FiltersClear all
Professional Services results
Showing results in professional services.
Identity and Access Management SolutionH One (Private) LimitedEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
1 out of 60
Copilot Readiness AssessmentAscent Global, Inc.Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro LtdWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementationCloudshift3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
4 out of 60
Intune for Android: 4-Week ImplementationMobile MentorAndroid devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
5 out of 60
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFTAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Microsoft Funded Workshop for Copilot for Microsoft 365 Adoption Acceleration: 2-Wk ImplementationProServeITIf your company is eligible, we can deliver a Microsoft funded adoption accelerator engagement for Copilot for Microsoft 365 to you free of charge ($10,000 USD value).
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
7 out of 60
Modern Management: 4 week ImplementationMobile MentorModern Management is a Microsoft 365 focused managed service that reduces cost, improves security and delights employees!
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
8 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeITCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Mergers and Acquisitions PlaybookIvision, Inc.ivision leverages an approach and methodology designed to help clients successfully plan and design for a M/A&D migrations to achieve successful mergers, consolidation or a separation outcome.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
10 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed CanaryGain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Incident Response RetainerSentinel Technologies Inc.Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Microsoft 365 Mergers and Acquisitions (M&A): 4-Week ImplementationSpyglass MTG, LLCSpyglass’s Microsoft 365 Mergers and Acquisitions (M&A) Implementation is a 4-week/ $50k engagement that focuses on quickly being able to move data to its desired destination.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
13 out of 60
Microsoft Data Security EngagementRackspace TechnologyThe Data Security Engagement is designed to help organizations identify and mitigate data security risks, especially in the context of the increasing deployment of generative AI applications.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
14 out of 60
Microsoft 365 Managed ServicesNetrix GlobalNetrix’s 24x7x365 managed services for Microsoft 365 combines a reactive service desk with proactive strategic planning to ensure your team is productive and secure.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
15 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalystAlithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
16 out of 60
Identity as a Service | Assure 365CyberOneFully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
17 out of 60
Windows10 EOL to Windows11 Foundations - 1 Week QuickStartCoretek ServicesWindows 10 EOL is right around the corner, prepare with the Windows 11 foundations QuickStart for your organization today.
+3
Applicable to:
Device Deployment & Management
Frontline Workers
Identity & Access Management
18 out of 60
SCCM to Intune Migration Plan: 2-week AssessmentMobile MentorOur migration plan gives you a roadmap, a timeline, and best practices to migrate from SCCM / ConfigMan to Intune.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
19 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFTManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONSUNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFTEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
22 out of 60
Implementation of Microsoft Copilot and AgentsStoneridge Software LLCA structured enablement journey that helps organizations strategically align, technically prepare, and culturally adopt Microsoft Copilot
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
23 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
24 out of 60
HPT Nextgen Windows Experience_02 days workshopHPT Vietnam CorporationNextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
25 out of 60
Microsoft Intune Jumpstart for Endpoints - Mobile & Workstations: 2-Wk ImplementationProServeITEnable organization-wide management & security for your mobile devices & workstations with a Microsoft Intune jumpstart pilot.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
26 out of 60
Autopilot: 2-Wk Proof of ConceptFSI StrategiesFSi Strategies will review the deployment scenarios with the client and execute a proof of concept up to 25 devices in order to demonstrate the capabilities of Windows Autopilot
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
27 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile ITAgile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
28 out of 60
Google to Microsoft 365 MigrationManaged SolutionEmpowering digital transformation through a Google to Microsoft 365 migration with world-class support, so you can focus on what matters most—your business.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
29 out of 60
Secure Remote Workplace: 1-Wk WorkshopFSI Strategies5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
30 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş."Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
31 out of 60
Device Management Migration - On-Premises to Cloud by AVASOFTAVASOFTSeamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
32 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
MDS Managed MXDR EngagementMaureen Data SystemsDesigned to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Defender Pak365™: Microsoft Defender ImplementationRavanty Tech Consulting, Inc.Empower your organization with comprehensive, AI-driven protection tailored to meet evolving security needs with the help of Microsoft Defender.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
35 out of 60
Microsoft Entra Domain Services WiFi AuthenticationAlfa Connections Pte LtdEnable secure Wi-Fi and legacy app authentication using Microsoft Entra Domain Services with LDAP support—ideal for organizations migrating from on-premises AD to Azure.
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
36 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
Windows 365: 4 Week Readiness AssessmentNetrix GlobalGet an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
38 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLCOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Cloud Device Management - 4hours BriefingReplyImprove the security, manageability, and efficiency of your corporate devices with Intune. Ideal for businesses looking to move to centralized IT management and reduce operational costs.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
40 out of 60
Quadra Entra Permissions ManagementQuadrasystems.net (India) P LtdUnderstand how permissions creep can impact the attack surface risk in your cloud infrastructure
Understand how to manage user and identity risk
+1
Applicable to:
Identity & Access Management
41 out of 60
Okta to Entra Migration: Roadmap ArchitectAscent Global, Inc.Roadmap and architect the shift from Okta to Microsoft Entra’s enhanced data security
+1
Applicable to:
Identity & Access Management
42 out of 60
Microsoft 365 Security Health Check Assessment 3-WkBulletproof Solutions Inc.Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Microsoft 365 Copilot & Sales Readiness AssessmentJourneyTEAMAccelerate your sales team's performance with JourneyTEAM's Copilot & Sales Readiness Assessment
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
44 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo SoftwareCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
46 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReplyValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
47 out of 60
Copilot for Security Readiness AssessmentInvokeInvoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Modern Workplace Strategy: 12-Day AssessmentPerficient IncTogether we assess your current environment and business goals, to provide best practices and recommendations that maximize your investment in Microsoft 365.
+2
Applicable to:
Identity & Access Management
Workplace Analytics
49 out of 60
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso CorporationHelping customers KickStart features in Microsoft 365 E3 Subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
50 out of 60
Microsoft Entra - Global Secure Access | Pilot DeploymentITC Secure LtdMicrosoft Entra Global Secure Access pilot deployment for improved security posture, streamlined access management & regulatory compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
51 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View SystemsSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Microsoft Endpoint Manager: 8-Hours WorkshopOnex GroupLearn how to secure Windows 11 environments with Microsoft Endpoint Manager
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
53 out of 60
Red Canary MSSP FastTrack for SecurityRed CanaryLeverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Microsoft 365 Security Health Check: 3 day AssessmentISCG SP Z O OMicrosoft 365 is a multi-layer solution with the right security policies you can block over 99.9 percent of account compromise attacks!
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
55 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte LtdHelps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile ITA 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
58 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
59 out of 60
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
60 out of 60