FiltersClear all
Consulting services results
Showing results in consulting services.
All results
Microsoft Security Immersion: 1 Day BriefingSynergy Technical, LLCKnowing that your time is valuable, we have developed a true to life, hands-on, interactive session designed to give you a deep understanding of the Microsoft 365 Security suite of products.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
1 out of 60
Mail Airlift: Exchange Online ImplementationSynergy Technical, LLCOur Mail Airlift engagement will get you up and running with Microsoft Exchange online in the fastest, most secure manner.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 60
Document Airlift-OneDrive ImplementationSynergy Technical, LLCOur Document Airlift will enable and configure your organization’s environment to use OneDrive for Business services in your Office 365 tenant.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
3 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeITCybersecurity review and lockdown of Microsoft 365 environment.
Monitor and provide implementation recommendations
Protect against phishing and other attacks
Review desired state configuration
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
1-Day Security & Identity WorkshopConvergeOneTailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 60
Ransomware Protection: 1 Day-WorkshopConvergeOneLearn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Microsoft 365 Security Healthcheck-1 wk assessmentKiZAN TechnologiesQuickly identify security vulnerabilities for Microsoft 365 services with a Security Healthcheck.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
7 out of 60
Windows 365 Quick Start: 4-Day Proof of ConceptSynergy Technical, LLCThe Windows 365 Quick Start engagement is designed to give you everything you need to deploy Windows 365. Included are a solution overview, planning services, as well as a proof of concept engagement
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
8 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLCRoadmap to increase your security score with cost-effective security tools
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 60
Compliance Assessment - 6 weeksBDO Digital, LLCIdentify your compliance maturity and areas that need improvement
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
10 out of 60
Microsoft 365 Defender Threat Check: 4-wk assessInterlink Cloud Advisors, Inc.Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
+2
Applicable to:
Cloud Security
Threat Protection
11 out of 60
Office 365 Protection: Design & Pilot 1-Wk POCManaged SolutionProtect Your Employees from External Email Threats with Defender for Office 365 Protection
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 60
Secure Live Workspace - 8 Weeks AssessmentLTIMindtree LimitedOur Secure Live Workspace is an 8 week assessment that will evaluate the Business Objectives for enabling remote working, platform needs in Microsoft 365, Azure Virtual Desktop, and Security services
+3
Applicable to:
Cloud Security
Power Platform for Teams
Teams Custom Solutions
13 out of 60
Microsoft Advisory Services Managed 12M AssessmentSoftwareONEDrive Value and Cost Savings Throughout the Microsoft Cloud Investment Lifecycle
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
14 out of 60
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
15 out of 60
Cy:lent Pursuit Threat Hunt: 6-Wk AssessmentAscent Global, Inc.Ascent’s intel-based approach to cybersecurity threat hunting helps identify threat actors faster and more accurately than other, more traditional methodologies.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
16 out of 60
Endpoint Management: 3-Day WorkshopECF Data LLCGet an executive deep dive into remote deployment, management, and the security of corporate and BYOD devices in your organization with ECF Data’s Endpoint Management Workshop
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
17 out of 60
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer SolutionsSirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
18 out of 60
discover-sensitive-data-workshopECF Data LLCECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
19 out of 60
ECF Data Threat Protection: 3-Day WorkshopECF Data LLCThe Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLCThe Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
21 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
22 out of 60
Azure Sentinel: 3 Day WorkshopModality SystemsThis workshop will give you a bird's eye view across your enterprise with SIEM, for a truly modern world and workplace
+1
Applicable to:
Cloud Security
23 out of 60
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
24 out of 60
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
25 out of 60
Security Assessment: 2 Week AssessmentTallanTallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
26 out of 60
Microsoft 365 Security Assessment - 4wk AssessmentProtivitiEffective Analysis of CIS & NIST Benchmarking, Active Directory to Azure and Microsoft 365 Configurations
+1
Applicable to:
Cloud Security
27 out of 60
Azure Sentinel: 8H WorkshopadaQuestModernize your security operations with Azure Sentinel.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
28 out of 60
Discover Sensitive Data: 2 Week WorkshopNetwovenNetwoven Discover Sensitive Data workshop will train you to better discover, protect, and govern your corporate data
+2
Applicable to:
Cloud Security
Information Protection & Governance
29 out of 60
Defender for Office 365: 3-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
30 out of 60
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLCCatapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
31 out of 60
Change Management 6-Months ImplementationSupremo Sp. z o.o.Bądź pewny, że zaangażowanie użytkowników i przyjęcie nowych rozwiązań przyczyni się do sukcesu wdrożenia, sukcesu całej organizacji.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
32 out of 60
Secure Identities and Access: 8H WorkshopadaQuestAn executive deep dive into foundational identity strategy, tailored to your customers’ organization.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Enhance IT Security: 1-2-Wk ImplementationFMT ConsultantsFMT offers a smart security solution that protects your business, your employees, and your clients while providing a reliable, scalable, and durable approach to keeping your business up and running.
