FiltersClear all
Consulting services results
Showing results in consulting services.
Microsoft Defender Secure Score Optimization + Licensing & Skills Review - 1-Week AssessmentBlue Cycle LLCMaximize your Secure Score and ROI with a 1-week audit of config, licensing, and security team readiness
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 60
Microsoft Entra - Global Secure Access | Pilot DeploymentITC Secure LtdMicrosoft Entra Global Secure Access pilot deployment for improved security posture, streamlined access management & regulatory compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
2 out of 60
Microsoft Purview Insider Risk Management and Compliance: ImplementationITC Secure LtdThis engagement delivers setup and enablement for Microsoft Purview’s Insider Risk Management and Communication Compliance capabilities, supporting proactive risk mitigation.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
3 out of 60
Cybersecurity Assessment Service: 2-Day AssessmentHTGThe Cyber Security Assessment Tool (CSAT) is a software product developed by security experts to quickly assess the status of an organisation’s security with recommended improvements based on fact.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
5 out of 60
Intune Design and Deployment ServicesTrusted Tech TeamModernize deployment, configuration and management of your Windows devices while
improving your security posture.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
6 out of 60
POC Securité IT : 2 semainesEconocom Products & Solutions BeluxValidation des capacités des solutions de sécurité Microsoft dans votre environnement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
8 out of 60
Threat Protection EngagementFUJITSUIdentify and mitigate threats. Strengthen security, prioritize vulnerabilities, and improve your position.
+1
Applicable to:
Threat Protection
9 out of 60
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions BeluxImplémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
"Threat Protection: 3 Day Workshop"Insentra Pty LtdOur Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure LtdApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 60
Secure AILogicalis SolutionsComprehensive security for generative AI applications, ensuring safe usage and protection of sensitive data
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
14 out of 60
Multifactor Authentication: 4-Day ImplementationFSI StrategiesImplementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
16 out of 60
Security Posture Assessment ServiceKochoSecurity Posture Service, assesses an organisation’s cloud environment against recognised security benchmarks and makes recommendations to uplift security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Trustwave Accelerator for Microsoft PurviewTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Purview to unlock full value for your organization
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
18 out of 60
Email and Threat Protection 4 Week ImplementationHTGHTG’s Advanced Email Threat Protection pack ensures your Microsoft products such as Outlook, SharePoint, OneDrive & Microsoft Teams are hardened to best practice standards.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
19 out of 60
Security and Compliance AssessmentAgilisys LtdOur Security & Compliance assessment helps you understand the threats you might be facing, reduce the risk of your business being interrupted, and as a result allow you to gain speed and efficiency.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
20 out of 60
Security Accelerator: 5-Day WorkshopRicoh UK LimitedProvides insight and rates risk to existing security posture & delivers a roadmap to improvement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Microsoft 365 Security: 2-Day ImplementationCloud DirectA quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Microsoft 365 Security: 6-Day ImplementationCloud DirectA quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Microsoft 365 Security: 9-Day ImplementationCloud DirectAn engagement that will setup Microsoft 365 with enterprise-level security & compliance policies to provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security assessment - 3 day848 GroupMicrosoft 365 Security assessment to benchmark Office 365 implementation against CIS and Microsoft Security best practice, and deliver a road map for resolving security risks
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 60
Enablement Support Implementation (Unit Based)PowerONPlatforms LimitedPowerON Enablement Support provides a unit/hour based support agreement for customers seeking increased ROI and expert support on their Microsoft 365 workloads (Unit/Hour Based, Annual Agreement)
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
26 out of 60
Endpoint Management - 3-Day enablement WorkshopBT BusinessThis workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
27 out of 60
Security Threat Check: 5-Day Assessment & WorkshopChorusOur security assessment identifies active and potential security threats and gives you a clear breakdown of which Microsoft 365 security products can be used to remediate active threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Zero Trust Security Assessment: 10-Day AssessmentChorusOur zero trust security assessment reviews your security posture to give you a clear roadmap to adopt Microsoft 365 security solutions to remove vulnerabilities and improve your posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Mobile Threat Defence 3 Week AssessmentBT BusinessMTD risk assessment using Microsoft 365 and Zimperium zIPS
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
30 out of 60
Enterprise Mobility + Security - 2 week PoCPowerONPlatforms LimitedProof of Concept designed to provide customers the most flexible way to explore, review and adopt Microsoft Security solutions across the Microsoft Enterprise Mobility + Security suites over 2 weeks
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
31 out of 60
Microsoft Cloud App Security (MCAS) WorkshopAdvaniaThis MCAS workshop guides an organisation through the high level design considerations applicate to Cloud Discovery, Connect App and session proxy policy capabilities and related integrations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 60
Microsoft 365 Security 1-Day AssessmentValtoA security assessment of the Microsoft 365 Environment checking all services within the platform and covering off additional tools available in your organisation to assist with the security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Microsoft 365 Security: 3 Day AssessmentDaisy Corporate Services Trading LimitedDaisy's Microsoft 365 Security Assessment is a three-day consultancy service delivering a current state assessment of your Microsoft 365 environment, security controls and security requirements.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 60
Microsoft 365 Security Audit: 3-Day AssessmentMarathon Managed ServicesMicrosoft 365 Security Health Check and Report. Analysis of Secure Score and adherence to the NCSC 14 security principles. Presentation of report to customer detailing Microsoft 365 security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Security Assessment for Microsoft 365: 5 DaysChess LtdProtect your data with Security Assessment of your Microsoft 365 subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
SOC as a Service_1 day ImplementationTarsus On Demand (Pty) LtdSOC is a managed service that leverages a bespoke Threat Monitoring Platform. This platform detects malicious and suspicious activity across 3 critical attack vectors: Endpoint, Network & Cloud.
