FiltersClear all
Consulting services results
Showing results in consulting services.
Microsoft 365 Security AssessmentSoftcatProviding a security audit of your Microsoft 365 environment and benchmarking this against Centre for Internet Security (CIS) frameworks
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
1 out of 43
PwC Business Aligned Zero Trust: 4-Wk AssessmentPricewaterhouseCoopers UKPwC's Zero trust proposition aims to help organisations to understand their current security state and develop a prioritised set of activities to improve their cyber maturity and resilience.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
2 out of 43
PwC Portfolio RationalisationPricewaterhouseCoopers UKThe objective of PwC's portfolio rationalisation is to simplify your portfolio to reduce the cost and complexity of your environment. Many companies have redundant tools that cost them time and money.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
3 out of 43
Endpoint management with security: 4-day workshope-Plenish LimitedDemonstrating the value of Microsoft Intune, Microsoft Defender for Endpoint and the Azure AD Premium P1 features that come with Microsoft 365 E3 licensing
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 43
Security Posture Assessment ServiceKochoSecurity Posture Service, assesses an organisation’s cloud environment against recognised security benchmarks and makes recommendations to uplift security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 43
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Cyberdefense UK LimitedOur workshop will help you designing and deploying Microsoft security technologies for your unique needs.
+1
Applicable to:
Threat Protection
6 out of 43
Managed Threat Detection [xdr] for Microsoft 365 DefenderOrange Cyberdefense UK LimitedImplementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
7 out of 43
UK Managed Workspace Protection for Microsoft 365 DefenderOrange Cyberdefense UK LimitedImplementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
+1
Applicable to:
Threat Protection
8 out of 43
Defender for Endpoint and Defender for Server DeploymentCISILION LTDMicrosoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
+2
Applicable to:
Cloud Security
Threat Protection
9 out of 43
Microsoft Defender for Endpoint ImplementationSIX DEGREES TECHNOLOGY GROUP LTDStrengthen cyber security defences through advanced endpoint detection and response.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
10 out of 43
SSC Endpoint Mgmt & Security Services WorkshopSCCDiscover, Envision, Educate and Plan for Device Management & Security with Microsoft 365 E3
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
11 out of 43
Microsoft 365 Security Assessment: 5-Day assessment and reviewCISILION LTDOur Security Assessment provides a holistic review of your organisations security posture and maps it against CISA baselines and recommendation to help take informed steps to secure your environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 43
Atech Microsoft 365 Security AssessmentAtech SupportWith 10 years+ experience Atech have developed an assessment which provides us with a benchmark to design and deliver your secure journey to maximising the potential of Microsoft 365
+2
Applicable to:
Cloud Security
Threat Protection
13 out of 43
Microsoft 365 Copilot Readiness: 8-Day Maturity and Technical Readiness AssessmentCISILION LTDThis engagement is designed to help ensure organisations have the essential, fundamental, intermediate, and advanced building blocks in place to ensure the best Copilot experience upon purchase/pilot.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
14 out of 43
Atech Microsoft Sentinel EngagementAtech SupportGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on premises environments with an Atech delivered, Microsoft Sentinel Workshop.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 43
Atech Microsoft Data Security EngagementAtech SupportThe Data Security Engagement, delivered by Atech, gives you the insights you need to understand data security, privacy and compliance risks in your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 43
Atech Microsoft Threat Protection EngagementAtech SupportThis engagement will provide the help organisations need to achieve achieve security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 43
Microsoft Value Realisation Assessment – Security: 2-Wk AssessmentTelstra LimitedSecure your IT estate with Microsoft. Identify the gaps and overlaps in your security solutions, strengthen your protection and cut your costs.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
18 out of 43
Managed XDR Services (1- Day Readiness Assessment)KochoCombine Microsoft Sentinel and Defender Managed Services for comprehensive coverage, cutting-edge security, and complete peace of mind.
+2
Applicable to:
Cloud Security
Threat Protection
19 out of 43
Microsoft Threat Protection Value Realisation Assessment: 1-Wk AssessmentTelstra LimitedStrengthen your security posture, simplify your security portfolio, and secure your organisation with Microsoft Security solutions and our expert guidance.
