AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
G Suite to Office 365 migration: 1-Hour Assessment
True.org Cloud
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
Assessment of your current G Suite environment to plan migration to Office 365
1 out of 60
Microsoft 365 Security Audit: 3-Day Assessment
Marathon Managed Services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security Health Check and Report. Analysis of Secure Score and adherence to the NCSC 14 security principles. Presentation of report to customer detailing Microsoft 365 security posture.
2 out of 60
Managed Extended Detection & Response for Workplace - Implementation
DXC
+1
Applicable to:
Threat Protection
Secure your business with Managed XDR for Workplace
3 out of 60
Security Maturity Assessment - 4 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
4 out of 60
Zero Trust Baseline Implementation - 4 weeks
BDO Digital, LLC
+1
Applicable to:
Threat Protection
BDO Digital’s Zero Trust Baseline implementation will help your organization apply the Zero Trust framework necessary for addressing threats that arise in the modern workplace.
5 out of 60
Mobile Threat Defence 3 Week Assessment
BT Enterprise
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
MTD risk assessment using Microsoft 365 and Zimperium zIPS
6 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
7 out of 60
Defender for Office 365 Deployment: 6-Week Implementation
BlueVoyant
+2
Applicable to:
Cloud Security
Threat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
8 out of 60
Migrate to Microsoft Defender for Endpoint: 11-Wk Implementation
Computacenter (UK) Ltd - Hatfield HQ
+1
Applicable to:
Threat Protection
This service covers migration from your existing 3rd party end point protection solution to Microsoft Defender for Endpoint. Our approach ensures you have peace of mind with full visibility of the ste
9 out of 60
UNITE: Secure Core_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
UNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
10 out of 60
BUI Cyber MDR - 1 Day Discovery Workshop
BUI (Pty) Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
11 out of 60
Secure Hybrid Identity - Defender for Identity: 6 week Implementation
Performanta
+2
Applicable to:
Identity & Access Management
Threat Protection
Secure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
12 out of 60
Copilot Data Protection
Cloud Life
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
13 out of 60
Ransomware & Supply Chain Incident Management: 12 Hour Assessment
Maureen Data Systems
+3
Applicable to:
Compliance Advisory Services
Knowledge & Insights
Threat Protection
Identify vulnerabilities within your organization, including those who pose a threat to your supply chain, provide & mature a tailored incident response & management program.
14 out of 60
Microsoft 365 Risk 5-Days Assessment
KPCS CZ, s.r.o.
+3
Applicable to:
Compliance Advisory Services
Mobile Device Management
Threat Protection
Microsoft 365 Risk Assessment provides preventive and comprehensive check of the Customer's Microsoft 365 Environment.
15 out of 60
Modern Desktop Management Managed service
SIX DEGREES TECHNOLOGY GROUP LTD
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Secure end-to-end device management service from a trusted Microsoft Expert MSP.
16 out of 60
Onevinn Secure Microsoft Copilot Journey Workshop
Onevinn AB
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
This workshop will enable you to take full advantage of Microsoft 365 Copilot with focus on Compliance and Information Protection.
17 out of 60
Logicalis Cyber Security Initiative
Logicalis Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Logicalis Cyber Security Initiative (CSI) helps customer adopt and deploy Microsoft security technologies and solutions.
18 out of 60
Managed Security Service: Half Day Workshop
Transparity Solutions Ltd
+2
Applicable to:
Cloud Security
Threat Protection
A workshop to provide you with an understanding of the Transparity Managed Security Service and SOC, along with the benefits of a Microsoft-based approach to your security requirements.
19 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
20 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
21 out of 60
cyber security threat analysis workshop
U-BTech Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
the workshop is design to discover threats and risks
22 out of 60
Microsoft 365 Security Assurance Programme : 12M Implementation
CENTRALITY LTD
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Provision of ongoing Microsoft 365 security consultancy services to drive a continual improvement in your Microsoft Security Score and & posture
23 out of 60
Managed Detection and Response [Security Monitoring]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
24 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
25 out of 60
Office 365 Migration: 5 Days Workshop
Aeris Teknoloji A.S.
+3
Applicable to:
Meeting Rooms for Microsoft Teams
Meetings for Microsoft Teams
Threat Protection
Migration workshop to the Cloud the Collaboration's Benefit for explaining the customers how to migrate their systems from third party products.
