FiltersClear all
Professional Services results
Showing results in professional services.
Copilot Advanced Services: 1 Day 3 WorkshopsNess IsraelUnlock the full potential of Microsoft Copilot with our tailored AI services, enhancing security, development and productivity across Microsoft 365 applications through flexible, expert-led sessions.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Workplace Analytics
1 out of 60
Intune Security ReviewmnemonicEnhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
+2
Applicable to:
Cloud Security
Mobile Device Management
2 out of 60
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
3 out of 60
Watchguard Managed ServiceCWSIWatchGuard helps customers understand, implement and fully utilise Microsoft Defender and Microsoft Sentinel's capabilities to deliver secure operations, all watched over by our 24x7 CSOC service.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
4 out of 60
Modern Security Operations EngagementFUJITSUDetect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
+2
Applicable to:
Cloud Security
Threat Protection
5 out of 60
Threat Protection EngagementNitec Solutions LtdLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 60
Microsoft 365 Security AssessmentNviron LimitedNviron’s Microsoft 365 Security Assessment provides an in-depth analysis of your organisation's existing security posture and recommends Microsoft 365 security capabilities to mitigate any risks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
secure365® MDRSoftwerx Ltd.secure365® works with Microsoft Sentinel and Microsoft Defender to provide SMB's with a managed 24x7 security solution that offers enterprise-grade protection at an affordable price.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 60
Microsoft 365 Copilot Readiness AssessmentQuorumAccelerate your AI journey with a Microsoft 365 Copilot Readiness Assessment
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
10 out of 60
Unified Identity & Secure Edge Modernization with Entra SuiteBDOModernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Secure Your Future: Cybersecurity PathwaysReplyDiscover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 60
Free Data Security & Threat Protection Immersion BriefingIT Partner LLCDiscover how to strengthen your Microsoft 365 environment with real-time insights, proactive threat detection, and intelligent data protection — guided by certified experts from IT Partner LLC.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
13 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
+2
Applicable to:
Cloud Security
Threat Protection
14 out of 60
Threat Protection Immersion BriefingJUMPSEC LIMITEDMicrosoft funded-Briefings. Make fast, low risk progress on Microsoft security.
+2
Applicable to:
Cloud Security
Threat Protection
15 out of 60
Microsoft 365 Security AssessmentTechPlus TalentThis Microsoft 365 Security Assessment evaluates your entire Microsoft 365 environment to identify security gaps and misconfigurations, delivering risk-rated findings and prioritized recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
16 out of 60
Threat Protection Envisioning WorkshopSoftwerx Ltd.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
18 out of 60
S4B_XDR_Recuperacion_Automatica_RecursosS4BSILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
+2
Applicable to:
Cloud Security
Threat Protection
19 out of 60
S4B Email Attack Simulation TrainingS4BAttack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
20 out of 60
Microsoft Managed Security Service 4-Week ImplementationAtech SupportEnterprise-grade security implementation, configuration and monitoring with proactive threat detection and incident response in a 24/7/365 SOC across applications, endpoints and infrastructure
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
21 out of 60
Free Office 365 Review: 1hr AssessmentOutbound Solutions and Computing LtdOffice 365 review, health check, usage and overall environment summary
+3
Applicable to:
Adoption & Change Management
Calling for Microsoft Teams
Cloud Security
22 out of 60
Microsoft 365 Security: 2-Day ImplementationCloud DirectA quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Microsoft 365 Security: 9-Day ImplementationCloud DirectAn engagement that will setup Microsoft 365 with enterprise-level security & compliance policies to provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security: 6-Day ImplementationCloud DirectA quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Microsoft 365 Security assessment - 3 day848 GroupMicrosoft 365 Security assessment to benchmark Office 365 implementation against CIS and Microsoft Security best practice, and deliver a road map for resolving security risks
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
