Skip to main content
Marketplace
Give feedback
Help & support
Saved items
Private plans
Just a moment, logging you in...
All
Products
Categories
Industries
Partners
Filters
Clear all
Your location
Your location
Products (1)
Products (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adoption & Change Management
Adoption & Change Management
Calling for Microsoft Teams
Calling for Microsoft Teams
Cloud Security
Cloud Security
Compliance Advisory Services
Compliance Advisory Services
Device Deployment & Management
Device Deployment & Management
Frontline Workers
Frontline Workers
Identity & Access Management
Identity & Access Management
Information Protection & Governance
Information Protection & Governance
Insider Risk
Insider Risk
Knowledge & Insights
Knowledge & Insights
Meeting Rooms for Microsoft Teams
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Meetings for Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Mobile Device Management
Mobile Device Management
Power Platform for Teams
Power Platform for Teams
Teams Custom Solutions
Teams Custom Solutions
Teamwork Deployment
Teamwork Deployment
Threat Protection
Threat Protection
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Industries
Industries
Service type
Service type
Pricing Model
Pricing Model
Consulting services results
Showing results in consulting services.
OneSec Defender for Endpoint – Migration offer
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
The OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
1 out of 60
Health-Check for Microsoft 365 Tenant: Assessment
novaCapta GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Microsoft 365 nach höchsten Sicherheitsstandards und Best Practices absichern, schützen und optimieren
2 out of 60
UNITE: Secure Core_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
UNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
3 out of 60
Microsoft 365 Security Health Check Assessment 3-Wk
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
4 out of 60
Microsoft Cloud App Security Data Access Control Solutions by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
5 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
6 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
7 out of 60
Microsoft 365 E5 NIST 800-171 -1 Week GAP Assessmt
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
This offer is for a NIST800-171 Gap Assessment for a single Host Unit, scoped to a single contract, single subnet using the Microsoft 365 E5 license
8 out of 60
ANECT Security Monitoring and Response 3 Months PoC
ANECT a.s.
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
9 out of 60
TGS Windows 11
TEKsystems Global Services LLC.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
TEKsystems partners with you to navigate the transition to Windows 11
10 out of 60
KMicro Rapid Incident Response & Readiness Service
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
11 out of 60
Microsoft Agent 365 Pilot Deployment Offer
Cyclotron Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft Agent 365 Pilot provides evidence-based clarity on how Agent 365 supports secure agentic AI at scale, enabling you to validate security and governance capabilities in your own tenant.
12 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
13 out of 60
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
14 out of 60
Microsoft 365 consultancy
Onex Group
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Get Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
15 out of 60
4security - Microsoft In-Depth Threat Protection Engagement
4Sight Holdings
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Strengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
16 out of 60
Cloud Security Envisioning Workshop
TierPoint
+2
Applicable to:
Cloud Security
Insider Risk
The Cloud Security Envisioning engagement helps you explore how to detect threats, understand your security posture, and identify risks and opportunities across all your cloud environments.
17 out of 60
IN - Microsoft 365 Barracuda Cloud to Cloud Backup
Crayon
+1
Applicable to:
Cloud Security
Secure, easy-to-use SaaS backup for your Microsoft 365 data
18 out of 60
Citrix Endpoint Management to Microsoft Intune Migration Plan
Mobile Mentor
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Mobile Mentor’s Citrix Endpoint Management to Microsoft Intune services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
19 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
20 out of 60
Microsoft Copilot Readiness Assessment
Inviso Corporation
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Get ready for Microsoft Copilot, by identifying best-in-class Microsoft 365 security solutions that will protect data and users by establishing a secure foundation, control content
21 out of 60
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
22 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
23 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
24 out of 60
Avanade Security Risk Assessment
Avanade, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Avanade's 5-day Risk Assessment offers security leaders a comprehensive view of risk posture across their enterprise and proactive ways to protect their organizations from growing cyber threats.
25 out of 60
AI Security for Microsoft 365 Copilot
Exelegent
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Concerned about AI security? Not sure what Copilot can already access in your environment? Concerned about AI security? Not sure what Copilot can already access in your environment?
