FiltersClear all
Consulting services results
Showing results in consulting services.
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
1 out of 36
Copilot for Microsoft 365: Data Governance WorkshopReplySecure and Enhance Your Microsoft 365 Experience with WM Reply's One-Day Copilot Data Governance Workshop
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
2 out of 36
Dell Implementation Services for Copilot SecurityDell Technologies ServicesReadiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
+1
Applicable to:
Cloud Security
3 out of 36
Threat Protection: 2-Month ImplementationOfficeline SAThreat protection with Microsoft Defender products. We deliver a solution that improves and streamlines threat protection for every organization.
+2
Applicable to:
Cloud Security
Threat Protection
4 out of 36
Road to Microsoft 365: 1 month ImplementationCrayonCrayon Microsoft 365 migration services brings best practices and expertise to assure seamless migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
5 out of 36
Information Protection - 1Month ImplementationOfficeline SAAn offering of Microsoft Information Protection implementation to improve and streamline compliance across all environments.
+2
Applicable to:
Cloud Security
Information Protection & Governance
6 out of 36
Security Architecture Design and Implementation Service上海诺未网络科技有限公司NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 36
Mitigate Compliance and Privacy Risks - 3 Day WorkshopCGI Inc.Help customers detect, investigate, and take action to mitigate risk and ensure compliance in their modern workplace.
+1
Applicable to:
Cloud Security
8 out of 36
Modernize Endpoints (Microsoft Intune): 1 Day WorkshopCrayonThe Endpoint Management Workshop is a one-day engagement that will help you showcase the value of Microsoft Endpoint Manager and how to manage users’ devices and apps from anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
9 out of 36
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 36
SYSTEX Data Security and Compliance Solution精诚(中国)企业管理有限公司通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
11 out of 36
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 36
Microsoft 365 Copilot workshop: 1-week consulting servicesUni Systems S.M.S.A.This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
13 out of 36
SMART Microsoft 365 Adoption: 4-Wk ImplementationSMART business LLCMicrosoft 365 SMART adoption program represents a set of activities to drive change in behavior and create fundamentally different way of working.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
14 out of 36
ITE ZeroTrust360™Information Technology of Egypt CorporationITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
15 out of 36
Microsoft 365 Security: 2-Hour WorkshopSNOMANNFree 2-hour workshop assessment to review your Microsoft 365 environment and provide recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
16 out of 36
Microsoft 365 Tenant Setup, 1-Day ImplementationTec Networks GmbHWe provide you a good-practice configured tenant for the best experience with Microsoft 365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
17 out of 36
Microsoft Defender for Cloud Deployment & Multi-Cloud Security Implementation: 4-8 Weeks EngagementCelebal Technologies Private LimitedStrengthen Azure and multi-cloud security through CSPM, CWPP, and CNAPP capabilities with compliance alignment and AI-driven remediation.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
18 out of 36
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
+1
Applicable to:
Cloud Security
19 out of 36
Quadra BluForge Managed XDRQuadrasystems.net (India) P LtdDiscover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 36
Microsoft 365 Copilot Value Discovery: 2-Week AssessmentPrimendUnlock the full potential of Microsoft Copilot. Discover high-value use cases, optimize your AI readiness, and build a robust business case for AI transformation
+2
Applicable to:
Adoption & Change Management
Cloud Security
21 out of 36
HCLTech Frontline Worker Digital Experience – Assessment & Implementation support for Empowering Frontline WorkersHCL America Inc_HCLTHCLTech’s solution streamlines frontline communication, digital workflows, and secure device management, powered by HCLTech, Microsoft, and Zebra for a modern, sustainable frontline workplace.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
22 out of 36
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
23 out of 36
Minsait Cyber SmartMDR SOC ServiceMinsaitServicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
24 out of 36
Minsait Threath Protection Engagement WorkshopMinsaitEvaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
25 out of 36
TSG Microsoft Security Risk AssessmentTechnology Service Group LtdAssess your true cyber risk. Get a practical roadmap built on the Microsoft Security stack.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
26 out of 36
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLCCMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
27 out of 36
AI Agents In CopilotINOVASYS FOR SYSTEMSInovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
28 out of 36
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLCBoost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 36
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
30 out of 36
Beyondsoft Segurança Ambiente CloudBeyondsoftOferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
31 out of 36
Netox MXDR / SOC 24/7Netox OyFinnish-built 24/7 MXDR & SOC for Microsoft environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 36
Microsoft Defender XDR and Zero Trust Security Implementation: 4-8 Weeks EngagementCelebal Technologies Private LimitedUnify endpoint, identity, email, and cloud security to improve visibility, automate SOC response, and enable Zero Trust enforcement.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 36
Unified SOC with Microsoft Defender XDR and Sentinel (SIEM & SOAR): 4-8 Weeks EngagementCelebal Technologies Private LimitedModernize security operations using Microsoft Sentinel and Defender XDR to centralize threat monitoring, automate response, strengthen hybrid and multi cloud protection, and improve SOC outcomes fast.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
34 out of 36
Microsoft Entra Identity & Access Management Implementation: 4-8 Weeks EngagementCelebal Technologies Private LimitedStrengthen hybrid identity security with Microsoft Entra ID, Conditional Access, MFA, Identity Governance, and PIM to establish adaptive access control and a Zero Trust IAM foundation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 36
EPAM Intune Endpoint Management ImplementationEPAM Systems, Inc.Enable secure, automated, and compliant device management by modernizing endpoint operations with Microsoft Intune to streamline deployment, policy control, and ongoing lifecycle management.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
36 out of 36