AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
Integrating Microsoft Sentinel with External EDR Service
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
1 out of 60
Device Monitoring with Microsoft Defender for Endpoint
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
2 out of 60
Device Domain Migration from On-Premises to Cloud
AVA SOFTWARE INC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Seamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
3 out of 60
Implementing Defender for Endpoint & Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
4 out of 60
Microsoft Cloud application security Assessment - 2 weeks
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
5 out of 60
Manage Corporate Data on Devices with Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Can you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
6 out of 60
Information Protection with Microsoft Cloud App Security
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Boost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
7 out of 60
Microsoft Managed Security Service 4-Week Implementation
Atech Support
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enterprise-grade security implementation, configuration and monitoring with proactive threat detection and incident response in a 24/7/365 SOC across applications, endpoints and infrastructure
8 out of 60
Microsoft 365 Security: 2-Day Implementation
Cloud Direct
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
A quick engagement to setup Microsoft 365 with the security & compliance policies that will provide immediate levels of protection
9 out of 60
Microsoft 365 Security: 9-Day Implementation
Cloud Direct
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An engagement that will setup Microsoft 365 with enterprise-level security & compliance policies to provide immediate levels of protection
10 out of 60
Microsoft 365 Managed Service: 1-Hour Assessment
Cloud Direct
+3
Applicable to:
Identity & Access Management
Knowledge & Insights
Meetings for Microsoft Teams
A consultancy service for Microsoft 365 adopters to demonstrate the benefits a managed service can have on accelerating optimal performance
11 out of 60
Enablement Support Implementation (Unit Based)
PowerONPlatforms Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
PowerON Enablement Support provides a unit/hour based support agreement for customers seeking increased ROI and expert support on their Microsoft 365 workloads (Unit/Hour Based, Annual Agreement)
12 out of 60
Security Threat Check: 5-Day Assessment & Workshop
Chorus
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our security assessment identifies active and potential security threats and gives you a clear breakdown of which Microsoft 365 security products can be used to remediate active threats.
13 out of 60
Enterprise Mobility + Security - 2 week PoC
PowerONPlatforms Limited
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Proof of Concept designed to provide customers the most flexible way to explore, review and adopt Microsoft Security solutions across the Microsoft Enterprise Mobility + Security suites over 2 weeks
14 out of 60
Modern Work Compliance Assessment: 3-Hour Brief
RISUAL LTD
+3
Applicable to:
Compliance Advisory Services
Device Deployment & Management
Identity & Access Management
Engagement helps organisations understand with data structure, governance, protection and compliance posture.
15 out of 60
Modern Work Security Strategy & Assessment Brief
RISUAL LTD
+2
Applicable to:
Cloud Security
Identity & Access Management
Call with risual's Architecture team to discuss how assessment offering can support your organisation to define security strategy for modern work (Office 365) services : 3-Hour Briefing Call
16 out of 60
Microsoft 365 Security Compliance 6-Day Assessment
Chorus
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Establish a clear roadmap to ensure that your organisation takes full advantage of the advanced security and compliance features in Microsoft 365 to build a Zero Trust framework.
17 out of 60
Microsoft 365 Security: 5-Day Assessment
Synergi Software Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Targeted for Small and Mid Sized Business the offer provides a strategic review and output assessment detailing clear guidance on security improvements across your Microsoft 365 and Azure Estate
18 out of 60
Microsoft 365 Security: 3-Day Workshop
delaware
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
19 out of 60
Microsoft 365 Security: 2-Week Implementation
Telelink Business Services EAD
+2
Applicable to:
Identity & Access Management
Threat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
20 out of 60
Cloud Identity Foundation Workshop (5-day)
DexMach
+2
Applicable to:
Identity & Access Management
Threat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
21 out of 60
BUI Cyber MDR - 1 Day Discovery Workshop
BUI (Pty) Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
22 out of 60
Microsoft 365 Security Audit: 3-Day Assessment
Marathon Managed Services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 Security Health Check and Report. Analysis of Secure Score and adherence to the NCSC 14 security principles. Presentation of report to customer detailing Microsoft 365 security posture.
23 out of 60
Portfolio Rationalisation: 10-Wk Implementation
PricewaterhouseCoopers UK
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Manage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
24 out of 60
Security Assessment for Microsoft 365: 5 Days
Chess Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Protect your data with Security Assessment of your Microsoft 365 subscription
25 out of 60
Microsoft 365 Device & Identity Mgt: 12 Day Imp
Telefonica UK Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Microsoft 365 Device & Identity Management for your endpoint devices uses the best modern management techniques to keep your identity and information safe and your security up to date.
26 out of 60
Cyber Essentials: 1 Day Assessment
ADM Computer Services Ltd
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Cyber Essentials is a government-backed scheme to help organisations protect themselves against common online threats. ADM are well positioned to help businesses becomes CE and CE+ accredited.
27 out of 60
EPAM Microsoft 365 Security: 4-Week Assessment
EPAM Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
• EPAM's Microsoft 365 Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Microsoft 365
28 out of 60
Seguridad Corporativa: Evaluación 4 semanas
Consultora CognosIT Limitada
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
29 out of 60
Azure AD: Cloud Authentication 1-Day Assessment
Transparity Solutions Ltd
+2
Applicable to:
Cloud Security
Identity & Access Management
An assessment to provide you with an overview of Cloud Identity and the capabilities within Azure AD to help you better serve and engage with your employees, including transition away from AD and ADFS
30 out of 60
FastTrack for Microsoft 365: 1-day Assessment
SCC
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
FastTrack helps you migrate data, enable effective teamwork, protect the organisation from cyber security threats and help keep your devices and apps up to date.
