FiltersClear all
Consulting services results
Showing results in consulting services.
Microsoft Information Protection Fast Start - 12 Week ImplementationInsight Canada IncDevelop and implement a best-practice Microsoft Information Protection framework. As more and more business data moves to the cloud, classifying and protecting that data is becoming critical.
+2
Applicable to:
Cloud Security
Information Protection & Governance
1 out of 48
Data Security Engagement - 5 Week WorkshopInsight Canada IncIntelligently investigate and take action on data security risks. Detect, investigate, and act on data security risks in your organization.
+1
Applicable to:
Cloud Security
2 out of 48
Microsoft 365 E5 Roadmap - 4 Week WorkshopInsight Canada IncThe Insight Microsoft 365 E5 Roadmap is designed to provide clients with a roadmap to guide near and long-term rollout plans to more effectively use their Microsoft 365 E5 investment.
+2
Applicable to:
Cloud Security
Knowledge & Insights
3 out of 48
Security Best Practices AssessmentTechNet UC LLCOur assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
4 out of 48
Comprehensive Exchange Online Security ConfigurationTechNet UC LLCUnmatched Security and Compliance for Your Exchange Online Environment
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
5 out of 48
KK_Exchange_Migration Consulting ServicesKraft KennedyMoving to Exchange Online significantly extends the use of Microsoft 365 by modernizing communication infrastructure, enhancing security, and unlocking integrated productivity features.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
6 out of 48
Compugen Security Posture AssessmentCompugenThe assessment is designed to evaluate and strengthen your organization's security posture by leveraging the robust tools available in Microsoft Defender.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 48
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLCSkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 48
SkyTerra's Cloud Security AssessmentSkyTerra Technologies LLCStrengthen Microsoft cloud security with a structured assessment, an actionable roadmap, and enablement your team can run with
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 48
InTune AssessmentSkyTerra Technologies LLCSkyTerra helps you configure and align Intune to meet your real business needs, across platforms, policies, and people.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
10 out of 48
Unified Identity & Secure Edge Modernization with Entra SuiteBDOModernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 48
Okta to Microsoft Entra ID ConversionSkyTerra Technologies LLCConsolidate identity on Microsoft Entra ID, reduce cost and complexity, and raise your security baseline without disrupting your users.
+2
Applicable to:
Cloud Security
Identity & Access Management
12 out of 48
Zero Trust Deployment and Optimization ServiceSoftchoiceDeploy zero trust with confidence, optimize it to deliver lasting outcomes.
+2
Applicable to:
Cloud Security
Threat Protection
13 out of 48
Microsoft 365 Defender Deployment from BellBell CanadaKeep your organization protected against cyber threats with a comprehensive security audit and risk assessment by Bell, backed by the threat detection capabilities of Microsoft Defender.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
14 out of 48
Microsoft 365 Intune Deployment From BellBell CanadaEnable Microsoft’s best-in-class compliance and identity management solution with start-to-finish support from Bell.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
15 out of 48
Microsoft Purview QuickStart: ImplementationKraft KennedyKraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
16 out of 48
Mergers & Acquisitions Integration Services in 90: Three (3) Month TransitionLong View SystemsSupport a seamless user experience and align business operations from Day One of any merger, acquisition, or system migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
17 out of 48
Assessment and Remediation on Microsoft 365 by CompugenCompugenThe Security Assessment and Remediation evaluates your Microsoft 365 tenant's security posture, aligned with the best practices outlined by the Center for Information Security (CIS) benchmark.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
18 out of 48
Microsoft 365 Security Best PracticesTechNet UC LLCSecure your Microsoft 365 environment by aligning with Microsoft’s latest security standards—enhancing threat protection, data governance, and compliance across Exchange, Teams, and SharePoint.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 48
Free Data Security & Threat Protection Immersion BriefingIT Partner LLCDiscover how to strengthen your Microsoft 365 environment with real-time insights, proactive threat detection, and intelligent data protection — guided by certified experts from IT Partner LLC.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
20 out of 48
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
21 out of 48
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
22 out of 48
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
23 out of 48
Microsoft 365 Security AssessmentTechPlus TalentThis Microsoft 365 Security Assessment evaluates your entire Microsoft 365 environment to identify security gaps and misconfigurations, delivering risk-rated findings and prioritized recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
24 out of 48
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
25 out of 48
CBTS Microsoft 365 Managed ServiceCBTS Technology Solutions LLCPartner with CBTS for ongoing management and support of Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
26 out of 48
Cybersecurity Incident Response Retainer with Microsoft DefenderCBTS Technology Solutions LLCPartner with CBTS to ensure assistance when you need it most during a significant security event.