26 out of 60
Migrate to Microsoft Defender for Office 365: 11-Wk Implementation
Computacenter (UK) Ltd - Hatfield HQ
+1
Applicable to:
Threat Protection
This service covers the migration from your existing 3rd party email protection solution to Microsoft Defender for Office 365. Our service provides you with an end to end migration path that is flexib
27 out of 60
Conscia Security Assessment: 1-2 Weeks Infra Assessment
Conscia A/S
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
We can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
28 out of 60
Microsoft Security Services:5-Wk Implementation
Energy Time LLC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Deploy&Configure Microsoft Security Services: Azure AD Premium features, Microsoft Defender Family, Endpoint Management, Information Protection
29 out of 60
ionder Cyber Security Navigator - 12-Month-Assessment
Tec Networks GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
30 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
31 out of 60
OAAA Advanced Adversary Assesment-1 month assesment
Secure Nextgen Systems
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Learn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
32 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Conscia A/S
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
33 out of 60
Mobile Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Corporate Mobile Devices (iOS, Android and macOS)
34 out of 60
Windows Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
35 out of 60
Microsoft 365: 1 Day Secure Score and Tenant Review
Cobweb Solutions Ltd.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cobweb’s Secure Score and Tenant Review offers to help you gain visibility of your existing tenant configuration and outstanding security recommendations.
36 out of 60
Defender for IoT Operational Technology Discovery: 2-Hour Workshop
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
ITC Secure's Defender for IoT (OT) Discovery Workshop helps you understand the solution, the fit to your OT estate and potential threat posture improvements
37 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage Workshop
CGI Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
38 out of 60
Overwatch for Microsoft 365 Security: 12 Month Implementation
THREATSCAPE
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Overwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
39 out of 60
365SecurityREADY for Mid-Size Business: 6-8 Weeks Implementation
The Cloud Factory EMEA Ltd.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enabling a Secured & Connected Modern Workplace with Microsoft 365
40 out of 60
Microsoft 365 Security Essentials Implementation Service
Softcat
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Kick-starting your Microsoft 365 security position, aligning with industry best practice standards.
41 out of 60
365SecurityREADY for ISO 27001: 12-16 Weeks Implementation
The Cloud Factory EMEA Ltd.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Get ISO 27001 Ready with Microsoft 365
42 out of 60
365SecurityREADY for Enterprise: 8-12 Weeks Implementation
The Cloud Factory EMEA Ltd.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Elevating Your Cloud Security with Microsoft 365
43 out of 60
True Managed Security Service- 3 day Workshop
true org cloud
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
You have a vision. We can help you secure it...
44 out of 60
Endpoint management with security: 4-day workshop
e-Plenish Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Demonstrating the value of Microsoft Intune, Microsoft Defender for Endpoint and the Azure AD Premium P1 features that come with Microsoft 365 E3 licensing
45 out of 60
Defend Against Threats with SIEM Plus XDR usage Workshop
Orange Cyberdefense UK Limited
+1
Applicable to:
Threat Protection
Our workshop will help you designing and deploying Microsoft security technologies for your unique needs.
46 out of 60
Managed Threat Detection [xdr] for Microsoft 365 Defender
Orange Cyberdefense UK Limited
+1
Applicable to:
Threat Protection
Implementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
47 out of 60
UK Managed Workspace Protection for Microsoft 365 Defender
Orange Cyberdefense UK Limited
+1
Applicable to:
Threat Protection
Implementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
48 out of 60
Red Canary Cloud Security Assessment
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
49 out of 60
Microsoft Defender for Endpoint Implementation
SIX DEGREES TECHNOLOGY GROUP LTD
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
Strengthen cyber security defences through advanced endpoint detection and response.
50 out of 60
Onesec’s Secure Access to Microsoft 365 with Zscaler
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
51 out of 60
Threat Protection - 2 Days Workshop
Mayasoft Bilgi Sistemleri A.S.
+2
Applicable to:
Cloud Security
Threat Protection
We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
52 out of 60
Ctelecoms Threat Protection Engagement
Consolidated Telecoms (Ctelecoms)
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
53 out of 60
Atech Microsoft 365 Security Assessment
Atech Support
+2
Applicable to:
Cloud Security
Threat Protection
With 10 years+ experience Atech have developed an assessment which provides us with a benchmark to design and deliver your secure journey to maximising the potential of Microsoft 365
54 out of 60
Atech Microsoft Data Security Engagement
Atech Support
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Data Security Engagement, delivered by Atech, gives you the insights you need to understand data security, privacy and compliance risks in your organization.
55 out of 60
Atech Microsoft Threat Protection Engagement
Atech Support
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
This engagement will provide the help organisations need to achieve achieve security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR workshop
56 out of 60
Managed Detection and Response [Threat Hunting]
Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Inspect events in your network to locate threat indicators and entities
57 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for Endpoint
Cyderes
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
Cyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
58 out of 60
Microsoft Value Realisation Assessment – Security: 2-Wk Assessment
Telstra Limited
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your IT estate with Microsoft. Identify the gaps and overlaps in your security solutions, strengthen your protection and cut your costs.
59 out of 60
Microsoft Defender for Office 365: 1-hour briefing
Reply
+2
Applicable to:
Cloud Security
Threat Protection
Free one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Office 365
60 out of 60
Previous
1
2
3
4
Next