Skip to main content
Marketplace
Give feedback
Help & support
Saved items
Private plans
Just a moment, logging you in...
All
Products
Categories
Industries
Partners
Filters
Clear all
Your location
Your location
Products (1)
Products (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adoption & Change Management
Adoption & Change Management
Calling for Microsoft Teams
Calling for Microsoft Teams
Cloud Security
Cloud Security
Compliance Advisory Services
Compliance Advisory Services
Device Deployment & Management
Device Deployment & Management
Frontline Workers
Frontline Workers
Identity & Access Management
Identity & Access Management
Information Protection & Governance
Information Protection & Governance
Insider Risk
Insider Risk
Knowledge & Insights
Knowledge & Insights
Meeting Rooms for Microsoft Teams
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Meetings for Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Mobile Device Management
Mobile Device Management
Power Platform for Teams
Power Platform for Teams
Teams Custom Solutions
Teams Custom Solutions
Teamwork Deployment
Teamwork Deployment
Threat Protection
Threat Protection
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Industries
Industries
Service type
Service type
Pricing Model
Pricing Model
Consulting services results
Showing results in consulting services.
Microsoft 365 Backup Readiness Assessment
ABTechnologies
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Evaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
1 out of 60
Copilot Advanced Services: 1 Day 3 Workshops
Ness Israel
+3
Applicable to:
Adoption & Change Management
Cloud Security
Workplace Analytics
Unlock the full potential of Microsoft Copilot with our tailored AI services, enhancing security, development and productivity across Microsoft 365 applications through flexible, expert-led sessions.
2 out of 60
Olive + Goose Data Security Workshop
Olive + Goose
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Enhance Your Organization’s Security with a Comprehensive Data Security Workshop
3 out of 60
MDR Workshop
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
4 out of 60
Windows 365 Rapid Deploy
Ivision, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
The ivision Windows 365 Rapid Deployment approach will accelerates the adoption and use case development of Windows 365 virtual desktops.
5 out of 60
BCN Intranet Lite
BCN Group Ltd.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
6 out of 60
Exchange Online Migration
DataVox
+3
Applicable to:
Adoption & Change Management
Cloud Security
Mobile Device Management
Migrating emails to Office 365 includes assessing the environment, choosing a method (Cutover, Staged, Hybrid, or IMAP), migrating data, updating DNS, configuring devices, and user training.
7 out of 60
Microsoft Security: 3-Day Workshop
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Develop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
8 out of 60
Company Document Migration to SharePoint Online or Teams: 7-Days Consulting Service
IT Partner LLC
+2
Applicable to:
Cloud Security
Teamwork Deployment
Migration of file shares, folders and documents from your file server or a third-party service like Box, Dropbox, or Google Drive to SharePoint Online or Teams.
9 out of 60
Microsoft 365 Security: 90 Days Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Establish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
10 out of 60
Microsoft Sentinel Workshop and Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
11 out of 60
Microsoft Secure Cloud Business Applications (SCuBA) Workshop 2-Day Workshop
CDI LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
An assessment of your Microsoft 365 security in accordance with the Cybersecurity and Infrastructure Security Agency which could lead to appropriate adoption of your existing security licensing.
12 out of 60
Securing Identities Workshop
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
13 out of 60
Communication Security Quick Start 12-wk Implementation
Edgile, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
14 out of 60
Office 365 Tenant - Initial Setup: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
The goal is to efficiently and effectively set up your organization's Office 365 tenant, enabling seamless access to a suite of productivity tools and collaboration services.
15 out of 60
TS As a Services (TSaaS): 5-day Implementation
E-Level Cloud Services S.A. de C.V.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
16 out of 60
Zero Trust Security 10-Hour Assessment
JourneyTEAM
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
JourneyTeam’s Zero Trust Security Assessment is designed to provide a clear, actionable strategy for strengthening your organization’s Microsoft 365 security posture.
17 out of 60
Agent 365 Implementation Program
Anthrowiz
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Govern, secure, and operationalize AI agents across your Microsoft tenant in 5 days - from shadow AI discovery to production-ready deployment.
18 out of 60
Fortis Assessment Microsoft Online Security
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
19 out of 60
Dynapt Advisory Services for Microsoft 365 Copilot 3 Week Workshop
Dynapt Inc
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Unleash the potential of AI to transform your business operations with Microsoft 365 Copilot.
20 out of 60
Foundations Agent 365 Assessment & Roadmap
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Executive-ready strategy engagement for Microsoft Agent 365 that helps organizations learn how to prepare for and govern AI agents as a ‘digital workforce,’ with visibility, security, and audit-ready
21 out of 60
Threat Protection Engagement: 3-Day Assessment
PSM Partners
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Do more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
22 out of 60
Defender for Office 365: 5-Day Assessment
eGroup Enabling Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Microsoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
23 out of 60
Microsoft 365: 2-Week Assessment
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
Establish a clear roadmap and change management plan for your journey to a modern workplace.
24 out of 60
Microsoft Security Copilot POV & Adoption Plan
BDO
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Prove the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
25 out of 60
Windows Virtual Desktop Implementation: 5-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Provide a streamlined solution using Windows Virtual Desktop (WVD) on Microsoft Azure, offering efficient remote workstations, cost-effective licensing, and Windows 365 in a terminal server format.
