FiltersClear all
Consulting services results
Showing results in consulting services.
Microsoft 365 Security Assessment: 6-day AssessmentPerformantaPerformanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCSeamlessly transfer email data and mailboxes between Office 365 tenants during mergers or separations. Ensure continuity for users, minimize disruptions, and enables a smooth transition.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
2 out of 60
XENMDM - Monthly SoC Support for Mobile DevicesXencia Technology Solutions Pvt LtdMicrosoft Intune platform based Managed Services covering device management, control and compliance along with monitoring and remediation of issues, policies, users, devices and threats.
+1
Applicable to:
Cloud Security
3 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLCAdvanced endpoint security and threat protection: detect, investigate, and respond to attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLCEstablish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Data Classification and labelling: 6-Months Impl.Toreon CVBAData classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
6 out of 60
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 60
Cybersecurity Assessment Service: 2-Day AssessmentHTGThe Cyber Security Assessment Tool (CSAT) is a software product developed by security experts to quickly assess the status of an organisation’s security with recommended improvements based on fact.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Cybersecurity AssessmentCDI LLCThe Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
9 out of 60
POC Securité IT : 2 semainesEconocom Products & Solutions BeluxValidation des capacités des solutions de sécurité Microsoft dans votre environnement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Microsoft 365 Security AssessmentFITTS LtdThe Microsoft 365 Security Assessment will review your businesses security posture across identity, devices, information, apps and infrastructure and provide a list of recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
11 out of 60
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 60
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions BeluxImplémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Collaboration & Data Governance 4-Week ImplementationHTGHTG’s Collaboration & Data Governance pack can help companies achieve the right balance of user freedom while ensuring compliance with corporate policies.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
14 out of 60
"Threat Protection: 3 Day Workshop"Insentra Pty LtdOur Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure LtdApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
16 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
18 out of 60
Secure AILogicalis SolutionsComprehensive security for generative AI applications, ensuring safe usage and protection of sensitive data
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
19 out of 60
Multifactor Authentication: 4-Day ImplementationFSI StrategiesImplementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Cloud Security Assesment - 4 Wks AssessmentYouCC Technologies LTD.YouCC Technology a leader in the Israeli Cloud Security consulting provider will assess your current cloud security situation and recommend key Microsoft 365 suite deployment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
21 out of 60
Zero Trust Adoption: 6-Day AssessmentPowerONPlatforms LimitedThe Solution Alignment is designed to support your understanding and plan your Secure Organisations future with Microsoft services. Looking across Data, Apps, Infra, Network, Identities and Endpoints.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
22 out of 60
Security and Compliance AssessmentAgilisys LtdOur Security & Compliance assessment helps you understand the threats you might be facing, reduce the risk of your business being interrupted, and as a result allow you to gain speed and efficiency.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
23 out of 60
Bytes Managed Workspace: 5 Day WorkshopBytes Software ServicesWorkshop and onboarding to provide on-going support and management of Surface, Microsoft 365 and workplace productivity applications
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
24 out of 60
Security Accelerator: 5-Day WorkshopRicoh UK LimitedProvides insight and rates risk to existing security posture & delivers a roadmap to improvement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Free Office 365 Review: 1hr AssessmentOutbound Solutions and Computing LtdOffice 365 review, health check, usage and overall environment summary
+3
Applicable to:
Adoption & Change Management
Calling for Microsoft Teams
Cloud Security
26 out of 60
Microsoft 365 Security: 2-Day ImplementationCloud DirectA quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Microsoft 365 Security: 6-Day ImplementationCloud DirectA quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Microsoft 365 Security: 9-Day ImplementationCloud DirectAn engagement that will setup Microsoft 365 with enterprise-level security & compliance policies to provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security assessment - 3 day848 GroupMicrosoft 365 Security assessment to benchmark Office 365 implementation against CIS and Microsoft Security best practice, and deliver a road map for resolving security risks
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 60
Microsoft 365 Security Advisor: 1-Hour AssessmentCloud DirectA consultancy service to advise the most optimal way to manage security posture within Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
31 out of 60
Security Threat Check: 5-Day Assessment & WorkshopChorusOur security assessment identifies active and potential security threats and gives you a clear breakdown of which Microsoft 365 security products can be used to remediate active threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Zero Trust Security Assessment: 10-Day AssessmentChorusOur zero trust security assessment reviews your security posture to give you a clear roadmap to adopt Microsoft 365 security solutions to remove vulnerabilities and improve your posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Mobile Threat Defence 3 Week AssessmentBT BusinessMTD risk assessment using Microsoft 365 and Zimperium zIPS
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
34 out of 60
Always on VPN - Implementation Service - 2 WeeksPowerONPlatforms LimitedHave a secure Microsoft Always On VPN Environment deployed quickly and effectively to support your remote working needs
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
35 out of 60
Modern Work Security Strategy & Assessment BriefRISUAL LTDCall with risual's Architecture team to discuss how assessment offering can support your organisation to define security strategy for modern work (Office 365) services : 3-Hour Briefing Call
+2
Applicable to:
Cloud Security
Identity & Access Management
36 out of 60
Peace of Mind for Microsoft 365: ImplementationAvaelgoManaged service offer: monthly proactive maintenance for Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
37 out of 60
Microsoft 365 Security Compliance 6-Day AssessmentChorusEstablish a clear roadmap to ensure that your organisation takes full advantage of the advanced security and compliance features in Microsoft 365 to build a Zero Trust framework.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
38 out of 60
Microsoft Cloud App Security (MCAS) WorkshopAdvaniaThis MCAS workshop guides an organisation through the high level design considerations applicate to Cloud Discovery, Connect App and session proxy policy capabilities and related integrations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 60
Microsoft 365 Security: 5-Day AssessmentSynergi Software LtdTargeted for Small and Mid Sized Business the offer provides a strategic review and output assessment detailing clear guidance on security improvements across your Microsoft 365 and Azure Estate
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
40 out of 60
Microsoft 365 Security 1-Day AssessmentValtoA security assessment of the Microsoft 365 Environment checking all services within the platform and covering off additional tools available in your organisation to assist with the security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Microsoft 365 Security: 3 Day AssessmentDaisy Corporate Services Trading LimitedDaisy's Microsoft 365 Security Assessment is a three-day consultancy service delivering a current state assessment of your Microsoft 365 environment, security controls and security requirements.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 60
Cloud Security Review: 4-Day AssessmentRISUAL LTDWe can assess the security configuration of Microsoft Office 365, Microsoft Azure IaaS and PaaS and Dynamics 365 together or we can review them individually if you have particular concerns.
