FiltersClear all
Consulting services results
Showing results in consulting services.
Lenovo Cyber Resiliency as a Service EDALenovo SoftwareEnvironment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Microsoft Security Copilot POV & Adoption PlanBDOProve the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLCLeverage your Microsoft investment to create a strong Zero Trust security environment.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
3 out of 60
Cloud Security Journey: 2 Hour Proof of Concept360 Visibility Inc.See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 WeeksNetrix GlobalUnderstand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
6 out of 60
Microsoft 365 Tenant-to-Tenant MigrationOlive + GooseThis offering provides assessment, migration, and post-migration support for transitioning Microsoft 365 workloads and endpoint management from a source Microsoft 365 tenant to a target tenant.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
7 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvokeThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
8 out of 60
Microsoft 365 E5 Zero Trust Security AssessmentSHI International CorpExplore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 60
Threat Protection Engagement FY25The Partner MastersLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Microsoft Endpoint Manager BaselineSHI International CorpExplore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
11 out of 60
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
12 out of 60
Lightstream Data Security AssessmentLightstreamLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
13 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLCAdvanced endpoint security and threat protection: detect, investigate, and respond to attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo SoftwareCRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Content Security and Data Loss Prevention: 3-Day WorkshopFSI StrategiesFSi Strategies will demonstrate how an organization can protect it's most important asset, at the source. Ensuring that documents are protected no matter where they live.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
16 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View SystemsSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
17 out of 60
Microsoft 365/Azure Cloud Secure 5 Day AssessmentDynTek Inc.DynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
18 out of 60
Endpoint Management with Security WorkshopThe Partner MastersThe Endpoint Management with Security Workshop enables partners to lead customer conversations around modernizing their endpoint management and security capabilities by leveraging Microsoft 365.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
19 out of 60
Data Security and Governance: 2 Hour Free BriefingNetwovenNetwoven Data Security and Governance free strategy workshop will help you get started on the path to discover, protect, and govern your sensitive corporate data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
20 out of 60
Microsoft 365 Backup Readiness AssessmentABTechnologiesEvaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
21 out of 60
C1st End-user Device Security Zero TrustC1st Technologies LLCC1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCSeamlessly transfer email data and mailboxes between Office 365 tenants during mergers or separations. Ensure continuity for users, minimize disruptions, and enables a smooth transition.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
23 out of 60
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLCCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
25 out of 60
Modern Management for EndpointsIvision, Inc.Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
26 out of 60
Manage Compliance Obligations & Risks with Microsoft PurviewBDOEnhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
27 out of 60
Zero Trust Security 10-Hour AssessmentJourneyTEAMJourneyTeam’s Zero Trust Security Assessment is designed to provide a clear, actionable strategy for strengthening your organization’s Microsoft 365 security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
28 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwovenNetwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
29 out of 60
CMMC Secure EnclavePlanet TechnologiesA secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
30 out of 60
Your Smart Workplace AssessmentRackspace TechnologyYour Smart Workplace Assessment helps organizations develop secure, cost-effective, and productivity-enhancing strategies for modern work environments.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
31 out of 60
Copilot Security Assessment: 4-Wk AssessmentManaged SolutionUnlock the full potential of AI with a comprehensive Microsoft Copilot Security Assessment, fully integrated with Microsoft 365
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
32 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Microsoft 365 Value Discovery - Workshop - 1 DayDynTek Inc.OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT
OF MICROSOFT 365 IN YOUR ENVIRONMENT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
34 out of 60
BCN Cloud Readiness Assessment and ReportBCN Group Ltd.This assessment will help you decide whether you are ready to migrate IT systems and services to the cloud.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Meetings for Microsoft Teams
35 out of 60
FastTrack for Microsoft 365Olive + GooseOur offer provides expert guidance as a FastTrack Ready Partner to help businesses deploy, secure, and optimize Microsoft 365 solutions seamlessly—ensuring a smooth transition with no extra cost.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
36 out of 60
Microsoft 365 Implementation for Financial ServiceNew Charter Technologies, Inc.Paid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
37 out of 60
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstreamLightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Managed IT Services for DentalOlive + GooseComprehensive managed IT services for dental offices, ensuring security, compliance, and continuity.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
39 out of 60
Microsoft Security Deployment: 5-day WorkshopCampana & Schott GmbHUnderstand your Microsoft security posture and minimize risks with the right experts
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
40 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
C1st Office 365 Tenant Migration AssessmentC1st Technologies LLCEnsure a smooth Office 365 tenant-to-tenant migration for businesses. We provide comprehensive consulting services to facilitate seamless transitions during mergers, acquisitions, and other scenarios.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
42 out of 60
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLCSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Virtual Desktop - Health and Configuration 1 Week AssessmentCDI LLCCDI provides a review of a customer's Virtual Desktop environment and identify opportunities to improve the performance, stability, security and manageability.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
44 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementationInterlink Cloud Advisors, Inc.Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Microsoft 365 Migration: 10-Wk ImplementationabraSuccessfully migrate your Microsoft 365 environment to a managed services model.
+2
Applicable to:
Cloud Security
Power Platform for Teams
46 out of 60
CMMC Compliance with Microsoft 365: 4 wk impl.InsightInsight’s CMMC services program helps clients understand DoD requirements, develop a strategy to achieve compliance in hybrid and cloud models, and execute to implementation and ongoing operations.
+1
Applicable to:
Cloud Security
47 out of 60
Microsoft 365 HIPAA/HITECH 20 Hour ImplementationNew Charter Technologies, Inc.Implementation of Microsoft 365 to include compliance policies and templates for health care.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
48 out of 60
BCN Intranet LiteBCN Group Ltd.We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
49 out of 60
Enhance IT Security: 1-2-Wk ImplementationFMT ConsultantsFMT offers a smart security solution that protects your business, your employees, and your clients while providing a reliable, scalable, and durable approach to keeping your business up and running.
+2
Applicable to:
Cloud Security
Identity & Access Management
50 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLCGet a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Office 365 Tenant-to-Tenant Cutover Email Migration without downtime and bounced email: 7-Days Professional ServiceIT Partner LLCSeamless Microsoft 365 tenant-to-tenant mailbox migration, essential for mergers, acquisitions, or relocations, ensuring no bounced emails, NDR, or downtime.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
52 out of 60
CMMC Assessment Ready SolutionPlanet TechnologiesBased off the Planet secure collaboration enclave, this provides customers with CMMC Assessment Ready artifacts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
53 out of 60
Endpoint Management WorkshopCitrin Cooperman Advisors, LLCEmpower secure endpoint management with Microsoft Intune through streamlined operations.
+2
Applicable to:
Cloud Security
Threat Protection
54 out of 60
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstreamLightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBAA zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Microsoft 365 Inter-Tenant Migration: 2 days AssessmentPreeminent Solutions, Inc.Preeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
57 out of 60
Neudesic's Knowledge Governance WorkshopNeudesicThe Neudesic Knowledge Governance Workshop is a 4–6-week session that is designed to assist customers in safeguarding their sensitive information.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
58 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLCIf you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
59 out of 60
Zones Implementation of Microsoft DefenderZones Inc.Enhance cybersecurity with Zones' Microsoft Defender suite, offering expert implementation, comprehensive coverage, and continuous support.
+1
Applicable to:
Cloud Security
60 out of 60