Skip to main content
Marketplace
Give feedback
Help & support
Saved items
Private plans
Just a moment, logging you in...
All
Products
Categories
Industries
Partners
Filters
Clear all
Your location
Your location
Products (1)
Products (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adoption & Change Management
Adoption & Change Management
Calling for Microsoft Teams
Calling for Microsoft Teams
Cloud Security
Cloud Security
Compliance Advisory Services
Compliance Advisory Services
Device Deployment & Management
Device Deployment & Management
Frontline Workers
Frontline Workers
Identity & Access Management
Identity & Access Management
Information Protection & Governance
Information Protection & Governance
Insider Risk
Insider Risk
Knowledge & Insights
Knowledge & Insights
Meeting Rooms for Microsoft Teams
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Meetings for Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Mobile Device Management
Mobile Device Management
Power Platform for Teams
Power Platform for Teams
Teams Custom Solutions
Teams Custom Solutions
Teamwork Deployment
Teamwork Deployment
Threat Protection
Threat Protection
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Industries
Industries
Service type
Service type
Pricing Model
Pricing Model
Consulting services results
Showing results in consulting services.
Data Security: 2-Weeks Workshop
Conterra
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Identify data security risks in your organizational data
1 out of 60
MFA Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan.
2 out of 60
Zero Trust as a Service (ZTaaS)
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital transformation and adopting AI starts with building a secure foundation.
3 out of 60
Copilot adoption for customer service
Conterra
+2
Applicable to:
Adoption & Change Management
Cloud Security
Transform customer service processes with Copilot and Conterra Copilot Adoption Offer: 4-Wk Imp
4 out of 60
BCN Cloud Readiness Assessment and Report
BCN Group Ltd.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Meetings for Microsoft Teams
This assessment will help you decide whether you are ready to migrate IT systems and services to the cloud.
5 out of 60
Microsoft 365 Strategy, guidance and governance workshop by Nexer: 1 Day
Nexer Group AB
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
We will help you go through your Microsoft 365 implementation and make sure that you follow Microsofts Best Practices.
6 out of 60
Cutover Google Workspace to Office 365 migration (IMAP migration). Just email and email folders: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Migration of email data and email folders from G Suite (Google Apps) to Microsoft 365 / Exchange Online.
7 out of 60
Microsoft Managed Security Services
Netrix Global
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Netrix’s 24x7x365 virtual Security Operations Center (SOC) leverages Microsoft’s enterprise-grade security software to monitor and respond to incidents as well as proactively hunt threats.
8 out of 60
Zero Trust Security: 3-day Workshop
Oxford Computer Group LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
9 out of 60
Advanced Email Security: 4-Day Implementation
FSI Strategies
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
Leverage Microsoft Defender for Office 365 to implement best in class email security
10 out of 60
Sentinel Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
11 out of 60
Threat Protection Engagement FY25
The Tech Mavericks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
12 out of 60
Data Security Assessment
PSM Partners
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
This assessment is designed to help companies identify their data security, privacy, and compliance goals while accelerating their compliance journey using the latest Microsoft technologies.
13 out of 60
eDiscovery, Data Lifecycle & Records Management
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Manage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
14 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Strengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
15 out of 60
Virtual Desktop - Health and Configuration 1 Week Assessment
CDI LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
CDI provides a review of a customer's Virtual Desktop environment and identify opportunities to improve the performance, stability, security and manageability.
16 out of 60
Fortis IR Active Recovery
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
17 out of 60
Zero Trust Security Assessment
Citrin Cooperman Advisors, LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Our Zero Trust Security Assessment will evaluate identity, email, data, and endpoint device controls, threat protection, management, and licensing to strengthen your organization's security posture.
18 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeks
Plain Concepts
+2
Applicable to:
Cloud Security
Information Protection & Governance
The objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
19 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
The goal of the service is to securely remove your previous Exchange Server, ensuring it doesn't disrupt your operations and enabling a smooth transition to Exchange Online.
20 out of 60
impelSecure Threat Protection Engagement: Free 4-week workshop
impeltec Pty Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Discover threats and vulnerabilities to your Microsoft cloud and on-premises environments
21 out of 60
Data Loss Prevention: 3-Wk POC
FPT/Intellinet
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Discover, classify, and protect sensitive data to prevent any inadvertent exposure.
22 out of 60
AI Security Readiness: 4 week Assessment
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
Quisitive's AI Security Readiness Assessment provides organizations with an in-depth understanding of how best to adopt Copilot and Generative AI without putting their organization at risk.
23 out of 60
Defend Against Threats with SIEM Plus XDR Workshop
The Tech Mavericks
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Defend Against Threats with SIEM Plus XDR Workshop will help you achieve broader security objectives—and identify current and real threats.
