Skip to main content
Marketplace
Give feedback
Help & support
Saved items
Private plans
Just a moment, logging you in...
All
Products
Categories
Industries
Partners
Filters
Clear all
Your location
Your location
Products (1)
Products (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adoption & Change Management
Adoption & Change Management
Calling for Microsoft Teams
Calling for Microsoft Teams
Cloud Security
Cloud Security
Compliance Advisory Services
Compliance Advisory Services
Device Deployment & Management
Device Deployment & Management
Frontline Workers
Frontline Workers
Identity & Access Management
Identity & Access Management
Information Protection & Governance
Information Protection & Governance
Insider Risk
Insider Risk
Knowledge & Insights
Knowledge & Insights
Meeting Rooms for Microsoft Teams
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Meetings for Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Mobile Device Management
Mobile Device Management
Power Platform for Teams
Power Platform for Teams
Teams Custom Solutions
Teams Custom Solutions
Teamwork Deployment
Teamwork Deployment
Threat Protection
Threat Protection
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Industries
Industries
Service type
Service type
Pricing Model
Pricing Model
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
CMMC Implementation for Microsoft 365 (8 Wk Proj)
Summit 7 Systems, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Summit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) technical control practices associated with Level 2 for Microsoft 365, as well as Azure and AAD
1 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Manage and Investigate Risk and Threat Protection
2 out of 60
Data Security & Protection: 8 weeks - Implementation
Mazzy Technologies Corp.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
3 out of 60
Zero Trust Security Assessment
Concurrency, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess and advance your Zero Trust security posture—and accelerate or expand your Microsoft 365 security strategy with expert-led guidance.
4 out of 60
Zones Intune Device Endpoint Management Implementation
Zones Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Mobile Device Management
Elevate your mobile device and application management with Intune—a robust solution offering advanced security features like conditional access, multi-factor authentication, and data encryption.
5 out of 60
Microsoft Security Copilot Readiness Assessment
Softchoice
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Aims to ensure organizations can securely utilize Microsoft’s Copilot for Security and identifying gaps in signal data from core Microsoft security products
6 out of 60
Lightstream Complimentary Microsoft 365 Core Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
7 out of 60
Microsoft 365 Migration 12 Hour Proof-of-Concept
New Charter Technologies, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
8 out of 60
Microsoft 365 CMMC: 4-Wk Workshop
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Provides expert guidance to help organizations in the Defense Industrial Base achieve CMMC compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
9 out of 60
User Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
10 out of 60
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POC
atQor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
11 out of 60
Data Security and Governance Engagement for Microsoft 365: Microsoft Purview Suite
CompuNet
+2
Applicable to:
Cloud Security
Information Protection & Governance
Intelligently investigate and take action on data security risks.
12 out of 60
CCPA CPRA: 6 - Wk Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
13 out of 60
Microsoft Security: 4-Week Implementation
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Establish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
14 out of 60
Microsoft 365 Security Review: Assessment
CyberOne
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Identify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
15 out of 60
Lenovo Cyber Resiliency as a Service EDA
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Environment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
16 out of 60
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour Assessment
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
17 out of 60
Mergers, Acquisitions, and Divestitures: 5-Month Implementation
Cyclotron Inc.
+2
Applicable to:
Adoption & Change Management
Cloud Security
Cyclotron helps organizations overcome the technical challenges of consolidating or divesting organization assets using Microsoft 365, Azure, and third-party migration tools.
18 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
19 out of 60
Entra ID Governance and Guest Access
Mobile Mentor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Empower your business with Mobile Mentor’s Microsoft Entra ID Governance and Guest Access service, built on Microsoft’s cutting-edge Entra Identity Governance platform.
20 out of 60
Security and Operations with Expert Microsoft 365 Support
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Maximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
21 out of 60
Microsoft Defender for Cloud Apps: 2-Hr Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
22 out of 60
Modern Management for Endpoints
Ivision, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
23 out of 60
Microsoft Security Deployment: 5-day Workshop
Campana & Schott GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand your Microsoft security posture and minimize risks with the right experts
24 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk Implementation
Neway Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Streamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
25 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
26 out of 60
Copilot for Microsoft 365 Adoption Accelerator Program - 18 Weeks
Trace3
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
This program's primary objective is to help accelerate client adoption of Copilot for Microsoft 365 and setup the client for continued maturity with their usage of Copilot for Microsoft 365.
27 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers detect, investigate, and take action to mitigate risk and ensure compliance in their modern workplace.
