AppSource
Give feedback
Help + support
Saved items
Private plans
Just a moment, logging you in...
All
Apps
Categories
Industries
Consulting Services
Partners
Filters
Clear all
Your location
Products (1)
Industries
Service type
Consulting services results
Showing results in consulting services.
View
related results in industry clouds
.
All results
SmartStart for Intune
Mobile Mentor
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
1 out of 60
Onesec Identity Governance Lifecycle Assessment
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
2 out of 60
Microsoft 365 Digital Workforce: 2-Day Workshop
CompuNet
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Meetings for Microsoft Teams
Two-day engagement to envision agile work scenarios and how to enable people to be productive and secure from anywhere with Microsoft 365
3 out of 60
Enhanced Data Privacy with Microsoft Purview
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
4 out of 60
Infra & Network Monitoring with Microsoft Sentinel
AVA SOFTWARE INC
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Boost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
5 out of 60
Device Security Management with Microsoft Intune
AVA SOFTWARE INC
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
Seamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
6 out of 60
Integrating Microsoft Sentinel with External EDR Service
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
7 out of 60
Device Monitoring with Microsoft Defender for Endpoint
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
8 out of 60
Device Domain Migration from On-Premises to Cloud
AVA SOFTWARE INC
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Seamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
9 out of 60
Lightstream Microsoft 365 Comprehensive Security Assessment
Lightstream
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
10 out of 60
Copilot for Security Rapid Test Flight | 2-Wk Workshop
Bulletproof Solutions Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
11 out of 60
Zero Trust Security: 3-day Workshop
Oxford Computer Group LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
12 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days Workshop
Wipro Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
13 out of 60
Fortis IR Readiness Assessment
Sentinel Technologies Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
14 out of 60
The Modern Workplace: 1 hour Briefing Session
Automize
+3
Applicable to:
Identity & Access Management
Meetings for Microsoft Teams
Mobile Device Management
This 1 hours briefing session provides a complete overview of our Modern Workplace concept of Endpoint Management, Identity & Access Management and Collaboration Solutions in context to your business.
15 out of 60
[Managed Service] NR Automate Security: 12-Months Implementation
ネクストリード株式会社
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
16 out of 60
Microsoft 365 Strategic Roadmap Workshop
CDI LLC
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Mobile Device Management
CDI provides this Strategic Roadmap workshop to identify workloads that can be migrated to Microsoft 365 and design a roadmap for you, our customer, to drive adoption and improve ROI.
17 out of 60
Defender for Identity Professional Security Services | Customized Deployment in as Little As 6-Weeks
Difenda
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure Azure Active Directory with Difenda, the 2023 Microsoft Security Impact Award Winner.
18 out of 60
Microsoft 365 Information Protection 1-day Workshop
Grant Thornton LLP
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Review your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
19 out of 60
Onesec Digital Identity
Secure Nextgen Systems
+2
Applicable to:
Identity & Access Management
Threat Protection
Having a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
20 out of 60
Collaborative Apps: 3 - W Workshop
Exelegent
+3
Applicable to:
Identity & Access Management
Power Platform for Teams
Teamwork Deployment
Build Solutions for your Customers to drive organizations goals and create collaborative experiences.
21 out of 60
HPT Secure Identities and Access_03 days workshop
HPT Vietnam Corporation
+2
Applicable to:
Identity & Access Management
Mobile Device Management
With identity attacks on the rise, this workshop will show you how to stop tomorrow’s data breaches by securing identities today.
22 out of 60
Capgemini Modern Workspace Portfolio
Capgemini Group
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
Capgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
23 out of 60
Merge and Acquisitions-Discovery, Planning Assessment
New Era Technology
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Teamwork Deployment
M&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
24 out of 60
Cloud-Native Migration Service: 4-Month Implementation
Cyclotron Inc.
+2
Applicable to:
Cloud Security
Identity & Access Management
With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
25 out of 60
Cyber Security Services 9 days Assessment
Alfa Connections Pte Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
26 out of 60
Managed Extended Detection and Response Service (MXDR)
Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
27 out of 60
Microsoft 365 GCC High Mig from Google (25 Users)
Daymark Solutions
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
White-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Google G Suite
28 out of 60
Microsoft 365 GCC High Mig from Exchange: 6 Week Implementation
Daymark Solutions
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
White-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Microsoft Exchange On-Premises
29 out of 60
Microsoft Purview Records Management Assessment & Strategy for Government - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists government departments and agencies with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
30 out of 60
Microsoft Purview Records Management Assessment & Strategy for Financial Services - 9 Week Assessment
Protiviti
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Information Protection & Governance
Protiviti assists Financial Services organizations with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
31 out of 60
Secure Identities and Access Management Assessment
Invoke
+1
Applicable to:
Identity & Access Management
To provide enterprise customers with a detailed identity assessment report, a high-level migration plan, and demonstrations of Microsoft Entra Azure AD and Microsoft Entra Identity Governance features
32 out of 60
Discover Sensitive Data: 3-Wk Assessment
KiZAN Technologies
+2
Applicable to:
Identity & Access Management
Information Protection & Governance
Identify and assess the security posture, location, and movement patterns of sensitive data in your organization to better understand required solutions.
