Skip to main content
Marketplace
Give feedback
Help & support
Saved items
Private plans
Just a moment, logging you in...
All
Products
Categories
Industries
Partners
Filters
Clear all
Your location
Your location
Products (1)
Products (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adoption & Change Management
Adoption & Change Management
Calling for Microsoft Teams
Calling for Microsoft Teams
Cloud Security
Cloud Security
Compliance Advisory Services
Compliance Advisory Services
Device Deployment & Management
Device Deployment & Management
Frontline Workers
Frontline Workers
Identity & Access Management
Identity & Access Management
Information Protection & Governance
Information Protection & Governance
Insider Risk
Insider Risk
Knowledge & Insights
Knowledge & Insights
Meeting Rooms for Microsoft Teams
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Meetings for Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Mobile Device Management
Mobile Device Management
Power Platform for Teams
Power Platform for Teams
Teams Custom Solutions
Teams Custom Solutions
Teamwork Deployment
Teamwork Deployment
Threat Protection
Threat Protection
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Industries
Industries
Service type
Service type
Pricing Model
Pricing Model
Consulting services results
Showing results in consulting services.
Microsoft 365 Threat Check Assessment: 3-Wk Assessment
Invoke
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
1 out of 60
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
2 out of 60
Security Outcomes Sprint
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Understand the Business Value of Your Cybersecurity Investments
3 out of 60
Microsoft 365 Security 4 Weeks Assessment
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
4 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-Weeks
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
5 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
6 out of 60
Managed XDR Shield: 4-Week Implementation
Long View Systems
+2
Applicable to:
Cloud Security
Threat Protection
Address all your proactive security needs, engage the Managed XDR Shield plan to monitor, alert, and respond to threats effectively.
7 out of 60
IT Infrastructure Optimization
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
IT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
8 out of 60
Windows 365: 4 Week Readiness Assessment
Netrix Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Get an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
9 out of 60
Microsoft 365 Tenant-to-Tenant Migration
Olive + Goose
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
This offering provides assessment, migration, and post-migration support for transitioning Microsoft 365 workloads and endpoint management from a source Microsoft 365 tenant to a target tenant.
10 out of 60
Cybersecurity Assessment
CDI LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
The Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
11 out of 60
Hybrid Cloud Security Workshop - 1-Day
Zones, LLC
+1
Applicable to:
Cloud Security
Identify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
12 out of 60
Softchoice Security Platformization Assessment and Design
Softchoice
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
13 out of 60
Unified Access & Protection with Microsoft Entra Global Secure Access
Mobile Mentor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Step confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
14 out of 60
Secure Remote Workplace: 1-Wk Workshop
FSI Strategies
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
15 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
16 out of 60
Cyber Evolution: Security Workshop
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Two-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
17 out of 60
Hybrid Infrastructure Overview Workshop
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Rapid hybrid‑cloud design workshop — learn best practices, pitfalls, and licensing tips for Microsoft on‑prem + Azure/Microsoft 365.
18 out of 60
Cloud Security Envisioning Workshop for Microsoft 365
Synechron Technologies
+1
Applicable to:
Cloud Security
Expert-led workshop to assess, adopt, and extend Microsoft 365 security using Defender XDR, Entra ID, Defender for Endpoint, Defender for Office 365, and Defender for Cloud Apps
19 out of 60
Microsoft 365 Copilot Implementation Readiness Assessment
Collective Insights
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Actionable recommendations in data security, technical infrastructure, user adoption, and workflow integration, ensuring preparation to adopt and integrate new technologies.
20 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week Implementation
Options Technology Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
21 out of 60
Microsoft 365 Copilot Adoption: 2-3 Week Assessment
Coretek Services
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Evaluate the current customer Microsoft investments adoption of Microsoft Cloud Services and overall Security posture in an effort to develop a "Art of the Possible" to Adopt Microsoft 365 Copilot.
22 out of 60
Microsoft 365 Secure Score Assessment
Daymark Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Improve your environment’s security posture using Microsoft Secure Score.
23 out of 60
Rapid Remediation of Microsoft Secure Score
CyberOne
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost your Microsoft Secure Score, reduce risk and increase cyber resilience with expert-led rapid remediation.
24 out of 60
Identity Health Check
Mobile Mentor
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Mobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
25 out of 60
KK_Intune Implementation
Kraft Kennedy
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Kraft Kennedy's Implementation service for Migration to Microsoft Intune is designed to assist customers in an Intune Deployment Architecture Scenario
26 out of 60
CMMC Compliance with Microsoft 365: 4 wk impl.
Insight
+1
Applicable to:
Cloud Security
Insight’s CMMC services program helps clients understand DoD requirements, develop a strategy to achieve compliance in hybrid and cloud models, and execute to implementation and ongoing operations.
27 out of 60
Enabled Microsoft 365 Productivity: 12-MO Briefing
eGroup Enabling Technologies, LLC
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Mobile Device Management
Get the expertise needed to successfully manage Microsoft 365 with eGroup Enabling Technologies, LLC. Enabled Microsoft 365.
