Skip to main content
Marketplace
Give feedback
Help & support
Saved items
Private plans
Just a moment, logging you in...
All
Products
Categories
Industries
Partners
Filters
Clear all
Your location
Your location
Products (1)
Products (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adoption & Change Management
Adoption & Change Management
Calling for Microsoft Teams
Calling for Microsoft Teams
Cloud Security
Cloud Security
Compliance Advisory Services
Compliance Advisory Services
Device Deployment & Management
Device Deployment & Management
Frontline Workers
Frontline Workers
Identity & Access Management
Identity & Access Management
Information Protection & Governance
Information Protection & Governance
Insider Risk
Insider Risk
Knowledge & Insights
Knowledge & Insights
Meeting Rooms for Microsoft Teams
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Meetings for Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Mobile Device Management
Mobile Device Management
Power Platform for Teams
Power Platform for Teams
Teams Custom Solutions
Teams Custom Solutions
Teamwork Deployment
Teamwork Deployment
Threat Protection
Threat Protection
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Industries
Industries
Service type
Service type
Pricing Model
Pricing Model
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
Copilot for Microsoft 365: 1-Day Data and Security Workshop
Awara IT Kazakhstan LLP
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Unlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
1 out of 60
Avanade Security Risk Assessment
Avanade, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Avanade's 5-day Risk Assessment offers security leaders a comprehensive view of risk posture across their enterprise and proactive ways to protect their organizations from growing cyber threats.
2 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
3 out of 60
Mergers, Acquisitions, and Divestitures: 5-Month Implementation
Cyclotron Inc.
+2
Applicable to:
Adoption & Change Management
Cloud Security
Cyclotron helps organizations overcome the technical challenges of consolidating or divesting organization assets using Microsoft 365, Azure, and third-party migration tools.
4 out of 60
Microsoft Defender for Cloud Apps: 2-Hr Workshop
Slalom Consulting
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
5 out of 60
KPMG Agent 365 Implementation - Adoption & Management
KPMG
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Enable organisations to operationalise Microsoft Agent 365 with trusted governance, security, and lifecycle controls so AI agents can scale safely beyond pilots
6 out of 60
Copilot Security Assessment: 4-Wk Assessment
Managed Solution
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
Unlock the full potential of AI with a comprehensive Microsoft Copilot Security Assessment, fully integrated with Microsoft 365
7 out of 60
Avanade Modern Sec Ops
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
8 out of 60
1-Tages KI Praxis Update Workshop (inkl. Copilot): Ihr Kompass durch die Welt der Künstlichen Intelligenz
AppSphere AG
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Mit dem KI Praxis Update Workshop statten wir Ihr Team mit dem neuesten Wissen über KI aus. Lernen Sie, wie Sie KI zielgerichtet und profitabel in Ihrer Organisation nutzen können.
9 out of 60
CMMC Secure Enclave
Planet Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
A secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov.
10 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFT
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Our approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
11 out of 60
Microsoft OT/IOT Security : 2-Wks Assessment
Wipro Ltd
+2
Applicable to:
Cloud Security
Threat Protection
Identify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
12 out of 60
Data Protection Impact Assessment: 8 Wk
Lighthouse Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Empowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
13 out of 60
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
14 out of 60
Security Maturity Assessment - 4 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
15 out of 60
Onesec Identity Governance Lifecycle Assessment
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
16 out of 60
Microsoft Security Solutions - 4 Week Assessment
Protiviti
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
17 out of 60
Endpoint Management Workshop
Citrin Cooperman Advisors, LLC
+2
Applicable to:
Cloud Security
Threat Protection
Empower secure endpoint management with Microsoft Intune through streamlined operations.
18 out of 60
Implementation of Microsoft Security Copilot
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
19 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
20 out of 60
Managed Detection and Response [Threat Hunting]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Inspect events in your network to locate threat indicators and entities
21 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week Implementation
Beyondsoft
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
22 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und Ausarbeitung
AppSphere AG
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Vom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
23 out of 60
MDS - Threat Protection Engagement
Maureen Data Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
24 out of 60
Licensing Microsoft 365: 1-day Assessment
Informatika a.d.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
We offer relationship-focused support and knowledge so that you can implement perfectly tailored Microsoft 365 subscriptions and solutions for your business.
25 out of 60
Microsoft Copilot for Security: 2-Day Workshop
Planet Technologies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
This 2-day workshop covers the essential aspects you need to effectively and efficiently leverage Microsoft Copilot for Security for your organization's security operations and needs.