+2
Applicable to:
Cloud Security
Threat Protection
37 out of 60
Managed Security Support: 5-days ImplementationChess LtdManaged security support using the latest technology from Microsoft and Chess Data Protect for Microsoft 365.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
38 out of 60
Incident Response: 24 Hour ImplementationBytes Software ServicesProviding help with security incidents when you need it most.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
39 out of 60
Managed Defender for Endpoint : 4-wk PoCBytes Software ServicesBytes Managed Defender for Endpoints provides proactive management with 24/7 detection and response to ensure appropriate response capabilities.
+2
Applicable to:
Cloud Security
Threat Protection
40 out of 60
Microsoft 365 Modern Workplace: 4Wk ImplementationStripe OLT Consulting LtdMicrosoft 365 has been designed to help your organisation excel in a remote working world - Our team of gold certified Microsoft experts are here to support it's implementation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
41 out of 60
Modern Device Management Managed serviceSIX DEGREES TECHNOLOGY GROUP LTDSecure end-to-end device management service from a trusted Microsoft Expert MSP.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
42 out of 60
Information Protection Workshop: 3day WorkshopPHOENIX SOFTWARE LTDEnabling you to use the capabilities built into Microsoft 365 to mange and secure your organisation's digital information in the cloud with products such as Information Protection
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 60
Microsoft 365 Security Workshop: 3-day WorkshopPHOENIX SOFTWARE LTDEnable organisations to understand how Identity & Access Management, Threat Protection and Secure Management can help to secure their organisation in comparison to their existing Security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Endpoint Management: 5 Day ImplementationCorporate Project SolutionsOur Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Device Management sits within your Security & Compliance strategy.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
45 out of 60
Zero Trust Identity: 5 day ImplementationCorporate Project SolutionsCPS' Security, Compliance, & Identity (SCI) team will work with you to identify how Microsoft 365 Zero Trust identity management can be implemented within your Security strategy.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
46 out of 60
Compliance and Identity: 5 day ImplementationCorporate Project SolutionsOur Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where SCI sits within your Cyber Security strategy.
+2
Applicable to:
Identity & Access Management
Threat Protection
47 out of 60
Compliance Microsoft 365: 5 Day ImplementationCorporate Project SolutionsOur Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Information Protection & Governance sits within your Compliance strategy. They
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
48 out of 60
Microsoft 365 Risk Management 5 day ImplementationCorporate Project SolutionsOur Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Risk Management sits within your Compliance strategy.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
49 out of 60
Microsoft 365 Threat Protect: 5 Day ImplementationCorporate Project SolutionsOur Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Threat Protection sits within your Cyber Security strategy.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
50 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Microsoft 365 Licence Health Check: 1-Day AssessmentITC Secure LtdA 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
[Threat Management: 5-Days Assessment]Computacenter PlcCustomer security assessment in regards of Threat management: 5 day offer
+1
Applicable to:
Threat Protection
53 out of 60
Surface as a Service: 12-Month Managed ServiceTrustmarque Solutions LimitedSurface as a Service is an accessible, risk averse way of getting the latest Microsoft Surface technology in the hands of your employees, wherever they are.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
54 out of 60
Secure Score Review: 2-Hour WorkshopCloud DirectEnhance your security posture with an expert-led consultancy workshop. This workshop is a 'get started' guide for those who don't have the luxury of employing security architects.
+2
Applicable to:
Cloud Security
Threat Protection
55 out of 60
Migrate to Microsoft Defender for Office 365: 11-Wk ImplementationComputacenter (UK) Ltd - Hatfield HQThis service covers the migration from your existing 3rd party email protection solution to Microsoft Defender for Office 365. Our service provides you with an end to end migration path that is flexib
+1
Applicable to:
Threat Protection
56 out of 60
Migrate to Microsoft Defender for Endpoint: 11-Wk ImplementationComputacenter (UK) Ltd - Hatfield HQThis service covers migration from your existing 3rd party end point protection solution to Microsoft Defender for Endpoint. Our approach ensures you have peace of mind with full visibility of the ste
+1
Applicable to:
Threat Protection
57 out of 60
Microsoft 365 Security Hardening: 3 Days ImplementationINFINITY TECHNOLOGY SOLUTIONS2-3 days of consultancy from a Microsoft Gold Partner to improve the security stance within your Microsoft 365 tenant, including Conditional Access, MAM, MFA, email filtering and alerts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Overwatch for Microsoft 365 Security: 12 Month ImplementationThreatscapeOverwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
59 out of 60
Microsoft 365 Security Essentials Implementation ServiceSoftcatKick-starting your Microsoft 365 security position, aligning with industry best practice standards.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
60 out of 60