24 out of 60
Microsoft 365 Defender 10-week Implementation
Cyclotron Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender for enterprises, resulting in improved detection rates, threat coverage, and organizational security posture.
25 out of 60
Tenant to Tenant Migration for AAD, EXO and OD4B Services Only: 1-Week Implementation
IT Partner LLC
+2
Applicable to:
Adoption & Change Management
Cloud Security
Microsoft 365 Tenant-to-Tenant Migration Including Azure AD, Exchange Online and OneDrive for Business services and data
26 out of 60
Microsoft 365 Security Assessment up to 6 weeks
ACTS
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
ACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
27 out of 60
Cloud Protection for AI
KiZAN Technologies
+1
Applicable to:
Cloud Security
Protect Cloud Environments leveraging Microsoft Secure Scores and other Microsoft Products to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigat
28 out of 60
Threat Protection Engagement
Neway Technologies
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance your organization's security stance with a Neway Threat Protection Engagement.
29 out of 60
Cybersecurity Assessment Engagement
adaQuest
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Get a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
30 out of 60
Microsoft 365: 2-Week Implementation
Technologent
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Expert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
31 out of 60
Microsoft Cybersecurity Assessment
Akins IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
32 out of 60
cyber security threat analysis workshop
U-BTech Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
the workshop is design to discover threats and risks
33 out of 60
MDS - Zero Trust Assessment & Advisory
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
34 out of 60
Microsoft 365 Copilot Readiness Assessment & Adoption
Heartland Business Systems, LLC
+3
Applicable to:
Cloud Security
Knowledge & Insights
Teamwork Deployment
Microsoft 365 Copilot enhances business intelligence, processes, and data analysis. A Readiness Assessment prepares for AI integration with a customized plan, tailored recommendations & training.
35 out of 60
Microsoft Purview QuickStart: Implementation
Kraft Kennedy
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Kraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
36 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementation
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
37 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free Briefing
Netwoven
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Netwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
38 out of 60
Microsoft Cybersecurity: 1 Month Assessment
Big Cloud Consultants
+2
Applicable to:
Cloud Security
Threat Protection
Our expert team will work with you to assess your current security posture and develop recommendations for appropriate improvements.
39 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Apply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
40 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POC
Long View Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure and manage your cloud environments by fortifying your infrastructure against emerging threats.
41 out of 60
Endpoint as a Service | Assure 365
CyberOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Fully Managed Endpoint Security with 24x7 monitoring, compliance and Zero Trust enforcement—powered by Microsoft Intune.
42 out of 60
Healthcare Security Briefing: 1 hour briefing
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
43 out of 60
Microsoft 365 Tenant - 1-Wk Assessment
Point Alliance Inc
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
You may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
44 out of 60
UNITE: Cyber Security Assessment_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
45 out of 60
Cybersecurity: Protect Your Operations with Henson Group
The Henson Group
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Henson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
46 out of 60
Managed Services Provider
SkyTerra Technologies LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
SkyTerra delivers seamless integration with your existing Microsoft ecosystem, from Azure infrastructure to Microsoft 365 productivity suites.
47 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Seamlessly transfer email data and mailboxes between Office 365 tenants during mergers or separations. Ensure continuity for users, minimize disruptions, and enables a smooth transition.
48 out of 60
iT1's Security Assessment
It1 Source LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Improve your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
49 out of 60
Avanade Cybersecurity Services Global offerings FY23
Avanade, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
50 out of 60
Microsoft 365 Tenant Security Assessment
Daymark Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Strengthen the Security of Your Microsoft 365 Environment.
51 out of 60
Advanced Threat Analytics: 7-Day Installation
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Advanced Threat Analytics (ATA) is a complex system that allows you to protect your IT infrastructure from a variety of information threats and cyberattacks.
52 out of 60
Microsoft Security Immersion: 1 Day Briefing
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Knowing that your time is valuable, we have developed a true to life, hands-on, interactive session designed to give you a deep understanding of the Microsoft 365 Security suite of products.
53 out of 60
MXDR Consultation
CBTS Technology Solutions LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
54 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Advanced endpoint security and threat protection: detect, investigate, and respond to attacks.
55 out of 60
Intune and Defender - Zero Trust Implementation by C1st
C1st Technologies LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
C1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
56 out of 60
Endpoint Management: 2-Week Implementation
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Maintain control over your devices and the data stored on them to stay protected in a cloud-focused environment.
57 out of 60
Aseguramiento de ciberseguridad: taller 4 semanas
Sofistic Colombia SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
58 out of 60
Microsoft Secure Score - increase to 200: 3-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
The goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
59 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for Endpoint
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
60 out of 60
Previous
5
6
7
8
9
Next