FiltersClear all
Consulting services results
Showing results in consulting services.
Copilot for Micosoft 365 Readiness: 2-Day WorkshopCTGlobal A/SPlan adoption of Copilot for Microsoft 365 through explicit scenarios, use cases and data governance. Develop strategies for seamless onboarding and future integrations. In a safe and secure workshop.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
1 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Microsoft Security Solutions - 4 Week AssessmentProtivitiMicrosoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
3 out of 60
Invoke Data Risk AssessmentInvokeThis assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
4 out of 60
Cybersecurity Assessment: 3-Wk WorkshopExelegentThe Cybersecurity Assessment is designed to evaluate your cybersecurity posture and reduce risks exposure by using advanced Microsoft 365 Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
5 out of 60
Data Security Engagement: 4-Wk WorkshopExelegentThe Data Security Engagement provides a summary of an organization’s data protection and compliance stature with actionable recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
6 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Microsoft 365 Security Readiness: 4-Wk AssessmentQuadrasystems.net (India) P LtdIdentify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
8 out of 60
MDS - Cybersecurity AssessmentMaureen Data SystemsThe purpose of the MDS cybersecurity assessment is to identify and prioritize vulnerabilities within the customer's production environment, covering both cloud and on-premises systems.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data SystemsAssess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security KftReview and harden Microsoft Security configurations based on industry best practices
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Mitigate Compliance and Privacy Risks - 3 Day WorkshopCGI Inc.Help customers detect, investigate, and take action to mitigate risk and ensure compliance in their modern workplace.
+1
Applicable to:
Cloud Security
12 out of 60
Manage Compliance Obligations & Risks with Microsoft PurviewBDOEnhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
13 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONSUNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Copilot Business Value DiscoveryNetwovenReady to embrace AI? Join our Microsoft 365 Copilot Value Discovery Workshop and learn how to maximize its potential for your business
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
15 out of 60
Microsoft 365 Secure Productivity WorkshopABTechnologiesEnable your team to work securely and productively using Microsoft 365 best practices.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
16 out of 60
Microsoft 365 Backup Readiness AssessmentABTechnologiesEvaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
17 out of 60
Complete MXDR Threat Protection Powered by Microsoft SentinelKiZAN TechnologiesManaged security services to protect against an evolving cyber threat landscape 24x7x365 with Microsoft Entra ID Protection, Microsoft Sentinel, and Microsoft Defender.
+2
Applicable to:
Cloud Security
Threat Protection
18 out of 60
SYSTEX Data Security and Compliance Solution精诚(中国)企业管理有限公司通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
19 out of 60
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
20 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
UNITE: AI Aware Workshop_INFINITY TECHNOLOGY SOLUTIONSFor business leaders who seek to understand AI in a business context, UNITE: AI Aware_ is an expert-led workshop for all departments. Participants can learn about AI types, capabilities and benefits.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
22 out of 60
Data Security & Threat Protection WorkshopITVTIdentify data security risks in your organizational data & discover vulnerabilities in your environment
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
23 out of 60
End-to-end Threat Protection Workshop and PilotExelegentThe Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
AI Security Readiness AssessmentProArch Technologies, IncProArch’s AI Security Readiness Assessment delivers a comprehensive evaluation of your cloud and AI environment, identifies critical security gaps, and provides a prioritized roadmap for remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
25 out of 60
Microsoft Defender for Endpoint QuickStartPresidioPresidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Microsoft Security Copilot POV & Adoption PlanBDOProve the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Cloud Security Operations CenterReplyVerified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
28 out of 60
AI Security and Microsoft 365 Copilot Readiness Assessment ProgramExelegentMaster control over your data and get ready to deploy Copilot in 60-90 days with a simple engagement process
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
29 out of 60
Security Assessment for Copilot Readiness: 3 Day WorkshopNetwovenNetwoven's security assessment for Copilot workshop will train you to better discover, secure, and govern your corporate data for usage with Copilot for Microsoft 365
+2
Applicable to:
Cloud Security
Knowledge & Insights
30 out of 60
Microsoft 365 Copilot Readiness AssessmentPresidioReview data protection, preparation, and governance with a Microsoft Copilot readiness assessment from Presidio.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Teamwork Deployment
31 out of 60
Data Security implementation for generative AI: 8-Wk ImpConterraHelp your organization to govern, monitor, and secure the use of generative AI tools like Copilot, ChatGPT, or custom GPT applications
