FiltersClear all
Consulting services results
Showing results in consulting services.
Pently PentestPently GmbHSimulated cyber attacks to uncover real vulnerabilities in your entire IT landscape.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
1 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process AdoptionVitalystAlithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
2 out of 60
TGS Windows 11TEKsystems Global Services LLC.TEKsystems partners with you to navigate the transition to Windows 11
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
3 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-WeeksmyCloudDoorAssess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
4 out of 60
Microsoft 365 Copilot - Technical ReadinessCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Technical Readiness - your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
5 out of 60
Microsoft 365 Security Review: AssessmentCyberOneIdentify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
6 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Protect 365 App - 1 hour implementationCloud LifeThe Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
8 out of 60
Avanade Security Business Value 4-Wk AssessmentAvanade, Inc.Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
9 out of 60
Avanade Security Risk AssessmentAvanade, Inc.Avanade's 5-day Risk Assessment offers security leaders a comprehensive view of risk posture across their enterprise and proactive ways to protect their organizations from growing cyber threats.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
10 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdgeEndpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
11 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys LimitedMicrosoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
12 out of 60
Windows 11 Assessment: 1-WKSteeves Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
13 out of 60
NEST ArenaNoibitTwo-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight HoldingsStrengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Microsoft 365 Copilot - AdvisoryCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Readiness Workshop – your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
16 out of 60
Nanyang Bandang security operation services上海南洋万邦软件技术有限公司Security operation services with Microsoft Denfender component and Sentinel
+1
Applicable to:
Cloud Security
17 out of 60
Endpoint as a Service | Assure 365CyberOneFully Managed Endpoint Security with 24x7 monitoring, compliance and Zero Trust enforcement—powered by Microsoft Intune.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
18 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
19 out of 60
Licensing Microsoft 365: 1-day AssessmentInformatika a.d.We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
20 out of 60
Microsoft Intune ServiceSii Sp. z o.o.Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
+3
Applicable to:
Cloud Security
Device Deployment & Management
Insider Risk
21 out of 60
Pently Microsoft 365 - AssessmentPently GmbHStructured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
22 out of 60
Data Security with Microsoft Purview-4h AssessmentReplyThe Microsoft Purview Assessment offers advanced data security, integrating discovery, classification, and governance with Microsoft’s suite to enhance compliance and protection.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
23 out of 60
XDR as a Service | Assure 365CyberOneFully Managed XDR with 24x7 detection, response and threat protection—Powered by Microsoft Defender XDR.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
24 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
25 out of 60
Data Security as a Service | Assure 365CyberOneFully Managed Data Security, governance and compliance with 24x7 monitoring—Powered by Microsoft Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
26 out of 60
Microsoft 365 Copilot Risk Assessment: 1-Week Strategic WorkshopAtmoseraUncover data risks and prepare for secure Copilot adoption with a Microsoft 365 risk assessment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
27 out of 60
Data Protection Impact Assessment: 8 WkLighthouse GlobalEmpowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
28 out of 60
Data Security EngagementadaQuestThe Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
29 out of 60
Pently SOCaaSPently GmbHFull Managed Security Service with a personal touch and individually build for each customer
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Cloud Endpoints AssessmentInviso CorporationMaximize your Endpoints! Find out how a Cloud PC could potentially save you money!
+1
Applicable to:
Cloud Security
31 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security LtdThe Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
32 out of 60
Security Operations Center with Microsoft SentinelAVASOFTMonitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 60
Identity Health CheckMobile MentorMobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
34 out of 60
Data Security: 2-Weeks WorkshopConterraIdentify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
35 out of 60
Citrix Endpoint Management to Microsoft Intune Migration PlanMobile MentorMobile Mentor’s Citrix Endpoint Management to Microsoft Intune services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
36 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo SoftwareCRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
37 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
38 out of 60
Threat Protection EngagementadaQuestLearn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Microsoft Purview Insider Risk Management (IRM): 2-Week ImplementationSpyglass MTG, LLCOur engagement is designed to accelerate the ability to integrate and consume IRM across your enterprise while better securing data and identities in the environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
40 out of 60
SmartStart for IntuneMobile MentorThe SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
41 out of 60
Microsoft 365 consultancyOnex GroupGet Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
42 out of 60
Microsoft 365 Copilot Value DiscoveryCrayonJumpstart your journey with the Crayon Microsoft 365 Copilot Value Discovery Workshop – your cornerstone for secure and efficient AI adoption within your organization.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
43 out of 60
Identity as a Service | Assure 365CyberOneFully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
44 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
45 out of 60
Copilot for Microsoft 365: 1-Day Data and Security WorkshopAwara IT Kazakhstan LLPUnlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
46 out of 60
Rapid Remediation of Microsoft Secure ScoreCyberOneBoost your Microsoft Secure Score, reduce risk and increase cyber resilience with expert-led rapid remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
47 out of 60
Microsoft 365 Security Health Check Assessment 3-WkBulletproof Solutions Inc.Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Microsoft Data Compliance Consulting Services - 2 Weeks AssessmentArmis, Sistemas de Informação, LdaThe Microsoft 365 Compliance assessment helps organizations implement a compliance strategy that accelerates and streamlines data security and governance while reducing risk.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
49 out of 60
Defender for Office365Suri Services SCSuri Services y Office 365: La alianza impenetrable en ciberseguridad.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
50 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT LimitedCybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
51 out of 60
Avanade Cyber Portfolio EvaluationAvanade, Inc.The Cyber Portfolio Evaluation maps your tools with Microsoft solutions, cutting costs and enhancing efficiency.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
52 out of 60
Microsoft 365 Copilot Readiness AssessmentPresidioReview data protection, preparation, and governance with a Microsoft Copilot readiness assessment from Presidio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
53 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
54 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFTEnhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
55 out of 60
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) LtdReadiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Trip to Microsoft 365 Copilot ImplementationSuri Services SCOfrecemos un servicio de capacitación y preparación estratégica para la adopción de Microsoft 365 Copilot, enfocado en acelerar la productividad y transformar los procesos clave
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
57 out of 60
ADFS to Entra ID Migration ServiceMobile MentorMobile Mentor’s ADFS to Entra ID Migration Service offers a secure, cloud-first Single Sign-On experience that eliminates outdated infrastructure and unlocks the full potential of Microsoft Entra ID.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
58 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
60 out of 60