FiltersClear all
Consulting services results
Showing results in consulting services.
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvokeProvide cross-domain threat protection and simplify breach prevention
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 60
Data Security EngagementadaQuestThe Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 60
Microsoft Cybersecurity AssessmentThe Partner MastersDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 60
Microsoft 365 Security AssessmentCDWCDW’s Microsoft 365 Security Assessment allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Threat Protection EngagementadaQuestLearn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Microsoft 365 Copilot Workshop: 2daysInsightTake the first steps toward helping your organization unleash creativity, unlock productivity, and level up skills with Insight’s Microsoft 365 Copilot Workshop.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
6 out of 60
Microsoft Funded Workshop for Copilot for Microsoft 365 Adoption Acceleration: 2-Wk ImplementationProServeITIf your company is eligible, we can deliver a Microsoft funded adoption accelerator engagement for Copilot for Microsoft 365 to you free of charge ($10,000 USD value).
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
7 out of 60
Avanade Entra Verified ID Consulting ServicesAvanade, Inc.Microsoft Entra Verified ID is a Decentralized Identity implementation that streamlines any identity related process, simplifies it, reduce costs and increases convenience.
+1
Applicable to:
Identity & Access Management
8 out of 60
Microsoft 365 Copilot Foundations ProgramHSO From envisioning and assessment to deployment, embrace the power of Microsoft 365 Copilot - your Copilot for work!
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
9 out of 60
Intune Managed ServiceMobile MentorYour endpoint ecosystem is constantly evolving and needs proactive management, so we designed the Intune Managed Service to help customers unlock the full potential of Intune.
+2
Applicable to:
Cloud Security
Identity & Access Management
10 out of 60
Introducing Microsoft Purview: 2 Hour WorkshopSlalom ConsultingLearn about how Microsoft Purview brings together comprehensive solutions from their compliance & data governance portfolios and Slalom's approach that provides security in harmony with your business.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
11 out of 60
Introduction to Microsoft Purview Data Protection: 4-Hour TrainingLong View SystemsGain hands-on knowledge in data protection, governance, and compliance with Long View’s expert-led Microsoft Purview training.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
12 out of 60
Okta to Microsoft Entra ID MigrationPerformantaPerformanta's Okta to Microsoft Entra ID Application Migration service will give you a controlled, seamless and secure transition to Azure AD.
+1
Applicable to:
Identity & Access Management
13 out of 60
Microsoft Entra – IAM Review and AssessmentCollective InsightsStreamline your Microsoft 365 identity management and enhance your security with insights from our Microsoft Entra IAM Review and Assessment
+1
Applicable to:
Identity & Access Management
14 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 WksWipro LtdWipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
+2
Applicable to:
Identity & Access Management
Threat Protection
15 out of 60
Microsoft 365 Copilot Security and Compliance controlstrue org cloudMicrosoft Copilot for Security: Enhance Your Organization's Security Posture
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
16 out of 60
Microsoft Purview Roadmap Deployment - 6 Week AssessmentProtivitiThis engagement will provide clients with an understanding of Microsoft Purview capabilities and establish a strategic roadmap for deploying and using Purview to enhance their Data Protection Program.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
17 out of 60
Active Directory Services: Implementation, Upgrade, and MigrationITX360 (Pvt) Ltd.Boost productivity and security with expert Active Directory services. Integrate seamlessly with Microsoft 365 through our implementation, upgrade, and migration solutions
+1
Applicable to:
Identity & Access Management
18 out of 60
CGI - Managed Services for Microsoft 365 FY25CGI Inc.Leave the end-to-end Microsoft 365 support services to CGI so that your IT support team can focus on value-added tasks.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
19 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
20 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile ITAgile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
21 out of 60
Copilot Value DiscoveryadaQuestThe Copilot Value Discovery is a three-phase process that helps customers grasp the benefits of AI reinvention, pinpoint key functional scenarios, create a business case, and develop a strategic plan.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
22 out of 60
Microsoft Purview: 5-Day Fundamentals WorkshopeGroup Enabling TechnologiesQuickly reduce risk and enable compliance controls with an eGroup Enabling Technologies, LLC Microsoft Purview Fundamentals Workshop.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
23 out of 60
Cloud Security Operations CenterReplyVerified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Windows10 EOL to Windows11 Foundations - 1 Week QuickStartCoretek ServicesWindows 10 EOL is right around the corner, prepare with the Windows 11 foundations QuickStart for your organization today.
+3
Applicable to:
Device Deployment & Management
Frontline Workers
Identity & Access Management
25 out of 60
Microsoft 365 Copilot Data and Security Readiness: 4-Week AssessmentSpyglass MTG, LLCOur Microsoft 365 Copilot Data and Security Readiness Assessment is a scoped engagement that is designed to accelerate the ability to integrate and consume Copilot across your enterprise.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
26 out of 60
Copilot for Security Readiness AssessmentInvokeInvoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365 GCC High for CMMC/ITAR: 6-Wk Assessment and PlanningAgile ITShorten the time to value from an M&A activity which includes partial or all going to Microsoft 365 GCC High by starting with an assessment and plan to rationalize identities, tenants, and costs.
