Skip to main content
Marketplace
Give feedback
Help & support
Saved items
Private plans
Just a moment, logging you in...
All
Products
Categories
Industries
Partners
Filters
Clear all
Your location
Your location
Products (1)
Products (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adoption & Change Management
Adoption & Change Management
Calling for Microsoft Teams
Calling for Microsoft Teams
Cloud Security
Cloud Security
Compliance Advisory Services
Compliance Advisory Services
Device Deployment & Management
Device Deployment & Management
Frontline Workers
Frontline Workers
Identity & Access Management
Identity & Access Management
Information Protection & Governance
Information Protection & Governance
Insider Risk
Insider Risk
Knowledge & Insights
Knowledge & Insights
Meeting Rooms for Microsoft Teams
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Meetings for Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Mobile Device Management
Mobile Device Management
Power Platform for Teams
Power Platform for Teams
Teams Custom Solutions
Teams Custom Solutions
Teamwork Deployment
Teamwork Deployment
Threat Protection
Threat Protection
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Industries
Industries
Service type
Service type
Pricing Model
Pricing Model
Consulting services results
Showing results in consulting services.
Zones SOCaaS - MXDR with Threat Protection
Zones Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Zones SOCaaS powered by Microsoft Sentinel and Defender offers advanced MDR and XDR capabilities, reinforcing your business’s safety.
1 out of 60
Data Security Engagement
adaQuest
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
2 out of 60
cubesys Microsoft 365 Managed Service
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
3 out of 60
Modern Frontline Work Acceleration 2 days Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
LiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
4 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process Adoption
Vitalyst
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
5 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-Weeks
myCloudDoor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Assess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
6 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and Planning
Agile IT
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Shorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
7 out of 60
Application Monitoring Solution with Microsoft Sentinel
AVASOFT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
8 out of 60
Microsoft Purview & Generative AI Synergy: Data Governance for the Future
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Usage of generative AI increases day by day in enterprise environments, in some cases without control. Act in time and prevent data breaches and exfiltration activities.
9 out of 60
Threat Protection Engagement
adaQuest
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
10 out of 60
DLP Implementation and Tuning Services
INFOTECHTION
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Reduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
11 out of 60
Cloud Endpoints Assessment
Inviso Corporation
+1
Applicable to:
Cloud Security
Maximize your Endpoints! Find out how a Cloud PC could potentially save you money!
12 out of 60
Defender for IoT Enterprise: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understanding risk with unmanaged IoT devices can be difficult. Our Defender for Enterprise IoT Proof of Concept helps you visualise and understand the threats to your environment.
13 out of 60
Lightstream Data Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Lightstream will Identify data security risks in your organizational data. Identify data security risks in your organizational data
14 out of 60
MDS - Threat Protection Engagement
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
15 out of 60
Lenovo Cyber Resiliency as a Service Deployment
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
16 out of 60
Security Operations Center with Microsoft Sentinel
AVASOFT
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Monitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
17 out of 60
Microsoft Cloud App Security Data Access Control Solutions by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
18 out of 60
Windows 11 Pilot: 3 Weeks POC
Steeves
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
19 out of 60
Identity and Access Management Solution
H One (Private) Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Entra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
20 out of 60
Cloud App Security – Advanced CASB Solution for Cloud Data Protection
ITX360 (Pvt) Ltd.
+1
Applicable to:
Cloud Security
Secure your cloud apps with real-time monitoring, Shadow IT discovery, and automated data protection. Integrated with Microsoft Information Protection for enhanced compliance and threat detection.
21 out of 60
Copilot for Microsoft 365: 1-Day Data and Security Workshop
Awara IT Kazakhstan LLP
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Unlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
22 out of 60
Microsoft Sentinel Proof of Concept: 4 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand how prepared is your Microsoft infrastructure when adversaries attack
23 out of 60
Microsoft Copilot Readiness Assessment
Inviso Corporation
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Get ready for Microsoft Copilot, by identifying best-in-class Microsoft 365 security solutions that will protect data and users by establishing a secure foundation, control content
24 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
25 out of 60
Mergers, Acquisitions, and Divestitures: 5-Month Implementation
Cyclotron Inc.
