AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
Zero Trust as a Service (ZTaaS)
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Digital transformation and adopting AI starts with building a secure foundation.
1 out of 60
GDPR Assessment: 6-Week Assessment
Happiest Minds Technologies Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Enable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
2 out of 60
Overwatch Microsoft 365 Security: 12 Month Implementation
THREATSCAPE LIMITED
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Overwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
3 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POC
Long View Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure and manage your cloud environments by fortifying your infrastructure against emerging threats.
4 out of 60
Managed Threat Detection [xdr] [log]
Orange Cyberdefense Global
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
Stop threats with a cloud-native SIEM adapted to your new business needs.
5 out of 60
Incident Response Retainer
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
6 out of 60
Barracuda Office 365 email-based security
Crayon
+1
Applicable to:
Threat Protection
Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defense, API-based inbox defense, incident response, data protection, and compliance capabilities.
7 out of 60
Cybersecurity Assessment - 3 Weeks
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Microsoft Security Assessment: detect security problems and take targeted action
8 out of 60
Microsoft Security Workshop: 3-day
Oxford Computer Group LLC
+2
Applicable to:
Cloud Security
Threat Protection
This 3-day workshop shows you how to put Microsoft’s security capabilities to work. Learn how secure your organization is now and how to mitigate and protect against threats in the future.
9 out of 60
Endpoint Management with Security - 4 days - FREE Workshop
OPEN BPO
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
This workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
10 out of 60
Microsoft 365 Security Briefing
CDI LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
11 out of 60
Cyber Security Assessment
Aegis Innovators
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
12 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
13 out of 60
Managed XDR Service for Microsoft 365 Government Commercial Cloud (GCC) High environments
SysArc Inc
+1
Applicable to:
Threat Protection
Our Managed XDR Service ensures regulatory compliance, and security for your organization’s needs.
14 out of 60
Device as a Service with Windows 11 and Intune: 4 Week Implementation
Cognizant
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Windows 10 has revolutionized how organizations manage operating systems, delivering the features that you have come to know and rely on, while enhancing mobility and agility without losing data.
15 out of 60
Microsoft Sentinel Workshop and Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
16 out of 60
Microsoft 365 CISO Security Workshop with Sentinel
CDW
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Microsoft 365 CISO Security Workshop with Sentinel is designed as a day engagement for Business Decision Makers (BDM) to help showcase the value proposition of Microsoft Security.
17 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week Implementation
Beyondsoft Brasil
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
18 out of 60
Teams & SharePoint Security Hardening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Teams Custom Solutions
Threat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
19 out of 60
Phishing, Malware & Spam protection- 2 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
20 out of 60
Red Canary Defend Against Threats Siem Plus XDR Workshop
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
21 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
Manage and Investigate Risk and Threat Protection
22 out of 60
Microsoft Defender for Endpoint SMC Deployment: 4-Week Implementation
BlueVoyant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our services are designed to maximize your investment with Microsoft with hands-on onboarding & baseline configuration services.
23 out of 60
Onesec’s Secure Access to Microsoft 365 with Zscaler
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
24 out of 60
Darktrace Managed Network Sensor
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
25 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security Services
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
26 out of 60
ThreatHunter MXDR MSSP: 12-Mo Implementation
eGroup Enabling Technologies
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
To assist our customers with advanced security services focused on identifying and mitigating cloud and device malicious threats and providing 24x7 monitoring and response services.
27 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDO
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Introducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
28 out of 60
Modern Workplace Security 10-Wk Implementation
Wipro Ltd
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
29 out of 60
Microsoft 365 Threat Protection Workshop + 5 Day
Cyberwise Siber Güvenlik TIC. AS.
+1
Applicable to:
Threat Protection
Is your Microsoft 365 environment secure? Do you wonder about your current security maturity? We will assist you with a full-fledged workshop on how to deploy and implement Microsoft 365 Security.
30 out of 60
Onevinn Secure Microsoft Copilot Journey Workshop
Onevinn AB
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
This workshop will enable you to take full advantage of Microsoft 365 Copilot with focus on Compliance and Information Protection.
