Skip to main content
Marketplace
Give feedback
Help & support
Saved items
Private plans
Just a moment, logging you in...
All
Products
Categories
Industries
Partners
Filters
Clear all
Your location
Your location
Products (1)
Products (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adoption & Change Management
Adoption & Change Management
Calling for Microsoft Teams
Calling for Microsoft Teams
Cloud Security
Cloud Security
Compliance Advisory Services
Compliance Advisory Services
Device Deployment & Management
Device Deployment & Management
Frontline Workers
Frontline Workers
Identity & Access Management
Identity & Access Management
Information Protection & Governance
Information Protection & Governance
Insider Risk
Insider Risk
Knowledge & Insights
Knowledge & Insights
Meeting Rooms for Microsoft Teams
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Meetings for Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Mobile Device Management
Mobile Device Management
Power Platform for Teams
Power Platform for Teams
Teams Custom Solutions
Teams Custom Solutions
Teamwork Deployment
Teamwork Deployment
Threat Protection
Threat Protection
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Industries
Industries
Service type
Service type
Pricing Model
Pricing Model
Consulting services results
Showing results in consulting services.
Zones SOCaaS - MXDR with Threat Protection
Zones Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Zones SOCaaS powered by Microsoft Sentinel and Defender offers advanced MDR and XDR capabilities, reinforcing your business’s safety.
1 out of 60
Defender for IoT Operational Technology: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
2 out of 60
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-Weeks
Invoke
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Invoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
3 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
4 out of 60
Microsoft Security Copilot Readiness Assessment
Softchoice
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Aims to ensure organizations can securely utilize Microsoft’s Copilot for Security and identifying gaps in signal data from core Microsoft security products
5 out of 60
Identity as a Service | Assure 365
CyberOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Fully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
6 out of 60
Cloud App Security – Advanced CASB Solution for Cloud Data Protection
ITX360 (Pvt) Ltd.
+1
Applicable to:
Cloud Security
Secure your cloud apps with real-time monitoring, Shadow IT discovery, and automated data protection. Integrated with Microsoft Information Protection for enhanced compliance and threat detection.
7 out of 60
AvePoint Backup: 4 Weeks Proof Of Concept
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Sentinel Technologies is proud to offer AvePoint’s Cloud Backup, a powerful cloud-to-cloud backup solution for Microsoft 365 and Azure.
8 out of 60
CMMC Assessment Ready Solution
Planet Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Based off the Planet secure collaboration enclave, this provides customers with CMMC Assessment Ready artifacts.
9 out of 60
DLP Implementation and Tuning Services
INFOTECHTION
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Reduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
10 out of 60
CMMC Secure Enclave
Planet Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
A secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov.
11 out of 60
Microsoft 365 Copilot Onboarding Workshop
SMART business LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Join our interactive workshop to learn about the capabilities of Microsoft Copilot for Microsoft 365!
12 out of 60
KPMG Agent 365 Implementation - Adoption & Management
KPMG
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enable organisations to operationalise Microsoft Agent 365 with trusted governance, security, and lifecycle controls so AI agents can scale safely beyond pilots
13 out of 60
Lightstream Data Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Lightstream will Identify data security risks in your organizational data. Identify data security risks in your organizational data
14 out of 60
Copilot for Microsoft 365: Taller De Seguridad Y Datos De 1 Día
Awara IT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Desbloquea el máximo potencial de Copilot for Microsoft 365 mientras refuerzas la seguridad y protección de tus datos con un taller intensivo de un día dirigido por los expertos de Awara IT.
15 out of 60
Defender for Office365
Suri Services SC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Suri Services y Office 365: La alianza impenetrable en ciberseguridad.
16 out of 60
MDS - Cybersecurity Assessment
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
17 out of 60
Endpoint Management with Security Workshop
The Tech Mavericks
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
The Endpoint Management with Security Workshop enables partners to lead customer conversations around modernizing their endpoint management and security capabilities by leveraging Microsoft 365.
18 out of 60
Inviso KickStarter - Microsoft 365 E3 Adoption
Inviso Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Helping customers KickStart features in Microsoft 365 E3 Subscription
19 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
20 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
21 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and Planning
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Shorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
22 out of 60
Mailbox Guardian - Security: 2 Week Implementation
ProServeIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cybersecurity review and lockdown of Microsoft 365 environment. Monitor and provide implementation recommendations Protect against phishing and other attacks Review desired state configuration
23 out of 60
Onesec Identity Governance Lifecycle Assessment
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
24 out of 60
Threat Protection Workshop
Mobile Mentor
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
During this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
25 out of 60
Microsoft 365 E5 CMMC L3 8 Week Implementation
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
26 out of 60
Implementation of Microsoft Security Copilot
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
27 out of 60
Microsoft 365 Copilot Accelerator: 12Wk Implementation
BDO Canada
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Leveraging BDO’s Microsoft 365 Copilot Framework, we'll quickly help you assess your readiness and then accelerate your deployment of Microsoft 365 Copilot in just 12 weeks.
