FiltersClear all
Consulting services results
Showing results in consulting services.
Get AI Ready: 5-Day AssessmentPSM PartnersAI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
1 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk EngagementCloudScale InternationalThis assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
2 out of 60
Modern SecOps Envisioning WorkshopPSM PartnersThis engagement is for security teams and IT leaders seeking to boost threat detection with experience in Microsoft Sentinel and Defender XDR, automating operations and mitigating cyber risks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
3 out of 60
Microsoft 365 Copilot Implementation Readiness AssessmentCollective InsightsActionable recommendations in data security, technical infrastructure, user adoption, and workflow integration, ensuring preparation to adopt and integrate new technologies.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
4 out of 60
Copilot for Security Readiness AssessmentInvokeInvoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP TechnologiesThe SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Lightstream Threat Protection Assessment and Deployment RoadmapLightstreamLeveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk ImplementationNeway TechnologiesStreamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
8 out of 60
Copilot for Microsoft 365 AssessmentIt1 Source LLCPrepare your organization for the future of AI technology with a secure, productive, and modernized data foundation
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
9 out of 60
Centric Threat Protection EngagementCentric Consulting, LLCLearn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
10 out of 60
Modern Managed Services: 2-tägiges AssessmentnovaCapta GmbHIhre Optionen für Managed Services rund um Endpunkte, Microsoft Azure, Microsoft 365 und Security am Modern Workplace entdecken
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
11 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Cybersecurity AssessmentCDI LLCThe Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
13 out of 60
Microsoft Security Assessment: 3-Wk AssessmenteGroup Enabling Technologies, LLCAnalyze your cross platform security posture, with evaluated vulnerabilities and risks identified with a Microsoft Security Assessment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
14 out of 60
Microsoft 365 GCC High Rapid DeploymentDaymark SolutionsDeploy Microsoft 365 GCC High services in days, not weeks, while leveraging Daymark’s enhanced security baseline.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
15 out of 60
Copilot Security Assessment: 4-Wk AssessmentManaged SolutionUnlock the full potential of AI with a comprehensive Microsoft Copilot Security Assessment, fully integrated with Microsoft 365
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
16 out of 60
iT1's Security AssessmentIt1 Source LLCImprove your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
17 out of 60
Microsoft Defender for Cloud Apps: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Cloud Apps
+2
Applicable to:
Cloud Security
Threat Protection
18 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure LtdApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
19 out of 60
Microsoft 365 Fundamentals: 1 Day WorkshopNETCOM LEARNINGIntroduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
+3
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
20 out of 60
discover-sensitive-data-workshopECF Data LLCECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
21 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 WeeksNetrix GlobalUnderstand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
22 out of 60
Defend Against Threats with SIEM Plus XDRNetrix GlobalAn immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Google Workspace to Microsoft 365 MigrationDataVoxDataVox offers migration services for your company from Google Workspace to Microsoft 365
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
24 out of 60
Multifactor Authentication: 4-Day ImplementationFSI StrategiesImplementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Data Security and Compliance Services - 4 Week AssessmentProtivitiEnd-to-End Data Security to Identify, Classify, Protect and Optimize Your Data in Microsoft 365
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
26 out of 60
Darktrace Managed Network SensorSentinel Technologies Inc.Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
+2
Applicable to:
Cloud Security
Threat Protection
27 out of 60
Zero Trust Security AssessmentCitrin Cooperman Advisors, LLCOur Zero Trust Security Assessment will evaluate identity, email, data, and endpoint device controls, threat protection, management, and licensing to strengthen your organization's security posture.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 60
Remote Access to On-Prem Apps: 3 Wk ImplementationInvokeSurface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
+2
Applicable to:
Cloud Security
Identity & Access Management
29 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTDMicrosoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
+2
Applicable to:
Cloud Security
Threat Protection
30 out of 60
