FiltersClear all
Consulting services results
Showing results in consulting services.
KK_Exchange_Migration Consulting ServicesKraft KennedyMoving to Exchange Online significantly extends the use of Microsoft 365 by modernizing communication infrastructure, enhancing security, and unlocking integrated productivity features.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
1 out of 60
Microsoft 365 Security Assessment up to 6 weeksACTSACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 60
Comprehensive Threat Protection: Free WorkshopLong View SystemsProtect against advanced threats with Long View’s Threat Protection, leveraging Microsoft Defender for full security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 60
Comprehensive Exchange Online Security ConfigurationTechNet UC LLCUnmatched Security and Compliance for Your Exchange Online Environment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
4 out of 60
User Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
5 out of 60
MXDR Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
6 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View SystemsSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Microsoft 365 Security Best PracticesTechNet UC LLCSecure your Microsoft 365 environment by aligning with Microsoft’s latest security standards—enhancing threat protection, data governance, and compliance across Exchange, Teams, and SharePoint.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoiceThe Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Defender PilotLevacloud LLCThe Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
+2
Applicable to:
Cloud Security
Threat Protection
11 out of 60
Threat Protection EngagementISA Cybersecurity Inc.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
13 out of 60
Secure Workspace: 1 Day WorkshopWatserv Inc.A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
14 out of 60
Imagine workshop for Security: 3daysSoftlanding Solutions Inc.MCI Build Intent Workshops demonstrate value, build customer intent, and maximize opportunities for Modern Work and Security for Microsft365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
15 out of 60
Microsoft 365 Copilot Readiness AssessmentInsight Canada IncLeverage the power of Generative AI, and Large Language Models while ensuring you are protected against from the risks of unauthorized data leakage, inappropriate data access and other risks
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
16 out of 60
QC Education Security Directives -1 Day BriefingAvalerisThis one day GAP Analysis will help you assess your current state of compliance for Quebec Ministry of Education Security Directives and provide high-level recommendations to address any shortcomings.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
17 out of 60
Compliance Workshop: Data Risk ManagementAvalerisA structured approach to discover risks related to organizational data and mapping these risks to solutions that will help manage and protect data and mitigate the associated risks
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
18 out of 60
Endpoint Management WorkshopAvalerisThis Cloud Accelerator Workshop will demonstrate how Microsoft Endpoint Manager can help your organization protect endpoint devices, secure user identities, and increase user productivity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
19 out of 60
Secure Work from Anywhere WorkshopAvalerisTeamwork & collaboration are needed to build resilience for your people, teams, & organization. Empower people to be productive & secure as they adapt to new ways of working with Microsoft365
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
20 out of 60
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLCRavenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
21 out of 60
QC Education- Threat Protection - 2 Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #14 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
22 out of 60
Mobile Device Management - 2 Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #1, #2 and #3 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
23 out of 60
Office 365 Security: 1-Day AssessmentNetrix GlobalSecurity assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
+1
Applicable to:
Cloud Security
24 out of 60
Defend Against Threats with SIEM Plus XDRNetrix GlobalAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Hybrid Return to Work Enablement: 4 Wk-AssessmentInsight Canada IncThis offer helps enable your hybrid return to work strategy and ensure your organization is ready for this transition.
+3
Applicable to:
Cloud Security
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
26 out of 60
Information Protection - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Information Protection policies, procedures and technology against best practices.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 60
Security Maturity Assessment: 4 WksLixar ITLet BDO help you design your roadmap to increase your security score with cost-effective security tools with our 4 week Security Maturity Assessment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
28 out of 60
Insider Risk Management Assessment: 4 WksLixar ITBDO's Insider Risk Management Assessment can help you identify insider data risks and establish a plan to reduce data leakage using Microsoft 365 to ensure compliance and security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
29 out of 60
BDO eDiscovery: 4 Wk AssessmentLixar ITCentralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
30 out of 60
Microsoft 365 Digital Workforce WorkshopVNEXT GroupLearn how to empower people to be more productive and secure as they adapt to new ways of working with Microsoft 365.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Teams Custom Solutions
31 out of 60
Endpoint Management: 5-Days WorkshopVNEXT GroupLearn how to manage users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
32 out of 60
Quebec Education - DLP - 2 Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directives #5 and #6 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
33 out of 60
QC Education- Identity Management- 2Day AssessmentAvalerisThis Assessment will help you assess your current state of compliance for Quebec Ministry of Education Security Directive #4 and provide high-level recommendations to achieve compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
34 out of 60
Enterprise Mobility - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Enterprise Mobility policies, procedures and technology against best practices.
