Skip to main content
Marketplace
Give feedback
Help & support
Saved items
Private plans
Just a moment, logging you in...
All
Products
Categories
Industries
Partners
Filters
Clear all
Your location
Your location
Products (1)
Products (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adoption & Change Management
Adoption & Change Management
Calling for Microsoft Teams
Calling for Microsoft Teams
Cloud Security
Cloud Security
Compliance Advisory Services
Compliance Advisory Services
Device Deployment & Management
Device Deployment & Management
Frontline Workers
Frontline Workers
Identity & Access Management
Identity & Access Management
Information Protection & Governance
Information Protection & Governance
Insider Risk
Insider Risk
Knowledge & Insights
Knowledge & Insights
Meeting Rooms for Microsoft Teams
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Meetings for Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Mobile Device Management
Mobile Device Management
Power Platform for Teams
Power Platform for Teams
Teams Custom Solutions
Teams Custom Solutions
Teamwork Deployment
Teamwork Deployment
Threat Protection
Threat Protection
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Industries
Industries
Service type
Service type
Pricing Model
Pricing Model
Consulting services results
Showing results in consulting services.
Endpoint Management Workshop
Citrin Cooperman Advisors, LLC
+2
Applicable to:
Cloud Security
Threat Protection
Empower secure endpoint management with Microsoft Intune through streamlined operations.
1 out of 60
Implementing Defender for Endpoint & Cloud App Security
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
2 out of 60
Trip to Microsoft 365 Copilot Implementation
Suri Services SC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Ofrecemos un servicio de capacitación y preparación estratégica para la adopción de Microsoft 365 Copilot, enfocado en acelerar la productividad y transformar los procesos clave
3 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-Weeks
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
4 out of 60
Identity and Access Management Solution
H One (Private) Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Entra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
5 out of 60
Cyber Portfolio Rationalization: 3-Day Workshop
PwC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Simplify your cybersecurity portfolio to reduce the cost and complexity of your Microsoft 365 and Microsoft Azure environment
6 out of 60
Managed XDR Shield: 4-Week Implementation
Long View Systems
+2
Applicable to:
Cloud Security
Threat Protection
Address all your proactive security needs, engage the Managed XDR Shield plan to monitor, alert, and respond to threats effectively.
7 out of 60
Spyglass-MXDR Managed Detection & Response: 2-week Implementation
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Spyglass-MXDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
8 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
9 out of 60
Fortis IR Table Top Exercises
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
10 out of 60
Microsoft 365 Security Review: Assessment
CyberOne
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Identify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
11 out of 60
Lightstream Threat Protection Assessment and Deployment Roadmap
Lightstream
+2
Applicable to:
Cloud Security
Threat Protection
Leveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
12 out of 60
Microsoft Endpoints Management Pilot
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Get started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
13 out of 60
MDR Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
“MDR Shield” is Long View’s cyber security managed detection and response service.
14 out of 60
Security Modernization: 3 Day Workshop
Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Safeguard your business with a three-step security modernization solution from Netwoven
15 out of 60
Incident Response Retainer
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
16 out of 60
Microsoft 365 Copilot Assessment
Suri Services SC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Asegura tu ruta de adopción con Suri Services y Microsoft 365 Copilot
17 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers detect, investigate, and take action to mitigate risk and ensure compliance in their modern workplace.
18 out of 60
Lenovo Cyber Resiliency as a Service Deployment
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
19 out of 60
Your Smart Workplace Assessment
Rackspace Technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Your Smart Workplace Assessment helps organizations develop secure, cost-effective, and productivity-enhancing strategies for modern work environments.
20 out of 60
Lenovo Cyber Resiliency as a Service Remediation
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
21 out of 60
Cyber Evolution: Security Workshop
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Two-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
22 out of 60
Secure Multi-Cloud Environments: 3-day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Secure Multi-Cloud Environments Workshop helps customers gain insights on active threats and vulnerabilities related to their hybrid and multi-cloud workloads within Microsoft 365.
23 out of 60
Microsoft 365 Threat Check Assessment: 3-Wk Assessment
Invoke
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
24 out of 60
Microsoft Security Deployment: 5-day Workshop
Campana & Schott GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand your Microsoft security posture and minimize risks with the right experts
25 out of 60
Microsoft 365 Security 4 Weeks Assessment
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
26 out of 60
Modern Management for Endpoints
Ivision, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
27 out of 60
Microsoft 365 E5 Zero Trust Security Assessment
SHI International Corp
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Explore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
28 out of 60
Adoption, Deployment & Success of Microsoft 365 Copilot
IT Quest Solutions
+2
Applicable to:
Adoption & Change Management
Cloud Security
Empower your team with Microsoft 365 Copilot—boost productivity, streamline workflows, and unlock AI-driven insights across Word, Excel, Teams & CopilotAgents
29 out of 60
Microsoft Defender for Endpoints Pilot: Implementation
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Evaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
30 out of 60
Identity Health Check
Mobile Mentor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Mobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
31 out of 60
Darktrace Managed Network Sensor
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
32 out of 60
Microsoft 365 Tenant-to-Tenant Migration
Olive + Goose
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
This offering provides assessment, migration, and post-migration support for transitioning Microsoft 365 workloads and endpoint management from a source Microsoft 365 tenant to a target tenant.
