FiltersClear all
Consulting services results
Showing  results in consulting services.
Threatscape CSI EngagementsTHREATSCAPE LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
1 out of 23
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro LtdWipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
2 out of 23
Threat Protection - 2 Days WorkshopMayasoft Bilgi Sistemleri A.S.We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
3 out of 23
Microsoft 365 Data oversharing report: 5-D Implementation and consultingReplyComprehensive Insights: Get a holistic overview of your environment and uncover overshared sites, documents, and items without the need for expensive Microsoft 365 E5 licenses.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Teamwork Deployment
Teamwork Deployment
4 out of 23
Defender for Office365Suri Services SCSuri Services y Office 365: La alianza impenetrable en ciberseguridad.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
5 out of 23
Microsoft 365 Copilot AssessmentSuri Services SCAsegura tu ruta de adopción con Suri Services y Microsoft 365 Copilot
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
6 out of 23
Trip to Microsoft 365 Copilot ImplementationSuri Services SCOfrecemos un servicio de capacitación y preparación estratégica para la adopción de Microsoft 365 Copilot, enfocado en acelerar la productividad y transformar los procesos clave
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance
7 out of 23
Ctelecoms Threat Protection EngagementConsolidated Telecoms (Ctelecoms)Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
8 out of 23
Cloud Endpoints AssessmentInviso CorporationMaximize your Endpoints! Find out how a Cloud PC could potentially save you money!
+1
Applicable to: Cloud Security
Cloud Security
9 out of 23
Adoption, Deployment & Success of Microsoft 365 CopilotIT Quest SolutionsEmpower your team with Microsoft 365 Copilot—boost productivity, streamline workflows, and unlock AI-driven insights across Word, Excel, Teams & CopilotAgents
+2
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security
10 out of 23
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso CorporationHelping customers KickStart features in Microsoft 365 E3 Subscription
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Workplace Analytics
Workplace Analytics
11 out of 23
iT1's Security AssessmentIt1 Source LLCImprove your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
+3
Applicable to: Cloud Security
Cloud Security Information Protection & Governance
Information Protection & Governance Threat Protection
Threat Protection
12 out of 23
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to: Cloud Security
Cloud Security Insider Risk
Insider Risk Threat Protection
Threat Protection
13 out of 23
Microsoft 365 Threat Check Assessment: 3-Wk AssessmentInvokeThe Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Threat Protection
Threat Protection
14 out of 23
Zero Trust Baseline Pilot 8-Week ImplementationInvokeThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Identity & Access Management
Identity & Access Management
15 out of 23
Remote Access to On-Prem Apps: 3 Wk ImplementationInvokeSurface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
+2
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management
16 out of 23
Microsoft 365 Security Assessment up to 6 weeksACTSACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
+3
Applicable to: Cloud Security
Cloud Security Identity & Access Management
Identity & Access Management Information Protection & Governance
Information Protection & Governance
17 out of 23
TS As a Services (TSaaS): 5-day ImplementationE-Level Cloud Services S.A. de C.V.Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
+3
Applicable to: Cloud Security
Cloud Security Mobile Device Management
Mobile Device Management Threat Protection
Threat Protection
18 out of 23
Secure Live Workspace - 8 Weeks AssessmentLTIMindtree LimitedOur Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
+3
Applicable to: Cloud Security
Cloud Security Power Platform for Teams
Power Platform for Teams Teams Custom Solutions
Teams Custom Solutions
19 out of 23
Device Mgm and Protection - 12 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Mobile Device Management
Mobile Device Management
20 out of 23
Threat Protection - 7 days ImplementationSPAN d.d.Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
+2
Applicable to: Cloud Security
Cloud Security Threat Protection
Threat Protection
21 out of 23
Change Management 6-Months ImplementationSupremo Sp. z o.o.Bądź pewny, że zaangażowanie użytkowników i przyjęcie nowych rozwiązań przyczyni się do sukcesu wdrożenia, sukcesu całej organizacji.
+3
Applicable to: Adoption & Change Management
Adoption & Change Management Cloud Security
Cloud Security Knowledge & Insights
Knowledge & Insights
22 out of 23
Windows 365 Pilot: 5 Days Proof of ConceptDelphi ConsultingDelphi Consulting will help you get started with Windows 365 Cloud-PC with its Pilot offering with the program running over 5 days.
+3
Applicable to: Cloud Security
Cloud Security Device Deployment & Management
Device Deployment & Management Mobile Device Management
Mobile Device Management
23 out of 23