+1
Applicable to:
Threat Protection
20 out of 43
UNITE: Exploring E5 Security Workshop_INFINITY TECHNOLOGY SOLUTIONSUNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
21 out of 43
Logicalis Copilot for Microsoft 365 JumpstartLogicalis UKThe Copilot for Microsoft 365 Jumpstart will lay the groundwork for you to leverage Copilot for Microsoft 365 effectively
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
22 out of 43
Logicalis Cyber Security InitiativeLogicalis SolutionsThe Logicalis Cyber Security Initiative (CSI) helps customer adopt and deploy Microsoft security technologies and solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 43
SCC Data Security PathfinderSCCProtect Your Most Valuable Asset
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Threat Protection
24 out of 43
Fitzrovia IT - Defender for EndpointFitzrovia I.T. LtdFitzrovia IT will consult and configure and Defender for Endpoint for your business
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
25 out of 43
Microsoft 365 Attack SimulationWanstorMicrosoft’s cyber-security solution provides users with information on the most common and dangerous types of cyber-attacks, such as phishing, ransomware, malware, etc..
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 43
Microsoft Defender for Endpoints - Proof of ConceptWanstorBusinesses may decide to use Managed Defender to help keep them more secure from cyber threats, but they won’t all have the necessary resource to make optimum use out of this valuable tool.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 43
Microsoft Copilot for Security: Deployment and Adoption EngagementKochoStarting with scoping and discovery sessions, then progressing onto deployment and adoption support, Kocho's Microsoft Copilot for Security engagement will help you deploy Copilot successfully.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Threat Protection
28 out of 43
Cyber Maturity PathfinderSCCPrepare for cyber threats and improve security awareness in our Cyber Maturity Pathfinder and evaluate your security against industry benchmarks
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
29 out of 43
UNITE: Cyber Security Assessment_INFINITY TECHNOLOGY SOLUTIONSBoost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
30 out of 43
Microsoft Defender XDR AcceleratorThe Partner MastersWe empower your security team to detect and respond to cyberthreats with expanded visibility, incident-level investigation tools, and built-in automation
+1
Applicable to:
Threat Protection
31 out of 43
Microsoft Managed Extended Detection & Response (MXDR)ISA Cybersecurity Inc.Our Managed XDR service provides your environment with the ultimate protection against cyber attacks.
+1
Applicable to:
Threat Protection
32 out of 43
Threat Protection EngagementNitec Solutions LtdLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 43
eDiscovery, Data Lifecycle & Records ManagementITC Secure LtdManage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
34 out of 43
Microsoft 365 Security AssessmentNviron LimitedNviron’s Microsoft 365 Security Assessment provides an in-depth analysis of your organisation's existing security posture and recommends Microsoft 365 security capabilities to mitigate any risks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 43
secure365™ MDRSoftwerx Ltd.secure365™ works with Microsoft Sentinel and Microsoft Defender to provide SMB’s with a managed 24x7 security solution that offers enterprise-grade protection at an affordable price.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
36 out of 43
Armor Defender XDR Foundational AssessmentArmorTailored consulting engagement designed to evaluate your current security environment and establish a baseline for implementing Microsoft Defender XDR.
+2
Applicable to:
Identity & Access Management
Threat Protection
37 out of 43
Zero Trust WorkshopSoftcatThe Microsoft Zero Trust Workshop helps organisations evaluate their current security posture and define a practical roadmap for adopting Zero Trust principles.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
38 out of 43
Microsoft 365 Security Essentials Implementation ServiceSoftcatA service to kick-start the security position of your Microsoft 365 environment. We ensure it is configured to best practice set by Microsoft, Softcat and the Centre for Internet Security (CIS)
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
39 out of 43
Skysecure Realize Zero Trust BlueprintSkysecure Technologies Pvt. Ltd.Accelerate Microsoft Zero Trust adoption with Skysecure’s AI-driven framework that unifies identity, data, device, and threat protection across Microsoft 365 and Microsoft Azure.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
40 out of 43
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
41 out of 43
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 43
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
43 out of 43