AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
Copilot for Security Readiness Assessment
Performanta
+2
Applicable to:
Cloud Security
Threat Protection
Futureproof your Business Security with Microsoft Security Copilot and Performanta
1 out of 60
Microsoft 365 Copilot - Adoption & Change Mgmt.
Crayon
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Unlock the full potential of Microsoft 365 Copilot with our specialized Change Management service.
2 out of 60
Microsoft 365 Copilot Readiness Workshop
Crayon
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Jumpstart your journey with the Crayon Microsoft 365 Copilot Readiness Workshop – your cornerstone for secure and efficient AI adoption within your organization.
3 out of 60
DORA act assessment and implementation
Sii Sp. z o.o.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
4 out of 60
KMicro's Sentinel360 MXDR with Microsoft Copilot for Security: 4-Wk POC/POV
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Enhance threat hunting & accelerated MXDR for Microsoft Sentinel with Copilot for Security integration
5 out of 60
Microsoft 365 Copilot - Technical Readiness
Crayon
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Jumpstart your journey with the Crayon Microsoft 365 Copilot Technical Readiness - your cornerstone for secure and efficient AI adoption within your organization.
6 out of 60
MDS - Microsoft Copilot for Security Workshop
Maureen Data Systems
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Discover how Microsoft Copilot for Security can enhance your security operations, streamline incident response, and empower your security teams
7 out of 60
Microsoft 365 Copilot - Advisory
Crayon
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Jumpstart your journey with the Crayon Microsoft 365 Copilot Readiness Workshop – your cornerstone for secure and efficient AI adoption within your organization.
8 out of 60
Microsoft 365 Copilot - Extensibility Solutions
Crayon
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Enhance your Microsoft 365 Copilot experience and boost your productivity through customizations tailored to your organization's specific needs.
9 out of 60
Bulletproof 365 Enterprise: MXDR Service
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
10 out of 60
Intune Managed Service
Mobile Mentor
+2
Applicable to:
Cloud Security
Identity & Access Management
Your endpoint ecosystem is constantly evolving and needs proactive management, so we designed the Intune Managed Service to help customers unlock the full potential of Intune.
11 out of 60
Copilot For Microsoft 365 Security Accelerator Briefing
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
12 out of 60
Performanta MXDR Services
Performanta
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Performanta’s Consultancy and MXDR service is built on Microsoft’s Endpoint Detection and Response technology, and combines the critical elements required to provide enterprise-class cyber security.
13 out of 60
Microsoft 365 Rapid Security Assessment: 1-Wk Assessment
Awara IT Kazakhstan LLP
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft 365 Rapid Security Assessment is a quick yet comprehensive evaluation to enhance Microsoft 365 security against evolving cyber threats
14 out of 60
Digital Workplace Essentials - Managed Service
SoftwareOne
+3
Applicable to:
Cloud Security
Information Protection & Governance
Workplace Analytics
Our kitbag of essential tools to get the best from your Microsoft 365 services investment
15 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
16 out of 60
Microsoft Defender for Business Managed Service: Monthly MDR
e2e-assure Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Maximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
17 out of 60
Cybersecurity Assessment - 3 Weeks
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Microsoft Security Assessment: detect security problems and take targeted action
18 out of 60
Microsoft Advisory Services Managed
SoftwareOne
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Drive Value and Cost Savings Throughout the Microsoft Cloud Investment Lifecycle
19 out of 60
Mentoring Service
Mobile Mentor
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Our mentoring service helps customers leverage Microsoft 365 to improve endpoint security & user experience. We help accelerate the learning curve & reduce risk by deploying Microsoft 365 optimally.
20 out of 60
Prepárate para Microsoft Copilot con ENCAMINA: Assesment 3 semanas
ENCAMINA S.L.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Obtén un assessment integral: análisis de información, optimización de arquitectura y seguridad, más plan de comunicación y Road Map personalizado
21 out of 60
Windows 11 Pilot: 3 Weeks POC
Steeves
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
22 out of 60
4 Weeks Microsoft 365 Security Assessment
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
The Microsoft 365 Assessment engagement will help customers evaluate their current security and compliance posture and create a roadmap to meet the organizational needs.