28 out of 60
Security Modernization: 3 Day Workshop
Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Safeguard your business with a three-step security modernization solution from Netwoven
29 out of 60
Defender for IoT Enterprise: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understanding risk with unmanaged IoT devices can be difficult. Our Defender for Enterprise IoT Proof of Concept helps you visualise and understand the threats to your environment.
30 out of 60
Trip to Microsoft 365 Copilot Implementation
Suri Services SC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Ofrecemos un servicio de capacitación y preparación estratégica para la adopción de Microsoft 365 Copilot, enfocado en acelerar la productividad y transformar los procesos clave
31 out of 60
Copilot Readiness Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
32 out of 60
Endpoint Management Workshop
Citrin Cooperman Advisors, LLC
+2
Applicable to:
Cloud Security
Threat Protection
Empower secure endpoint management with Microsoft Intune through streamlined operations.
33 out of 60
Implementing Defender for Endpoint & Cloud App Security
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
34 out of 60
Secure Multi-Cloud Environments: 3-day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Secure Multi-Cloud Environments Workshop helps customers gain insights on active threats and vulnerabilities related to their hybrid and multi-cloud workloads within Microsoft 365.
35 out of 60
Inviso KickStarter - Microsoft 365 E3 Adoption
Inviso Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Helping customers KickStart features in Microsoft 365 E3 Subscription
36 out of 60
Darktrace Managed Network Sensor
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
37 out of 60
Microsoft 365 Security Assessment: 3-Week Assessment
Spyglass MTG, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
38 out of 60
Identity and Access Management Solution
H One (Private) Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Entra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
39 out of 60
Cyber Portfolio Rationalization: 3-Day Workshop
PwC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Simplify your cybersecurity portfolio to reduce the cost and complexity of your Microsoft 365 and Microsoft Azure environment
40 out of 60
Microsoft 365 Security: 4-hour Assessment
Catapult Systems, LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Catapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
41 out of 60
Spyglass-MXDR Managed Detection & Response: 2-week Implementation
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Spyglass-MXDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
42 out of 60
Microsoft Endpoints Management Pilot
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Get started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
43 out of 60
Endpoint Management: 3 Days Workshop
INOVASYS FOR SYSTEMS
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Microsoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
44 out of 60
Fortis IR Table Top Exercises
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
45 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Understand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
46 out of 60
Backups and DR Office 365 in Kazakhstan
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Office 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
47 out of 60
Lightstream Threat Protection Assessment and Deployment Roadmap
Lightstream
+2
Applicable to:
Cloud Security
Threat Protection
Leveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
48 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
49 out of 60
MDR Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
“MDR Shield” is Long View’s cyber security managed detection and response service.
50 out of 60
Endpoint Management with Security Workshop
The Tech Mavericks
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
The Endpoint Management with Security Workshop enables partners to lead customer conversations around modernizing their endpoint management and security capabilities by leveraging Microsoft 365.
51 out of 60
TCS Agent Governance as a Service - Implementation - 12 weeks
TCS - Digital Workplace
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Transition from “Shadow AI” to a “governed, enterprise‑grade innovation model”—controlling agent sprawl, data leakage risks, and unvetted maker behavior.
52 out of 60
Incident Response Retainer
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
53 out of 60
Lenovo Cyber Resiliency as a Service Deployment
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
54 out of 60
Dell Implementation Services for Copilot Security
Dell Technologies Services
+1
Applicable to:
Cloud Security
Readiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
55 out of 60
Your Smart Workplace Assessment
Rackspace Technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Your Smart Workplace Assessment helps organizations develop secure, cost-effective, and productivity-enhancing strategies for modern work environments.
56 out of 60
Microsoft Sentinel - Monitor file access and permission changes in SharePoint Implementation: 5-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Implement Microsoft Sentinel for monitoring file access and permission changes in SharePoint, ensuring prompt detection and notification of unauthorized or unwanted activities.
57 out of 60
Copilot for Micosoft 365 Readiness: 2-Day Workshop
CTGlobal A/S
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Plan adoption of Copilot for Microsoft 365 through explicit scenarios, use cases and data governance. Develop strategies for seamless onboarding and future integrations. In a safe and secure workshop.
58 out of 60
Microsoft Copilot for Security: 2-Day Workshop
Planet Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
This 2-day workshop covers the essential aspects you need to effectively and efficiently leverage Microsoft Copilot for Security for your organization's security operations and needs.
59 out of 60
GDPR Assessment: 6-Week Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
60 out of 60
Previous
3
4
5
6
7
Next