28 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week Implementation
Beyondsoft
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
29 out of 60
Avanade Security Business Value 4-Wk Assessment
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
30 out of 60
Comprehensive Threat Protection: Free Workshop
Long View Systems
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Protect against advanced threats with Long View’s Threat Protection, leveraging Microsoft Defender for full security.
31 out of 60
Microsoft 365: 3 Week Solution Assessment
First National Technology Solutions, Inc.
+3
Applicable to:
Cloud Security
Meetings for Microsoft Teams
Teamwork Deployment
Partner with FNTS to conduct a 3 week workplace modernization solution assessment to build a TOC analysis & evaluate current purchasing structure to make recommendations for adoption of Microsoft 365.
32 out of 60
Microsoft 365 Security Readiness: 4-Wk Assessment
Quadrasystems.net (India) P Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Identify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
33 out of 60
Data Security & Protection: 8 weeks - Implementation
Mazzy Technologies Corp.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
34 out of 60
Zero Trust Security Assessment
Concurrency, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess and advance your Zero Trust security posture—and accelerate or expand your Microsoft 365 security strategy with expert-led guidance.
35 out of 60
Zones Intune Device Endpoint Management Implementation
Zones Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Mobile Device Management
Elevate your mobile device and application management with Intune—a robust solution offering advanced security features like conditional access, multi-factor authentication, and data encryption.
36 out of 60
Lightstream Complimentary Microsoft 365 Core Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
37 out of 60
ADFS to Entra ID Migration Service
Mobile Mentor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Mobile Mentor’s ADFS to Entra ID Migration Service offers a secure, cloud-first Single Sign-On experience that eliminates outdated infrastructure and unlocks the full potential of Microsoft Entra ID.
38 out of 60
Microsoft 365 CMMC: 4-Wk Workshop
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Provides expert guidance to help organizations in the Defense Industrial Base achieve CMMC compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
39 out of 60
Hybrid Infrastructure Overview Workshop
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Rapid hybrid‑cloud design workshop — learn best practices, pitfalls, and licensing tips for Microsoft on‑prem + Azure/Microsoft 365.
40 out of 60
Copilot for Security Readiness Assessment
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Get a Copilot for Security Readiness + a Security Health Check on your Microsoft 365 environment
41 out of 60
Data Security and Governance Engagement for Microsoft 365: Microsoft Purview Suite
CompuNet
+2
Applicable to:
Cloud Security
Information Protection & Governance
Intelligently investigate and take action on data security risks.
42 out of 60
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
43 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
44 out of 60
Microsoft Security: 4-Week Implementation
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Establish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
45 out of 60
Microsoft Sentinel Proof of Concept: 4 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand how prepared is your Microsoft infrastructure when adversaries attack
46 out of 60
Lenovo Cyber Resiliency as a Service EDA
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Environment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
47 out of 60
Mergers, Acquisitions, and Divestitures: 5-Month Implementation
Cyclotron Inc.
+2
Applicable to:
Adoption & Change Management
Cloud Security
Cyclotron helps organizations overcome the technical challenges of consolidating or divesting organization assets using Microsoft 365, Azure, and third-party migration tools.
48 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
49 out of 60
Security and Operations with Expert Microsoft 365 Support
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Maximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
50 out of 60
Microsoft Defender for Cloud Apps: 2-Hr Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
51 out of 60
Dell Implementation Services for Copilot Security
Dell Technologies Services
+1
Applicable to:
Cloud Security
Readiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
52 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk Implementation
Neway Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Streamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
53 out of 60
Unified Access & Protection with Microsoft Entra Global Secure Access
Mobile Mentor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Step confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
54 out of 60
Copilot for Microsoft 365 Adoption Accelerator Program - 18 Weeks
Trace3
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
This program's primary objective is to help accelerate client adoption of Copilot for Microsoft 365 and setup the client for continued maturity with their usage of Copilot for Microsoft 365.
55 out of 60
Defender for IoT Enterprise: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understanding risk with unmanaged IoT devices can be difficult. Our Defender for Enterprise IoT Proof of Concept helps you visualise and understand the threats to your environment.
56 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
57 out of 60
Entra ID Governance and Guest Access
Mobile Mentor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Empower your business with Mobile Mentor’s Microsoft Entra ID Governance and Guest Access service, built on Microsoft’s cutting-edge Entra Identity Governance platform.
58 out of 60
Copilot Readiness Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
59 out of 60
Secure Remote Workplace: 1-Wk Workshop
FSI Strategies
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
60 out of 60
Previous
2
3
4
5
6
Next