33 out of 60
Cybersecurity Assessment
CDI LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
The Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
34 out of 60
Backups and DR Office 365 in Kazakhstan
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Office 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
35 out of 60
Hybrid Cloud Security Workshop - 1-Day
Zones, LLC
+1
Applicable to:
Cloud Security
Identify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
36 out of 60
Softchoice Security Platformization Assessment and Design
Softchoice
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
37 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Understand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
38 out of 60
Copilot for Micosoft 365 Readiness: 2-Day Workshop
CTGlobal A/S
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Plan adoption of Copilot for Microsoft 365 through explicit scenarios, use cases and data governance. Develop strategies for seamless onboarding and future integrations. In a safe and secure workshop.
39 out of 60
IT Infrastructure Optimization
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
IT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
40 out of 60
License Advisory Services
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Teamwork Deployment
Threat Protection
Whether you’ve been approached by Microsoft for an audit or simply want to conduct a self-assessment, our License Advisory Services is a great solution for understanding your real licensing needs.
41 out of 60
Microsoft 365 Copilot Adoption: 2-3 Week Assessment
Coretek Services
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Evaluate the current customer Microsoft investments adoption of Microsoft Cloud Services and overall Security posture in an effort to develop a "Art of the Possible" to Adopt Microsoft 365 Copilot.
42 out of 60
Rapid Remediation of Microsoft Secure Score
CyberOne
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost your Microsoft Secure Score, reduce risk and increase cyber resilience with expert-led rapid remediation.
43 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5
Collective Insights
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Upgrade to Microsoft 365 E5 for Advanced Productivity and Security
44 out of 60
Microsoft Endpoint Manager Baseline
SHI International Corp
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Explore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
45 out of 60
Security Outcomes Sprint
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Understand the Business Value of Your Cybersecurity Investments
46 out of 60
NEST Arena
Noibit
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Two-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
47 out of 60
Trustwave Accelerator for Microsoft Entra ID
Trustwave Holdings, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
48 out of 60
Microsoft Copilot for Security: 2-Day Workshop
Planet Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
This 2-day workshop covers the essential aspects you need to effectively and efficiently leverage Microsoft Copilot for Security for your organization's security operations and needs.
49 out of 60
TCS Agent Governance as a Service - Implementation - 12 weeks
TCS - Digital Workplace
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Transition from “Shadow AI” to a “governed, enterprise‑grade innovation model”—controlling agent sprawl, data leakage risks, and unvetted maker behavior.
50 out of 60
Microsoft Sentinel - Monitor file access and permission changes in SharePoint Implementation: 5-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Implement Microsoft Sentinel for monitoring file access and permission changes in SharePoint, ensuring prompt detection and notification of unauthorized or unwanted activities.
51 out of 60
Microsoft 365 Security: 4-Week Assessment
Apex Digital Solutions
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most and improving your security maturity over time.
52 out of 60
Data Security and Governance: 2 Hour Free Briefing
Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Netwoven Data Security and Governance free strategy workshop will help you get started on the path to discover, protect, and govern your sensitive corporate data
53 out of 60
KK_Intune Implementation
Kraft Kennedy
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Kraft Kennedy's Implementation service for Migration to Microsoft Intune is designed to assist customers in an Intune Deployment Architecture Scenario
54 out of 60
Microsoft Defender for Cloud Apps Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Microsoft Defender for Cloud Apps address security gaps in an organization's environment.
55 out of 60
Copilot for Security Readiness Assessment
Invoke
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Invoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
56 out of 60
Microsoft 365 Copilot Implementation Readiness Assessment
Collective Insights
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Actionable recommendations in data security, technical infrastructure, user adoption, and workflow integration, ensuring preparation to adopt and integrate new technologies.
57 out of 60
Microsoft 365 Copilot Risk Assessment: 1-Week Strategic Workshop
Atmosera
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Uncover data risks and prepare for secure Copilot adoption with a Microsoft 365 risk assessment.
58 out of 60
Cloud Security Envisioning Workshop for Microsoft 365
Synechron Technologies
+1
Applicable to:
Cloud Security
Expert-led workshop to assess, adopt, and extend Microsoft 365 security using Defender XDR, Entra ID, Defender for Endpoint, Defender for Office 365, and Defender for Cloud Apps
59 out of 60
Enabled Microsoft 365 Productivity: 12-MO Briefing
eGroup Enabling Technologies, LLC
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Mobile Device Management
Get the expertise needed to successfully manage Microsoft 365 with eGroup Enabling Technologies, LLC. Enabled Microsoft 365.
60 out of 60
Previous
3
4
5
6
7
Next