Microsoft 365 Security Advisor: 1-Hour AssessmentCloud DirectA consultancy service to advise the most optimal way to manage security posture within Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 60
Zero Trust Security Assessment: 10-Day AssessmentChorusOur zero trust security assessment reviews your security posture to give you a clear roadmap to adopt Microsoft 365 security solutions to remove vulnerabilities and improve your posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
Security Threat Check: 5-Day Assessment & WorkshopChorusOur security assessment identifies active and potential security threats and gives you a clear breakdown of which Microsoft 365 security products can be used to remediate active threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Mobile Threat Defence 3 Week AssessmentBT BusinessMTD risk assessment using Microsoft 365 and Zimperium zIPS
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
30 out of 60
Always on VPN - Implementation Service - 2 WeeksPowerONPlatforms LimitedHave a secure Microsoft Always On VPN Environment deployed quickly and effectively to support your remote working needs
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
31 out of 60
Modern Work Security Strategy & Assessment BriefRISUAL LTDCall with risual's Architecture team to discuss how assessment offering can support your organisation to define security strategy for modern work (Office 365) services : 3-Hour Briefing Call
+2
Applicable to:
Cloud Security
Identity & Access Management
32 out of 60
Peace of Mind for Microsoft 365: ImplementationAvaelgoManaged service offer: monthly proactive maintenance for Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
33 out of 60
Microsoft 365 Security Compliance 6-Day AssessmentChorusEstablish a clear roadmap to ensure that your organisation takes full advantage of the advanced security and compliance features in Microsoft 365 to build a Zero Trust framework.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
34 out of 60
Microsoft Cloud App Security (MCAS) WorkshopAdvaniaThis MCAS workshop guides an organisation through the high level design considerations applicate to Cloud Discovery, Connect App and session proxy policy capabilities and related integrations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
35 out of 60
Bytes Managed Workspace: 5 Day WorkshopBytes Software ServicesWorkshop and onboarding to provide on-going support and management of Surface, Microsoft 365 and workplace productivity applications
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
36 out of 60
Microsoft 365 Security: 5-Day AssessmentSynergi Software LtdTargeted for Small and Mid Sized Business the offer provides a strategic review and output assessment detailing clear guidance on security improvements across your Microsoft 365 and Azure Estate
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
37 out of 60
Microsoft 365 Security 1-Day AssessmentValtoA security assessment of the Microsoft 365 Environment checking all services within the platform and covering off additional tools available in your organisation to assist with the security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft 365 Security: 3 Day AssessmentDaisy Corporate Services Trading LimitedDaisy's Microsoft 365 Security Assessment is a three-day consultancy service delivering a current state assessment of your Microsoft 365 environment, security controls and security requirements.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 60
Cloud Security Review: 4-Day AssessmentRISUAL LTDWe can assess the security configuration of Microsoft Office 365, Microsoft Azure IaaS and PaaS and Dynamics 365 together or we can review them individually if you have particular concerns.
+2
Applicable to:
Cloud Security
Compliance Advisory Services
40 out of 60
Microsoft 365 Security Audit: 3-Day AssessmentMarathon Managed ServicesMicrosoft 365 Security Health Check and Report. Analysis of Secure Score and adherence to the NCSC 14 security principles. Presentation of report to customer detailing Microsoft 365 security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Modern Work Strategy: 3-hour Briefing SessionRISUAL LTDThis engagement is a 3 hour briefing session with an Enterprise Architect to go through two primary elements of Microsoft 365, our Modern Work Strategy & out Modern Work assessments.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
42 out of 60
Security Assessment for Microsoft 365: 5 DaysChess LtdProtect your data with Security Assessment of your Microsoft 365 subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
SOC as a Service_1 day ImplementationTarsus On Demand (Pty) LtdSOC is a managed service that leverages a bespoke Threat Monitoring Platform. This platform detects malicious and suspicious activity across 3 critical attack vectors: Endpoint, Network & Cloud.
