AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
Windows 365 Rapid Deploy
Ivision, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
The ivision Windows 365 Rapid Deployment approach will accelerates the adoption and use case development of Windows 365 virtual desktops.
1 out of 60
Infosys Modern Identity and Access Solution with MS Entra
Infosys Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Microsoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
2 out of 60
Threat Protection: 3-Wk Workshop
Exelegent
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
3 out of 60
ThreatHunter MXDR MSSP: 12-Mo Implementation
eGroup Enabling Technologies
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
To assist our customers with advanced security services focused on identifying and mitigating cloud and device malicious threats and providing 24x7 monitoring and response services.
4 out of 60
CT - Microsoft 365 Copilot Readiness Assessment
Cloud Target
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Assessment in Microsoft 365 environment to enable Microsoft 365 Copilot deploy
5 out of 60
Microsoft 365 Threat Check Assessment: 3-Wk Assessment
Invoke
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
6 out of 60
SharePoint Premium Readiness Assessment & Roadmap - 5 Week Assessment
Protiviti
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
Evaluate and ensure your readiness for implementing SharePoint Premium, considering technical, business case, data lifecycle, and administration perspectives.
7 out of 60
Discover Sensitive Data: 6W - Workshop
Exelegent
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
8 out of 60
Threat Protection Engagement: 3-Day Assessment
PSM Partners
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Do more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
9 out of 60
Microsoft 365 E5 Zero Trust Security Assessment
SHI International Corp
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Explore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
10 out of 60
Copilot for Security: 3-week Proof of Concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
11 out of 60
Cybersecurity Assessment Engagement
adaQuest
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Get a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
12 out of 60
Prepárate para Microsoft Copilot con ENCAMINA: Assesment 3 semanas
ENCAMINA S.L.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
Obtén un assessment integral: análisis de información, optimización de arquitectura y seguridad, más plan de comunicación y Road Map personalizado
13 out of 60
Microsoft Sentinel Workshop and Pilot
CDW
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
14 out of 60
Secure Identities and Access: 3 W - Workshop
Exelegent
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Help customers find and mitigate identity risks and safeguard their organization with a seamless identity solution.
15 out of 60
Cybersecurity Assessment
CDI LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
The Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
16 out of 60
Defend, Protect, Secure with Microsoft Defender XDR
Comtrade System Integration
+2
Applicable to:
Cloud Security
Threat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
17 out of 60
Cybersecurity Assessment - 3 Weeks
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Microsoft Security Assessment: detect security problems and take targeted action
18 out of 60
4 Weeks Microsoft 365 Security Assessment
Armis, Sistemas de Informação, Lda
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
The Microsoft 365 Assessment engagement will help customers evaluate their current security and compliance posture and create a roadmap to meet the organizational needs.
19 out of 60
Microsoft 365 Security Assessment: 3-Week Assessment
Spyglass MTG, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
20 out of 60
Threat Protection Engagement
The Partner Masters
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
21 out of 60
Insider Risk Management: 8-Wk implementation
PwC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
22 out of 60
Microsoft 365 Security Health Check Assessment 3-Wk
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
23 out of 60
Incident Response Tabletop Exercises: 2-Wk Briefing
eGroup Enabling Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Be proactive and prepare your IT team for emergencies with a Disaster Plan
24 out of 60
Data Security and Governance: 2 Hour Free Briefing
Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Netwoven Data Security and Governance free strategy workshop will help you get started on the path to discover, protect, and govern your sensitive corporate data
25 out of 60
Digital Workplace Essentials - Managed Service
SoftwareOne
+3
Applicable to:
Cloud Security
Information Protection & Governance
Workplace Analytics
Our kitbag of essential tools to get the best from your Microsoft 365 services investment
26 out of 60
Microsoft Defender for Endpoint SMC Deployment: 4-Week Implementation
BlueVoyant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Our services are designed to maximize your investment with Microsoft with hands-on onboarding & baseline configuration services.
27 out of 60
Crayon Cloud Security Assessment: 3-Wk Assessment
Crayon
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Evaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
28 out of 60
Varonis Jumpstart
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
29 out of 60
AvePoint Policies & Insights: 10-Days Assesments
IT-Dev sp. z o.o.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Assesment's outcomes: • Enable centralized reporting on Microsoft 365 security. • Discover potential risks and exposed content. • Enforce policies and automatically remediate security breaches!
