof Solutions Inc.A dependable approach to deployment of Data Security workloads led by governance and following our standard framework for Microsoft 365 customers
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
2 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCThe primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
3 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk AssessmentApex Digital SolutionsAchieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityThreat Protection
4 out of 60
Endpoint Security Advanced Quick Start 14-wk ImplementationEdgile, Inc.Pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementMobile Device Management
5 out of 60
Endpoint Security Basic Quick Start 12-wk ImplementationEdgile, Inc.Achieve a Microsoft pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementMobile Device Management
6 out of 60
Microsoft Defender for Endpoint: 4-Week ImplementationInvokeUnderstand your current use cases for antimalware / endpoint detection and response, map those use cases to Defender, and execute on a migration and rollout to Defender for Endpoint.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementThreat Protection
7 out of 60
Microsoft Cloud App Security: 2 Week ImplementationArmis, Sistemas de Informação, LdaKeep your employees productive and secure on their favorite apps and devices with Cloud App Security. Bring the security of your on-premises systems to your cloud applications.
+1
Applicable to:
Cloud Security
8 out of 60
Management Services: 3-month AssessmentQuisitiveQuisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementInformation Protection & Governance
9 out of 60
GDPR Assessment: 6-Week AssessmentHappiest Minds Technologies LimitedEnable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
10 out of 60
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POCatQorOur Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
11 out of 60
Microsoft 365 Security Readiness: 4-Wk AssessmentQuadrasystems.net (India) P LtdIdentify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
12 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
13 out of 60
DNS & Safe Sender Enablement for Microsoft 365 Mail: Configuration and 1-Month MonitoringFinchloomProtect your brand and eliminate spoof phishing on your Email domain(s) with setup of DMARC, DKIM, SPF authentication, and Valimail. Plus, one month of Monitoring and Reporting.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
14 out of 60
Microsoft Security: 4-Week ImplementationApex Digital SolutionsEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
15 out of 60
Security Outcomes SprintAscent Global, Inc.Understand the Business Value of Your Cybersecurity Investments
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
16 out of 60
Windows Virtual Desktop Implementation: 5-Days Professional ServiceIT Partner LLCProvide a streamlined solution using Windows Virtual Desktop (WVD) on Microsoft Azure, offering efficient remote workstations, cost-effective licensing, and Windows 365 in a terminal server format.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
17 out of 60
Modern Management for EndpointsIvision, Inc.Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
18 out of 60
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInsider Risk
19 out of 60
Office 365 Tenant-to-Tenant Cutover Email Migration without downtime and bounced email: 7-Days Professional ServiceIT Partner LLCSeamless Microsoft 365 tenant-to-tenant mailbox migration, essential for mergers, acquisitions, or relocations, ensuring no bounced emails, NDR, or downtime.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityDevice Deployment & Management
20 out of 60
Wc-PC- Wragby Cloud PCWragby Business Solutions & Technologies LimitedThe Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
21 out of 60
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week ImplementationQuisitiveQuisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityIdentity & Access Management
22 out of 60
Ctelecoms Threat Protection EngagementConsolidated Telecoms (Ctelecoms)Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
23 out of 60
MDS - Cybersecurity AssessmentMaureen Data SystemsThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
24 out of 60
Modern Frontline Work Acceleration 2 days WorkshopLiveRoute FZ-LLCLiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityFrontline Workers
25 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLCAdvanced endpoint security and threat protection: detect, investigate, and respond to attacks.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
26 out of 60
Windows 365 Assessment - 1 dayCC Bilgi TeknolojileriHybrid Windows for a hybrid world
Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
27 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementMobile Device Management
28 out of 60
Threat Protection: 2-Week WorkshopForsyte IT SolutionsLearn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
29 out of 60
Virtual Desktop - Health and Configuration 1 Week AssessmentCDI LLCCDI provides a review of a customer's Virtual Desktop environment and identify opportunities to improve the performance, stability, security and manageability.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementKnowledge & Insights
30 out of 60
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom ConsultingThis FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
31 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro LtdWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
32 out of 60
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLCCatapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
33 out of 60
Windows 365 Standardized PilotMobile MentorThe Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
34 out of 60
Microsoft Security Assessment: 3-Wk AssessmenteGroup Enabling Technologies, LLCAnalyze your cross platform security posture, with evaluated vulnerabilities and risks identified with a Microsoft Security Assessment.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
35 out of 60
Office 365 Security: 1-Day AssessmentNetrix GlobalSecurity assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
+1
Applicable to:
Cloud Security
36 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POCITC Secure LtdExperience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
37 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
38 out of 60
Security and Operations with Expert Microsoft 365 SupportAVASOFTMaximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementWorkplace Analytics
39 out of 60
GoDaddy Office 365 to Microsoft Office 365 Tenant-to-Tenant Cutover Email Migration: 7-Days Professional ServiceIT Partner LLCSeamless, short-term-downtime migration of email service from GoDaddy Office 365 to Microsoft Office 365, ensuring user access and Exchange Online functionality.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
40 out of 60
Microsoft 365 Licence Health Check: 1-Day AssessmentITC Secure LtdA 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
41 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
42 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvokeThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementIdentity & Access Management
43 out of 60
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLCSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
44 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
45 out of 60
Darktrace Managed Network SensorSentinel Technologies Inc.Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
+2
Applicable to:
Cloud SecurityThreat Protection
46 out of 60
CCPA CPRA: 6 - Wk AssessmentHappiest Minds Technologies LimitedEnable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesThreat Protection
47 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLCThis service moves key server tasks to a new one for upgrades or system changes.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
48 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLCEnhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
49 out of 60
Cloud-Native Migration Service: 4-Month ImplementationCyclotron Inc.With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
+2
Applicable to:
Cloud SecurityIdentity & Access Management
50 out of 60
Cloud App Security Information and Threat Protection: 3-Wk Professional serviceIT Partner LLCProtect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
51 out of 60
Copilot Planning WorkshopAhead, IncThis Copilot workshop will prepare your organization to utilize Copilot by identifying key scenarios and gaps in current Microsoft 365 configurations to improve ROI of initial Copilot deployments.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
52 out of 60
Virtual CISO Services: 1-Mo BriefingeGroup Enabling TechnologiesCIOs are busy leading the digital initiatives of the business, with security falling behind other priorities.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
53 out of 60
Defender for Office 365: 5-Day AssessmenteGroup Enabling TechnologiesMicrosoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
54 out of 60
Mitigate Compliance and Privacy Risks - 3 Day WorkshopProtivitiMicrosoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
55 out of 60
Microsoft Priva Assessment: 2 WkLighthouse GlobalEmpowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
+2
Applicable to:
Cloud SecurityInformation Protection & Governance
56 out of 60
CMMC Compliance with Microsoft 365: 4 wk impl.InsightInsight’s CMMC services program helps clients understand DoD requirements, develop a strategy to achieve compliance in hybrid and cloud models, and execute to implementation and ongoing operations.
+1
Applicable to:
Cloud Security
57 out of 60
Secure Data Management with Microsoft PurviewAVASOFTConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
58 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwovenNetwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
59 out of 60
UNITE: Cyber Security Assessment_INFINITY TECHNOLOGY SOLUTIONSBoost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
60 out of 60