Microsoft 365 Secure Score AssessmentDaymark SolutionsImprove your environment’s security posture using Microsoft Secure Score.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
31 out of 60
1-Day Security & Identity WorkshopConvergeOneTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Threat Protection EngagementISA Cybersecurity Inc.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLCThe Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Office 365 Tenant-to-Tenant Cutover Email Migration without downtime and bounced email: 7-Days Professional ServiceIT Partner LLCSeamless Microsoft 365 tenant-to-tenant mailbox migration, essential for mergers, acquisitions, or relocations, ensuring no bounced emails, NDR, or downtime.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
35 out of 60
Microsoft Security AssessmentDataVoxThis assessment provides a comprehensive review of the Microsoft 365 environment, focusing on configuration, security posture, identity management, and data governance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
36 out of 60
CMMC Compliance: 4 week WorkshopSirius Computer SolutionsThe U.S. Department of Defense (DoD) is implementing the Cybersecurity Maturity Model Certification (CMMC) to verify the cybersecurity of its supply chain, our Workshop will help you ensure compliance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
37 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional ServiceIT Partner LLCStrengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
38 out of 60
Threat Protection and Cloud Security: 3 Day WorkshopNetwovenImprove your security posture with a Microsoft Threat Protection Assessment Workshop
+2
Applicable to:
Cloud Security
Threat Protection
39 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk AssessmentApex Digital SolutionsAchieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
40 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
41 out of 60
Licensing Optimization: 2-Wk WorkshopeGroup Enabling TechnologiesGain confidence in your level of control with your Microsoft 365 licensing.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
42 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
43 out of 60
Microsoft 365 Modern Endpoint Service Powered by IntuneAll Covered, a division of Konica MinoltaMicrosoft 365 Modern Endpoint is a cloud-native, fully managed service powered by Microsoft Intune. It is designed to simplify endpoint hardening, configuration, and application management.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
44 out of 60
Microsoft 365: 2-Week ImplementationTechnologentExpert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
45 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServusGain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
46 out of 60
Office 365 Migration 3-Month ImplementationRKON TECHNOLOGIESLeverage RKON's consulting expertise for a smooth and seamless migration to Microsoft's Office 365 suite of products including SharePoint, OneDrive, and Teams
+3
Applicable to:
Cloud Security
Device Deployment & Management
Teamwork Deployment
47 out of 60
Advanced Email Security: 4-Day ImplementationFSI StrategiesLeverage Microsoft Defender for Office 365 to implement best in class email security
+3
Applicable to:
Cloud Security
Threat Protection
Workplace Analytics
48 out of 60
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
49 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
+2
Applicable to:
Cloud Security
Identity & Access Management
50 out of 60
Digital Workplace Program: 4-week AssessmentQuisitiveThe Digital Workplace Foundations Assessment helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tool
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
51 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
MXDR Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
53 out of 60
Managed Extended Detection & Response (MXDR) for Workplace: 2 Hr WorkshopNetwovenLearn how to put next generation Microsoft security tools to work for you.
+2
Applicable to:
Cloud Security
Threat Protection
54 out of 60
Cyber Insurer Readiness WorkshopSentinel Technologies Inc.Uncover gaps and strengthen your position when applying for cyber insurance
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
55 out of 60
Microsoft Defender for End Points JumpstartSentinel Technologies Inc.Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
+2
Applicable to:
Cloud Security
Threat Protection
56 out of 60
Microsoft Defender for Office JumpstartSentinel Technologies Inc.Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
+2
Applicable to:
Cloud Security
Threat Protection
57 out of 60
Cloud-Native Migration Service: 4-Month ImplementationCyclotron Inc.With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
+2
Applicable to:
Cloud Security
Identity & Access Management
58 out of 60
Cloud Protection for AIKiZAN TechnologiesProtect Cloud Environments leveraging Microsoft Secure Scores and other Microsoft Products to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigat
+1
Applicable to:
Cloud Security
59 out of 60
Exchange Online Migration: 6-Week DeploymentCyclotron Inc.Exchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
+2
Applicable to:
Cloud Security
Information Protection & Governance
60 out of 60