26 out of 60
Your Smart Workplace Assessment
Rackspace Technology
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Your Smart Workplace Assessment helps organizations develop secure, cost-effective, and productivity-enhancing strategies for modern work environments.
27 out of 60
Defender for IoT Enterprise: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understanding risk with unmanaged IoT devices can be difficult. Our Defender for Enterprise IoT Proof of Concept helps you visualise and understand the threats to your environment.
28 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
29 out of 60
Content Security and Data Loss Prevention: 3-Day Workshop
FSI Strategies
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
FSi Strategies will demonstrate how an organization can protect it's most important asset, at the source. Ensuring that documents are protected no matter where they live.
30 out of 60
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
31 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
32 out of 60
Vulnerability Management
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+2
Applicable to:
Cloud Security
Threat Protection
Rapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
33 out of 60
Microsoft 365 E5 CMMC L3 8 Week Implementation
KAMIND IT, Inc
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
34 out of 60
Lenovo Cyber Resiliency as a Service EDA
Lenovo Software
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Environment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
35 out of 60
Microsoft 365 Threat Check Assessment: 3-Wk Assessment
Invoke
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
36 out of 60
Microsoft Sentinel Proof of Concept: 4 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand how prepared is your Microsoft infrastructure when adversaries attack
37 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
38 out of 60
Infosys Modern Identity and Access Solution with MS Entra
Infosys Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Microsoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
39 out of 60
Office 365 Tenant-to-Tenant Cutover Email Migration without downtime and bounced email: 7-Days Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Seamless Microsoft 365 tenant-to-tenant mailbox migration, essential for mergers, acquisitions, or relocations, ensuring no bounced emails, NDR, or downtime.
40 out of 60
Data Security Engagement
adaQuest
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
41 out of 60
Modern Management for Endpoints
Ivision, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
42 out of 60
Microsoft 365 Secure Score Assessment
Daymark Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Improve your environment’s security posture using Microsoft Secure Score.
43 out of 60
Windows 11 Pilot: 3 Weeks POC
Steeves
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
44 out of 60
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
45 out of 60
Enhance Identity Security with Microsoft Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POC
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Bulletproof’s six-week Microsoft Entra ID P2 implementation empowers your organization to significantly strengthen identity security by ensuring only authorized access to critical systems and data.
46 out of 60
Secure Multi-Cloud Environments: 3-day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Secure Multi-Cloud Environments Workshop helps customers gain insights on active threats and vulnerabilities related to their hybrid and multi-cloud workloads within Microsoft 365.
47 out of 60
Microsoft Defender for Endpoint Deployment
Citrin Cooperman Advisors, LLC
+2
Applicable to:
Cloud Security
Threat Protection
Fortify your business with Microsoft Defender for Endpoint that seamlessly integrates into Microsoft 365, safeguarding all devices and strengthening your Zero Trust framework.
48 out of 60
Microsoft 365 Tenant - 1-Wk Assessment
Point Alliance Inc
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
You may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
49 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: Implementation
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Apply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
50 out of 60
Cyber Security Services 9 days Assessment
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
51 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional Service
IT Partner LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
The goal of the service is to securely remove your previous Exchange Server, ensuring it doesn't disrupt your operations and enabling a smooth transition to Exchange Online.
52 out of 60
Microsoft Defender for Cloud Apps Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Microsoft Defender for Cloud Apps address security gaps in an organization's environment.
53 out of 60
Secure Data Management with Microsoft Purview
AVASOFT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
54 out of 60
Identity and Access Management Solution
H One (Private) Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Entra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
55 out of 60
Microsoft Cloud Accelerator Workshops 2-Days
SoftwareOne
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
Improve NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
56 out of 60
Security Outcomes Sprint
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Understand the Business Value of Your Cybersecurity Investments
57 out of 60
Cloud App Security – Advanced CASB Solution for Cloud Data Protection
ITX360 (Pvt) Ltd.
+1
Applicable to:
Cloud Security
Secure your cloud apps with real-time monitoring, Shadow IT discovery, and automated data protection. Integrated with Microsoft Information Protection for enhanced compliance and threat detection.
58 out of 60
GDPR Assessment: 6-Week Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
59 out of 60
Modern SecOps Discovery Session
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
60 out of 60
Previous
2
3
4
5
6
Next