+2
Applicable to:
Cloud Security
Threat Protection
27 out of 48
S4B_XDR_Recuperacion_Automatica_RecursosS4BSILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
+2
Applicable to:
Cloud Security
Threat Protection
28 out of 48
S4B Email Attack Simulation TrainingS4BAttack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
29 out of 48
Threat Investigation and Analysis Service with Microsoft Defender XDRS4BSILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
+2
Applicable to:
Cloud Security
Threat Protection
30 out of 48
Advanced Hybrid Identity Security with Microsoft IdentityS4BHybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 48
Credentials and access protection , unauthorized logins, and suspicious behavior with Microsoft IdentityS4BCloud Identity Protection detects and mitigates credential and access risks using Microsoft Entra ID Protection. It leverages analytics, adaptive MFA, and condicional access to enhance security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
32 out of 48
Protección Identidades en ambiente Híbrido con Microsoft IdentityS4BIntegra seguridad en nube y on-premise con Defender for Identity y Entra ID Protection, unificando detección, investigación y respuesta frente a amenazas.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
33 out of 48
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDRS4BProtección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
+2
Applicable to:
Cloud Security
Threat Protection
34 out of 48
Entrenamiento de Phishing con Microsoft Office 365S4BOfrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
35 out of 48
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4BSeguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
+2
Applicable to:
Cloud Security
Threat Protection
36 out of 48
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4BInvestiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
37 out of 48
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4BProtects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
+2
Applicable to:
Cloud Security
Threat Protection
38 out of 48
CYBERWELL Microsoft Security AuditCYBERWELL Canada Inc.Identify risks and misconfigurations with prioritized remediation guidance across Microsoft 365 environments.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
39 out of 48
Seguridad avanzada de identidad en la nube con Microsoft IdentityS4BProtege credenciales y accesos en la nube con Microsoft Entra ID Protection, aplicando MFA adaptativo y acceso condicional para mitigar riesgos de identidad.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
40 out of 48
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4BDefensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
41 out of 48
Enterprise Automated Endpoint Recovery with Microsoft Defender XDRS4BSILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
42 out of 48
Microsoft 365 Security Assessment - 4 DaysMatrix3D Infocom Private Ltd.This Assessment is a comprehensive evaluation of your Microsoft 365 environment, designed to identify misconfigurations, security gaps, compliance risks, and underutilized Microsoft security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
43 out of 48
Microsoft 365 Migration and Deployment ServicesImprovingAssess, migrate, and optimize Microsoft 365 to boost collaboration, strengthen security, reduce redundant tools, and prepare your environment for AI‑driven productivity with Microsoft 365 Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
44 out of 48
The Threat Protection Envisioning WorkshopRackspace TechnologyA collaborative workshop that identifies real threats, prioritizes risk, and delivers a clear Microsoft-aligned security roadmap to focus investments and reduce cyber risk confidently enterprise-wide.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
45 out of 48
Microsoft Sentinel SOC Managed Service by H OneH One (Private) LimitedH One’s Microsoft Sentinel–based MDR service combines certified expertise, continuous monitoring, and rapid response to protect and strengthen your cloud environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 48
Beyondsoft Segurança Ambiente CloudBeyondsoftOferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
47 out of 48
Netox MXDR / SOC 24/7Netox OyFinnish-built 24/7 MXDR & SOC for Microsoft environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 48