FiltersClear all
Consulting services results
Showing results in consulting services.
Identity and Access Management: 4-Wk AssessmentZetta Pty LtdZetta’s Assessment and Optimisation engagement will assess your current identity posture and advise you how to manage and secure your users and access to all your apps.
+2
Applicable to:
Cloud Security
Identity & Access Management
1 out of 36
Zero Trust: 3-Day AssessmentQUORUM SYSTEMS PTY LTDThe assessment has been designed and scoped to focus on Microsoft 365 or Azure security elements as these relate to inform a robust zero trust strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 36
Identity - Entra - Azure iDPLinktech AustraliaConsolidate all third party and on-premises applications to use Azure AD as the main identity provider for authentication and access.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
3 out of 36
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 36
Microsoft 365 Security Posture 10-days AssessmentFUJITSUSecure Microsoft 365 and maximise your investment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
5 out of 36
Office 365 Assessment ServiceWaterstons LimitedPlan, design and implement Office 365 or evaluate and optimise your existing Office 365 investment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
6 out of 36
Windows 365 Hybrid Work Proof of ConceptZetta Pty LtdZetta’s Windows 365 Hybrid Work Proof of Concept will help you identify how Windows 365 can meet your organisation's hybrid work needs.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
7 out of 36
Copilot Preparation Workshop 1Generation-e Productivity Solutions Pty LtdThe Copilot Preparation Workshop is a crucial step in ensuring your organisation is ready to utilise the full potential of Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
8 out of 36
Essential Eight Maturity AssessmentChamonix IT ConsultingThe culmination of this assessment is the establishment of a robust security foundation to equip you with a solid base upon which you can build and enhance your cybersecurity posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
9 out of 36
Assessment of Microsoft Defender for IdentityEighty20 Solutions Pty LtdOur Defender for Identity Assessment is a dependable way to get ready for your Defender for Identity adoption, ensuring that you enhance your environment and evaluate the results before you begin.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
10 out of 36
Copilot for Security: Assessment 10-DaysQUORUM SYSTEMS PTY LTDMicrosoft Copilot for Security Readiness Assessment (including PoC) – the first generative AI product to help security and IT teams protect at the speed and scale of AI.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 36
Copilot Advanced Services: 1 Day 3 WorkshopsNess IsraelUnlock the full potential of Microsoft Copilot with our tailored AI services, enhancing security, development and productivity across Microsoft 365 applications through flexible, expert-led sessions.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Workplace Analytics
12 out of 36
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
13 out of 36
Microsoft Purview Data Loss Prevention: 4-Wk Implementation ServiceUNIFY Solutions Pty. Ltd.UNIFY Solutions will implement Microsoft Purview Data Loss Prevention (DLP) to protect your organisation's sensitive information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
14 out of 36
Microsoft Copilot for Security Readiness AssessmentDEFEND LimitedAssess your organisations' readiness for the power of Copilot for Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 36
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
16 out of 36
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
17 out of 36
Microsoft 365 Copilot Value Discovery: 2-Week AssessmentPrimendUnlock the full potential of Microsoft Copilot. Discover high-value use cases, optimize your AI readiness, and build a robust business case for AI transformation
+2
Applicable to:
Adoption & Change Management
Cloud Security
18 out of 36
Microsoft 365 Backup Readiness AssessmentABTechnologiesEvaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
19 out of 36
Microsoft 365 Secure Productivity WorkshopABTechnologiesEnable your team to work securely and productively using Microsoft 365 best practices.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
20 out of 36
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
21 out of 36
Manage Compliance Obligations & Risks with Microsoft PurviewBDOEnhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
22 out of 36
Data Security with Microsoft Purview SolutionsBDOEnhance data security control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
23 out of 36
Identity and Access Control ImplementationSMART business LLCCybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
24 out of 36
MCI Engagements - Cloud Securityimpeltec Pty LtdimpelSecure Cloud Security Engagement: Free 4-week workshop
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 36
Managed Microsoft security services by DatacomDatacomDatacom’s managed cyber defence operation centre (CDOC) services provide 24/7 managed security through a centralised CDOC.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 36
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 36
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
28 out of 36
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
29 out of 36
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
30 out of 36
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
31 out of 36
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
32 out of 36
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 36
Microsoft 365 Security AssessmentTechPlus TalentThis Microsoft 365 Security Assessment evaluates your entire Microsoft 365 environment to identify security gaps and misconfigurations, delivering risk-rated findings and prioritized recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
34 out of 36
A1 Technologies Secure and Govern Copilot and AgentsA1 Technologies GroupEnable secure, compliant adoption of Microsoft 365 Copilot and AI Agents with A1 Technologies’ governance-first approach, delivering risk mitigation, policy alignment, and operational confidence.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
35 out of 36
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
36 out of 36