Skip to main content
Marketplace
Give feedback
Help & support
Saved items
Private plans
Just a moment, logging you in...
All
Products
Categories
Industries
Partners
Filters
Clear all
Your location
Your location
Products (1)
Products (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adoption & Change Management
Adoption & Change Management
Calling for Microsoft Teams
Calling for Microsoft Teams
Cloud Security
Cloud Security
Compliance Advisory Services
Compliance Advisory Services
Device Deployment & Management
Device Deployment & Management
Frontline Workers
Frontline Workers
Identity & Access Management
Identity & Access Management
Information Protection & Governance
Information Protection & Governance
Insider Risk
Insider Risk
Knowledge & Insights
Knowledge & Insights
Meeting Rooms for Microsoft Teams
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Meetings for Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Mobile Device Management
Mobile Device Management
Power Platform for Teams
Power Platform for Teams
Teams Custom Solutions
Teams Custom Solutions
Teamwork Deployment
Teamwork Deployment
Threat Protection
Threat Protection
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Industries
Industries
Service type
Service type
Pricing Model
Pricing Model
Consulting services results
Showing results in consulting services.
Microsoft 365 Threat Protection : 2-Wk Implementation
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
1 out of 60
Microsoft 365 consultancy
Onex Group
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Get Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
2 out of 60
4security - Microsoft In-Depth Threat Protection Engagement
4Sight Holdings
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Strengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
3 out of 60
Cloud Security Envisioning Workshop
TierPoint
+2
Applicable to:
Cloud Security
Insider Risk
The Cloud Security Envisioning engagement helps you explore how to detect threats, understand your security posture, and identify risks and opportunities across all your cloud environments.
4 out of 60
Virtual CISO (vCISO) Managed Services
Netrix Global
+1
Applicable to:
Cloud Security
Our virtual CISO offering provides organizations a senior level security executive for ongoing security program management and governance.
5 out of 60
Microsoft 365 Security Assessment
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW’s Microsoft 365 Security Assessment allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
6 out of 60
UNITE: AI Aware Workshop_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
For business leaders who seek to understand AI in a business context, UNITE: AI Aware_ is an expert-led workshop for all departments. Participants can learn about AI types, capabilities and benefits.
7 out of 60
AI Security for Microsoft 365 Copilot
Exelegent
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Concerned about AI security? Not sure what Copilot can already access in your environment? Concerned about AI security? Not sure what Copilot can already access in your environment?
8 out of 60
Microsoft 365 Security Readiness: 4-Wk Assessment
Quadrasystems.net (India) P Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Identify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
9 out of 60
Copilot for Microsoft 365: La Evaluación De Preparación De Datos Y Seguridad
Awara IT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Awara IT puede apoyar tu negocio con Copilot for Microsoft 365, aprovechando un equipo de más de 200 profesionales dedicados con más de 16 años de experiencia en la optimización de entornos de Microso
10 out of 60
ALFA Managed SOC with Microsoft Defender XDR and Sentinel
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
ALFA Managed Security Operations Center (SOC) leverages the powerful capabilities of Microsoft Defender Extended Detection and Response (XDR) and Microsoft Sentinel (SIEM & SOAR) to provide a robust,
11 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365 GCC High for CMMC/ITAR: 6-Wk Assessment and Planning
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Shorten the time to value from an M&A activity which includes partial or all going to Microsoft 365 GCC High by starting with an assessment and plan to rationalize identities, tenants, and costs.
12 out of 60
Microsoft Intune Service
Sii Sp. z o.o.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Insider Risk
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
13 out of 60
SecureBlu MDR Service for Microsoft 365 Defender
New Era Technology
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
14 out of 60
Okta Migration to Azure AD: 3-Week Assessment
Invoke
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
The Okta Migration to Azure AD Assessment offering is designed to assess & plan your migration efforts to your existing investments in Azure AD.
15 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
16 out of 60
AvePoint Backup: 4 Weeks Proof Of Concept
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Sentinel Technologies is proud to offer AvePoint’s Cloud Backup, a powerful cloud-to-cloud backup solution for Microsoft 365 and Azure.
17 out of 60
Microsoft 365 Copilot - Technical Readiness
Crayon
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Jumpstart your journey with the Crayon Microsoft 365 Copilot Technical Readiness - your cornerstone for secure and efficient AI adoption within your organization.
18 out of 60
Zones SOCaaS - MXDR with Threat Protection
Zones Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Zones SOCaaS powered by Microsoft Sentinel and Defender offers advanced MDR and XDR capabilities, reinforcing your business’s safety.
