AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
SharePoint and Teams Security - 2 week assessment
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Confident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
1 out of 60
Secure Data Management with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
2 out of 60
Microsoft 365 threat protection assessment
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
Identify vulnerabilities and threats in Microsoft 365. Use advanced protection, intelligence, detection, and response to safeguard data. Enhance security with real-time insights and monitoring.
3 out of 60
Free Microsoft 365 Defender Suite 4–6-hour Proof of Concept
Levacloud LLC
+2
Applicable to:
Cloud Security
Threat Protection
This free, 4–6-hour workshop will provide you with a hands-on experience using Microsoft 365 Defender, Microsoft Defender for Office 365, Microsoft Defender for Endpoint
4 out of 60
Microsoft Information Protection Administrator: 3 Days Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Information Protection Administrator course focuses on data governance and information protection within your organization.
5 out of 60
Managed Detection and Response [Security Monitoring]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
6 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation Tools
CloudEdge
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
7 out of 60
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day Implementation
Critical Start
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Rapidly identify, contain, and remediate a breach.
8 out of 60
Compliance Assessment - 6 weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Identify your compliance maturity and areas that need improvement
9 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Understand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
10 out of 60
Mailbox Guardian - Security: 2 Week Implementation
ProServeIT
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cybersecurity review and lockdown of Microsoft 365 environment. Monitor and provide implementation recommendations Protect against phishing and other attacks Review desired state configuration
11 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
12 out of 60
Protect and Manage data in personal devices using Intune
AVA SOFTWARE INC
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
Leverage Microsoft Intune for tailored security measures, advanced threat detection, and real-time monitoring to safeguard sensitive data, mitigate risks, and ensure compliance.
13 out of 60
Unified Endpoint Mgmt. - 6 Weeks - Implementation
TCS - Digital Workplace
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
TCS Unified Endpoint Management combines Microsoft Intune, Microsoft Defender for Endpoint and Configuration Manager solutions to provide modern management of endpoints with a Zero Trust strategy.
14 out of 60
Securing Identities and Access: 3-day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
15 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk Assessment
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Leverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
16 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
17 out of 60
Aseguramiento de ciberseguridad: taller 4 semanas
Sofistic Colombia SAS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
18 out of 60
HPT_Microsoft Cyber Security Assessment_2 week
HPT Vietnam Corporation
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Strengthen your firm's defenses with our all-in-one cybersecurity platform
19 out of 60
Solution Assessment for Security: 30 Day
Concurrency, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
An assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
20 out of 60
BYOD Intune 1-Wk Accelerated Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Bring Your Own Device (BYOD) capability
21 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
22 out of 60
Threat Protection: 3-Wk POC
FPT/Intellinet
+2
Applicable to:
Cloud Security
Threat Protection
Identify security threats and begin to respond and mitigate.
23 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshop
HPT Vietnam Corporation
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
24 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
25 out of 60
Virteva Microsoft 365 Defender Ready Deploy
Virteva LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
26 out of 60
Infosys Intelligent Security Solution
Infosys Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Infosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
27 out of 60
Threat Protection and Cloud Security: 3 Day Workshop
Netwoven
+2
Applicable to:
Cloud Security
Threat Protection
Improve your security posture with a Microsoft Threat Protection Assessment Workshop
28 out of 60
G Suite to Office 365 migration: 1-Hour Assessment
True.org Cloud
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
Assessment of your current G Suite environment to plan migration to Office 365
29 out of 60
Office 365 Teamwork Security - Managed Service
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Teamwork Security provides a comprehensive security management service for Office 365 platforms
30 out of 60
Microsoft 365 Risk 5-Days Assessment
KPCS CZ, s.r.o.
+3
Applicable to:
Compliance Advisory Services
Mobile Device Management
Threat Protection
Microsoft 365 Risk Assessment provides preventive and comprehensive check of the Customer's Microsoft 365 Environment.
31 out of 60
Microsoft Sentinel Proof of Concept: 4 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand how prepared is your Microsoft infrastructure when adversaries attack
32 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
33 out of 60
Modern SecOps Discovery Session
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
34 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
35 out of 60
Information Protection with Microsoft Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Boost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
36 out of 60
Microsoft Security Deployment: 5-day Workshop
Campana & Schott GmbH
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Understand your Microsoft security posture and minimize risks with the right experts
37 out of 60
License Advisory Services
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Teamwork Deployment
Threat Protection
Whether you’ve been approached by Microsoft for an audit or simply want to conduct a self-assessment, our License Advisory Services is a great solution for understanding your real licensing needs.
38 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
39 out of 60
Zero Trust Defend Against Threats: 7-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Accelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
40 out of 60
Microsoft 365 Security: 1 Month Implementation
Valorem LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
A detailed baseline assessment of your current and desired state followed by a pilot production of Microsoft’s advanced security solutions to accelerate your modern security journey.
41 out of 60
Microsoft 365 Defender 10-week Implementation
Cyclotron Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender for enterprises, resulting in improved detection rates, threat coverage, and organizational security posture.
42 out of 60
Security Maturity Assessment - 4 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
43 out of 60
Rapid Risk Assessment: 4-Wk Assessment
Ascent Global, Inc.
+2
Applicable to:
Information Protection & Governance
Threat Protection
Immediate and long-term Microsoft security strategy assessment utilizing security tools such as Defender, Sentinel, and Cloud App Security.
44 out of 60
UNITE: Exploring E5 Security Workshop_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
UNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
45 out of 60
Microsoft Security: 4-Week Implementation
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Establish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
46 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
47 out of 60
Nonprofit Security Maturity Assessment - 4 weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
48 out of 60
Bulletproof 365 Standard, Managed IT Service
Bulletproof Solutions Inc.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Managed IT Services and Support to Make Your Business Run Smoother
49 out of 60
Copilot Data Protection
Cloud Life
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
50 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
51 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk Assessment
Apex Digital Solutions
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
52 out of 60
iT1's Security Assessment
It1 Source LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Improve your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
53 out of 60
Security Assessment: 2-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
54 out of 60
Microsoft Defender for Endpoint: 2-wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Defender for Endpoint assessment will help the customers review the current state, evaluate existing AV and EDR solutions and expectations, deploy MDE, and plan for ongoing management.
55 out of 60
Defend Against Threats with SIEM Plus XDR
Netrix Global
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
56 out of 60
Big Green IT Security Assessment: 3-Week
Big Green IT - Dev
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
57 out of 60
Microsoft 365 Security Alignment Workshop: 10 Days
Sirius Computer Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
58 out of 60
Managed Workspace Protection for Microsoft 365 Defender
Orange Business Services - Global
+1
Applicable to:
Threat Protection
Implementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
59 out of 60
Defender for IoT Operational Technology Discovery: 2-Hour Workshop
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT (OT) Discovery Workshop helps you understand the solution, the fit to your OT estate and potential threat posture improvements
60 out of 60
Previous
2
3
4
5
6
Next