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
32 out of 60
Spyglass-MXDR Managed Detection & Response: 2-week ImplementationQuisitiveSpyglass-MXDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
33 out of 60
NIST800-171-Microsoft 365-Accelerator-Guided-DeploymentKMicro Tech, Inc.Provides expert guidance to help organizations achieve NIST 800-171 compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
34 out of 60
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso CorporationHelping customers KickStart features in Microsoft 365 E3 Subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
36 out of 60
Neudesic's Knowledge Governance WorkshopNeudesicThe Neudesic Knowledge Governance Workshop is a 4–6-week session that is designed to assist customers in safeguarding their sensitive information.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
37 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLCIf you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
38 out of 60
Microsoft 365 Security AssessmentCDWCDW’s Microsoft 365 Security Assessment allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Microsoft Cybersecurity AssessmentThe Partner MastersDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Threat Protection Engagement FY25The Partner MastersLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
AvePoint Backup: 4 Weeks Proof Of ConceptSentinel Technologies Inc.Sentinel Technologies is proud to offer AvePoint’s Cloud Backup, a powerful cloud-to-cloud backup solution for Microsoft 365 and Azure.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
42 out of 60
Data Security with Microsoft Purview SolutionsBDOEnhance data security control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
43 out of 60
Microsoft Security Copilot Readiness AssessmentSoftchoiceAims to ensure organizations can securely utilize Microsoft’s Copilot for Security and identifying gaps in signal data from core Microsoft security products
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Data Security Engagement with Microsoft PurviewInviso CorporationOur Data Security engagement will look over your data estate and establish areas of Security Risk. We will show you the benefits to Microsoft Purview to help protect your environment from risks.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
45 out of 60
Microsoft Defender for Office 365: 1-hour briefingReplyFree one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Office 365
+2
Applicable to:
Cloud Security
Threat Protection
46 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk AssessmentErgoServicesErgo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
47 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITEDProfessional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for EndpointCyderesCyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
49 out of 60
Microsoft Defender for Endpoint DeploymentCitrin Cooperman Advisors, LLCFortify your business with Microsoft Defender for Endpoint that seamlessly integrates into Microsoft 365, safeguarding all devices and strengthening your Zero Trust framework.
+2
Applicable to:
Cloud Security
Threat Protection
50 out of 60
Endpoint Management with Security WorkshopThe Partner MastersThe Endpoint Management with Security Workshop enables partners to lead customer conversations around modernizing their endpoint management and security capabilities by leveraging Microsoft 365.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
51 out of 60
impelSecure Modern SecOps Engagement: Free 4-week workshopimpeltec Pty LtdGain visibility into threats to your Microsoft 365 and Azure clouds and on-premises environments across email, identity, endpoints, and third-party data
+2
Applicable to:
Cloud Security
Threat Protection
52 out of 60
Incident Response Tabletop Exercises: 2-Wk BriefingeGroup Enabling TechnologiesBe proactive and prepare your IT team for emergencies with a Disaster Plan
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
53 out of 60
Cyderes Managed Security Services for Microsoft SentinelCyderesCyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
54 out of 60
Cyderes Microsoft Security Adoption AdvisoryCyderesThe Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
55 out of 60
Managed XDR Shield: 4-Week ImplementationLong View SystemsAddress all your proactive security needs, engage the Managed XDR Shield plan to monitor, alert, and respond to threats effectively.
+2
Applicable to:
Cloud Security
Threat Protection
56 out of 60
XENMDM - Monthly SoC Support for Mobile DevicesXencia Technology Solutions Pvt LtdMicrosoft Intune platform based Managed Services covering device management, control and compliance along with monitoring and remediation of issues, policies, users, devices and threats.
+1
Applicable to:
Cloud Security
57 out of 60
Zones Intune Device Endpoint Management ImplementationZones Inc.Elevate your mobile device and application management with Intune—a robust solution offering advanced security features like conditional access, multi-factor authentication, and data encryption.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Mobile Device Management
58 out of 60
Cyderes Microsoft 365 Incident ResponseCyderesCyderes Digital Forensics and Incident Response (DFIR) services encompass the full security motion and emphasize your ability to respond.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
59 out of 60
impelSecure Threat Protection Engagement: Free 4-week workshopimpeltec Pty LtdDiscover threats and vulnerabilities to your Microsoft cloud and on-premises environments
+2
Applicable to:
Cloud Security
Threat Protection
60 out of 60