FiltersClear all
Professional Services results
Showing results in professional services.
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Endpoint Security Advanced Quick Start 14-wk ImplementationEdgile, Inc.Pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
2 out of 60
Licensing Optimization: 2-Wk WorkshopeGroup Enabling TechnologiesGain confidence in your level of control with your Microsoft 365 licensing.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
3 out of 60
Microsoft 365: 2-Week AssessmentApex Digital SolutionsEstablish a clear roadmap and change management plan for your journey to a modern workplace.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
4 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Cutover Google Workspace to Office 365 migration (IMAP migration). Just email and email folders: 7-Days Professional ServiceIT Partner LLCMigration of email data and email folders from G Suite (Google Apps) to Microsoft 365 / Exchange Online.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
6 out of 60
Microsoft 365 E5 Shield Deployment: 8 Week Imp.KAMIND IT, IncKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 60
Microsoft 365 Secure Score AssessmentDaymark SolutionsImprove your environment’s security posture using Microsoft Secure Score.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
8 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementationInterlink Cloud Advisors, Inc.Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Threat Protection WorkshopMobile MentorDuring this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
10 out of 60
Virtual Desktop - Health and Configuration 1 Week AssessmentCDI LLCCDI provides a review of a customer's Virtual Desktop environment and identify opportunities to improve the performance, stability, security and manageability.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
11 out of 60
Microsoft 365 Security BriefingCDI LLCA Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Microsoft 365 Tenant Security AssessmentDaymark SolutionsStrengthen the Security of Your Microsoft 365 Environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
13 out of 60
Microsoft Secure Score - increase to 200: 3-Days Professional ServiceIT Partner LLCThe goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
14 out of 60
Microsoft 365 Copilot Readiness Assessment - CRATechPlus TalentThrough this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
15 out of 60
Microsoft Security Copilot POV & Adoption PlanBDOProve the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
Change Management 6-Months ImplementationSupremo Sp. z o.o.Bądź pewny, że zaangażowanie użytkowników i przyjęcie nowych rozwiązań przyczyni się do sukcesu wdrożenia, sukcesu całej organizacji.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
17 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVASOFTEnhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
19 out of 60
Threat Protection and Cloud Security: 3 Day WorkshopNetwovenImprove your security posture with a Microsoft Threat Protection Assessment Workshop
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 60
Implementation of Microsoft Defender for EndpointCDWCDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Cloud-Native Migration Service: 4-Month ImplementationCyclotron Inc.With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
+2
Applicable to:
Cloud Security
Identity & Access Management
22 out of 60
Dynapt Advisory Services for Microsoft 365 Copilot 3 Week WorkshopDynapt IncUnleash the potential of AI to transform your business operations with Microsoft 365 Copilot.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
23 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to:
Cloud Security
Threat Protection
25 out of 60
Strategic Advisory Services: 1-Wk BriefingeGroup Enabling TechnologieseGroup Enabling Technologies, LLC. Strategic Advisory Services will help your organization down the path of digital transformation.
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Information Protection & Governance
26 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServusGain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
28 out of 60
C1st Office 365 Tenant Migration AssessmentC1st Technologies LLCEnsure a smooth Office 365 tenant-to-tenant migration for businesses. We provide comprehensive consulting services to facilitate seamless transitions during mergers, acquisitions, and other scenarios.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
29 out of 60
impelSecure Threat Protection Engagement: Free 4-week workshopimpeltec Pty LtdDiscover threats and vulnerabilities to your Microsoft cloud and on-premises environments
+2
Applicable to:
Cloud Security
Threat Protection
30 out of 60
Trip to Microsoft 365 Copilot ImplementationSuri Services SCOfrecemos un servicio de capacitación y preparación estratégica para la adopción de Microsoft 365 Copilot, enfocado en acelerar la productividad y transformar los procesos clave
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
31 out of 60
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLCSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Security Audit and Recommendations: 3-Days Consulting ServiceIT Partner LLCGoal: help organizations review their security settings, configurations, and policies to identify any potential vulnerabilities and ensure that the tenant is properly secured against external threats.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
33 out of 60
Cyber Security AssessmentAegis InnovatorsUnderstand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Cloud Protection for AIKiZAN TechnologiesProtect Cloud Environments leveraging Microsoft Secure Scores and other Microsoft Products to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigat
+1
Applicable to:
Cloud Security
35 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Managed IT Services for DentalOlive + GooseComprehensive managed IT services for dental offices, ensuring security, compliance, and continuity.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
37 out of 60
Copilot Advanced Services: 1 Day 3 WorkshopsNess IsraelUnlock the full potential of Microsoft Copilot with our tailored AI services, enhancing security, development and productivity across Microsoft 365 applications through flexible, expert-led sessions.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Workplace Analytics
38 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdgeEndpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
40 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFTEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
41 out of 60
Workshop for Microsoft 365 Threat ProtectionCDWThe Workshop for Microsoft 365 Threat Protection provides the following objectives to ensure thorough enablement of crucial Microsoft products for a more secure environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
+1
Applicable to:
Cloud Security
43 out of 60
Secure and Maximize Your Microsoft 365 Tenant with Manage & ProtectAll Covered, a division of Konica MinoltaMicrosoft 365 tenant management to provide you with continuous security & compliance, enhanced administration, and actionable insights.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
44 out of 60
Defend Against Threats with SIEM Plus XDR WorkshopThe Tech MavericksThe Defend Against Threats with SIEM Plus XDR Workshop will help you achieve broader security objectives—and identify current and real threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
45 out of 60
Microsoft 365 Defender Threat Check: 4-wk assessInterlink Cloud Advisors, Inc.Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
+2
Applicable to:
Cloud Security
Threat Protection
46 out of 60
KK_Intune ImplementationKraft KennedyKraft Kennedy's Implementation service for Migration to Microsoft Intune is designed to assist customers in an Intune Deployment Architecture Scenario
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
47 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology LtdSpeak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
48 out of 60
SYSTEX Data Security and Compliance Solution精诚(中国)企 业管理有限公司通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
49 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
51 out of 60
MXDR Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
52 out of 60
Microsoft 365: 2-Week ImplementationTechnologentExpert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
53 out of 60
Zero Trust Assessment: 3-Week WorkshopAccountabilITOur Microsoft Zero Trust Assessment: 3-Week Workshop is designed to evaluate an organization's security posture and provide guidance on implementing a Zero Trust security model.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
54 out of 60
Hybrid Infrastructure Overview WorkshopAwara IT Kazakhstan LLPRapid hybrid‑cloud design workshop — learn best practices, pitfalls, and licensing tips for Microsoft on‑prem + Azure/Microsoft 365.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
55 out of 60
Zero Trust Model - 4h assessmentReplyZero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Purview Information Protection: setup and adoptionDev4SideProtect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
57 out of 60
Modern SecOps Engagement (Security Operations)PerformantaGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft SecOps Engagement
+2
Applicable to:
Cloud Security
Threat Protection
58 out of 60
Digital Workplace Program: 4-week AssessmentQuisitiveThe Digital Workplace Foundations Assessment helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tool
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
59 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyantManage and Investigate Risk and Threat Protection
+2
Applicable to:
Cloud Security
Threat Protection
60 out of 60