FiltersClear all
Consulting services results
Showing results in consulting services.
Cutover Exchange Online Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLCMailbox migration from an Exchange Server hosted and managed by you to Exchange Online. All mailboxes will be migrated at once.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Information Protection & Governance
1 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLCEnhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 60
Cutover Exchange Online migration from any IMAP email system: 7-Days Professional serviceIT Partner LLCMigrate users, email data, and email folders from any IMAP system to Microsoft 365 / Exchange Online.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
3 out of 60
MDR WorkshopGrant Thornton LLPMaximize Your Security Posture with Grant Thornton's MDR Program Assessment
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Cutover Google Workspace to Office 365 migration (IMAP migration). Just email and email folders: 7-Days Professional ServiceIT Partner LLCMigration of email data and email folders from G Suite (Google Apps) to Microsoft 365 / Exchange Online.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
5 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 60
Microsoft 365 Security: 3,5 Tage Tenant AssessmentAppSphere AGSicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
+3
Applicable to:
Cloud Security
Identity & Access Management
Knowledge & Insights
7 out of 60
Modern Workplace - Cloud Endpoint ManagementArxusOur Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
8 out of 60
Healthcare Innovations Strategic Alignment WorkshopSentinel Technologies Inc.At the start of 2020, the charge of the Healthcare Technology Executive focused on key areas for improvement & alignment with their business along with providing a secure environment that allowed for
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Knowledge & Insights
9 out of 60
Identity WorkshopSentinel Technologies Inc.Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 60
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.According to multiple studies, breaches and ransomware have more than doubled in the past year.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
13 out of 60
Windows 365: 10-day Pilot ServiceUltima BusinessUltima Business Solutions offers a 10 day, potentially funded, pilot service to help you explore the benefits of Windows 365, the cloud-based Windows experience that enables hybrid work scenarios.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
14 out of 60
JourneyTEAM Security Solutions for Higher EducationJourneyTEAMUnlock the future of secure access in Higher Education environments using Microsoft 365.
+1
Applicable to:
Identity & Access Management
15 out of 60
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstreamLightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
16 out of 60
UNITE: Exploring E5 Security Workshop_INFINITY TECHNOLOGY SOLUTIONSUNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
17 out of 60
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstreamLightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 60
Copilot for Security Readiness AssessmentInvokeInvoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
eDiscovery Workshop: 4 hours WorkshopPlanet TechnologiesA half-day Workshop that provides an overview and deep understanding of Microsoft 365 eDiscovery Standard and Premium products.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
20 out of 60
Frontline Worker: 3-Wk Proof of ConcepteGroup Enabling TechnologiesReimagine the frontline worker experience with an eGroup Enabling Technologies, LLC. Frontline Worker Proof of Concept
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
21 out of 60
Passwordless Authentication: 2 Week ImplementationCDI LLCImplement passwordless authentication solutions for up to twenty pilot users
+1
Applicable to:
Identity & Access Management
22 out of 60
Secure Data on Personally-Owned Devices: 2 Week ImplementationCDI LLCDeploy Intune App Protection Policies to secure organization data on employee-owned devices
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
23 out of 60
Microsoft Cloud PC - 4 Day Proof of Concept EngagementSynergy Technical, LLCOur Microsoft Cloud PC offering is designed to help organizations simplify desktop management, increase security, streamline application delivery and increase end user satisfaction.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
24 out of 60
Microsoft Cybersecurity AssessmentAkins ITDevelop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
25 out of 60
Modern Management for EndpointsIvision, Inc.Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
26 out of 60
Windows 365 PilotCDWWith the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
27 out of 60
Security Baseline Integrity ManagerAegis InnovatorsSingle pane of glass for unified configuration, governance, and lifecycle management of security workloads across Microsoft 365.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
28 out of 60
MXDR ConsultationCBTS Technology Solutions LLCCBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
29 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
30 out of 60
