FiltersClear all
Consulting services results
Showing results in consulting services.
Microsoft 365 Manage and Investigate Risk: 3-Day WorkshopComms-care Group LtdMicrosoft Funded Manage and Investigate Risk Consultancy Workshop
+2
Applicable to:
Cloud Security
Insider Risk
1 out of 59
Secure Score Review: 2-Hour WorkshopCloud DirectEnhance your security posture with an expert-led consultancy workshop. This workshop is a 'get started' guide for those who don't have the luxury of employing security architects.
+2
Applicable to:
Cloud Security
Threat Protection
2 out of 59
Microsoft 365 Security: 2-Days AssessmentCloud NexusOur team will compare your Microsoft 365 tenant configuration against Best Practice security baseline
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
3 out of 59
Adopt FastTrack Microsoft 365: 1hr BriefingComms-care Group LtdFastTrack helps customers adopt Microsoft 365. Customers with eligible subscriptions to Microsoft 365 can use FastTrack at no additional cost for the life of their subscription.
+3
Applicable to:
Adoption & Change Management
Calling for Microsoft Teams
Cloud Security
4 out of 59
Office 365 Migration 3-Month ImplementationRKON TECHNOLOGIESLeverage RKON's consulting expertise for a smooth and seamless migration to Microsoft's Office 365 suite of products including SharePoint, OneDrive, and Teams
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
5 out of 59
Microsoft 365 Security Hardening: 3 Days ImplementationINFINITY TECHNOLOGY SOLUTIONS2-3 days of consultancy from a Microsoft Gold Partner to improve the security stance within your Microsoft 365 tenant, including Conditional Access, MAM, MFA, email filtering and alerts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 59
Overwatch for Microsoft 365 Security: 12 Month ImplementationThreatscapeOverwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 59
365SecurityREADY for ISO 27001: 12-16 Weeks ImplementationThe Cloud Factory EMEA Ltd.Get ISO 27001 Ready with Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
8 out of 59
PwC Business Aligned Zero Trust: 4-Wk AssessmentPricewaterhouseCoopers UKPwC's Zero trust proposition aims to help organisations to understand their current security state and develop a prioritised set of activities to improve their cyber maturity and resilience.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
9 out of 59
PwC UK: Governance and Risk: 4-Wk AssessmentPricewaterhouseCoopers UKPwC's Governance and Risk solutions can help organisation to create comprehensive governance, risk and control frameworks that support their organisations wider security and operational goals.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
10 out of 59
PwC Portfolio RationalisationPricewaterhouseCoopers UKThe objective of PwC's portfolio rationalisation is to simplify your portfolio to reduce the cost and complexity of your environment. Many companies have redundant tools that cost them time and money.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
11 out of 59
PwC Digital Identity: 4-Wk AssessmentPricewaterhouseCoopers UKPwC provides leading class Identity and Access Management advisory, assurance and delivery services that offer distinctive value and enable clients to optimise their digital services and processes.
