AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
Microsoft Intune: 4-Wk Implementation Services
TechNet UC LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Microsoft Intune Design and Deployment Services
1 out of 60
Intune Managed Service
Mobile Mentor
+2
Applicable to:
Cloud Security
Identity & Access Management
Your endpoint ecosystem is constantly evolving and needs proactive management, so we designed the Intune Managed Service to help customers unlock the full potential of Intune.
2 out of 60
Windows 11 Pilot: 3 Weeks POC
Steeves
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
3 out of 60
Atos || Microsoft Windows 365 Pilot
Atos International SAS
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Atos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
4 out of 60
Accenture Modern Workplace Services
Accenture
+3
Applicable to:
Frontline Workers
Identity & Access Management
Meetings for Microsoft Teams
Accenture Modern Workplace Services
5 out of 60
Defend Against Threats with SIEM Plus XDR: 2-W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR (with Attack Simulation) workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
6 out of 60
Copilot Readiness Assessment for Microsoft 365
Mint Management Technologies
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
Mint Group is thrilled to bring you a consulting service designed to supercharge your Microsoft 365 experience and get you Microsoft 365 Copilot ready.
7 out of 60
Crayon Cloud Security Assessment: 3-Wk Assessment
Crayon
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Evaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
8 out of 60
MDM Health Check (Mobile OS Only): 2-week Assessment
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
9 out of 60
Zero Touch Provisioning: 3-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Zero-Touch Provisioning sets you up to ship devices straight to users, with auto-configuration occurring over the air on initial sign in.
10 out of 60
Co-pilot Technical Readiness
PHOENIX SOFTWARE LTD
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
Help your organisation ensure that they are technically ready for Co-pilot
11 out of 60
Red Canary MSSP FastTrack for Security
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Leverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
12 out of 60
Windows 11 Assessment: 1-WK
Steeves
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Prepare for Windows 11 Enterprise with a WIN11 Assessment & make the most of your M365 investment.
13 out of 60
Endpoint Management and Windows Deployment Services: 4-Wk Implementation
Data Market Bilgi Hizmetleri A.S
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Endpoint Management and Windows Deployment Services Consultancy is a professional consultancy service for modernization of device and application management infrastructure .
14 out of 60
Secure Identities and Access: 3 W - Workshop
Exelegent
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Help customers find and mitigate identity risks and safeguard their organization with a seamless identity solution.
15 out of 60
Endpoint Modernization Quickstart Service
Dell Technologies Services
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Dell Quick Start service helps customers configure their environment and prepare it for Modern Device Management and Modern Provisioning.
16 out of 60
Modern Workplace - Cloud Endpoint Management
Arxus
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Our Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
17 out of 60
Intune for macOS: 2Weeks Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Manage your macOS devices from Microsoft Intune with zero-touch provisioning, OS and app updates, and more.
18 out of 60
Cybersecurity: 3-Wks Quick-Assessment
Unipartner IT Services, S.A.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
19 out of 60
Non-Profit Security Essentials : 1 Day Workshop
true org cloud
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
True.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
20 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk Assessment
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
21 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 Wks
Wipro Ltd
+2
Applicable to:
Identity & Access Management
Threat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
22 out of 60
Microsoft Intune Deployment
Secure Future Bilgi Tek. ve Hiz. Tic A.S.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
23 out of 60
Journey to Microsoft 365 Copilot: 4-hours Workshop
PROJECT INFORMATICA SRL
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Microsoft 365 Copilot workshop bring to you the opportunity to create awareness about holistic to Microsoft 365 Copilot
24 out of 60
Infosys Modern Identity and Access Solution with MS Entra
Infosys Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Microsoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
25 out of 60
Modern Management: 4 week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
Modern Management is a Microsoft 365 focused managed service that reduces cost, improves security and delights employees!
26 out of 60
Intune for Windows: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
27 out of 60
Microsoft Defender for Endpoint SMC Deployment: 4-Week Implementation
BlueVoyant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our services are designed to maximize your investment with Microsoft with hands-on onboarding & baseline configuration services.
28 out of 60
BYOD 365: 6-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
The BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
29 out of 60
Windows 365 Standardized Pilot
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
30 out of 60
Modern Workplace Security 10-Wk Implementation
Wipro Ltd
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
31 out of 60
Intune for iOS, iPadOS 2-Weeks Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Manage corporate and personal iOS and iPadOS devices with Microsoft Intune. Get zero-touch, OS and app updates, and more.
32 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
33 out of 60
Change Management: 1-week Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Change Management is a proven methodology to deploy technology changes to large groups of diverse Microsoft 365 users.
34 out of 60
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
35 out of 60
Collaborative Apps: 3 - W Workshop
Exelegent
+3
Applicable to:
Identity & Access Management
Power Platform for Teams
Teamwork Deployment
Build Solutions for your Customers to drive organizations goals and create collaborative experiences.
36 out of 60
Red Canary Defend Against Threats Siem Plus XDR Workshop
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
37 out of 60
Microsoft 365 Copilot Readiness: 2 week Assessment
TOKIOTA
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
We help our clients to integrate Microsoft 365 Copilot in their organization in the most secure and efficent way
38 out of 60
Active Directory Security on Demand
Comtrade System Integration
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
39 out of 60
Data Protection and Governance with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
40 out of 60
Endpoint Management Solutions: 4-Wk Implementation
Signal Alliance
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Discover how Signal Alliance Consulting enables users in your organization to be productive, on any device, without compromising IT security by leveraging Microsoft Endpoint Management.
41 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
42 out of 60
Secure Remote Work: 3 Days Intro and Plan Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Engagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
43 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
44 out of 60
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
45 out of 60
Email Security Threat Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
46 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
47 out of 60
Intune for Android: 2-wk Imp
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Android devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
48 out of 60
HPT Nextgen Windows Experience_02 days workshop
HPT Vietnam Corporation
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
NextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
49 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
50 out of 60
IBM Digital Workforce Offering
IBM Consulting - EA
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Power Platform for Teams
IBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
51 out of 60
Microsoft Endpoint Management: 3- W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
52 out of 60
Advania: Intune Get Started: 2 d training and PoC
Advania AB
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Understand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
53 out of 60
Endpoint Ecosystem Technical Support: 12-month Support Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Provide support and advice to IT administrators on Microsoft Endpoint Manager
54 out of 60
Phishing, Malware & Spam protection- 2 weeks Implementation
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
55 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
56 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入を ご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
57 out of 60
Conditional Access Penetration Test: 4 Days Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
58 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
59 out of 60
Microsoft 365 Email Threat Protection Assessment
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Microsoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
60 out of 60
1
2
Next