+2
Applicable to:
Cloud Security
Compliance Advisory Services
43 out of 60
Microsoft 365 Security Audit: 3-Day AssessmentMarathon Managed ServicesMicrosoft 365 Security Health Check and Report. Analysis of Secure Score and adherence to the NCSC 14 security principles. Presentation of report to customer detailing Microsoft 365 security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Modern Work Strategy: 3-hour Briefing SessionRISUAL LTDThis engagement is a 3 hour briefing session with an Enterprise Architect to go through two primary elements of Microsoft 365, our Modern Work Strategy & out Modern Work assessments.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
45 out of 60
Security Assessment for Microsoft 365: 5 DaysChess LtdProtect your data with Security Assessment of your Microsoft 365 subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
SOC as a Service_1 day ImplementationTarsus On Demand (Pty) LtdSOC is a managed service that leverages a bespoke Threat Monitoring Platform. This platform detects malicious and suspicious activity across 3 critical attack vectors: Endpoint, Network & Cloud.
+2
Applicable to:
Cloud Security
Threat Protection
47 out of 60
Azure AD: Cloud Authentication 1-Day AssessmentTransparity Solutions LtdAn assessment to provide you with an overview of Cloud Identity and the capabilities within Azure AD to help you better serve and engage with your employees, including transition away from AD and ADFS
+2
Applicable to:
Cloud Security
Identity & Access Management
48 out of 60
Windows 365 - 3 Day Proof of Concept DeploymentCISILION LTDWindows 365 - 3-day Proof of Concept inclusive of demo, design, deployment, configuration, testing and handover.
+2
Applicable to:
Cloud Security
Device Deployment & Management
49 out of 60
Microsoft 365 Adoption : 3-6 Day Adoption WorkshopMarathon Managed ServicesGain knowledge around current Microsoft 365 feature sets and capabilities, and understanding of how the benefits of modern working can benefit your business. Assess readiness and plan adoption roadmap
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
50 out of 60
IAM Health Check: 5-10 Day AssessmentMarathon Managed ServicesA stepping-stone towards a blueprint for change in your organisation, this assessment and report ensures that you benefit from a health check and assessment of your existing IAM infrastructure
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
51 out of 60
Managed Defender for Endpoint : 4-wk PoCBytes Software ServicesBytes Managed Defender for Endpoints provides proactive management with 24/7 detection and response to ensure appropriate response capabilities.
+2
Applicable to:
Cloud Security
Threat Protection
52 out of 60
Microsoft365 Security Gap Analysis: 2Wk AssessmentStripe OLT Consulting LtdOur Microsoft 365 Gap Analysis will help you determine the difference or ‘GAP’ between your organisation’s current and ideal state of security technology.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
53 out of 60
Microsoft 365 Modern Workplace: 4Wk ImplementationStripe OLT Consulting LtdMicrosoft 365 has been designed to help your organisation excel in a remote working world - Our team of gold certified Microsoft experts are here to support it's implementation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
54 out of 60
Email and Threat Protection 4 Week ImplementationHTGHTG’s Advanced Email Threat Protection pack ensures your Microsoft products such as Outlook, SharePoint, OneDrive & Microsoft Teams are hardened to best practice standards.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
55 out of 60
Information Protection Workshop: 3day WorkshopPHOENIX SOFTWARE LTDEnabling you to use the capabilities built into Microsoft 365 to mange and secure your organisation's digital information in the cloud with products such as Information Protection
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
56 out of 60
Microsoft 365 Security Workshop: 3-day WorkshopPHOENIX SOFTWARE LTDEnable organisations to understand how Identity & Access Management, Threat Protection and Secure Management can help to secure their organisation in comparison to their existing Security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Endpoint Manager: 5-Day Proof of ConceptTransparity Solutions LtdModernise device management with an expert-led POC deployment of Microsoft Endpoint Manager
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
58 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Microsoft 365 Licence Health Check: 1-Day AssessmentITC Secure LtdA 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60