FiltersClear all
Consulting services results
Showing  results in consulting services.
Windows 365 Rapid DeployIvision, Inc.The ivision Windows 365 Rapid Deployment approach will accelerates the adoption and use case development of Windows 365 virtual desktops.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management
1 out of 60
Microsoft Sentinel Workshop and PilotCDWThe Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
2 out of 60
Windows 365 PilotCDWWith the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
3 out of 60
MXDR ConsultationCBTS Technology Solutions LLCCBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
4 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
5 out of 60
Threat Protection Engagement - 4 weeksGrant Thornton LLPImprove your Security Posture with Grant Thornton's Threat Protection Engagement
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
6 out of 60
UNITE: Cyber Security Assessment_INFINITY TECHNOLOGY SOLUTIONSBoost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
7 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View SystemsSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
8 out of 60
Copilot for Microsoft 365 Data Security QuickStartSoftchoiceSetting the foundation for data security and governance in preparation for Copilot for Microsoft 365
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Insider Risk
Insider Risk
9 out of 60
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Insider Risk
Insider Risk
10 out of 60
Implementation of Microsoft Defender for Cloud AppsCDWCDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
11 out of 60
Implementation of Microsoft Defender for Office 365CDWThe Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
12 out of 60
Workshop for Microsoft 365 Threat ProtectionCDWThe Workshop for Microsoft 365 Threat Protection provides the following objectives to ensure thorough enablement of crucial Microsoft products for a more secure environment.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
13 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to: Cloud Security
Cloud Security Insider Risk
Insider Risk Threat Protection
Threat Protection
14 out of 60
Threat Protection EngagementNeway TechnologiesEnhance your organization's security stance with a Neway Threat Protection Engagement.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
15 out of 60
Fixing vulnerabilities based on Defender with ASR Module: 3-Days Consulting ServiceIT Partner LLCThis service provides a comprehensive approach to identifying and fixing vulnerabilities in organization's devices, helping mitigate the risks of cyber-attacks.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
16 out of 60
Healthcare & Education Cybersecurity AssessmentPSM PartnersThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Insider Risk
Insider Risk
17 out of 60
AI Security Readiness: 4 week AssessmentQuisitiveQuisitive's AI Security Readiness Assessment provides organizations with an in-depth understanding of how best to adopt Copilot and Generative AI without putting their organization at risk.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Teamwork Deployment
Teamwork Deployment
18 out of 60
Data Security AssessmentPSM PartnersThis assessment is designed to help companies identify their data security, privacy, and compliance goals while accelerating their compliance journey using the latest Microsoft technologies.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Information Protection & Governance
Information Protection & Governance
19 out of 60
Copilot Planning WorkshopAhead, IncThis Copilot workshop will prepare your organization to utilize Copilot by identifying key scenarios and gaps in current Microsoft 365 configurations to improve ROI of initial Copilot deployments.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
20 out of 60
Microsoft 365 Secure Score AssessmentDaymark SolutionsImprove your environment’s security posture using Microsoft Secure Score.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Threat Protection
Threat Protection
21 out of 60
Deploy Microsoft Intune for Mobile Device ManagementDaymark SolutionsOptimize Mobile Device Management and Security with Microsoft Intune.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Mobile Device Management
Mobile Device Management
22 out of 60
Microsoft 365 Tenant Security AssessmentDaymark SolutionsStrengthen the Security of Your Microsoft 365 Environment.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Threat Protection
Threat Protection
23 out of 60
C1st Implementation of Microsoft Defender for Office 365C1st Technologies LLCEnhance email security for businesses by implementing Defender for Office 365 with Exchange Online Protection (EOP). Our goal is to protect organizational email from spam, phishing, and sophisticated
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
24 out of 60
Modernize Identities with Entra ID PremiumDaymark SolutionsStrengthen User Security with Advanced Identity Management.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
Zones Implementation of Microsoft DefenderZones Inc.Enhance cybersecurity with Zones' Microsoft Defender suite, offering expert implementation, comprehensive coverage, and continuous support.