+2
Applicable to:
Cloud Security
Identity & Access Management
12 out of 59
Endpoint management with security: 4-day workshope-Plenish LimitedDemonstrating the value of Microsoft Intune, Microsoft Defender for Endpoint and the Azure AD Premium P1 features that come with Microsoft 365 E3 licensing
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 59
Security Posture Assessment ServiceKochoSecurity Posture Service, assesses an organisation’s cloud environment against recognised security benchmarks and makes recommendations to uplift security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 59
Defender for Endpoint and Defender for Server DeploymentCISILION LTDMicrosoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 59
Protect & Govern Sensitive Data WorkshopAtech SupportThe Protect & Govern Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
+1
Applicable to:
Cloud Security
16 out of 59
Defend Against Threats with SIEM Plus XDR WorkshopAtech SupportImprove your security posture with a Defend Against Threats with SIEM Plus XDR Workshop
+1
Applicable to:
Cloud Security
17 out of 59
Secure Multi-Cloud Environments WorkshopAtech SupportThis delivers visibility to threats and vulnerabilities across Microsoft Azure, on-premises and multi-cloud environments. Support on how to improve your security posture for the long term
+1
Applicable to:
Cloud Security
18 out of 59
Microsoft Defender for Endpoint ImplementationSIX DEGREES TECHNOLOGY GROUP LTDStrengthen cyber security defences through advanced endpoint detection and response.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
19 out of 59
SCC Digital Workforce WorkshopSCCThe Microsoft 365 Digital Workforce Workshop is designed to introduce and expand the value of Microsoft 365 to customers who are starting their cloud transformation to a secure hybrid work environment
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
20 out of 59
Sentinel WorkshopAtech SupportGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop delivered by Atech.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
21 out of 59
Mitigate Compliance and Privacy Risks WorkshopAtech SupportThe Mitigate Compliance and Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organisation, delivered by the Atech Certified Microsoft PS team
+1
Applicable to:
Cloud Security
22 out of 59
Microsoft 365 Security Assessment: 5-Day assessment and reviewCISILION LTDOur Security Assessment provides a holistic review of your organisations security posture and maps it against CISA baselines and recommendation to help take informed steps to secure your environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 59
Microsoft 365 Health Check and Tenant Review - 2 day - Consultancy offeringIntelogyThe Microsoft 365 tenant review will help strengthen the security of your tenant against cyber threats, promote secure collaboration within and outside the company
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
24 out of 59
Microsoft Copilot Data Security Workshop: 5 day WorkshopBytes Software ServicesWork with Bytes to build a security and trust framework to ensure correct access to all of your data
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
25 out of 59
Microsoft Copilot Zero Trust Workshop: 3 Day WorkshopBytes Software ServicesBytes will help customers deploy Copilot in the most secure manner
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
26 out of 59
Microsoft Copilot Data Structure Workshop: 5 day workshopBytes Software ServicesWork with Bytes to ensure that your business critical information stays protected.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
27 out of 59
Atech Microsoft 365 Security AssessmentAtech SupportWith 10 years+ experience Atech have developed an assessment which provides us with a benchmark to design and deliver your secure journey to maximising the potential of Microsoft 365
+2
Applicable to:
Cloud Security
Threat Protection
28 out of 59
Atech Cybersecurity AssessmentAtech SupportThis assessment is designed to help you understand the importance of security and how to protect your organization from potential threats. Get to know your secure score and future-proof your posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
29 out of 59
Atech Microsoft Sentinel EngagementAtech SupportGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on premises environments with an Atech delivered, Microsoft Sentinel Workshop.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 59
Atech Microsoft Data Security EngagementAtech SupportThe Data Security Engagement, delivered by Atech, gives you the insights you need to understand data security, privacy and compliance risks in your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 59
Atech Microsoft Threat Protection EngagementAtech SupportThis engagement will provide the help organisations need to achieve achieve security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 59
Managed XDR Services (1- Day Readiness Assessment)KochoCombine Microsoft Sentinel and Defender Managed Services for comprehensive coverage, cutting-edge security, and complete peace of mind.
