FiltersClear all
Professional Services results
Showing results in professional services.
Microsoft 365 Threat Check Assessment: 3-Wk AssessmentInvokeThe Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
2 out of 60
Microsoft 365 Copilot Readiness AssessmentPresidioReview data protection, preparation, and governance with a Microsoft Copilot readiness assessment from Presidio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
3 out of 60
Incident Response Tabletop Exercises: 2-Wk BriefingeGroup Enabling TechnologiesBe proactive and prepare your IT team for emergencies with a Disaster Plan
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
4 out of 60
Windows 365 Assessment - 1 dayCC Bilgi TeknolojileriHybrid Windows for a hybrid world
Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
5 out of 60
Invoke Data Risk AssessmentInvokeThis assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
6 out of 60
Windows 365 Standardized PilotMobile MentorThe Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
7 out of 60
Cyber Portfolio Rationalization: 3-Day WorkshopPwCSimplify your cybersecurity portfolio to reduce the cost and complexity of your Microsoft 365 and Microsoft Azure environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
8 out of 60
ALFA Managed SOC with Microsoft Defender XDR and SentinelAlfa Connections Pte LtdALFA Managed Security Operations Center (SOC) leverages the powerful capabilities of Microsoft Defender Extended Detection and Response (XDR) and Microsoft Sentinel (SIEM & SOAR) to provide a robust,
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 60
Cybersecurity Assessment: 3-Wk WorkshopExelegentThe Cybersecurity Assessment is designed to evaluate your cybersecurity posture and reduce risks exposure by using advanced Microsoft 365 Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
10 out of 60
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
11 out of 60
Copilot Business Value DiscoveryNetwovenReady to embrace AI? Join our Microsoft 365 Copilot Value Discovery Workshop and learn how to maximize its potential for your business
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
12 out of 60
Microsoft Defender for Endpoint QuickStartPresidioPresidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
14 out of 60
Discover Sensitive Data: 6W - WorkshopExelegentSensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
15 out of 60
4security: Backup as a Service for Microsoft 3654Sight HoldingsProtect your data with 4Security's Microsoft 365 Backup as a Service. Seamless integration, automated backups, and reliable data recovery for businesses of all sizes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
16 out of 60
4security: Microsoft 365 Communication Protect4Sight Holdings4security: Microsoft 365 Communication Protect, a solution to safeguard your organisation’s communications
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 60
AvePoint Backup: 4 Weeks Proof Of ConceptSentinel Technologies Inc.Sentinel Technologies is proud to offer AvePoint’s Cloud Backup, a powerful cloud-to-cloud backup solution for Microsoft 365 and Azure.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
18 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen SystemsThe Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
19 out of 60
Microsoft Security Deployment: 5-day WorkshopCampana & Schott GmbHUnderstand your Microsoft security posture and minimize risks with the right experts
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
20 out of 60
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) LtdReadiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Copilot for Microsoft 365 Data and Security Readiness AssessmentAwara IT Kazakhstan LLPElevate Your Data and Security with Copilot for Microsoft 365 Readiness Assessment by Awara IT's experts.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
22 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLCIntroducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
24 out of 60
ThreatHunter MXDR MSSP: 12-Mo ImplementationeGroup Enabling TechnologiesTo assist our customers with advanced security services focused on identifying and mitigating cloud and device malicious threats and providing 24x7 monitoring and response services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
25 out of 60
TGS Windows 11TEKsystems Global Services LLC.TEKsystems partners with you to navigate the transition to Windows 11
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
26 out of 60
AI Security and Microsoft 365 Copilot Readiness Assessment ProgramExelegentMaster control over your data and get ready to deploy Copilot in 60-90 days with a simple engagement process
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
27 out of 60
Data Security Engagement: 4-Wk WorkshopExelegentThe Data Security Engagement provides a summary of an organization’s data protection and compliance stature with actionable recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
28 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen SystemsThe OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
29 out of 60
Microsoft 365 Security AssessmentCDWCDW’s Microsoft 365 Security Assessment allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Complete MXDR Threat Protection Powered by Microsoft SentinelKiZAN TechnologiesManaged security services to protect against an evolving cyber threat landscape 24x7x365 with Microsoft Entra ID Protection, Microsoft Sentinel, and Microsoft Defender.