+2
Applicable to:
Cloud Security
Mobile Device Management
35 out of 60
Threat Protection - 1 Day BriefingAvalerisAvaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Threat Protection policies, procedures and technology against best practices.
+2
Applicable to:
Cloud Security
Threat Protection
36 out of 60
Enterprise Identity and Governance -1 Day BriefingAvalerisAvaleris developed a Capability Maturity Model to help organizations quickly assess the current state of Identity Management and Governance policies, procedures and technology against best practice.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
37 out of 60
microsoft365_security_identity_protection_1 Day_Workshop_CanadaCDWIdentity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to
manage your access quickly and accurately
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft 365 Security Device Protection 1 Day Workshop - CanadaCDWAs more and more users become mobile and are using a wider variety of devices, applications and documents need to keep up.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
39 out of 60
Microsoft365_security_information_protection_1Day_Workshop_CanadaCDWInformation is one of your most valuable assets and can easily be shared, even outside the organization.
+2
Applicable to:
Cloud Security
Threat Protection
40 out of 60
Microsoft Defender for Endpoint: 2-Wks Proof of ConceptLotus Beta AnalyticsExperience Threat identification, Triage and Automatic Remediation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Cloud-to-Cloud Backup: 1 Day ImplementationBDO CanadaGet scalable backup and recovery implemented for all your Microsoft Office 365 data.
+1
Applicable to:
Cloud Security
42 out of 60
Microsoft 365 Consulting Services: 10-Week ImplementationRicohDeployment of Microsoft 365 as a cloud-based solution and the world’s leading productivity platform. Your workforce can access the necessary tools and information whenever and wherever they want.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
43 out of 60
Microsoft 365 Cybersecurity Jumpstart: 1Wk ImplementationBDO CanadaEnsure the right safeguards are in place. Secure your Microsoft 365 tenant through BDO Lixar’s security configuration services and the cloud provisioning expertise
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Viva Insights WorkshopCDWThe Enablement Workshop for Microsoft Viva from CDW focuses on finding your organization’s pain points, and it identifies how the Viva platform can help
+3
Applicable to:
Cloud Security
Microsoft 365 Live Events
Teams Custom Solutions
46 out of 60
Microsoft 365 Defender Rapid Deployment - CanadaCDWCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Security - Managed Defender - One-Pager - CanadaCDWCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Sentinel Readiness WorkshopSentinel Technologies Inc.Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
49 out of 60
Copilot for Microsoft 365 Data Security QuickStartSoftchoiceSetting the foundation for data security and governance in preparation for Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
50 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
51 out of 60
Microsoft Intune Suite PilotSoftlanding Solutions Inc.Explore the advanced capabilities of Microsoft Intune Suite within your own environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
52 out of 60
Microsoft Security Threat Protection Engagement - CanadaCDWImprove your security posture with a Threat Protection Engagement. Organizations today are managing a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems.
+1
Applicable to:
Cloud Security
53 out of 60
Compugen Threat Protection WorkshopCompugenEmpower Your Security Journey: Assess, Mitigate, and Accelerate with Microsoft’s Comprehensive Threat Protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Microsoft Intune Suite Pilot - CanadaCDWMicrosoft Intune Suite is an all-encompassing service crafted to meet the varied requirements of organizations in search of reliable and effective device management solutions.
+2
Applicable to:
Cloud Security
Device Deployment & Management
55 out of 60
Intune Assessment One-Pager - CanadaCDWThe Intune and Autopilot Assessment provides a thorough evaluation of your endpoint management strategy using Microsoft
Intune and Windows Autopilot.
+2
Applicable to:
Cloud Security
Device Deployment & Management
56 out of 60
Security Foundations Email: Assessment and ImplementationProServeITProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Exchange On-Prem Assessment - CanadaCDWThis Microsoft 365 Exchange On-Prem assessment, conducted by CDW, aims to perform a high-level review and analysis of your local Exchange server environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
58 out of 60
Global Secure Access DeploymentSoftlanding Solutions Inc.Global Secure Access (GSA) provides a comprehensive security framework that protects against modern threats while ensuring seamless and secure connectivity.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Defender - Secure Score - Audit et recommandationsPrecicom TechnologiesOptimisez votre cybersécurité et maximisez le potentiel des solutions Microsoft
+2
Applicable to:
Adoption & Change Management
Cloud Security
60 out of 60