AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
SCC XDR Pathfinder
SCC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Boost Your Security Posture With SCC's XDR Pathfinder
1 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
2 out of 60
Microsoft Managed Security Service 4-Week Implementation
Atech Support
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enterprise-grade security implementation, configuration and monitoring with proactive threat detection and incident response in a 24/7/365 SOC across applications, endpoints and infrastructure
3 out of 60
Microsoft 365 configuration + Email migration
Senetic S.A.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
We will launch your Microsoft 365 solution package and migrate your company's mailboxes!
4 out of 60
Security Posture Assessment Service
Kocho
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Security Posture Service, assesses an organisation’s cloud environment against recognised security benchmarks and makes recommendations to uplift security posture.
5 out of 60
HPT Secure Identities and Access_03 days workshop
HPT Vietnam Corporation
+2
Applicable to:
Identity & Access Management
Mobile Device Management
With identity attacks on the rise, this workshop will show you how to stop tomorrow’s data breaches by securing identities today.
6 out of 60
Wc-PC- Wragby Cloud PC
Wragby Business Solutions & Technologies Limited
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
7 out of 60
Microsoft 365 Plan for Success:3-d Assessment
Cubesys Pty Ltd
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
8 out of 60
BCN Intranet Lite
BCN Group Ltd.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
9 out of 60
Guest Lifecycle for Azure AD
Swiss IT Security AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Guest Lifecycle for Azure AD (GL4AAD) handles maintenance and hygiene tasks for you.
10 out of 60
Office 365 Managment: 1 Day Assessment
Eze Castle Integration
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
ECI will review your Office 365 Tennant Configuration and suggest on-going managment needs
11 out of 60
Intune for macOS: 2Weeks Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Manage your macOS devices from Microsoft Intune with zero-touch provisioning, OS and app updates, and more.
12 out of 60
Microsoft 365: 1 Day Secure Score and Tenant Review
Cobweb Solutions Ltd.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Cobweb’s Secure Score and Tenant Review offers to help you gain visibility of your existing tenant configuration and outstanding security recommendations.
13 out of 60
Microsoft 365 Security: 6-Day Implementation
Cloud Direct
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
14 out of 60
Windows 365 Cloud PC 10-Days PoC
Sonata Information Technology Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Paid Assessment and PoC to deploy and use Windows 365 Cloud PC
15 out of 60
Windows 365 Proof of Concept
Agilisys Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
The Windows 365 proof of concept will deliver an operational pilot that allows you to validate the cloud PC against your use-case and requirements.
16 out of 60
Secure Microsoft 365 Managed Service
CW Systems Integration Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
17 out of 60
Microsoft 365: 2-Week Assessment
Practical Solutions, Inc
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
18 out of 60
PwC Digital Identity: 4-Wk Assessment
PricewaterhouseCoopers UK
+2
Applicable to:
Cloud Security
Identity & Access Management
PwC provides leading class Identity and Access Management advisory, assurance and delivery services that offer distinctive value and enable clients to optimise their digital services and processes.
19 out of 60
Windows 365 Standardized Pilot
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
20 out of 60
HPT Nextgen Windows Experience_02 days workshop
HPT Vietnam Corporation
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
NextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
21 out of 60
Modern Endpoint Management - 2 Hour Assessment
PowerONPlatforms Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
2 Hour Assessment with a Solutions Consultant to assist in developing the potential roadmap leveraging your existing Microsoft 365 investment with a supporting recommendations and next steps report.
22 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Conscia A/S
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Conscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
23 out of 60
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
24 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
25 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
26 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
27 out of 60
SmartManagement: Microsoft Endpoint Manager 3 Weeks implementation
Cloudshift
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
3 BASE SOLUTIONS FOR END ENDPOINT MANAGER. WE CAN HELP YOU CONFIGURE ENTERPRISE-LEVEL SECURITY AND ENTERPRISE MOBILITY MANAGEMENT TO ENFORCE YOUR COMPLIANCE POLICY EVERYWHERE.
28 out of 60
Security Anywhere:6Hour Workshop
Integrated Solutions Sp. z o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
29 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
30 out of 60
Endpoint Privilege Management with Intune Suite: 6-Wk Implementation
PHOENIX SOFTWARE LTD
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
During this implementation we'll discover your application requirements, define Endpoint Privilege Management rules based on the discovery and roll these out to your end user base.
31 out of 60
SEIDOR Modern Workplace with Microsoft 365 1-Month Implementation
SEIDOR SA
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
We promote and respond to the current needs of companies in terms of mobility, security, productivity, communication and collaboration through the evolution of their workstations
32 out of 60
Mitigate Compliance and Privacy Risks - 3 Day Workshop
Protiviti
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Microsoft-Funded Workshop to help organizations understand and discover insider and privacy risks and how to mitigate
33 out of 60
Modern Mobile Device Management Workshop; 3-Day Workshop
PHOENIX SOFTWARE LTD
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
The workshop will help you understand and align Microsoft Endpoint Manager across your mobile device estate, including iOS and Android.