19 out of 60
BUI Cyber MDR - 1 Day Discovery Workshop
BUI (Pty) Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
20 out of 60
Defender for IoT Operational Technology: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
21 out of 60
Conditional Access Penetration Test: 4 Days Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
22 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
23 out of 60
Invoke Data Risk Assessment
Invoke
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
This assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
24 out of 60
Varonis Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
25 out of 60
Advisory Service for Microsoft Cloud
Dell Technologies Services
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Leverage our expertise to uncover the insights to right-size your environment, minimize risk and optimize Microsoft 365 and Azure costs
26 out of 60
Mailbox Guardian - Security: 2 Week Implementation
ProServeIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cybersecurity review and lockdown of Microsoft 365 environment. Monitor and provide implementation recommendations Protect against phishing and other attacks Review desired state configuration
27 out of 60
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-Weeks
Invoke
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Invoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
28 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
29 out of 60
Microsoft 365 Plan for Success:3-d Assessment
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
30 out of 60
Copilot for Security Readiness Assessment
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Get a Copilot for Security Readiness + a Security Health Check on your Microsoft 365 environment
31 out of 60
DLP Implementation and Tuning Services
INFOTECHTION
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Reduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
32 out of 60
Avanade Security Risk Assessment
Avanade, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Avanade's 5-day Risk Assessment offers security leaders a comprehensive view of risk posture across their enterprise and proactive ways to protect their organizations from growing cyber threats.
33 out of 60
Secure Data Management with Microsoft Purview
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
34 out of 60
Microsoft Security Solutions - 4 Week Assessment
Protiviti
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
35 out of 60
KPMG Agent 365 Implementation - Adoption & Management
KPMG
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enable organisations to operationalise Microsoft Agent 365 with trusted governance, security, and lifecycle controls so AI agents can scale safely beyond pilots
36 out of 60
Microsoft Purview & Generative AI Synergy: Data Governance for the Future
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Usage of generative AI increases day by day in enterprise environments, in some cases without control. Act in time and prevent data breaches and exfiltration activities.
37 out of 60
Deploying Purview Data Security - Labels and DLP
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
A dependable approach to deployment of Data Security workloads led by governance and following our standard framework for Microsoft 365 customers
38 out of 60
Overwatch Microsoft 365 Security: 12 Month Implementation
THREATSCAPE LIMITED
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Overwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
39 out of 60
Microsoft Security Copilot Readiness Assessment
Softchoice
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Aims to ensure organizations can securely utilize Microsoft’s Copilot for Security and identifying gaps in signal data from core Microsoft security products
40 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week Implementation
Beyondsoft
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
41 out of 60
CMMC Secure Enclave
Planet Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
A secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov.
42 out of 60
Microsoft OT/IOT Security : 2-Wks Assessment
Wipro Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Identify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
43 out of 60
MDR for Microsoft Defender
ADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.
+2
Applicable to:
Cloud Security
Threat Protection
Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
44 out of 60
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
45 out of 60
Microsoft Defender for Endpoint Deployment
Citrin Cooperman Advisors, LLC
+2
Applicable to:
Cloud Security
Threat Protection
Fortify your business with Microsoft Defender for Endpoint that seamlessly integrates into Microsoft 365, safeguarding all devices and strengthening your Zero Trust framework.
46 out of 60
XDR as a Service | Assure 365
CyberOne
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Fully Managed XDR with 24x7 detection, response and threat protection—Powered by Microsoft Defender XDR.
47 out of 60
ANECT Security Monitoring and Response 3 Months PoC
ANECT a.s.
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
48 out of 60
Endpoint Management Workshop
Citrin Cooperman Advisors, LLC
+2
Applicable to:
Cloud Security
Threat Protection
Empower secure endpoint management with Microsoft Intune through streamlined operations.
49 out of 60
Copilot for Microsoft 365 Deployment
SMART business LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Copilot for Microsoft 365 is an AI-powered productivity tool that integrates with Microsoft 365 Apps and the Microsoft Graph to enhance user creativity, productivity, and skills.
50 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
51 out of 60
Microsoft 365 CMMC: 4-Wk Workshop
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Provides expert guidance to help organizations in the Defense Industrial Base achieve CMMC compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
52 out of 60
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POC
atQor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
53 out of 60
Avanade Modern Sec Ops
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
54 out of 60
Security Assessment for Copilot Readiness: 3 Day Workshop
Netwoven
+2
Applicable to:
Cloud Security
Knowledge & Insights
Netwoven's security assessment for Copilot workshop will train you to better discover, secure, and govern your corporate data for usage with Copilot for Microsoft 365
55 out of 60
Security Maturity Assessment - 4 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
56 out of 60
User Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
57 out of 60
Implementation of Microsoft Security Copilot
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
58 out of 60
Data Security Engagement
adaQuest
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
59 out of 60
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
60 out of 60
Previous
1
2
3
4
5
Next