Skip to main content
Marketplace
Give feedback
Help & support
Saved items
Private plans
Just a moment, logging you in...
All
Products
Categories
Industries
Partners
Filters
Clear all
Your location
Your location
Products (1)
Products (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adoption & Change Management
Adoption & Change Management
Calling for Microsoft Teams
Calling for Microsoft Teams
Cloud Security
Cloud Security
Compliance Advisory Services
Compliance Advisory Services
Device Deployment & Management
Device Deployment & Management
Frontline Workers
Frontline Workers
Identity & Access Management
Identity & Access Management
Information Protection & Governance
Information Protection & Governance
Insider Risk
Insider Risk
Knowledge & Insights
Knowledge & Insights
Meeting Rooms for Microsoft Teams
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Meetings for Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Mobile Device Management
Mobile Device Management
Power Platform for Teams
Power Platform for Teams
Teams Custom Solutions
Teams Custom Solutions
Teamwork Deployment
Teamwork Deployment
Threat Protection
Threat Protection
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Industries
Industries
Service type
Service type
Pricing Model
Pricing Model
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
Fortis IR Compromise Assessment
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A high-level forensics evaluation designed to identify current and past threat activity.
1 out of 60
NEST Arena
Noibit
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Two-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
2 out of 60
Microsoft 365 Copilot Readiness Assessment - CRA
TechPlus Talent
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Through this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
3 out of 60
Microsoft Endpoint Manager Baseline
SHI International Corp
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Explore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
4 out of 60
License Advisory Services
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Teamwork Deployment
Threat Protection
Whether you’ve been approached by Microsoft for an audit or simply want to conduct a self-assessment, our License Advisory Services is a great solution for understanding your real licensing needs.
5 out of 60
Microsoft Defender for Endpoint: 4-Week Implementation
Invoke
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understand your current use cases for antimalware / endpoint detection and response, map those use cases to Defender, and execute on a migration and rollout to Defender for Endpoint.
6 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5
Collective Insights
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Upgrade to Microsoft 365 E5 for Advanced Productivity and Security
7 out of 60
Identity Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
8 out of 60
Cloud Security Assessment - 3 Day Workshop
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
9 out of 60
Adoption & Change Management: 10-wk Implementation
Campana & Schott GmbH
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Your way to successful implementation and adoption of the modern workplace based on Microsoft 365 and AI technologies
10 out of 60
Microsoft 365 Migration: 10-Wk Implementation
abra
+2
Applicable to:
Cloud Security
Power Platform for Teams
Successfully migrate your Microsoft 365 environment to a managed services model.
11 out of 60
Data Security Engagement with Microsoft Purview
Inviso Corporation
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Our Data Security engagement will look over your data estate and establish areas of Security Risk. We will show you the benefits to Microsoft Purview to help protect your environment from risks.
12 out of 60
Trustwave Accelerator for Microsoft Defender XDR
Trustwave Holdings, Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
13 out of 60
AI Security Readiness Assessment
ProArch Technologies, Inc
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
ProArch’s AI Security Readiness Assessment delivers a comprehensive evaluation of your cloud and AI environment, identifies critical security gaps, and provides a prioritized roadmap for remediation.
14 out of 60
Cloud Security Journey: 2 Hour Proof of Concept
360 Visibility Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
15 out of 60
Multifactor Authentication: 4-Day Implementation
FSI Strategies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
16 out of 60
Microsoft 365 Security Program - 10 Weeks
Trace3
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
17 out of 60
Microsoft Priva Assessment: 2 Wk
Lighthouse Global
+2
Applicable to:
Cloud Security
Information Protection & Governance
Empowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
18 out of 60
Managed Detection and Response [Security Monitoring]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
19 out of 60
Cyber Security Assessment
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
20 out of 60
Microsoft 365 Copilot for Executives Workshop
SMART business LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Join our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
21 out of 60
BCN Cloud Readiness Assessment and Report
BCN Group Ltd.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Meetings for Microsoft Teams
This assessment will help you decide whether you are ready to migrate IT systems and services to the cloud.
22 out of 60
Change Management 6-Months Implementation
Supremo Sp. z o.o.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Bądź pewny, że zaangażowanie użytkowników i przyjęcie nowych rozwiązań przyczyni się do sukcesu wdrożenia, sukcesu całej organizacji.
23 out of 60
Pently Microsoft 365 Security Assessment: 2-Week Assessment
Pently GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Identify Microsoft 365 security gaps across identity, endpoints & cloud apps. Receive a Zero Trust roadmap.
24 out of 60
Protect and Govern your Data in Microsoft 365 1 day workshop
CloudWay AS
+2
Applicable to:
Cloud Security
Information Protection & Governance
With data growing exponentially over time, it’s more important than ever for organisations to implement the right tools and processes to ensure data protection and governance
25 out of 60
Copilot for Microsoft 365: Data Governance Workshop
Reply
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Secure and Enhance Your Microsoft 365 Experience with WM Reply's One-Day Copilot Data Governance Workshop
26 out of 60
Enhance IT Security: 1-2-Wk Implementation
FMT Consultants
+2
Applicable to:
Cloud Security
Identity & Access Management
FMT offers a smart security solution that protects your business, your employees, and your clients while providing a reliable, scalable, and durable approach to keeping your business up and running.