30 out of 60
Managed SOC_by SoftwareOne
SoftwareOne
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure your IT Environment with Microsoft Services and on-call Cyber-security Analysts with Managed SOC by SoftwareOne
31 out of 60
discover-sensitive-data-workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
32 out of 60
Red Canary MSSP FastTrack for Security
Red Canary
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Leverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
33 out of 60
Protect 365 App - 1 hour implementation
Cloud Life
+3
Applicable to:
Cloud Security
Mobile Device Management
Threat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
34 out of 60
Mentoring Service
Mobile Mentor
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Our mentoring service helps customers leverage Microsoft 365 to improve endpoint security & user experience. We help accelerate the learning curve & reduce risk by deploying Microsoft 365 optimally.
35 out of 60
Darktrace Managed Network Sensor
Sentinel Technologies Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
36 out of 60
Infosys Intelligent Security Solution
Infosys Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Infosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
37 out of 60
Incident Response Retainer
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
38 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeks
Plain Concepts
+2
Applicable to:
Cloud Security
Information Protection & Governance
The objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
39 out of 60
Difenda - Information Protection and Governance - 4-week Implementation
Difenda
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Use Microsoft Purview to Implement an Information (Data) Protection and Governance solution to improve Security.
40 out of 60
E-Suite Discovery Offerings - 2Wk Assessments EDO
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Introducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
41 out of 60
Microsoft 365 Security: 4-hour Assessment
Quisitive
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
The Microsoft 365 Security Assessment provides an in-depth assessment of your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
42 out of 60
MXDR Shield: 4-Wk Implementation
Long View Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
43 out of 60
Compliance Assessment - 6 weeks
BDO Digital, LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Identify your compliance maturity and areas that need improvement
44 out of 60
Cloud Security Implementation: 3-WK implementation
NeWay Technologies Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
45 out of 60
MDM Health Check (All OS): 2-week Assessment
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
46 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 Weeks
Netrix Global
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Understand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
47 out of 60
Microsoft Intune Service
Sii Sp. z o.o.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Insider Risk
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
48 out of 60
Endpoint Security Foundations 50 users: 1-Yr
Red River Technology LLC
+2
Applicable to:
Cloud Security
Threat Protection
Endpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
49 out of 60
GoDaddy to Office 365 Migration
SkyTerra Technologies LLC
+3
Applicable to:
Calling for Microsoft Teams
Cloud Security
Identity & Access Management
If you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
50 out of 60
AI Governance Workshop: 4-Hour Workshop
Vitalyst
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Be introduced to Microsoft's AI Services, Azure Open AI and Copilot, and better understand the governance principles and practices tailored to them, like transparency, fairness, privacy, and security.
51 out of 60
Avanade Modern Workplace FY23
Avanade, Inc.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Modern Workplace Consulting Services
52 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und Ausarbeitung
AppSphere AG
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Vom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
53 out of 60
Copilot for Microsoft 365: Security Accelerator
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Boost security with KMicro's Copilot For Microsoft 365 Security Accelerator: Tailored insights and guided deployments.
54 out of 60
Google Workspace to Microsoft 365 Migration - 4 Week Assessment
Protiviti
+2
Applicable to:
Adoption & Change Management
Cloud Security
High-level migration strategy and assessment for migrating from Google Workspace to Microsoft 365.
55 out of 60
Ransomware Protection: 1 Day-Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
56 out of 60
Avanade Modern Sec Ops FY24
Avanade, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
57 out of 60
Mergers, Acquisitions, and Divestitures: 5-Month Implementation
Cyclotron Inc.
+2
Applicable to:
Adoption & Change Management
Cloud Security
Cyclotron helps organizations overcome the technical challenges of consolidating or divesting organization assets using Microsoft 365, Azure, and third-party migration tools.
58 out of 60
Microsoft 365 Security Alignment Workshop: 10 Days
Sirius Computer Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
59 out of 60
Microsoft Security Assessment: 3-Wk Assessment
Egroup, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Analyze your cross platform security posture, with evaluated vulnerabilities and risks identified with a Microsoft Security Assessment.
60 out of 60
Previous
1
2
3
4
5
Next