FiltersClear all
Professional Services results
Showing results in professional services.
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLCGet a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbHMit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 60
Securing Identities WorkshopSynergy Technical, LLCThe foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
3 out of 60
Healthcare & Education Cybersecurity AssessmentPSM PartnersThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
4 out of 60
License Advisory ServicesSynergy Technical, LLCWhether you’ve been approached by Microsoft for an audit or simply want to conduct a self-assessment, our License Advisory Services is a great solution for understanding your real licensing needs.
+3
Applicable to:
Cloud Security
Teamwork Deployment
Threat Protection
5 out of 60
AI Security Readiness: 4 week AssessmentQuisitiveQuisitive's AI Security Readiness Assessment provides organizations with an in-depth understanding of how best to adopt Copilot and Generative AI without putting their organization at risk.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
6 out of 60
Office 365 Migration 3-Month ImplementationRKON TECHNOLOGIESLeverage RKON's consulting expertise for a smooth and seamless migration to Microsoft's Office 365 suite of products including SharePoint, OneDrive, and Teams
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
7 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional ServiceIT Partner LLCThe goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Secure Workspace: 1 Day WorkshopWatserv Inc.A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
10 out of 60
Windows Virtual Desktop Implementation: 5-Days Professional ServiceIT Partner LLCProvide a streamlined solution using Windows Virtual Desktop (WVD) on Microsoft Azure, offering efficient remote workstations, cost-effective licensing, and Windows 365 in a terminal server format.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
11 out of 60
Implementation of Copilot readiness assessmentDev4SidePrepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
12 out of 60
Compliance Managed ServicesForsyte IT SolutionsOrganizations everywhere are experiencing the benefits of Compliance Managed Services. Work with our Microsoft Gold Partner team to establish governance and manage user access and data security.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
13 out of 60
Cyderes Microsoft Security Adoption AdvisoryCyderesThe Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
14 out of 60
Fixing vulnerabilities based on Defender with ASR Module: 3-Days Consulting ServiceIT Partner LLCThis service provides a comprehensive approach to identifying and fixing vulnerabilities in organization's devices, helping mitigate the risks of cyber-attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
IT Infrastructure OptimizationAwara IT Kazakhstan LLPIT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
16 out of 60
Management Services: 3-month AssessmentQuisitiveQuisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
17 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLCThis service moves key server tasks to a new one for upgrades or system changes.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
18 out of 60
"Threat Protection: 3 Day Workshop"Insentra Pty LtdOur Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
19 out of 60
BCN Cloud Readiness Assessment and ReportBCN Group Ltd.This assessment will help you decide whether you are ready to migrate IT systems and services to the cloud.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Meetings for Microsoft Teams
20 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
21 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Secure AI Quickstart: 3-week Assessment and Proof of ConceptQuisitiveSecure AI Quick Start is a fundable, Microsoft-aligned security engagement that rapidly analyzes organizational AI readiness and identifies critical security & governance improvements
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
23 out of 60
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
24 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
+2
Applicable to:
Cloud Security
Identity & Access Management
25 out of 60
Office 365 Encrypted Email - Initial Setup: 1-Day Professional ServiceIT Partner LLCBoost Microsoft 365 security with default encryption. Elevate messaging protection and implement email encryption and rights protection for sensitive data.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
Manage Compliance Obligations & Risks with Microsoft PurviewBDOEnhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
27 out of 60
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week ImplementationQuisitiveQuisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
28 out of 60
Microsoft 365 Secure Productivity WorkshopABTechnologiesEnable your team to work securely and productively using Microsoft 365 best practices.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
29 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLCEnhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
32 out of 60
Pently Microsoft 365 - AssessmentPently GmbHStructured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
33 out of 60
Get AI Ready: 5-Day AssessmentPSM PartnersAI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
34 out of 60
Microsoft 365 Modern Endpoint Service Powered by IntuneAll Covered, a division of Konica MinoltaMicrosoft 365 Modern Endpoint is a cloud-native, fully managed service powered by Microsoft Intune. It is designed to simplify endpoint hardening, configuration, and application management.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
35 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLPGet started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
36 out of 60
Microsoft Sentinel Quick StartEdgile, Inc.Production pilot, which is expected to provide centralized log collection, detection of previously undetected threats, investigation with artificial intelligence, and Rapid Response to incidents.
+1
Applicable to:
Cloud Security
37 out of 60
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
38 out of 60
Virteva Microsoft 365 Defender Ready DeployVirteva LLCGet immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTDMicrosoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
+2
Applicable to:
Cloud Security
Threat Protection
40 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Microsoft Defender for End Points JumpstartSentinel Technologies Inc.Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
+2
Applicable to:
Cloud Security
Threat Protection
42 out of 60
Microsoft Defender for Office JumpstartSentinel Technologies Inc.Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
+2
Applicable to:
Cloud Security
Threat Protection
43 out of 60
Defender PilotLevacloud LLCThe Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
+2
Applicable to:
Cloud Security
Threat Protection
44 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCShadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
45 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCThe primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
46 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCConfigure and customize transport rules in Microsoft Exchange Online, ensuring efficient email routing, improved security, and compliance for your organization.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
47 out of 60
Assessment and Roadmap: Microsoft Security (Azure, Microsoft 365, Active Directory, Entra ID) 6-Week EngagementKudelski SecurityThis assessment defines and recommends steps to achieve your desired security state using your existing security solutions and capabilities.
+2
Applicable to:
Cloud Security
Compliance Advisory Services
48 out of 60
Multi-Factor Authentication - Initial Setup: 3-Professional serviceIT Partner LLCThe goal of the service is to make Microsoft 365 accounts safer by adding an extra layer of security, so only authorized users can access them.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
49 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLCThe goal of the service is to securely remove your previous Exchange Server, ensuring it doesn't disrupt your operations and enabling a smooth transition to Exchange Online.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
50 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLCThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLCEnhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Digital Transformation Calls: 1-Day Professional ServiceIT Partner LLCQualified assistance in resolving any issues after migration to the Microsoft 365 cloud services.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
53 out of 60
Company Document Migration to SharePoint Online or Teams: 7-Days Consulting ServiceIT Partner LLCMigration of file shares, folders and documents from your file server or a third-party service like Box, Dropbox, or Google Drive to SharePoint Online or Teams.
+2
Applicable to:
Cloud Security
Teamwork Deployment
Endpoint Security Foundations 50 users: 1-YrRed River Technology LLCEndpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
+2
Applicable to:
Cloud Security
Threat Protection
55 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional ServiceIT Partner LLCStrengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
56 out of 60
Foundational Identity AnalysisJourneyTEAMEnsure a Secure Foundation for Microsoft Cloud Services using our Foundational Identity Analysis.
+1
Applicable to:
Cloud Security
57 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for EndpointCyderesCyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
58 out of 60
Modern Managed Services: 2-tägiges AssessmentnovaCapta GmbHIhre Optionen für Managed Services rund um Endpunkte, Microsoft Azure, Microsoft 365 und Security am Modern Workplace entdecken
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
59 out of 60
Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
60 out of 60