FiltersClear all
Consulting services results
Showing results in consulting services.
Windows Intune: 1-Wk Accelerated ImplementionITC Secure LtdAccelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
1 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365 GCC High for CMMC/ITAR: 6-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity which includes partial or all going to Microsoft 365 GCC High by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
2 out of 60
Microsoft Cybersecurity AssessmentThe Tech MavericksDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Defender Pak365™: Microsoft Defender ImplementationRavanty Tech Consulting, Inc.Empower your organization with comprehensive, AI-driven protection tailored to meet evolving security needs with the help of Microsoft Defender.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
4 out of 60
Assessment - Workplace Modernization & Optimization - 1-MonthZones Inc.Analysis of current environment to highlight opportunities to reduce duplicative cost and modernize your workplace
+3
Applicable to:
Calling for Microsoft Teams
Compliance Advisory Services
Identity & Access Management
5 out of 60
Microsoft 365 Cyber Insurance Review: 2-5 Wk AssessmentKiZAN TechnologiesMap your business cyber insurance carrier requirements to Microsoft 365 environment controls, improve your security posture and enhance your security defenses.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
6 out of 60
Microsoft Entra - Global Secure Access | Pilot DeploymentITC Secure LtdMicrosoft Entra Global Secure Access pilot deployment for improved security posture, streamlined access management & regulatory compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
7 out of 60
Autopilot: 1-Wk AssessmentFSI StrategiesFSi Strategies will review the deployment scenarios with the client and deliver a Discovery and Assessment document on Windows Autopilot, and the level of effort to deploy in the environment.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
8 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte LtdHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
FastTrack for Microsoft 365Olive + GooseOur offer provides expert guidance as a FastTrack Ready Partner to help businesses deploy, secure, and optimize Microsoft 365 solutions seamlessly—ensuring a smooth transition with no extra cost.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
10 out of 60
Threat Protection: 2-Week WorkshopForsyte IT SolutionsLearn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Google to Microsoft 365 MigrationManaged SolutionEmpowering digital transformation through a Google to Microsoft 365 migration with world-class support, so you can focus on what matters most—your business.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
12 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View SystemsSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Secure Your Hybrid WorkplaceRackspace TechnologyThe purpose of this offer is to provide a comprehensive endpoint security and management solution aimed at enhancing hybrid workplaces
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
14 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbHStetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi SistemleriPerfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
+2
Applicable to:
Cloud Security
Identity & Access Management
16 out of 60
Secure Remote Workplace: 1-Wk WorkshopFSI Strategies5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
17 out of 60
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Microsoft Security: 4-Week ImplementationApex Digital SolutionsEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReplyValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
20 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile ITAgile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
21 out of 60
Quadra Entra Permissions ManagementQuadrasystems.net (India) P LtdUnderstand how permissions creep can impact the attack surface risk in your cloud infrastructure
Understand how to manage user and identity risk
+1
Applicable to:
Identity & Access Management
22 out of 60
Microsoft 365 Copilot & Sales Readiness AssessmentJourneyTEAMAccelerate your sales team's performance with JourneyTEAM's Copilot & Sales Readiness Assessment
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
23 out of 60
Microsoft 365 Threat Check Assessment: 3-Wk AssessmentInvokeThe Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeITCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Modern Management for EndpointsIvision, Inc.Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
26 out of 60
Copilot for Security Readiness AssessmentInvokeInvoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Microsoft 365 Copilot Success FrameworkInsightInsight’s Microsoft 365 Copilot Success Framework service is designed to enable your organization to securely drive ROI and take advantage of all that Microsoft 365 Copilot has to offer.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
28 out of 60
Autopilot: 2-Wk Proof of ConceptFSI StrategiesFSi Strategies will review the deployment scenarios with the client and execute a proof of concept up to 25 devices in order to demonstrate the capabilities of Windows Autopilot
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
29 out of 60
Windows10 EOL to Windows11 Foundations - 1 Week QuickStartCoretek ServicesWindows 10 EOL is right around the corner, prepare with the Windows 11 foundations QuickStart for your organization today.
