AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
Microsoft Sentinel - Log Management and threat detection
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
1 out of 60
Microsoft Cloud Apps Security for Microsoft 365 Apps
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
2 out of 60
Shadow IT discovery with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
3 out of 60
Threat Detection with Microsoft cloud app security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Integrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
4 out of 60
Microsoft 365 Defender for Endpoint Vulnerability Assessment
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Enhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
5 out of 60
Insider Risk Management: 8-Wk implementation
PwC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
6 out of 60
G Suite to Office 365 migration: 1-Hour Assessment
True.org Cloud
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
Assessment of your current G Suite environment to plan migration to Office 365
7 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
8 out of 60
4-Day Security Assesment
HSO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
9 out of 60
Microsoft 365 Security: 2-Day Implementation
Cloud Direct
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
10 out of 60
Microsoft 365 Security: 9-Day Implementation
Cloud Direct
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An engagement that will setup Microsoft 365 with enterprise-level security & compliance policies to provide immediate levels of protection
11 out of 60
Microsoft 365 Security: 6-Day Implementation
Cloud Direct
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
12 out of 60
Cybersecurity Advisory Microsoft 365 1-wk Workshop
NTT Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
13 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
14 out of 60
Microsoft 365 Security assessment - 3 day
848 Group
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft 365 Security assessment to benchmark Office 365 implementation against CIS and Microsoft Security best practice, and deliver a road map for resolving security risks
15 out of 60
Modern Workplace Security 10-Wk Implementation
Wipro Ltd
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
16 out of 60
Microsoft 365 Incident Response - 5 Week Assessment
Protiviti
+2
Applicable to:
Cloud Security
Threat Protection
Assessing the advanced security capabilities of Microsoft 365
17 out of 60
4 Weeks Microsoft 365 Security Assessment
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
The Microsoft 365 Assessment engagement will help customers evaluate their current security and compliance posture and create a roadmap to meet the organizational needs.
18 out of 60
CASB (MCAS) Advisory: 2-week Workshop Series
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
19 out of 60
Security Configuration Maintenance 2-Wks Imp
Insight Technology Solutions
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
A monthly Security Configuration Maintenance Service. This service will help to secure end-user devices more effectively based on Insight and Microsoft Security best practices.
20 out of 60
Enablement Support Implementation (Unit Based)
PowerONPlatforms Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
PowerON Enablement Support provides a unit/hour based support agreement for customers seeking increased ROI and expert support on their Microsoft 365 workloads (Unit/Hour Based, Annual Agreement)
21 out of 60
Endpoint Management - 3-Day enablement Workshop
BT Business
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
This workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
22 out of 60
Zero Trust Security Assessment: 10-Day Assessment
Chorus
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our zero trust security assessment reviews your security posture to give you a clear roadmap to adopt Microsoft 365 security solutions to remove vulnerabilities and improve your posture.
23 out of 60
Security Threat Check: 5-Day Assessment & Workshop
Chorus
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our security assessment identifies active and potential security threats and gives you a clear breakdown of which Microsoft 365 security products can be used to remediate active threats.
24 out of 60
Mobile Threat Defence 3 Week Assessment
BT Enterprise
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
MTD risk assessment using Microsoft 365 and Zimperium zIPS
25 out of 60
Enterprise Mobility + Security - 2 week PoC
PowerONPlatforms Limited
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Proof of Concept designed to provide customers the most flexible way to explore, review and adopt Microsoft Security solutions across the Microsoft Enterprise Mobility + Security suites over 2 weeks
26 out of 60
Intelligent Shield: 1d Assessment
Corporate Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
27 out of 60
Secure & Compliant Modern Workplace: 2 weeks Imp
Insight Technology Solutions
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Threat Protection
Based on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
28 out of 60
Microsoft Cloud App Security (MCAS) Workshop
Advania
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
This MCAS workshop guides an organisation through the high level design considerations applicate to Cloud Discovery, Connect App and session proxy policy capabilities and related integrations.