+2
Applicable to:
Cloud Security
Threat Protection
33 out of 59
Modern Workplace Maturity: 10-day AssessmentReplyUnderstand and evolve your approach to collaboration, communication, security, and productivity with our Modern Work Maturity Assessment
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
34 out of 59
Microsoft Security Copilot: Half-Day Readiness AssessmentTransparity Solutions LtdGet ready to adopt AI powered security with our Microsoft Security Copilot Readiness Assessment
+1
Applicable to:
Cloud Security
35 out of 59
Atech Copilot for Microsoft 365 Zero Trust EssentialsAtech SupportThe Atech Zero Trust Essentials Service provides a tailored approach to security and data readiness. We help organisations navigate data and security considerations to optimise Copilot possibilities
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
36 out of 59
Atech Copilot for Microsoft 365 Discovery WorkshopAtech SupportDesigned as an initial engagement, the Microsoft 365 Copilot Discovery Workshop will provide high - level visibility regarding your technical and people readiness to maximise the potential of Copilot
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
37 out of 59
Atech Copilot for Microsoft 365 Adoption Accelerator AssessmentAtech SupportAtech’s adoption accelerator for Copilot for Microsoft 365 is designed to empower organizations to deliver the new way of working that Copilot promises whilst accelerating your business goals
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
38 out of 59
Logicalis Cyber Security InitiativeLogicalis SolutionsThe Logicalis Cyber Security Initiative (CSI) helps customer adopt and deploy Microsoft security technologies and solutions.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 59
Fitzrovia IT - Defender for EndpointFitzrovia I.T. LtdFitzrovia IT will consult and configure and Defender for Endpoint for your business
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
40 out of 59
Google Workspace to Microsoft 365 Discovery and Design Service - 4-Wk EngagementCISILION LTDThis 3-wk engagement helps prepare any organisation looking to migrate from Google Workspace to Microsoft 365. This includes analysis and review of existing environment, and migration planning.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
41 out of 59
Microsoft 365 Attack SimulationWanstorMicrosoft’s cyber-security solution provides users with information on the most common and dangerous types of cyber-attacks, such as phishing, ransomware, malware, etc..
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 59
Windows 365 Proof of ConceptWanstorWanstor’s Windows 365 solution is designed to meet the standard requirements for building out a robust, secure, and efficient digital workspace for our customers.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
43 out of 59
Microsoft Defender for Endpoints - Proof of ConceptWanstorBusinesses may decide to use Managed Defender to help keep them more secure from cyber threats, but they won’t all have the necessary resource to make optimum use out of this valuable tool.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 59
Microsoft Intune & Autopilot POCWanstorWanstor implements its management infrastructure based on Microsoft’s Intune, which provides IT services, apps, protection, and configuration, combining these services and tools in one location
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
45 out of 59
Copilot for Microsoft 365 - Readiness Engagement: 2 Week-ImplementationHTGAfter assessing data availability and quality, we will provide and implement a robust set of recommendations for enhancing your security posture ahead of a Copilot deployment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
46 out of 59
Cyber Maturity PathfinderSCCPrepare for cyber threats and improve security awareness in our Cyber Maturity Pathfinder and evaluate your security against industry benchmarks
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
47 out of 59
UNITE: Cyber Security Assessment_INFINITY TECHNOLOGY SOLUTIONSBoost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
48 out of 59
Secure AILogicalis SolutionsComprehensive security for generative AI applications, ensuring safe usage and protection of sensitive data
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
49 out of 59
HTG Overwatch - Security Managed ServiceHTGA Security Managed Service that aligns with the industry recognised zero trust security model
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
50 out of 59
Threat Protection EngagementNitec Solutions LtdLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 59
eDiscovery, Data Lifecycle & Records ManagementITC Secure LtdManage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
52 out of 59
Microsoft 365 Security AssessmentNviron LimitedNviron’s Microsoft 365 Security Assessment provides an in-depth analysis of your organisation's existing security posture and recommends Microsoft 365 security capabilities to mitigate any risks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 59
secure365™ MDRSoftwerx Ltd.secure365™ works with Microsoft Sentinel and Microsoft Defender to provide SMB’s with a managed 24x7 security solution that offers enterprise-grade protection at an affordable price.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
54 out of 59
Microsoft 365 Copilot Readiness AssessmentQuorumAccelerate your AI journey with a Microsoft 365 Copilot Readiness Assessment
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
55 out of 59
Free Data Security & Threat Protection Immersion BriefingIT Partner LLCDiscover how to strengthen your Microsoft 365 environment with real-time insights, proactive threat detection, and intelligent data protection — guided by certified experts from IT Partner LLC.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
56 out of 59
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
57 out of 59
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
58 out of 59
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
59 out of 59