+2
Applicable to:
Adoption & Change Management
Cloud Security
Cyclotron helps organizations overcome the technical challenges of consolidating or divesting organization assets using Microsoft 365, Azure, and third-party migration tools.
26 out of 60
Microsoft Defender for Cloud Apps: 2-Hr Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
27 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
28 out of 60
Onesec Identity Governance Lifecycle Assessment
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
29 out of 60
1-Tages KI Praxis Update Workshop (inkl. Copilot): Ihr Kompass durch die Welt der Künstlichen Intelligenz
AppSphere AG
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Mit dem KI Praxis Update Workshop statten wir Ihr Team mit dem neuesten Wissen über KI aus. Lernen Sie, wie Sie KI zielgerichtet und profitabel in Ihrer Organisation nutzen können.
30 out of 60
Modern Management for Endpoints
Ivision, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
31 out of 60
Microsoft 365 E5 CMMC L3 8 Week Implementation
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
32 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Our approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
33 out of 60
Data Protection Impact Assessment: 8 Wk
Lighthouse Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Empowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
34 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week Implementation
Beyondsoft
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
35 out of 60
AvePoint Policies & Insights: 10-Days Assesments
IT-Dev sp. z o.o.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Assesment's outcomes: • Enable centralized reporting on Microsoft 365 security. • Discover potential risks and exposed content. • Enforce policies and automatically remediate security breaches!
36 out of 60
Cyber Security Services 9 days Assessment
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
37 out of 60
Darktrace Managed Network Sensor
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
38 out of 60
MDR Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
“MDR Shield” is Long View’s cyber security managed detection and response service.
39 out of 60
Identity as a Service | Assure 365
CyberOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Fully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
40 out of 60
Copilot for Security Rapid Test Flight | 2-Wk Workshop
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
41 out of 60
CMMC Implementation for Microsoft 365 (8 Wk Proj)
Summit 7 Systems, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Summit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) technical control practices associated with Level 2 for Microsoft 365, as well as Azure and AAD
42 out of 60
Inviso KickStarter - Microsoft 365 E3 Adoption
Inviso Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
Helping customers KickStart features in Microsoft 365 E3 Subscription
43 out of 60
Microsoft 365 Copilot Readiness Assessment - CRA
TechPlus Talent
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Through this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
44 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und Ausarbeitung
AppSphere AG
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Vom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
45 out of 60
GDPR Assessment: 6-Week Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
46 out of 60
Fortis IR Table Top Exercises
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
47 out of 60
Microsoft 365 Copilot Implementation Readiness Assessment
Collective Insights
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Actionable recommendations in data security, technical infrastructure, user adoption, and workflow integration, ensuring preparation to adopt and integrate new technologies.
48 out of 60
Licensing Microsoft 365: 1-day Assessment
Informatika a.d.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
49 out of 60
Microsoft Copilot for Security: 2-Day Workshop
Planet Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
This 2-day workshop covers the essential aspects you need to effectively and efficiently leverage Microsoft Copilot for Security for your organization's security operations and needs.
50 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
51 out of 60
IN - Microsoft 365 Barracuda Cloud to Cloud Backup
Crayon
+1
Applicable to:
Cloud Security
Secure, easy-to-use SaaS backup for your Microsoft 365 data
52 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
53 out of 60
CCPA CPRA: 6 - Wk Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
54 out of 60
Lightstream Threat Protection Assessment and Deployment Roadmap
Lightstream
+2
Applicable to:
Cloud Security
Threat Protection
Leveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
55 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
56 out of 60
Microsoft Security: 4-Week Implementation
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Establish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
57 out of 60
Lenovo Cyber Resiliency as a Service EDA
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Environment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
58 out of 60
KMicro Rapid Incident Response & Readiness Service
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
59 out of 60
Implementation of Copilot readiness assessment
Dev4Side
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
60 out of 60
Previous
2
3
4
5
6
Next