28 out of 60
Content Security and Data Loss Prevention: 3-Day Workshop
FSI Strategies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
FSi Strategies will demonstrate how an organization can protect it's most important asset, at the source. Ensuring that documents are protected no matter where they live.
29 out of 60
Managed Detection and Response [Threat Hunting]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Inspect events in your network to locate threat indicators and entities
30 out of 60
Microsoft 365 Copilot Assessment
Suri Services SC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Asegura tu ruta de adopción con Suri Services y Microsoft 365 Copilot
31 out of 60
Microsoft Copilot for Security: 2 x 4h Workshop
water IT Security GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Get ready for Microsoft’s Copilot for Security and learn how generative AI can strengthen your organization’s IT. We cover everything you need to know – from the implementation to proper prompting.
32 out of 60
Trustwave Accelerator for Microsoft Entra ID
Trustwave Holdings, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
33 out of 60
MFA Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan.
34 out of 60
Microsoft 365 Security: 4-Week Assessment
Apex Digital Solutions
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most and improving your security maturity over time.
35 out of 60
Data Security and Governance: 2 Hour Free Briefing
Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Netwoven Data Security and Governance free strategy workshop will help you get started on the path to discover, protect, and govern your sensitive corporate data
36 out of 60
Lenovo Cyber Resiliency as a Service Tuning
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
37 out of 60
Management Services: 10-Week Assessment
Catapult Systems, LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Catapult Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
38 out of 60
Microsoft 365 E5 Zero Trust Security Assessment
SHI International Corp
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Explore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
39 out of 60
Lenovo Cyber Resiliency as a Service Remediation
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
40 out of 60
Microsoft 365 Copilot Data Security Assessment
Collective Insights
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Accelerate your deployment of Microsoft Copilot while ensuring comprehensive data security and compliance across the enterprise.
41 out of 60
Adoption, Deployment & Success of Microsoft 365 Copilot
IT Quest Solutions
+2
Applicable to:
Adoption & Change Management
Cloud Security
Empower your team with Microsoft 365 Copilot—boost productivity, streamline workflows, and unlock AI-driven insights across Word, Excel, Teams & CopilotAgents
42 out of 60
Spyglass Managed Security Services: 2-week Implementation
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Spyglass is a security and compliance program for cloud and on-premises organizations that aligns security and compliance with current requirements of best-in-class technology and expert deployment.
43 out of 60
Microsoft Defender for Cloud Apps Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Microsoft Defender for Cloud Apps address security gaps in an organization's environment.
44 out of 60
Copilot for Security Readiness Assessment
Invoke
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Invoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
45 out of 60
Microsoft 365 Assessment
TechNet UC LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Our assessment provides a thorough analysis of your current Microsoft 365 environment, identifying areas for improvement and offering actionable recommendations to enhance performance and security.
46 out of 60
Microsoft 365 Copilot Risk Assessment: 1-Week Strategic Workshop
Atmosera
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Uncover data risks and prepare for secure Copilot adoption with a Microsoft 365 risk assessment.
47 out of 60
Microsoft 365 Security Briefing
CDI LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
48 out of 60
FastTrack for Microsoft 365
Olive + Goose
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Our offer provides expert guidance as a FastTrack Ready Partner to help businesses deploy, secure, and optimize Microsoft 365 solutions seamlessly—ensuring a smooth transition with no extra cost.
49 out of 60
Microsoft Defender for Endpoints Pilot: Implementation
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Evaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
50 out of 60
Copilot Security Assessment: 4-Wk Assessment
Managed Solution
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
Unlock the full potential of AI with a comprehensive Microsoft Copilot Security Assessment, fully integrated with Microsoft 365
51 out of 60
Microsoft 365/Azure Cloud Secure 5 Day Assessment
DynTek Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
DynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
52 out of 60
Modern SecOps Discovery Session
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
53 out of 60
Threat Protection: 2-Week Workshop
Forsyte IT Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
54 out of 60
Quick Start Accelerator for Microsoft Intune
WIZARD GROUP LIMITED
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
55 out of 60
Copilot adoption for legal
Conterra
+2
Applicable to:
Adoption & Change Management
Cloud Security
Transform legal service processes with Copilot and Conterra Copilot Adoption Offer: 4-Wk Imp
56 out of 60
Neudesic's Knowledge Governance Workshop
Neudesic
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
The Neudesic Knowledge Governance Workshop is a 4–6-week session that is designed to assist customers in safeguarding their sensitive information.
57 out of 60
Microsoft 365 Value Discovery - Workshop - 1 Day
DynTek Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT OF MICROSOFT 365 IN YOUR ENVIRONMENT
58 out of 60
Modern Endpoint Management: 2-Hr Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
There’s a reason Microsoft chose us as their Modern Endpoint Management Partner of the Year for 2023. We believe you can reduce your threat risk by modernizing your Endpoint Management Strategy.
59 out of 60
Zero Trust Baseline Pilot 8-Week Implementation
Invoke
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
60 out of 60
Previous
4
5
6
7
8
Next