+3
Applicable to:
Device Deployment & Management
Frontline Workers
Identity & Access Management
30 out of 60
General Data Protection Regulation (GDPR): 4-Wk Data Discovery ServiceIT Partner LLCMulti-step process to discover and scan data sources within the organization for personal data. The outcome: detailed inventory of data sources, together with the data they contain.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
31 out of 60
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-WeeksInvokeInvoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
32 out of 60
Incident Response RetainerSentinel Technologies Inc.Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Lightstream Data Security AssessmentLightstreamLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
34 out of 60
Microsoft Intune 10-wks ImplementationCyclotron Inc.Cyclotron's Intune implementation provides an introduction, education and production-ready framework for IT teams to revolutionize their device management strategy and enhance their end user security.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
35 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense GlobalStop threats with a cloud-native SIEM adapted to your new business needs.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
36 out of 60
Zero Trust Workplace Implementation ServicesSoftchoiceSolution for organizations wanting to improve their overall security posture by implementing key security features for protecting user identity, devices, and data.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
37 out of 60
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstreamLightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLCOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Windows 365: 4 Week Readiness AssessmentNetrix GlobalGet an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
40 out of 60
Microsoft 365 service - 4 weeks ImplementationSPAN d.d.With implementation of Microsoft 365 services support everyday activities, help build hybrid or cloud IT environments and streamline organizational availability to adapt to new future.
+3
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Teamwork Deployment
41 out of 60
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile ITA 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Okta to Entra Migration: Roadmap ArchitectAscent Global, Inc.Roadmap and architect the shift from Okta to Microsoft Entra’s enhanced data security
+1
Applicable to:
Identity & Access Management
43 out of 60
Modern Managed Endpoints: 4-Wk Proof of ConceptFSI StrategiesModernize your organization with end-to-end device management and monitoring, FSi Strategies will demonstrate modern device management and security using the latest in Microsoft 365 technology
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
44 out of 60
Window 365 Cloud PC: 3-Day Proof-of-ConceptCTGlobal A/SAssess, pilot and deploy Windows365 in a safe and secure Proof of Concept.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
45 out of 60
Microsoft Entra – IAM Review and AssessmentCollective InsightsStreamline your Microsoft 365 identity management and enhance your security with insights from our Microsoft Entra IAM Review and Assessment
+1
Applicable to:
Identity & Access Management
46 out of 60
Security Assessment - 4-Week AssessmentCoretek ServicesAnalysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
47 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, IncKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
CMMC Implementation for Microsoft 365 (8 Wk Proj)Summit 7 Systems, IncSummit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) technical control practices associated with Level 2 for Microsoft 365, as well as Azure and AAD
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
49 out of 60
CMMC Secure EnclavePlanet TechnologiesA secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
50 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLCLeverage your Microsoft investment to create a strong Zero Trust security environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
51 out of 60
MDS - Cybersecurity AssessmentMaureen Data SystemsThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Microsoft Windows Autopilot Services: 5-Day Proof of ConcepteGroup Enabling TechnologiesReduce IT complexity and eliminate time-consuming corporate re-imaging by shipping and deploying straight to users with Microsoft Windows Autopilot.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
53 out of 60
Microsoft Intune: 4-Wk Implementation ServicesTechNet UC LLCBaseline Microsoft Intune Design and Deployment Services - Comprehensive
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
54 out of 60
Microsoft Copilot Data SecurityFAST: 6-Week Secure Copilot Implementation using Microsoft Purview, Entra, and SentinelMAQ SoftwareElevate your AI adoption with enterprise-grade security
+1
Applicable to:
Identity & Access Management
55 out of 60
Microsoft Intune Jumpstart for Endpoints - Mobile & Workstations: 2-Wk ImplementationProServeITEnable organization-wide management & security for your mobile devices & workstations with a Microsoft Intune jumpstart pilot.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
56 out of 60
Microsoft Endpoint Manager BaselineSHI International CorpExplore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
57 out of 60
Microsoft 365 Managed ServicesNetrix GlobalNetrix’s 24x7x365 managed services for Microsoft 365 combines a reactive service desk with proactive strategic planning to ensure your team is productive and secure.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
58 out of 60
CMMC Assessment Ready SolutionPlanet TechnologiesBased off the Planet secure collaboration enclave, this provides customers with CMMC Assessment Ready artifacts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
59 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk ImplementationNeway TechnologiesStreamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
60 out of 60