+2
Applicable to:
Cloud Security
Identity & Access Management
34 out of 60
Avanade Defend Against Threats with SIEM Plus XDR FY23Avanade, Inc.Cybercrime is an ongoing and escalating challenge for organizations around the globe. We help clients modernize their security and defend against these threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
35 out of 60
Windows 365 QuickStart : 4 Day PoC + Surface GoSynergy Technical, LLCThe Windows 365 Quick Start engagement is designed to show you how Windows 365 + SurfaceGo keeps you productive. Included are a Surface Go, planning services, as well as a proof of concept.engagement
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
36 out of 60
Transition to the Cloud: 2 Day WorkshopModality SystemsEvaluate, envision and enable relevant scenarios so you can work productively and securely with Microsoft 365 in the cloud. You will leave with a deployment plan, timeline and next actions.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Compliance Advisory Services
37 out of 60
Manage and Investigate Risk: 2 Day WorkshopModality SystemsIn this one-day Microsoft workshop, you'll understand how to assess your environment against the data protection baseline, and learn how to address and mitigate compliance risks
+1
Applicable to:
Cloud Security
38 out of 60
Hybrid Cloud Security: 3 Day WorkshopModality SystemsOur workshop delivers a customised threat & vulnerability analysis of your hybrid and multi-cloud environment, and will teach you how to build a more robust cloud security system.
+2
Applicable to:
Cloud Security
Information Protection & Governance
39 out of 60
Discover Sensitive Data: 2 Day WorkshopModality SystemsIn this two-day Microsoft workshop, you'll understand the hidden risks of dark data, assess your own environment against the data protection baseline, and learn how to address and mitigate risk
+1
Applicable to:
Cloud Security
40 out of 60
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
41 out of 60
Threat Protection: 2-Week WorkshopForsyte IT SolutionsLearn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
42 out of 60
Office 365 Teamwork Security - Managed ServiceCognizantTeamwork Security provides a comprehensive security management service for Office 365 platforms
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
43 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareONEImprove NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareONE
+3
Applicable to:
Cloud Security
Device Deployment & Management
Information Protection & Governance
44 out of 60
AvePoint Policies & Insights: 10-Days AssesmentsIT-Dev sp. z o. o.Assesment's outcomes:
• Enable centralized reporting on Microsoft 365 security.
• Discover potential risks and exposed content.
• Enforce policies and automatically remediate security breaches!
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
45 out of 60
Guardian 365 Managed Security Services (Microsoft MXDR Verified)Forsyte IT SolutionsProtection is key to the security of your organization. Defend against threats with Guardian 365, your key to better managed security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
46 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro LtdIdentify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
+2
Applicable to:
Cloud Security
Threat Protection
47 out of 60
Email and Threat Protection 4 Week ImplementationHTGHTG’s Advanced Email Threat Protection pack ensures your Microsoft products such as Outlook, SharePoint, OneDrive & Microsoft Teams are hardened to best practice standards.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
48 out of 60
Collaboration & Data Governance 4Wk ImplementationHTGHTG’s Collaboration & Data Governance pack can help companies achieve the right balance of user freedom while ensuring compliance with corporate policies.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
49 out of 60
Microsoft 365 Security: 3 Week Exec WorkshopValorem LLCA strategic deep dive for security decision-makers to better understand, prioritize, and mitigate real-time threats in your environment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
50 out of 60
Digital Workplace Foundations: 4-wk AssessmentCatapult Systems, LLCCatapult’s Digital Workplace Foundations helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tools.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
51 out of 60
Microsoft 365 Migration 12 Hour Proof-of-ConceptNew Charter Technologies, Inc.Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
+3
Applicable to:
Adoption & Change Management
Cloud Security
Knowledge & Insights
52 out of 60
Microsoft 365 Implementation for Financial ServiceNew Charter Technologies, Inc.Paid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
53 out of 60
Microsoft 365 HIPAA/HITECH 20 Hour ImplementationNew Charter Technologies, Inc.Implementation of Microsoft 365 to include compliance policies and templates for health care.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
54 out of 60
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuestGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
55 out of 60
Microsoft 365 Digital Workforce: 8H WorkshopadaQuestLearn how to empower people to be more productive and secure as they adapt to new ways of working with Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
56 out of 60
Compliance Managed ServicesForsyte IT SolutionsOrganizations everywhere are experiencing the benefits of Compliance Managed Services. Work with our Microsoft Gold Partner team to establish governance and manage user access and data security.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
57 out of 60
Microsoft 365 Manage Service–12 mth ImplementationAlfa Connections Pte LtdAlfa Connections providing Microsoft 365 Managed service is designed to enhance your workforce experience by supporting your organization on planning, enablement, implementation, and adoption.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Frontline Workers
58 out of 60
Secureshield - 12 months - Managed ServicePatriot Consulting Technology Group LLCHarden Office 365, deploy and manage Intune, and keep up to date of all Microsoft 365 and Intune updates and changes.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Knowledge & Insights
59 out of 60
MD-100T00: Windows Client : 5 Days WorkshopNETCOM LEARNINGIn MD-100 course, students will also learn how to secure the Windows OS and protect the data on the device.
+2
Applicable to:
Cloud Security
Device Deployment & Management
60 out of 60