33 out of 60
Copilot for Security: 3-week Proof of Concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
34 out of 60
Ongoing Managed Services for Microsoft Intune
Finchloom
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Optimize your organization’s device management with Finchloom+ for Microsoft Intune. Tailored monthly managed service ensures streamlined, cloud-based endpoint management for company and BYOD devices.
35 out of 60
Microsoft 365 Passwordless Authentication: 3-Wk Implementation
KiZAN Technologies
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Unlock a new era of robust authentication with Microsoft's Passwordless Authentication solutions.
36 out of 60
Windows 365: 5-week Proof of Concept
Interlink Cloud Advisors, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Mobile Device Management
Enhance productivity through flexibility by enabling your team to create secure Cloud PCs and allowing BYOD without increasing risk to your environment
37 out of 60
Windows as a Service: 4-Wk Implementation
AMTRA Solutions Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Secure your data and devices, identities and your business with Windows 10/11.
38 out of 60
MITRE ATT&CK® MasterClass: 2-Hour Workshop
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent’s MITRE ATT&CK® MasterClass is focused on educating companies on ransomware threats specifically relevant to their environment.
39 out of 60
OENG - Next Generation Endpoints-1 Month Proof of Concept
Secure Nextgen Systems
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Learn how to best leverage Windows 365 together with Microsoft 365 Security, Compliance, Identity and Management technologies to deploy, secure and protect endpoints for hybrid users
40 out of 60
Offer Name: Microsoft 365 CrashCourse - 1 week Workshop
Virteva LLC
+3
Applicable to:
Identity & Access Management
Knowledge & Insights
Mobile Device Management
Empower organizations to gain a deeper understanding of Microsoft 365 and its vast array of services, features, and capabilities through Virteva's Microsoft 365 CrashCourse Workshop.
41 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week Project
Virteva LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Get a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
42 out of 60
Secure Remote Workplace: 1-Wk Workshop
FSI Strategies
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
43 out of 60
Security Accelerator: 3-Day Implementation
UnifyTech Bilgi Sistemleri
+2
Applicable to:
Cloud Security
Identity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
44 out of 60
Protect & Govern Sensitive Data: 3-Day Workshop
Netrix Global
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
A 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
45 out of 60
Managed Endpoint Assessment
FSI Strategies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Information Protection & Governance
This four-week engagement will determine the level of effort required for a migration to a fully modern desktop using Microsoft 365 services.
46 out of 60
Autopilot: 1-Wk Assessment
FSI Strategies
+3
Applicable to:
Adoption & Change Management
Device Deployment & Management
Identity & Access Management
FSi Strategies will review the deployment scenarios with the client and deliver a Discovery and Assessment document on Windows Autopilot, and the level of effort to deploy in the environment.
47 out of 60
Modern Managed Endpoints: 4-Wk Proof of Concept
FSI Strategies
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
Modernize your organization with end-to-end device management and monitoring, FSi Strategies will demonstrate modern device management and security using the latest in Microsoft 365 technology
48 out of 60
Secure Identities and Access: 4-Week Engagement & Workshop
CompuNet
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
4-week engagement and workshop that helps customers design and plan out their optimal identity model to ensure they have a roadmap to enhanced security using Microsoft 365 and Azure Active Directory
49 out of 60
Multifactor Authentication: 4-Day Implementation
FSI Strategies
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Implementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
50 out of 60
OAAA Advanced Adversary Assesment-1 month assesment
Secure Nextgen Systems
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Learn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
51 out of 60
Modern Work Services Proof of Concept
Crayon US
+3
Applicable to:
Calling for Microsoft Teams
Identity & Access Management
Meetings for Microsoft Teams
Crayon Modern Work Services PoC will help you pilot a subset of users with the best of Microsoft 365 prior to implementation. This will allow us to ensure a smooth transition for all users.
52 out of 60
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-Weeks
Invoke
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Invoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
53 out of 60
Entra Permission Risk Assessment
adaQuest
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Secure your Multi-Cloud Environment with Microsoft Entra by automating the remediation of Permissions. Get a comprehensive visibility into permissions assigned to all identities on your organization.
54 out of 60
Defender for Endpoint: 5-Day Implementation
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
55 out of 60
Windows Intune: 1-Wk Accelerated Implemention
ITC Secure Ltd
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
Accelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
56 out of 60
Security Outcomes Sprint
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Understand the Business Value of Your Cybersecurity Investments
57 out of 60
cyber security threat analysis workshop
U-BTech Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
the workshop is design to discover threats and risks
58 out of 60
Exchange Migration to Microsoft 365: 6-Week Implementation
All Covered, a division of Konica Minolta
+2
Applicable to:
Adoption & Change Management
Identity & Access Management
All Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
59 out of 60
Enable Windows 365 Cloud PC
Cofomo
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
With the right endpoint modernization strategy and tools, employees get a secure experience on every mobile device, tablet, or laptop they’re using, all while eliminating major management headaches.
60 out of 60
Previous
2
3
4
5
6
Next