FiltersClear all
Consulting services results
Showing results in consulting services.
Sort By:
All results
Microsoft 365 Migration: 3 Weeks Migration from Google Workspace / GsuiteRisksoftMigrate your emails, contacts. calendars and documents from Google Workspace to Microsoft 365
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
1 out of 60
cyber security threat analysis workshopU-BTech Solutionsthe workshop is design to discover threats and risks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Exchange Migration to Microsoft 365: 6-Week ImplementationAll Covered, a division of Konica MinoltaAll Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
3 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Enable Windows 365 Cloud PCCofomoWith the right endpoint modernization strategy and tools, employees get a secure experience on every mobile device, tablet, or laptop they’re using, all while eliminating major management headaches.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
5 out of 60
HPT Nextgen Windows Experience_02 days workshopHPT Vietnam CorporationNextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
6 out of 60
HPT_Microsoft Secure Score Assessment - 4 weekHPT Vietnam CorporationSecure Score helps customers quickly figure out what actions they can take to improve your score. They can check their action queue and find the change they can make that most improves their security
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
7 out of 60
HPT_Microsoft Cyber Security Assessment_2 weekHPT Vietnam CorporationStrengthen your firm's defenses with our all-in-one cybersecurity platform
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
8 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshopHPT Vietnam CorporationThe Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
HPT Secure Identities and Access_03 days workshopHPT Vietnam CorporationWith identity attacks on the rise, this workshop will show you how to stop tomorrow’s data breaches by securing identities today.
+2
Applicable to:
Identity & Access Management
Mobile Device Management
10 out of 60
NTT Americas - Microsoft Device ManagementNTT LimitedDeployment of Microsoft Unified Endpoint Management Services. Assessment of your resources and business objectives to develop a fresh approach to your security strategy.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
11 out of 60
1ID Platform for EDUTelelink Business Services EAD1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
12 out of 60
Microsoft 365 GCC High Mig from Google (25 Users)Daymark SolutionsWhite-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Google G Suite
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
13 out of 60
Microsoft 365 GCC High Mig from Exchange: 6 Week ImplementationDaymark SolutionsWhite-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Microsoft Exchange On-Premises
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
14 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
15 out of 60
Avanade Entra Verified ID Consulting Services FY23Avanade, Inc.Microsoft Entra Verified ID is a Decentralized Identity implementation that streamlines any identity related process, simplifies it, reduce costs and increases convenience.
+1
Applicable to:
Identity & Access Management
16 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
+2
Applicable to:
Cloud Security
Identity & Access Management
17 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLCBreach and Attack Simulations — We Attack to Defend You
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
18 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayonEvaluate and strengthen the current security posture of your environments in Microsoft365 and Microsoft Azure
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
19 out of 60
Microsoft 365 Tenant to Tenant Migration: 6 Week ImplementationAll Covered, a division of Konica MinoltaLet All Covered help you assess, plan and skillfully implement your Microsoft 365 Tenant to Tenant migration.
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
20 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era TechnologyM&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
21 out of 60
Office 365: Setup, Demo Train: 3-Hr ImplementationTrue.org CloudGain a competitive edge and be more productive with a higher growth in your business with the help of True.org Cloud’s Microsoft 365 Business implementation.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
22 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLCThe Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
23 out of 60
Intune for Windows: 6-week ImplementationMobile MentorIntune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
24 out of 60
MDM Health Check (Mobile OS Only): 2-week AssessmentMobile MentorOur certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
25 out of 60
BYOD 365: 6-week ImplementationMobile MentorThe BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
26 out of 60
Advania: Intune Get Started: 2 d training and PoCAdvania ABUnderstand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
27 out of 60
Microsoft 365 Identity & Security: 2 wk assessmentPSM PartnersCustomized identity and security assessment focused on the Microsoft 365 platform
+2
Applicable to:
Cloud Security
Identity & Access Management
28 out of 60
G Suite to M365 Migration: 1-Day Proof of conceptTrue.org CloudProof of concept for migration from G Suite to Microsoft 365
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
29 out of 60
Microsoft 365 E5 CMMC L1 3 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 1 using Microsoft 365 security Suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Intune & Autopilot - 2 Week - Proof of ConceptArraya SolutionsArraya can help jumpstart customer initiatives, no matter where they stand, regarding device management and deployment using Microsoft Intune and Autopilot.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
31 out of 60
Microsoft Intune: 4-Wk Implementation ServicesTechNet UC LLCMicrosoft Intune Design and Deployment Services
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
32 out of 60
Bitscape M365 Security Assessment: 3-Wk AssessmentBitscapeGet expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
33 out of 60
Microsoft Intune Implementation 10 DaysEnabling Technologies CorporationSecure your Mobile Devices with Microsoft Intune designed with Enabling's Security experts.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
34 out of 60
Microsoft 365: 2-Week AssessmentPractical Solutions, IncEstablish a clear roadmap and change management plan for your journey to a modern workplace.
Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
35 out of 60
Insider Risk Management Proof of Concept -5 DaysEnabling Technologies CorporationInsider risk management is a compliance solution in Microsoft 365 that helps minimize internal risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
36 out of 60
Modern Workplace Security 10-Wk ImplementationWipro LtdWipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
37 out of 60
Microsoft 365 Security: 3 Day AssessmentNetwovenProtect against evolving cybersecurity threats and implement a modern workplace using built-in solutions from Microsoft.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
38 out of 60
Securing Identities Workshop - 3 DaysEnabling Technologies CorporationSit down with the Security experts at Enabling Technologies to set up your security authentication and access policies for a secure and also productive workplace.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
39 out of 60
Microsoft Threat Check 4-Week AssessmentInvoke, LLCThe Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
40 out of 60
Microsoft 365 Identity Protection: 2 Week WorkshopNetwovenSecure user identities and devices with our Microsoft 365 Enhanced Identity Protection Workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvokeThe Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
42 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.Our security services provide a holistic approach through advisory,implementation & managed services
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Security Assessment: 2-Wk AssessmentAscent Global, Inc.Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
45 out of 60
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLCMicrosoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Microsoft Value Calculator: One Hour AssessmentPatriot Consulting Technology Group LLCThe Cost Takeout Opportunity shows the potential cost reductions from consolidating third party solutions with Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
EMS Energize: 1-month proof of conceptInterlink Cloud Advisors, Inc.Interlink Cloud Advisors’ EMS Energize engagement provides you with security experts who can help guide your business into a secure, productive cloud platform.
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
48 out of 60
CMMC Implementation for Microsoft 365 (8 Wk Proj)Summit 7 Systems, IncSummit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) practices associated with Levels 1-3 for Microsoft 365, as well as Azure and AAD where appropriate.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
49 out of 60
Remote Access to On-Prem Apps: 3 Wk ImplementationInvoke, LLCSurface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
+2
Applicable to:
Cloud Security
Identity & Access Management
50 out of 60
Azure AD Implentation in 8 weeksArmis, Sistemas de Informação, LdaPorovide a design and build capability that enables organisations to secure, control and simplify employee access to company data and sensitive resources resources from wherever they are.
+1
Applicable to:
Identity & Access Management
51 out of 60
Modern Management: 4 week ImplementationMobile MentorModern Management is a Microsoft 365 focused managed service that reduces cost, improves security and delights employees!
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
52 out of 60
Office 365 GCC High Migration +Tenant Imp 4WkSummit 7 Systems, IncCompanies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
53 out of 60
Microsoft 365 Security Assessment up to 6 weeksACTSACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
54 out of 60
Microsoft Defender for Endpoint: 2-wk AssessmentAscent Global, Inc.The Microsoft Defender for Endpoint assessment will help the customers review the current state, evaluate existing AV and EDR solutions and expectations, deploy MDE, and plan for ongoing management.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
55 out of 60
Microsoft 365 Security: 3-Day WorkshopdelawareMicrosoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it.
Analysis, advice for Microsoft 365 security controls.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Microsoft 365 Security: 2-Week ImplementationTelelink Business Services EADCreate and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
+2
Applicable to:
Identity & Access Management
Threat Protection
57 out of 60
Windows Autopilot 5 Day POCEnabling Technologies CorporationEnabling Tech walks customers through the process of provisioning Intune/Autopilot settings to distribute PCs directly from OEMs to end-users, and to reduce the effort with building new machines.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
58 out of 60
The Modern IT Enterprise Security Five Day POCEnabling Technologies CorporationThe Modern IT Enterprise Security 5 Day Proof-of-Concept provides a path to becoming a secure modern enterprise through
strategic investments in both digital transformation and security enhancements
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
59 out of 60
Modern Device Management ImplementationDXCImprove the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
60 out of 60