26 out of 60
Zero-Trust: 3-Day Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
27 out of 60
Microsoft 365 Security Workshop
Olive + Goose
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Improve your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
28 out of 60
XENMDM - Monthly SoC Support for Mobile Devices
Xencia Technology Solutions Pvt Ltd
+1
Applicable to:
Cloud Security
Microsoft Intune platform based Managed Services covering device management, control and compliance along with monitoring and remediation of issues, policies, users, devices and threats.
29 out of 60
SNP’s Approach to Copilot for Microsoft 365
SNP Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
30 out of 60
Office 365 Encrypted Email - Initial Setup: 1-Day Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost Microsoft 365 security with default encryption. Elevate messaging protection and implement email encryption and rights protection for sensitive data.
31 out of 60
Centric Threat Protection Engagement
Centric Consulting, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Learn how to put next-generation Microsoft Security tools to work for you
32 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
33 out of 60
Managed Extended Detection & Response (MXDR) for Workplace: 2 Hr Workshop
Netwoven
+2
Applicable to:
Cloud Security
Threat Protection
Learn how to put next generation Microsoft security tools to work for you.
34 out of 60
Defend Against Threats with SIEM Plus XDR
Netrix Global
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
35 out of 60
Protect and Govern Sensitive Data: 3 Day Workshop
CGI Inc.
+1
Applicable to:
Cloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
36 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
37 out of 60
Manage Compliance Obligations & Risks with Microsoft Purview
BDO
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Enhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
38 out of 60
Automatic In-Place Upgrade to Windows 10 or 11: 3-Wk Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Seamlessly upgrade PCs from Windows 7, 8, or 8.1 to Windows 10 or 11, ensuring compatibility and minimal user disruption, particularly suited for organizations with more than 25 PCs.
39 out of 60
MicroAge ManageWise Microsoft 365 Assessment & Services
MicroAge
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Comprehensive assessment of our clients Microsoft 365 tenant providing an Executive summary detailed report to reduce vulnerabilities improving Secure Score with 40 hours of Engineer time
40 out of 60
Threat Protection: 3-Wk POC
FPT/Intellinet
+2
Applicable to:
Cloud Security
Threat Protection
Identify security threats and begin to respond and mitigate.
41 out of 60
Comprehensive Exchange Online Security Configuration
TechNet UC LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Unmatched Security and Compliance for Your Exchange Online Environment
42 out of 60
Microsoft Defender for 365 Implementation by C1st
C1st Technologies LLC
+2
Applicable to:
Cloud Security
Threat Protection
Enhance email security for businesses by implementing Defender for Office 365 with Exchange Online Protection (EOP). Our goal is to protect organizational email from spam, phishing, and sophisticated
43 out of 60
Identity and Access Control Implementation
SMART business LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Cybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
44 out of 60
Implementation of Microsoft Defender for Endpoint
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
45 out of 60
Security Audit and Recommendations: 3-Days Consulting Service
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Goal: help organizations review their security settings, configurations, and policies to identify any potential vulnerabilities and ensure that the tenant is properly secured against external threats.
46 out of 60
Secure and Maximize Your Microsoft 365 Tenant with Manage & Protect
All Covered, a division of Konica Minolta
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Microsoft 365 tenant management to provide you with continuous security & compliance, enhanced administration, and actionable insights.
47 out of 60
TSG Microsoft Security Risk Assessment
Technology Service Group Ltd
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Assess your true cyber risk. Get a practical roadmap built on the Microsoft Security stack.
48 out of 60
Microsoft Value Calculator: One Hour Assessment
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Cost Takeout Opportunity shows the potential cost reductions from consolidating third party solutions with Microsoft 365.
49 out of 60
Modern Endpoint Design and Planning Workshop
Kraft Kennedy
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Kraft Kennedy will conduct a Modern Endpoint Design and Planning Workshop to review and discuss both your current management and deployment processes as well as plans for the future-state environment.
50 out of 60
Security Architecture Design and Implementation Service
上海诺未网络科技有限公司
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
51 out of 60
Enable Data Leak Prevention: 5-Day Configure and Enable DLP Policies
IT Partner LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Protect your organization from data leaks, block the transfer of confidential information, use our tool for monitoring your daily work of employees to find security weaknesses before the incident.
52 out of 60
C1st Office 365 Tenant Migration Assessment
C1st Technologies LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Ensure a smooth Office 365 tenant-to-tenant migration for businesses. We provide comprehensive consulting services to facilitate seamless transitions during mergers, acquisitions, and other scenarios.
53 out of 60
SYSTEX Data Security and Compliance Solution
精诚(中国)企业管理有限公司
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
54 out of 60
"Threat Protection: 3 Day Workshop"
Insentra Pty Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
55 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day Workshop
eGroup Enabling Technologies, LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
With Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
56 out of 60
Office 365 Migration 3-Month Implementation
RKON TECHNOLOGIES
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
Leverage RKON's consulting expertise for a smooth and seamless migration to Microsoft's Office 365 suite of products including SharePoint, OneDrive, and Teams
57 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week Project
Virteva LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Get a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
58 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk Engagement
CloudScale International
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
This assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
59 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed Service
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
60 out of 60
Previous
6
7
8
9
10
Next