FiltersClear all
Consulting services results
Showing results in consulting services.
Avanade Modern Workplace FY23Avanade, Inc.Modern Workplace Consulting Services
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
1 out of 60
Digital Workplace Essentials for Microsoft 365SoftwareOneDrive innovation and transformation, knowing your employees can work securely and efficiently with the CSP model and SoftwareOne’sDigital Workplace Essentials
+3
Applicable to:
Cloud Security
Information Protection & Governance
Workplace Analytics
2 out of 60
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
4 out of 60
System Center Endpoint Manager 40 hour Quick Start Proof of Concept with Co-Management with Endpoint Manager in Office 365York Telecom CorpSystem Center Endpoint Manager 40-Hour Quick Start Proof-of-Concept. Design, deploy and learn SCEM in 40-hour proof-of-concept with Co-Management with Endpoint Manager Office 365
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
5 out of 60
Microsoft 365 Adoption & Change: 1-Year Managed ServiceSignal Alliance Technology HoldingDiscover how our Adoption & Change Management program ensures that we effectively support your business to deploy, drive end-user adoption and maximise your Return on Investment (ROI).
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
6 out of 60
Microsoft Advisory Services ManagedSoftwareOneDrive Value and Cost Savings Throughout the Microsoft Cloud Investment Lifecycle
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
7 out of 60
Atos || Accessibility as a Service - ATVisor ConsoleAtos International SAS12-month Assistive Technology (AT) analytics add-on for Microsoft Intune. Analytics to provide actionable insights on AT / Accessibility feature availability, use, adoption & stability.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Workplace Analytics
8 out of 60
Secure Live Workspace - 8 Weeks AssessmentLTIMindtree LimitedOur Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
+3
Applicable to:
Cloud Security
Power Platform for Teams
Teams Custom Solutions
9 out of 60
Bulletproof Managed Security Elite (MXDR)Bulletproof Solutions Inc.Bulletproof Managed Security Elite is a Microsoft-native MXDR service that transforms Microsoft Sentinel and Defender XDR into a 24×7 cyber defense fabric.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Endpoint Management WorkshopYork Telecom Corp3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
11 out of 60
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, LdaThe engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
12 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformantaThe Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Windows 365 Pilot: 5 Days Proof of ConceptDelphi ConsultingDelphi Consulting will help you get started with Windows 365 Cloud-PC with its Pilot offering with the program running over 5 days.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
15 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
16 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage WorkshopCGI Inc.A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
18 out of 60
Infosys Microsoft 365 Security and Compliance: 8 Weeks AssessmentInfosys LimitedInfosys Microsoft 365 security expert team offers a full spectrum security service for microsoft 365 services facilitated digital workplace.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Workplace Analytics
19 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro LtdWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Windows 365 Assessment - 1 dayCC Bilgi TeknolojileriHybrid Windows for a hybrid world
Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
21 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
22 out of 60
Licensing Microsoft 365: 1-day AssessmentInformatika a.d.We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
23 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
24 out of 60
Defender for Endpoint Managed Servicee2e-assure LtdMicrosoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
25 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi ConsultingDelphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
+2
Applicable to:
Cloud Security
Threat Protection
26 out of 60
Intelligent Shield: 1d AssessmentCorporate SoftwareAn Audit for your Microsoft 365 tenant based on Best Practices
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
27 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
28 out of 60
Intune Health Check (All OS): 2-week AssessmentMobile MentorOur certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
29 out of 60
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Modern Frontline Work Acceleration 2 days WorkshopLiveRoute FZ-LLCLiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
31 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
33 out of 60
Mitigate Compliance and Privacy Risks - 3 Day WorkshopCGI Inc.Help customers detect, investigate, and take action to mitigate risk and ensure compliance in their modern workplace.
+1
Applicable to:
Cloud Security
34 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayonEvaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
35 out of 60
Windows 11 Assessment: 1-WKSteeves Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
36 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies LtdMicrosoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Overwatch Microsoft 365 Security: 12 Month ImplementationTHREATSCAPE LIMITEDOverwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
38 out of 60
AvePoint Policies & Insights: 10-Days AssesmentsIT-Dev sp. z o.o.Assesment's outcomes:
• Enable centralized reporting on Microsoft 365 security.
• Discover potential risks and exposed content.
• Enforce policies and automatically remediate security breaches!
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
39 out of 60
EPAM Microsoft 365 Security: 4-Week AssessmentEPAM Systems• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Microsoft Defender for Business Managed Service: Monthly MDRe2e-assure LtdMaximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
41 out of 60
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDSEgyptian Data Protection Law offer aims to give you a brief description of the following:
Data Privacy Basics
The Egyptian Data Protection Law main highlights
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
42 out of 60
Microsoft Intune ServiceSii Sp. z o.o.Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
+3
Applicable to:
Cloud Security
Device Deployment & Management
Insider Risk
43 out of 60
MDR for Microsoft DefenderADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
+2
Applicable to:
Cloud Security
Threat Protection
44 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLCLeverage your Microsoft investment to create a strong Zero Trust security environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
45 out of 60
Protect 365 App - 1 hour implementationCloud LifeThe Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
46 out of 60
Protect and Govern your Data in Microsoft 365 1 day workshopCloudWay ASWith data growing exponentially over time, it’s more important than ever for organisations to implement the right tools and processes to ensure data protection and governance
+2
Applicable to:
Cloud Security
Information Protection & Governance
47 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
48 out of 60
Device Mgm and Protection - 12 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
49 out of 60
Microsoft Priva Assessment: 2 WkLighthouse GlobalEmpowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
+2
Applicable to:
Cloud Security
Information Protection & Governance
50 out of 60
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyantThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
+2
Applicable to:
Cloud Security
Threat Protection
51 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
52 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareOneImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
53 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
54 out of 60
Identity & Access Management: 1-Mth ImplementationOfficeline SAMicrosoft 365 Identity & Access Management to improve and streamline security on cloud and applications
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
55 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdgeEndpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
56 out of 60
Threat Protection: 2-Month ImplementationOfficeline SAThreat protection with Microsoft Defender products. We deliver a solution that improves and streamlines threat protection for every organization.
+2
Applicable to:
Cloud Security
Threat Protection
57 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
58 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbHStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
60 out of 60