29 out of 60
Zero-Trust: 3-Day Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
30 out of 60
Microsoft Defender for Server:5-day Implementation
Delphi Consulting
+2
Applicable to:
Cloud Security
Threat Protection
Delphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
31 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
32 out of 60
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
33 out of 60
Managed Security Service: Half Day Workshop
Transparity Solutions Ltd
+2
Applicable to:
Cloud Security
Threat Protection
A workshop to provide you with an understanding of the Transparity Managed Security Service and SOC, along with the benefits of a Microsoft-based approach to your security requirements.
34 out of 60
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
35 out of 60
HCLTech Fusion Endpoint Detection and Response (FEDR) - 10 Days Implementation
HCL Technologies Limited.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
HCLTech FEDR (Fusion Endpoint Detection and Response) services powered by Microsoft Defender for Endpoint
36 out of 60
BUI Cyber MDR - 1 Day Discovery Workshop
BUI (Pty) Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
37 out of 60
Endpoint Management Workshop
York Telecom Corp
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
38 out of 60
Microsoft 365 Security Audit: 3-Day Assessment
Marathon Managed Services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security Health Check and Report. Analysis of Secure Score and adherence to the NCSC 14 security principles. Presentation of report to customer detailing Microsoft 365 security posture.
39 out of 60
Intelligent Endpoint Protection: 2-week Workshop
NTT DATA Inc.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
40 out of 60
Data Classification and Protection 3Weeks Workshop
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
41 out of 60
Security Assessment for Microsoft 365: 5 Days
Chess Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Protect your data with Security Assessment of your Microsoft 365 subscription
42 out of 60
Managed Security Support: 5-days Implementation
Chess Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Managed security support using the latest technology from Microsoft and Chess Data Protect for Microsoft 365.
43 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
44 out of 60
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
45 out of 60
Incident Response: 24 Hour Implementation
Bytes Software Services
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Providing help with security incidents when you need it most.
46 out of 60
Security and Compliance Assessment
Agilisys Ltd
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Our Security & Compliance assessment helps you understand the threats you might be facing, reduce the risk of your business being interrupted, and as a result allow you to gain speed and efficiency.
47 out of 60
Security Maturity Assessment - 4 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
48 out of 60
Secure Microsoft 365 Managed Service
CW Systems Integration Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
49 out of 60
Compliance Assessment - 6 weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Identify your compliance maturity and areas that need improvement
50 out of 60
Managed Defender for Endpoint : 4-wk PoC
Bytes Software Services
+2
Applicable to:
Cloud Security
Threat Protection
Bytes Managed Defender for Endpoints provides proactive management with 24/7 detection and response to ensure appropriate response capabilities.
51 out of 60
Discover Sensitive Data: 5-Week Workshop
Rackspace
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
52 out of 60
Threat Protection - 7 days Implementation
SPAN d.d.
+2
Applicable to:
Cloud Security
Threat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
53 out of 60
BYOD Endpoint Mgt: 1-Wk Accelerated Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Bring Your Own Device (BYOD) capability
54 out of 60
Cybersecurity Awareness: 12 month implementation
Prodware Group
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
Cybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
55 out of 60
Mobile Endpoint Mgt: 1-Wk Accelerated Implement'n
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Corporate Mobile Devices (iOS, Android and macOS)
56 out of 60
Windows Endpoint Mgt: 1-Wk Accelerated Implement'n
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
57 out of 60
Microsoft 365 Modern Workplace: 4Wk Implementation
Stripe OLT Consulting Ltd
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Microsoft 365 has been designed to help your organisation excel in a remote working world - Our team of gold certified Microsoft experts are here to support it's implementation.
58 out of 60
Modern Device Management Managed service
SIX DEGREES TECHNOLOGY GROUP LTD
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
Secure end-to-end device management service from a trusted Microsoft Expert MSP.
59 out of 60
Secure Modern Workplace Platform Implementation
Cognizant
+3
Applicable to:
Adoption & Change Management
Teamwork Deployment
Threat Protection
Enables teams to securely collaborate, connect and be more productive than ever before, no matter when or where they work.
60 out of 60
Previous
1
2
3
4
5
Next