+1
Applicable to: Cloud Security
Cloud Security
26 out of 60
Security Foundations Email: Assessment and ImplementationProServeITProtect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
27 out of 60
Comprehensive Threat Protection: Free WorkshopLong View SystemsProtect against advanced threats with Long View’s Threat Protection, leveraging Microsoft Defender for full security.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
28 out of 60
Threat Protection EngagementFIS Managed IT SolutionsLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
29 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoiceThe Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
30 out of 60
Modern Endpoint Design and Planning WorkshopKraft KennedyKraft Kennedy will conduct a Modern Endpoint Design and Planning Workshop to review and discuss both your current management and deployment processes as well as plans for the future-state environment.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management
31 out of 60
Threat Protection EngagementTierPointLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
32 out of 60
eDiscovery, Data Lifecycle & Records ManagementITC Secure LtdManage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
+3
Applicable to: Cloud Security
Cloud Security Insider Risk
Insider Risk Threat Protection
Threat Protection
33 out of 60
Secure and Maximize Your Microsoft 365 Tenant with Manage & ProtectAll Covered, a division of Konica MinoltaMicrosoft 365 tenant management to provide you with continuous security & compliance, enhanced administration, and actionable insights.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Threat Protection
Threat Protection
34 out of 60
Zero Trust Security AssessmentCitrin Cooperman Advisors, LLCOur Zero Trust Security Assessment will evaluate identity, email, data, and endpoint device controls, threat protection, management, and licensing to strengthen your organization's security posture.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
35 out of 60
Exchange Online MigrationDataVoxMigrating emails to Office 365 includes assessing the environment, choosing a method (Cutover, Staged, Hybrid, or IMAP), migrating data, updating DNS, configuring devices, and user training.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Mobile Device Management
Mobile Device Management
36 out of 60
Security Best Practices AssessmentTechNet UC LLCOur assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
37 out of 60
CMMC Secure Enclave with User TrainingPlanet TechnologiesA secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov and including User Training.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
38 out of 60
Managed Services ProviderSkyTerra Technologies LLCSkyTerra delivers seamless integration with your existing Microsoft ecosystem, from Azure infrastructure to Microsoft 365 productivity suites.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
39 out of 60
THInc.Ops Managed ServiceTECH HEADS INCPremium managed IT service solution that provides a higher quality of service supporting your staff and stronger protection against cyberattacks.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
40 out of 60
THInc Secure Managed Security Service for MicrosoftTECH HEADS INCComprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
+3
Applicable to: Cloud Security
Cloud Security Insider Risk
Insider Risk Threat Protection
Threat Protection
41 out of 60
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLCSkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
42 out of 60
DSPM for AI - Free 2-Hour AssessmentNetwoven Inc.To help enterprises identify blind spots in Microsoft 365's AI data security, assess DSPM maturity, and establish a governance-first approach to safely accelerate AI innovation with Microsoft Purview.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
43 out of 60
SkyTerra's Cloud Security AssessmentSkyTerra Technologies LLCStrengthen Microsoft cloud security with a structured assessment, an actionable roadmap, and enablement your team can run with
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
44 out of 60
InTune AssessmentSkyTerra Technologies LLCSkyTerra helps you configure and align Intune to meet your real business needs, across platforms, policies, and people.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Mobile Device Management
Mobile Device Management
45 out of 60
Unified Identity & Secure Edge Modernization with Entra SuiteBDOModernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
46 out of 60
Okta to Microsoft Entra ID ConversionSkyTerra Technologies LLCConsolidate identity on Microsoft Entra ID, reduce cost and complexity, and raise your security baseline without disrupting your users.
+2
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
47 out of 60
Redapt Data Security EngagementRedapt, Inc. Safeguard Your Enterprise Data with Confidence
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
48 out of 60
Threat Protection Envisioning Engagement SentinelSentinel Technologies Inc.Organizations today are managing a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Get help achieving your broader security objectives.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
49 out of 60
Modern SecOps Envisioning WorkshopTierPointUnlock unmatched security with TierPoint’s Microsoft cloud-native security solutions with our Modern SecOps Envisioning Workshop
+2
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
50 out of 60
Microsoft Security AssessmentDataVoxThis assessment provides a comprehensive review of the Microsoft 365 environment, focusing on configuration, security posture, identity management, and data governance.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
51 out of 60
Microsoft Security ImplementationDataVoxImplement the best Microsoft security practices throughout the customer environment by implementing Defender for Office 365 to Entra ID P1, Entra ID P2, and Entra ID Suite feature deployments.
+2
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
52 out of 60
Microsoft 365 Modern Endpoint Service Powered by IntuneAll Covered, a division of Konica MinoltaMicrosoft 365 Modern Endpoint is a cloud-native, fully managed service powered by Microsoft Intune. It is designed to simplify endpoint hardening, configuration, and application management.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Mobile Device Management
Mobile Device Management
53 out of 60
Zero Trust Deployment and Optimization ServiceSoftchoiceDeploy zero trust with confidence, optimize it to deliver lasting outcomes.
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
54 out of 60
Security AssessmentSoteria, LLCGain deep insights into your Secure Score, user and device health, application vulnerabilities, and data security with our security assessment.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Insider Risk
Insider Risk
55 out of 60
Copilot and AI Readiness AssessmentCloudServusRun an AI Readiness Assessment to pinpoint gaps using Copilot adoption; align next steps to Copilot & Agents at Work.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Threat Protection
Threat Protection
56 out of 60
Microsoft Purview QuickStart: ImplementationKraft KennedyKraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Threat Protection
Threat Protection
57 out of 60
Mergers & Acquisitions Integration Services in 90: Three (3) Month TransitionLong View SystemsSupport a seamless user experience and align business operations from Day One of any merger, acquisition, or system migration.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management
58 out of 60
Microsoft 365 Copilot Readiness Assessment (Security, Data, Governance)BlueAlly Technology SolutionsAssess your Microsoft 365 environment for secure Copilot adoption. Identify risks from oversharing, legacy auth, and data gaps, and get a roadmap to strengthen security and compliance readiness.
+3
Applicable to: Cloud Security
Cloud Security Compliance Advisory Services
Compliance Advisory Services Information Protection & Governance
Information Protection & Governance
59 out of 60
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
60 out of 60