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
28 out of 60
Full Cutover Google Workspace to Office 365 migration: 7-Days Professional ServiceIT Partner LLCMigrate G Suite (Google Apps) to Microsoft 365, transferring mailboxes, calendars, tasks, contacts, files, and documents seamlessly to Exchange Online and OneDrive.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
29 out of 60
Threat Protection EngagementISA Cybersecurity Inc.Learn how to put next-generation Microsoft Security tools to work for you
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Sogeti SmartWorkspace: 4 Week ImplementationCapgemini GroupSogeti provides a one-stop shop set of offerings around the SharePoint solutions. Our offer comprises consultancy, discovery of the existing landscape, Solution Architecture, SharePoint migration etc.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
31 out of 60
Microsoft Purview Records Management Assessment & Strategy for Government - 9 Week AssessmentProtivitiProtiviti assists government departments and agencies with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
32 out of 60
Microsoft Funded Workshop for Copilot for Microsoft 365: 2-Wk AssessmentProServeITIf your company is eligible, we can deliver a Microsoft funded readiness assessment for Copilot for Microsoft 365 to you free of charge ($5,000 USD value).
+2
Applicable to:
Compliance Advisory Services
Identity & Access Management
33 out of 60
Copilot Readiness AssessmentAscent Global, Inc.Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
34 out of 60
Incident Response RetainerSentinel Technologies Inc.Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLCOur 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
36 out of 60
Microsoft 365 Mergers and Acquisitions (M&A): 4-Week ImplementationSpyglass MTG, LLCSpyglass’s Microsoft 365 Mergers and Acquisitions (M&A) Implementation is a 4-week/ $50k engagement that focuses on quickly being able to move data to its desired destination.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
37 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk ImplementationNeway TechnologiesStreamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
38 out of 60
Threat Protection Engagement: 3-Day AssessmentPSM PartnersDo more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Avanade Microsoft 365 Copilot Information Management 4 wk Imp. FY24Avanade, Inc.Avanade Microsoft 365 Copilot Information Management Accelerator ensures your data meets high standards of security, privacy and compliance so you can confidently unlock Copilot's full potential.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
40 out of 60
Windows Virtual Desktop Implementation: 5-Days Professional ServiceIT Partner LLCProvide a streamlined solution using Windows Virtual Desktop (WVD) on Microsoft Azure, offering efficient remote workstations, cost-effective licensing, and Windows 365 in a terminal server format.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
41 out of 60
Microsoft 365 consultancyOnex GroupGet Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
42 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLCBreach and Attack Simulations — We Attack to Defend You
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
43 out of 60
Microsoft Sentinel - Monitor file access and permission changes in SharePoint Implementation: 5-Days Professional ServiceIT Partner LLCImplement Microsoft Sentinel for monitoring file access and permission changes in SharePoint, ensuring prompt detection and notification of unauthorized or unwanted activities.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Copilot Readiness: 2-Wk WorkshopCentric Consulting, LLCA facilitated workshop to build a Roadmap to guide your organization in implementing Copilot
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Knowledge & Insights
45 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayonEvaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
46 out of 60
Red Canary MSSP FastTrack for SecurityRed CanaryLeverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
48 out of 60
Microsoft 365 Security: 3,5 Tage Tenant AssessmentAppSphere AGSicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
49 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。
アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。
Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Microsoft Yammer Tenant-to-Tenant Migration: 1-Wk Professional ServiceIT Partner LLCFacilitate a smooth transition of your Yammer network and its associated data from one Microsoft 365 tenant to another.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
51 out of 60
Microsoft Endpoint Manager: 8-Hours WorkshopOnex GroupLearn how to secure Windows 11 environments with Microsoft Endpoint Manager
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
52 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBADefine the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
53 out of 60
Data Security and Governance Assessment and RoadmapCentric Consulting, LLCProvide customers with a clear path forward in addressing data security needs
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
54 out of 60
Mergers and Acquisitions PlaybookIvision, Inc.ivision leverages an approach and methodology designed to help clients successfully plan and design for a M/A&D migrations to achieve successful mergers, consolidation or a separation outcome.
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
55 out of 60
Google to Microsoft 365 MigrationManaged SolutionEmpowering digital transformation through a Google to Microsoft 365 migration with world-class support, so you can focus on what matters most—your business.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
56 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONSUNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
MDS - Data Security EngagementMaureen Data SystemsA 3-day engagement to help customers identify security risks in organizational data, understand how to mitigate them & prevent data security risks using Microsoft Purview (E5 Compliance) technologies.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
58 out of 60
Threat Protection Engagement FY25The Partner MastersLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
60 out of 60