31 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 Wks
Wipro Ltd
+2
Applicable to:
Identity & Access Management
Threat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
32 out of 60
Microsoft 365 E5 Zero Trust Security Assessment
SHI International Corp
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Explore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
33 out of 60
Microsoft 365 Licence Health Check: 1-Day Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 1-Day Health Check to ensure your Microsoft security and identity licencing is fully understood and used optimally
34 out of 60
Ransomware & Supply Chain Incident Management: 12 Hour Assessment
Maureen Data Systems
+3
Applicable to:
Compliance Advisory Services
Knowledge & Insights
Threat Protection
Identify vulnerabilities within your organization, including those who pose a threat to your supply chain, provide & mature a tailored incident response & management program.
35 out of 60
Cyber Security Assessment
ELEVATE Solutions Limited
+1
Applicable to:
Threat Protection
The Cybersecurity Assessment helps customers assess their security posture and risk to insider threats.
36 out of 60
MDR Workshop
Grant Thornton LLP
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
37 out of 60
Threat Protection: 5-Week Workshop
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
An executive deep dive into security strategy, tailored to your organization.
38 out of 60
Get AI Ready: 5-Day Assessment
PSM Partners
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
AI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
39 out of 60
Synergy Advisor Architecture Design Sessions (ADS) for Microsoft Copilot for Security
Synergy Advisors LLC
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Threat Protection
A Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
40 out of 60
Athenagy™ E-Discovery Assessment: 4 weeks
BDO Digital, LLC
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Centralize and simplify E-Discovery with our expert evaluation and recommendations on your current environment
41 out of 60
HCLTech Business Email Protection: 10-Days Implementation
HCL Technologies Limited.
+1
Applicable to:
Threat Protection
HCLTech Business Email Protection (BEP) Powered By Microsoft EOP and MDO, Enable real time Business Email Protection alerting and automated remediation for email service hosted on Microsoft platform
42 out of 60
Threat Protection Engagement
The Partner Masters
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
43 out of 60
Microsoft Sentinel Security Consulting Service
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
44 out of 60
Microsoft 365 Defender - MXDR Service - 1 Year Implementation
CGI Inc.
+1
Applicable to:
Threat Protection
Unleash your Microsoft Defender 365 capabilities. Automatically detect & correlate threat signals across your endpoints, email, cloud applications, identities, cloud and on-premises workloads.
45 out of 60
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
46 out of 60
Varonis Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
47 out of 60
Microsoft Intune Deployment
Secure Future Bilgi Tek. ve Hiz. Tic A.S.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
48 out of 60
Copilot - 2 Days Adoption Workshop
INSOMEA COMPUTER SOLUTIONS TUNISIE SARL
+2
Applicable to:
Frontline Workers
Threat Protection
INSOMEA will help users in adopting copilot within companies from different sectors and sizes
49 out of 60
Modern Workplace Optimization - 4 Week Assessment
Protiviti
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This assessment for Microsoft 365 helps customers obtain insights to what it takes to improve productivity against Cyber Threats for Workforce Productivity.
50 out of 60
Microsoft Defender for Endpoint: 4-Week Implementation
Invoke
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Understand your current use cases for antimalware / endpoint detection and response, map those use cases to Defender, and execute on a migration and rollout to Defender for Endpoint.
51 out of 60
Microsoft 365 Security: 4-hour Assessment
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Microsoft 365 Security Assessment provides an in-depth assessment of your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
52 out of 60
Security Assessment - 4-Week Assessment
Coretek Services
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Analysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
53 out of 60
Zero Trust Launchpad: 3-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
54 out of 60
Assessment of Microsoft Intune
CDW
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
CDW's Assessment of Microsoft Intune is a professional service that provides a comprehensive review of your current Microsoft Intune environment, including policies, settings and configurations.
55 out of 60
Email Security Threat Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
56 out of 60
Baseline Microsoft 365 complete security Hardnening
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Aware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
57 out of 60
Information Protection in Office 365: 4 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
58 out of 60
Sensitive data risk assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
59 out of 60
Security and compliance assessment with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Fortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
60 out of 60
Previous
1
2
3
4
5
Next