+2
Applicable to:
Cloud Security
Threat Protection
44 out of 60
Azure AD: Cloud Authentication 1-Day AssessmentTransparity Solutions LtdAn assessment to provide you with an overview of Cloud Identity and the capabilities within Azure AD to help you better serve and engage with your employees, including transition away from AD and ADFS
+2
Applicable to:
Cloud Security
Identity & Access Management
45 out of 60
Zero Trust Adoption: 6-Day AssessmentPowerONPlatforms LimitedThe Solution Alignment is designed to support your understanding and plan your Secure Organisations future with Microsoft services. Looking across Data, Apps, Infra, Network, Identities and Endpoints.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
46 out of 60
Windows 365 - 3 Day Proof of Concept DeploymentCISILION LTDWindows 365 - 3-day Proof of Concept inclusive of demo, design, deployment, configuration, testing and handover.
+2
Applicable to:
Cloud Security
Device Deployment & Management
47 out of 60
Security and Compliance AssessmentAgilisys LtdOur Security & Compliance assessment helps you understand the threats you might be facing, reduce the risk of your business being interrupted, and as a result allow you to gain speed and efficiency.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
48 out of 60
IAM Health Check: 5-10 Day AssessmentMarathon Managed ServicesA stepping-stone towards a blueprint for change in your organisation, this assessment and report ensures that you benefit from a health check and assessment of your existing IAM infrastructure
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
49 out of 60
Microsoft 365 Adoption : 3-6 Day Adoption WorkshopMarathon Managed ServicesGain knowledge around current Microsoft 365 feature sets and capabilities, and understanding of how the benefits of modern working can benefit your business. Assess readiness and plan adoption roadmap
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
50 out of 60
Microsoft365 Security Gap Analysis: 2Wk AssessmentStripe OLT Consulting LtdOur Microsoft 365 Gap Analysis will help you determine the difference or ‘GAP’ between your organisation’s current and ideal state of security technology.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
51 out of 60
Microsoft 365 Modern Workplace: 4Wk ImplementationStripe OLT Consulting LtdMicrosoft 365 has been designed to help your organisation excel in a remote working world - Our team of gold certified Microsoft experts are here to support it's implementation.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
52 out of 60
Cybersecurity Assessment Service: 2-Day AssessmentHTGThe Cyber Security Assessment Tool (CSAT) is a software product developed by security experts to quickly assess the status of an organisation’s security with recommended improvements based on fact.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
53 out of 60
Cloud Security Assesment - 4 Wks AssessmentYouCC Technologies LTD.YouCC Technology a leader in the Israeli Cloud Security consulting provider will assess your current cloud security situation and recommend key Microsoft 365 suite deployment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
54 out of 60
Email and Threat Protection 4 Week ImplementationHTGHTG’s Advanced Email Threat Protection pack ensures your Microsoft products such as Outlook, SharePoint, OneDrive & Microsoft Teams are hardened to best practice standards.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
55 out of 60
Collaboration & Data Governance 4-Week ImplementationHTGHTG’s Collaboration & Data Governance pack can help companies achieve the right balance of user freedom while ensuring compliance with corporate policies.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
56 out of 60
Microsoft 365 Security Workshop: 3-day WorkshopPHOENIX SOFTWARE LTDEnable organisations to understand how Identity & Access Management, Threat Protection and Secure Management can help to secure their organisation in comparison to their existing Security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Information Protection Workshop: 3day WorkshopPHOENIX SOFTWARE LTDEnabling you to use the capabilities built into Microsoft 365 to mange and secure your organisation's digital information in the cloud with products such as Information Protection
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
58 out of 60
Endpoint Manager: 5-Day Proof of ConceptTransparity Solutions LtdModernise device management with an expert-led POC deployment of Microsoft Endpoint Manager
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
59 out of 60
Security Accelerator: 5-Day WorkshopRicoh UK LimitedProvides insight and rates risk to existing security posture & delivers a roadmap to improvement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60