+2
Applicable to:
Cloud Security
Threat Protection
31 out of 60
SoftwareOne Managed Detection and Response Service for Microsoft SentinelSoftwareOneFuture-proof your cyber security with Managed Detection and Response (MDR)
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
32 out of 60
Microsoft Purview Insider Risk Management (IRM): 2-Week ImplementationSpyglass MTG, LLCOur engagement is designed to accelerate the ability to integrate and consume IRM across your enterprise while better securing data and identities in the environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
33 out of 60
Mentoring ServiceMobile MentorOur mentoring service helps customers leverage Microsoft 365 to improve endpoint security & user experience. We help accelerate the learning curve & reduce risk by deploying Microsoft 365 optimally.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
34 out of 60
Intune Health Check (All OS): 2-week AssessmentMobile MentorOur certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
35 out of 60
MDR Shield: 4-Wk ImplementationLong View Systems“MDR Shield” is Long View’s cyber security managed detection and response service.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
36 out of 60
Health-Check for Microsoft 365 Tenant: AssessmentnovaCapta GmbHMicrosoft 365 nach höchsten Sicherheitsstandards und Best Practices absichern, schützen und optimieren
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
37 out of 60
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
38 out of 60
KMicro MXDR for SMBKMicro Tech, Inc.KMicro MXDR for SMB helps businesses reduce operational complexity and strengthen cybersecurity defenses by managing their Microsoft Defender XDR environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
39 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
40 out of 60
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-WeeksInvokeInvoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
41 out of 60
Mitigate Compliance and Privacy Risks - 3 Day WorkshopCGI Inc.Help customers detect, investigate, and take action to mitigate risk and ensure compliance in their modern workplace.
+1
Applicable to:
Cloud Security
42 out of 60
Cloud Security Operations CenterReplyVerified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Virtual CISO (vCISO) Managed ServicesNetrix GlobalOur virtual CISO offering provides organizations a senior level security executive for ongoing security program management and governance.
+1
Applicable to:
Cloud Security
44 out of 60
Microsoft Purview & Generative AI Synergy: Data Governance for the FutureBlack Cell Magyarország Korlatolt Felelossegu TarsasagUsage of generative AI increases day by day in enterprise environments, in some cases without control. Act in time and prevent data breaches and exfiltration activities.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
45 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvokeThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
46 out of 60
Microsoft 365 Rapid Security Assessment: 1-Wk AssessmentAwara ITMicrosoft 365 Rapid Security Assessment is a quick yet comprehensive evaluation to enhance Microsoft 365 security against evolving cyber threats
+2
Applicable to:
Cloud Security
Threat Protection
47 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight HoldingsStrengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Okta Migration to Azure AD: 3-Week AssessmentInvokeThe Okta Migration to Azure AD Assessment offering is designed to assess & plan your migration efforts to your existing investments in Azure AD.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
49 out of 60
Security Assessment for Copilot Readiness: 3 Day WorkshopNetwovenNetwoven's security assessment for Copilot workshop will train you to better discover, secure, and govern your corporate data for usage with Copilot for Microsoft 365
+2
Applicable to:
Cloud Security
Knowledge & Insights
50 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
52 out of 60
NIST800-171-Microsoft 365-Accelerator-Guided-DeploymentKMicro Tech, Inc.Provides expert guidance to help organizations achieve NIST 800-171 compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
53 out of 60
4Sight's Microsoft Data Security Engagement4Sight HoldingsIdentify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
54 out of 60
End-to-end Threat Protection Workshop and PilotExelegentThe Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Data Security and Governance: 3 Day WorkshopNetwovenNetwoven Data Security and Governance workshop will get you started on the path to discover, protect, and govern your sensitive corporate data
+2
Applicable to:
Cloud Security
Information Protection & Governance
56 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, IncKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
Microsoft 365 consultancyOnex GroupGet Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
59 out of 60
Identity and Access Management SolutionH One (Private) LimitedEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
60 out of 60