31 out of 60
Zero Trust Adoption: 6-Day Assessment
PowerONPlatforms Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
The Solution Alignment is designed to support your understanding and plan your Secure Organisations future with Microsoft services. Looking across Data, Apps, Infra, Network, Identities and Endpoints.
32 out of 60
IAM Health Check: 5-10 Day Assessment
Marathon Managed Services
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
A stepping-stone towards a blueprint for change in your organisation, this assessment and report ensures that you benefit from a health check and assessment of your existing IAM infrastructure
33 out of 60
Microsoft 365 Adoption : 3-6 Day Adoption Workshop
Marathon Managed Services
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Gain knowledge around current Microsoft 365 feature sets and capabilities, and understanding of how the benefits of modern working can benefit your business. Assess readiness and plan adoption roadmap
34 out of 60
PowerON Windows As A Service - 2 Hour Assessment
PowerONPlatforms Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
This complementary Assessment will help you map out your Windows/Windows As A Service management strategy and maximise ROI from your Microsoft 365 investment across Windows 10 & 11.
35 out of 60
Secure Remote Work: 3 Days Intro and Plan Workshop
LiveRoute FZ-LLC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Engagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
36 out of 60
Cloud Security Assesment - 4 Wks Assessment
YouCC Technologies LTD.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
YouCC Technology a leader in the Israeli Cloud Security consulting provider will assess your current cloud security situation and recommend key Microsoft 365 suite deployment.
37 out of 60
Modern Workplace Assessment
HTG
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
This assessment supports businesses in their cloud journey to quickly develop or migrate into a modern cloud-based organisation by implementing a Software as a Service Strategy with Microsoft 365.
38 out of 60
Zero Trust Identity: 5 day Implementation
Corporate Project Solutions
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
CPS' Security, Compliance, & Identity (SCI) team will work with you to identify how Microsoft 365 Zero Trust identity management can be implemented within your Security strategy.
39 out of 60
Endpoint Management: 5 Day Implementation
Corporate Project Solutions
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Our Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Device Management sits within your Security & Compliance strategy.
40 out of 60
Compliance and Identity: 5 day Implementation
Corporate Project Solutions
+2
Applicable to:
Identity & Access Management
Threat Protection
Our Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where SCI sits within your Cyber Security strategy.
41 out of 60
Microsoft 365 Risk Management 5 day Implementation
Corporate Project Solutions
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Our Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Risk Management sits within your Compliance strategy.
42 out of 60
Next Gen Endpoints 3-Day Workshop
FUJITSU
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Provide your employees with access to a secure desktop experience from virtually anywhere.
43 out of 60
Identity & Access Management : 6 Wk Implementation
Happiest Minds Technologies Limited
+1
Applicable to:
Identity & Access Management
End to end Microsoft IAM Analysis & License Utilization, Plan- Deploy- Implement & Roll Out Microsoft IAM Suite, followed by ongoing managed services.
44 out of 60
Windows 365: 2-Wk Assessment
Agilisys Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Our Windows 365 assessment engagement is designed to give you everything you need to assess readiness, suitability and benefits of deploying Windows 365.
45 out of 60
Microsoft Teams Workshop; 3-Day Workshop
PHOENIX SOFTWARE LTD
+3
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Teamwork Deployment
Our workshop provides guidance into the adoption, utilisation and governance of Microsoft Teams.
46 out of 60
Security Accelerator: 5-Day Workshop
Ricoh UK Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Provides insight and rates risk to existing security posture & delivers a roadmap to improvement
47 out of 60
Securing Identities: 3 Days Workshop
INOVASYS FOR SYSTEMS
+1
Applicable to:
Identity & Access Management
Microsoft funded Securing Identities is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
48 out of 60
Claranet Endpoint Manager - 2 week Implementation
Claranet Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Unlock the capabilities of Microsoft Endpoint Manager utilizing best practice, with Microsoft accredited engineers
49 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
50 out of 60
Claranet Endpoint Manager for Manufacturing : 2 week Implementation
Claranet Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Unlock the capabilities of Microsoft Endpoint Manager utilizing best practice, with Microsoft accredited engineers
51 out of 60
Claranet Endpoint Manager for Enterprise and SMC : 2 week Implementation
Claranet Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Unlock the capabilities of Microsoft Endpoint Manager utilizing best practice, with Microsoft accredited engineers
52 out of 60
Claranet Endpoint Manager for Energy : 2 week Implementation
Claranet Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Unlock the capabilities of Microsoft Endpoint Manager utilizing best practice, with Microsoft accredited engineers
53 out of 60
Claranet Endpoint Manager for Retail, Construction & Transport : 2 week Implementation
Claranet Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Unlock the capabilities of Microsoft Endpoint Manager utilizing best practice, with Microsoft accredited engineers
54 out of 60
Intune for Android: 2-wk Imp
Mobile Mentor
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Android devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
55 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessment
utilitas GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
56 out of 60
Next-Gen Endpoints Workshop
Trustmarque Solutions Limited
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
The Next-Gen Endpoints three day workshop is specifically designed to help your organisation understand how Windows 365, Azure Virtual Desktop and Windows 11 can support your workforce
57 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and Implementation
Nil d.o.o.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
58 out of 60
Adoption and Consumption Services- 4 Weeks Implementation Drive Consumption
NewWave Computing Private Limited
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Teamwork Deployment
Assist Customers to achieve continuous business value through the use of your Microsoft Modern Workplace Cloud Solutions
59 out of 60
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POC
Bitscape
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
60 out of 60
Previous
2
3
4
5
6
Next