26 out of 60
ALFA Managed SOC with Microsoft Defender XDR and Sentinel
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
ALFA Managed Security Operations Center (SOC) leverages the powerful capabilities of Microsoft Defender Extended Detection and Response (XDR) and Microsoft Sentinel (SIEM & SOAR) to provide a robust,
27 out of 60
Microsoft Security Solutions - 4 Week Assessment
Protiviti
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
28 out of 60
Defender for Office 365: 3-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
29 out of 60
Guardian 365 Managed Security Services (Microsoft MXDR Verified)
Forsyte IT Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Guardian 365 is the always-on security managed service offering end-to-end protection, monitoring, detection, and remediation of attacks on your infrastructure, data, users, and endpoints 24x7.
30 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
31 out of 60
Copilot for Microsoft 365 Deployment
SMART business LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Copilot for Microsoft 365 is an AI-powered productivity tool that integrates with Microsoft 365 Apps and the Microsoft Graph to enhance user creativity, productivity, and skills.
32 out of 60
MDS Managed MXDR Engagement
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Designed to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
33 out of 60
Data Protection and Compliance Quick Start
Softchoice
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
The Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
34 out of 60
Enhance Identity Security with Microsoft Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Bulletproof’s six-week Microsoft Entra ID P2 implementation empowers your organization to significantly strengthen identity security by ensuring only authorized access to critical systems and data.
35 out of 60
BUI Cyber MDR - 1 Day Discovery Workshop
BUI (Pty) Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
36 out of 60
Purview Information Protection: setup and adoption
Dev4Side
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Protect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
37 out of 60
Security Assessment for Copilot Readiness: 3 Day Workshop
Netwoven
+2
Applicable to:
Cloud Security
Knowledge & Insights
Netwoven's security assessment for Copilot workshop will train you to better discover, secure, and govern your corporate data for usage with Copilot for Microsoft 365
38 out of 60
Incident Response Tabletop Exercises: 1-Wk Briefing
eGroup Enabling Technologies
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Be proactive and prepare your IT team for emergencies with a Disaster Plan
39 out of 60
Copilot for Microsoft 365: 1-Day Data and Security Workshop
Awara IT Kazakhstan LLP
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Unlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
40 out of 60
Egyptian Data Protection Law: 2 Days Workshop
GLOBAL BRANDS
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
41 out of 60
Conditional Access Penetration Test: 4 Days Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
42 out of 60
Data Security Engagement
adaQuest
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
43 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDO
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Introducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
44 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process Adoption
Vitalyst
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
45 out of 60
Varonis Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
46 out of 60
Cloud Endpoints Assessment
Inviso Corporation
+1
Applicable to:
Cloud Security
Maximize your Endpoints! Find out how a Cloud PC could potentially save you money!
47 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-Weeks
myCloudDoor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Assess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
48 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
49 out of 60
Microsoft 365 Plan for Success:3-d Assessment
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
50 out of 60
Infosys Modern Identity and Access Solution with MS Entra
Infosys Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Microsoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
51 out of 60
Deploying Purview Data Security - Labels and DLP
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
A dependable approach to deployment of Data Security workloads led by governance and following our standard framework for Microsoft 365 customers
52 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
53 out of 60
Threat Protection Engagement
adaQuest
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
54 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365 GCC High for CMMC/ITAR: 6-Wk Assessment and Planning
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Shorten the time to value from an M&A activity which includes partial or all going to Microsoft 365 GCC High by starting with an assessment and plan to rationalize identities, tenants, and costs.
55 out of 60
Microsoft 365 Managed Support
Ivision, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
iVision offers 24/7 advanced support for Microsoft 365, enhancing IT with agile, integrated cloud solutions.
56 out of 60
Overwatch Microsoft 365 Security: 12 Month Implementation
THREATSCAPE LIMITED
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Overwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
57 out of 60
Microsoft Cloud Accelerator Workshops 2-Days
SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Improve NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
58 out of 60
Implementation of Copilot readiness assessment
Dev4Side
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
59 out of 60
CMMC Secure Enclave
Planet Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
A secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov.
60 out of 60
Previous
1
2
3
4
5
Next