23 out of 60
Defender for Endpoint Managed Service
e2e-assure Ltd
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
24 out of 60
Crayon Cloud Security Assessment: 3-Wk Assessment
Crayon
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Evaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
25 out of 60
MDM Health Check (All OS): 2-week Assessment
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
26 out of 60
Avanade Modern Sec Ops FY24
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
27 out of 60
Data Protection Impact Assessment: 8 Wk
Lighthouse Global
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Empowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
28 out of 60
Egyptian Data Protection Law: 2 Days Workshop
GLOBAL BRANDS
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
29 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und Ausarbeitung
AppSphere AG
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Vom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
30 out of 60
Managed service : EDR with Defender for Endpoint
Cegeka NV
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Our EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
31 out of 60
Advisory Service for Microsoft Cloud
Dell Technologies Services
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Leverage our expertise to uncover the insights to right-size your environment, minimize risk and optimize Microsoft 365 and Azure costs
32 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
33 out of 60
Defend Against Threats with SIEM Plus XDR: 2-W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Defend Against Threats with SIEM Plus XDR (with Attack Simulation) workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
34 out of 60
Red Canary MSSP FastTrack for Security
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Leverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
35 out of 60
Microsoft 365 Security Posture 10-days Assessment
FUJITSU
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Secure Microsoft 365 and maximise your investment
36 out of 60
CASB (MCAS) Advisory: 2-week Workshop Series
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
37 out of 60
Data Classification and Protection 3Weeks Workshop
NTT DATA Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
38 out of 60
SVA Microsoft Copilot for Security Readiness Workshop 1d
SVA System Vertrieb Alexander GmbH
+3
Applicable to:
Cloud Security
Knowledge & Insights
Threat Protection
In zwei Sitzungen zu jeweils vier Stunden geben wir Ihnen eine umfassende Einführung in Copilot for Security.
39 out of 60
Conditional Access Penetration Test: 4 Days Assessment
Toreon CVBA
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
40 out of 60
Insider Risk Management: 8-Wk implementation
PwC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
41 out of 60
Microsoft Sentinel Security Consulting Service
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Microsoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
42 out of 60
Microsoft 365 Copilot: 1-Day Assessment
Data Market Bilgi Hizmetleri A.S
+3
Applicable to:
Adoption & Change Management
Cloud Security
Power Platform for Teams
How Microsoft 365 Copilot can transform your business and the overall concepts you must understand to better daily business life.
43 out of 60
Microsoft Defender for Endpoint SMC Deployment: 4-Week Implementation
BlueVoyant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our services are designed to maximize your investment with Microsoft with hands-on onboarding & baseline configuration services.
44 out of 60
Copilot for Microsoft 365 : 7 days Consulting Service
PROXIMUS NV/SA
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
In close collaboration with Microsoft 365 experts, we assist in preparing your business for Copilot, with a focus on compliance, governance and data management.
45 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
46 out of 60
Endpoint Management Workshop
York Telecom Corp
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
47 out of 60
Managed Microsoft Sentinel and Extended Detection and Response (XDR) implementation with Centric
Centric Netherlands b.v.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The SOC team's goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes.
48 out of 60
Microsoft 365 Security Assurance Service: Assessment
Performanta
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
49 out of 60
Olinko Cybersecurity Awareness Program for End Users - 5 Steps/Days
Olinko
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
A 5 steps cybersecurity awareness program for end users, in which we put people at the centre, use the Microsoft 365 Attack Simulation Training and integrate the approach of change management.
50 out of 60
Microsoft 365 Security: 3,5 Tage Tenant Assessment
AppSphere AG
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
51 out of 60
Secure Identities and Access: 3 W - Workshop
Exelegent
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Help customers find and mitigate identity risks and safeguard their organization with a seamless identity solution.
52 out of 60
Infosys Intelligent Security Solution
Infosys Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Infosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
53 out of 60
Microsoft Endpoint Management: 3- W Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Endpoint Manager explains how to manage users’ devices, apps, and identities from anywhere
54 out of 60
Infosys Modern Identity and Access Solution with MS Entra
Infosys Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Microsoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
55 out of 60
Defend Against Threats with Cognizant's Microsoft 365 Defender Security Services
Cognizant
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Defend against threats on your Microsoft 365 solution with Cognizant's Microsoft Security Services utilizing Microsoft 365 Defender
56 out of 60
Microsoft 365 Copilot for Security: 1-Day Workshop
Awara IT Kazakhstan LLP
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft 365 Copilot Readiness and Deployment Services: 1-Day Security Copilot Workshop by Awara IT experts.
57 out of 60
Windows 365 Assessment - 1 day
CC Bilgi Teknolojileri
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Hybrid Windows for a hybrid world Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
58 out of 60
NVISO Microsoft 365 Security Assessment
NVISO
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
The goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
59 out of 60
Microsoft Priva Assessment: 2 Wk
Lighthouse Global
+2
Applicable to:
Cloud Security
Information Protection & Governance
Empowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
60 out of 60
1
2
3
4
Next