Cybersecurity Assessment Engagement - 4 weeksGrant Thornton LLPEnhance Your Cloud Security Posture with Grant Thornton’s Cybersecurity Assessment
+2
Applicable to:
Cloud Security
Identity & Access Management
31 out of 60
Threat Protection Engagement - 4 weeksGrant Thornton LLPImprove your Security Posture with Grant Thornton's Threat Protection Engagement
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense GlobalStop threats with a cloud-native SIEM adapted to your new business needs.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
33 out of 60
Enhanced Data Privacy with Microsoft PurviewAVASOFTConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
34 out of 60
Data Protection and Governance with Microsoft PurviewAVASOFTConfident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
35 out of 60
Phishing, Malware & Spam protection- 2 weeks ImplementationAVASOFTPhishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
36 out of 60
Zero Trust Protect and Govern Sensitive DataKiZAN TechnologiesLock down your data and take back control. Our Zero Trust Protect and Govern program empowers you to secure your sensitive information, simplify compliance, and gain peace of mind.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
37 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View SystemsSecure and manage your cloud environments by fortifying your infrastructure against emerging threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
38 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFTEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
39 out of 60
Device Management Migration - On-Premises to Cloud by AVASOFTAVASOFTSeamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
40 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFTBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
42 out of 60
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFTAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Microsoft Cloud App Security (MCAS) Solutions for Native Apps by AVASOFTAVASOFTEnhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
44 out of 60
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFTIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
45 out of 60
Microsoft Defender for Endpoint - Vulnerability Assessment by AVASOFTAVASOFTEnhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
46 out of 60
Security and Operations with Expert Microsoft 365 SupportAVASOFTMaximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
+3
Applicable to:
Cloud Security
Identity & Access Management
Workplace Analytics
47 out of 60
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
48 out of 60
Implementation of Microsoft Defender for Cloud AppsCDWCDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Implementation of Microsoft Defender for Office 365CDWThe Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
50 out of 60
Copilot For Microsoft 365 - ImplementationITQAN GLOBAL FOR CLOUD AND DIGITAL COMPUTING SYSTEMS L.L.C.Guided Setup and Customization of Copilot and Copilot Studio for Microsoft 365- Training, Data Selection, Workflow Design Development
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Teamwork Deployment
51 out of 60
Microsoft 365 Security Readiness: 4-Wk AssessmentQuadrasystems.net (India) P LtdIdentify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
52 out of 60
Zero Trust Identity and Access Management: 8-16 Weeks Consulting + ImplementationAttosolIn today’s dynamic digital landscape, traditional security models fall short. Embrace Zero Trust with Microsoft and transform your security strategy to protect against evolving threats.
+2
Applicable to:
Compliance Advisory Services
Identity & Access Management
53 out of 60
Automate Identity Lifecycle Management: 8-16 Weeks Consulting + ImplementationAttosolIntegrate HRMS with Microsoft Entra ID for an automated, efficient and secure Identity Lifecycle Management.
+1
Applicable to:
Identity & Access Management
54 out of 60
Deployment of Copilot for Microsoft 365Windows Management Experts, Inc.Enhance the productivity of Microsoft 365 with our premium Deployment service for Copilot for Microsoft 365.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
55 out of 60
Fixing vulnerabilities based on Defender with ASR Module: 3-Days Consulting ServiceIT Partner LLCThis service provides a comprehensive approach to identifying and fixing vulnerabilities in organization's devices, helping mitigate the risks of cyber-attacks.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
56 out of 60
Healthcare & Education Cybersecurity AssessmentPSM PartnersThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
57 out of 60
Microsoft Intune QuickstartEmergent SoftwareDeploy Microsoft Intune via Microsoft 365 with Emergent's Quickstart for enhanced device management and security compliance.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
58 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data SystemsAssess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
59 out of 60
Copilot for Microsoft 365: 4 weeks Proof of ConceptReliance Infosystems Inc.We are thrilled to present our Copilot Seed Investment Offer, crafted to help organizations validate and achieve their AI objectives using Microsoft 365.
+3
Applicable to:
Adoption & Change Management
Compliance Advisory Services
Identity & Access Management
60 out of 60