27 out of 60
Copilot for Security Accelerator: 2-week Implementation
abra
+2
Applicable to:
Cloud Security
Threat Protection
Neway’s Microsoft Copilot for Security Accelerator empowers security teams with enhanced protection and streamlined operations through eight key steps.
28 out of 60
Data Security Assessment
PSM Partners
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
This assessment is designed to help companies identify their data security, privacy, and compliance goals while accelerating their compliance journey using the latest Microsoft technologies.
29 out of 60
MDS - Zero Trust Assessment & Advisory
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
30 out of 60
eDiscovery, Data Lifecycle & Records Management
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Manage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
31 out of 60
Threat Protection Engagement FY25
The Tech Mavericks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
32 out of 60
Cloud-Native Migration Service: 4-Month Implementation
Cyclotron Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
33 out of 60
Microsoft 365 Defender 10-week Implementation
Cyclotron Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender for enterprises, resulting in improved detection rates, threat coverage, and organizational security posture.
34 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POC
Long View Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure and manage your cloud environments by fortifying your infrastructure against emerging threats.
35 out of 60
Cyber Insurer Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Uncover gaps and strengthen your position when applying for cyber insurance
36 out of 60
Cyderes Microsoft 365 Incident Response
Cyderes
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Cyderes Digital Forensics and Incident Response (DFIR) services encompass the full security motion and emphasize your ability to respond.
37 out of 60
Microsoft 365 Tenant - 1-Wk Assessment
Point Alliance Inc
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
You may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
38 out of 60
Tenant to Tenant Migration for AAD, EXO and OD4B Services Only: 1-Week Implementation
IT Partner LLC
+2
Applicable to:
Adoption & Change Management
Cloud Security
Microsoft 365 Tenant-to-Tenant Migration Including Azure AD, Exchange Online and OneDrive for Business services and data
39 out of 60
Copilot for Microsoft 365 Data Security QuickStart
Softchoice
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Setting the foundation for data security and governance in preparation for Copilot for Microsoft 365
40 out of 60
AI Security Readiness: 4 week Assessment
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
Quisitive's AI Security Readiness Assessment provides organizations with an in-depth understanding of how best to adopt Copilot and Generative AI without putting their organization at risk.
41 out of 60
Data Security as a Service | Assure 365
CyberOne
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Fully Managed Data Security, governance and compliance with 24x7 monitoring—Powered by Microsoft Purview.
42 out of 60
Microsoft 365 Strategy, guidance and governance workshop by Nexer: 1 Day
Nexer Group AB
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
We will help you go through your Microsoft 365 implementation and make sure that you follow Microsofts Best Practices.
43 out of 60
Office 365 Tenant-to-Tenant Cutover Email Migration without downtime and bounced email: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Seamless Microsoft 365 tenant-to-tenant mailbox migration, essential for mergers, acquisitions, or relocations, ensuring no bounced emails, NDR, or downtime.
44 out of 60
Modern SecOps Envisioning Workshop
PSM Partners
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
This engagement is for security teams and IT leaders seeking to boost threat detection with experience in Microsoft Sentinel and Defender XDR, automating operations and mitigating cyber risks.
45 out of 60
Data Security: 2-Weeks Workshop
Conterra
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Identify data security risks in your organizational data
46 out of 60
Cloud Protection for AI
KiZAN Technologies
+1
Applicable to:
Cloud Security
Protect Cloud Environments leveraging Microsoft Secure Scores and other Microsoft Products to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigat
47 out of 60
impelSecure Threat Protection Engagement: Free 4-week workshop
impeltec Pty Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Discover threats and vulnerabilities to your Microsoft cloud and on-premises environments
48 out of 60
Endpoint as a Service | Assure 365
CyberOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Fully Managed Endpoint Security with 24x7 monitoring, compliance and Zero Trust enforcement—powered by Microsoft Intune.
49 out of 60
MIM to Entra: 6-Wk Implementation Plan
UNIFY Solutions Pty. Ltd.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
50 out of 60
Zero Trust Model - 4h assessment
Reply
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Zero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
51 out of 60
Management Services: 3-month Assessment
Quisitive
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Quisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
52 out of 60
Zero-trust collaboration security 6wk Implement
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
53 out of 60
Zero Trust as a Service (ZTaaS)
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital transformation and adopting AI starts with building a secure foundation.
54 out of 60
Microsoft 365: 2-Week Implementation
Technologent
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Expert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
55 out of 60
Zero-Trust Secure Email 6wk Imp
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
56 out of 60
Sentinel Readiness Workshop
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
57 out of 60
Microsoft Cybersecurity: 1 Month Assessment
Big Cloud Consultants
+2
Applicable to:
Cloud Security
Threat Protection
Our expert team will work with you to assess your current security posture and develop recommendations for appropriate improvements.
58 out of 60
KK_Exchange_Migration Consulting Services
Kraft Kennedy
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Moving to Exchange Online significantly extends the use of Microsoft 365 by modernizing communication infrastructure, enhancing security, and unlocking integrated productivity features.
59 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free Briefing
Netwoven
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Netwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
60 out of 60
Previous
5
6
7
8
9
Next