34 out of 60
Copilot for Microsoft 365 - Readiness Engagement: 2 Week-Implementation
HTG
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
After assessing data availability and quality, we will provide and implement a robust set of recommendations for enhancing your security posture ahead of a Copilot deployment.
35 out of 60
Claranet Endpoint Manager for Retail, Construction & Transport : 2 week Implementation
Claranet Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Unlock the capabilities of Microsoft Endpoint Manager utilizing best practice, with Microsoft accredited engineers
36 out of 60
Zero Trust Security Assessment: 10-Day Assessment
Chorus
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our zero trust security assessment reviews your security posture to give you a clear roadmap to adopt Microsoft 365 security solutions to remove vulnerabilities and improve your posture.
37 out of 60
Microsoft Purview Proof of Concept
Wanstor
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
In today's business environment, managing data effectively is challenging, especially as organizations grow, diversify, and adopt advanced technologies like AI. Data fragmentation.
38 out of 60
Windows 365 Cloud PC: 4-Wk Proof of Concept
Signal Alliance
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Discover how Signal Alliance Consulting helps you get started with Windows 365, the worlds first cloud PC that helps you access your data from anywhere, anytime from any device.
39 out of 60
Microsoft 365 - Threat Protection: 2-week workshop
Fortevento
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
40 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month Workshop
Vitalyst
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
41 out of 60
Microsoft 365 Defender: 2-Wk Assessment
Alithya Fullscope Solutions, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
42 out of 60
Microsoft 365 Security Assessment: 6-day Assessment
Performanta
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Performanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
43 out of 60
Atos || Pilot program for Windows 365
Atos International SAS
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Atos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
44 out of 60
UEM Migration Accelerator: 2-Weeks Implementation
CW Systems Integration Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Intune UEM Migration Accelerator Service - Accelerate your migration to Microsoft Intune UEM platform by up to 80%
45 out of 60
Security Maturity Assessment - 4 Weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Roadmap to increase your security score with cost-effective security tools
46 out of 60
Connect by Centrality : Cloud Native ever green best in class Windows 10/11 & Microsoft 365 end user experience delivered as managed service
CENTRALITY LTD
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Connect by Centrality: Cloud Native Windows & Microsoft 365 end user experience that is simple, seamless and secure (Cyber Essential + Ready) which is always up to date delivered as a managed service
47 out of 60
UNITE: Exploring E5 Security Workshop_
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
UNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
48 out of 60
Security Assessment Microsoft 365: 2day assessment
Prodware Group
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
A service for Office 365 and Microsoft 365 protection
49 out of 60
Information Governance Pre-study
Advania Finland Oy
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
This prestudy gets you started to create a framework for information governance and compliance, help your organization to direct and control activities and meet external standards and obligations.
50 out of 60
Zero Trust - Securing Identities: 3-Day Workshop
MSCloudExpert Kft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
51 out of 60
Bitscape Microsoft 365 Security Assessment: 3-Wk Assessment
Bitscape
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
52 out of 60
Information Protection with Microsoft Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Boost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
53 out of 60
Assessment-Implementation Plan for Information Protection: 3-Months Assesment
Cipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
54 out of 60
Adoption d'Intune Autopilot : 5 jours
Econocom Products & Solutions Belux
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Scénarios d'adoption zerotouch avec Intune Autopilot dans Microsoft 365
55 out of 60
Office 365 GCC High Migration +Tenant Imp 4Wk
Summit 7 Systems, Inc
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
Companies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
56 out of 60
Microsoft 365 Security Essentials Implementation Service
Softcat
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Kick-starting your Microsoft 365 security position, aligning with industry best practice standards.
57 out of 60
Modern Desktop PoC (Proof of Concept) - 15 days
848 Group
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
A tailored 15 day modern desktop PoC through developing an understanding of your business requirements, develop a strategy for secure working utilising Windows 10 and Microsoft 365 technologies.
58 out of 60
Managed Collaboration Suite: 4 Week Implementation
Logicalis UK
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Meeting Rooms for Microsoft Teams
The Logicalis Collaboration Suite enables employees to collaborate effectively and provides management with clear benchmarking and analytics to track adoption and measure success.
59 out of 60
Endpoint Ecosystem Technical Support: 12-month Support Implementation
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Provide support and advice to IT administrators on Microsoft Endpoint Manager
60 out of 60
Previous
1
2
3
4
5
Next