FiltersClear all
Consulting services results
Showing results in consulting services.
All results
Microsoft 365 Security Assessment: 3-Week AssessmentCompuNetThis engagement provides a comprehensive review of an organization's Microsoft 365 security controls, policies, and configurations to identify potential security risks and vulnerabilities.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
1 out of 60
Microsoft 365 Tenant Health CheckJourneyTEAMUnderstand the gaps in your Microsoft 365 Tenant Health Check so that you can prioritize and make plans to increase your security posture.
+1
Applicable to:
Information Protection & Governance
2 out of 60
Quorum Cyber - Managed Insider Risk Management using Microsoft PurviewQuorum CyberOur Managed Insider Risk service provides a comprehensive solution that will help identify and mitigate risks of insider threats within your organisation.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
3 out of 60
Discover Sensitive Data: 3-Wk AssessmentKiZAN TechnologiesIdentify and assess the security posture, location, and movement patterns of sensitive data in your organization to better understand required solutions.
+2
Applicable to:
Identity & Access ManagementInformation Protection & Governance
4 out of 60
M365 Compliance Assessment: 4-Wk AssessmentKiZAN TechnologiesManage and Improve your organizations compliance
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
5 out of 60
Zero Trust Foundation: 6-Wk ImplementationKiZAN TechnologiesAccelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
6 out of 60
Microsoft 365 Cyber Insurance Review: 2-5 Wk AssessmentKiZAN TechnologiesMap your business cyber insurance carrier requirements to Microsoft 365 environment controls ranked by priority and impact to your security posture.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
7 out of 60
Microsoft 365 Modern Work Copilot Readiness AssessmentSynergy Technical, LLCMicrosoft 365 Modern Work Copilot Readiness: 6-Week Assessment
+3
Applicable to:
Information Protection & GovernanceKnowledge & InsightsMeetings for Microsoft Teams
8 out of 60
Microsoft 365 Passwordless Authentication: 3-Wk ImplementationKiZAN TechnologiesUnlock a new era of robust authentication with Microsoft's Passwordless Authentication solutions.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
9 out of 60
Exchange Online Migration: 6-Week DeploymentCyclotron Inc.Exchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
+2
Applicable to:
Cloud SecurityInformation Protection & Governance
10 out of 60
General Data Protection Regulation (GDPR): 4-Wk Data Discovery ServiceIT Partner LLCMulti-step process to discover and scan data sources within the organization for personal data. The outcome: detailed inventory of data sources, together with the data they contain.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
11 out of 60
AI Readiness Assessment: 2-week assessmentInterlink Cloud Advisors, Inc.Transform your technology, processes and people with Microsoft 365 Copilot
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceKnowledge & Insights
12 out of 60
Slalom + Microsoft Syntex: 2-Hr WorkshopSlalom ConsultingDetermine the types of content your organization uses and how you would want to search and refine that content in the future during our Discovery Workshop.
+3
Applicable to:
Information Protection & GovernanceKnowledge & InsightsTeamwork Deployment
13 out of 60
SharePoint Online Initial Planning and Setup: 7-Day Design, Plan, Environments Set upIT Partner LLCWe design, plan, and set up both environments and provide post-implementation support. We can also provide educational and training materials for your users to help with internal adoption.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceTeamwork Deployment
Lighthouse Microsoft 365 Purview Art of the Possible: 1-Wk WorkshopLighthouse GlobalA custom hands-on workshop to understand the full capabilities and value of the Microsoft Purview suite and how to maximize its benefits in your organization’s compliance framework.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
15 out of 60
Legacy Data Migration and Optimization: 52-Wk MigrationLighthouse GlobalThis engagement delivers defensible migration from legacy on-prem archives to Microsoft 365, mapping to the Microsoft Purview suite of tools.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
16 out of 60
Enable Data Leak Prevention: 5-Day Configure and Enable DLP PoliciesIT Partner LLCProtect your organization from data leaks, block the transfer of confidential information, use our tool for monitoring your daily work of employees to find security weaknesses before the incident.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
17 out of 60
Spyglass-MDR Managed Detection & Response: 2-week ImplementationQuisitiveSpyglass-MDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
18 out of 60
Encrypted Email and Data Loss Prevention: 3-Day Initial SetupIT Partner LLCBy implementing encrypted email and data loss prevention (DLP) measures, we ensure that sensitive information remains safeguarded, minimizing the risk of data breaches and unauthorized access.
+3
Applicable to:
Adoption & Change ManagementCompliance Advisory ServicesInformation Protection & Governance
19 out of 60
Microsoft 365 Protect and Govern Sensitive Data Workshop: 2 DaysCDI LLCProtecting information—wherever it goes—is critical to ensuring trust and meeting compliance requirements. But first, you need to know what data you have, where it is and how its used.
+3
Applicable to:
Adoption & Change ManagementCompliance Advisory ServicesInformation Protection & Governance
20 out of 60
Advanced Threat Analytics: 7-Day InstallationIT Partner LLCAdvanced Threat Analytics (ATA) is a complex system that allows you to protect your IT infrastructure from a variety of information threats and cyberattacks.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
21 out of 60
Intune PilotLevacloud LLCThis Pilot aims to elevate your capabilities in managing and securing endpoints at the enterprise level with the power of Microsoft Intune and optional MECM Co-Management
+3
Applicable to:
Device Deployment & ManagementInformation Protection & GovernanceMobile Device Management
22 out of 60
Security Audit and Recommendations: 3-Days Consulting ServiceIT Partner LLCGoal: help organizations review their security settings, configurations, and policies to identify any potential vulnerabilities and ensure that the tenant is properly secured against external threats.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
23 out of 60
Exchange Security AssessmentJourneyTEAMTake proactive steps to fortify your email security today with this Exchange Security Assessment.
+1
Applicable to:
Information Protection & Governance
24 out of 60
Identity Security AssessmentJourneyTEAMTake proactive measures to enhance your cloud environment today with this assessment.
+1
Applicable to:
Information Protection & Governance
25 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLCConfigure and customize transport rules in Microsoft Exchange Online, ensuring efficient email routing, improved security, and compliance for your organization.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
26 out of 60
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski SecurityKudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceInsider Risk
27 out of 60
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom ConsultingThis FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
28 out of 60
GoDaddy to Direct Microsoft 365 Migration 2 Hrs Proof of Concepttrue org cloudRemove GoDaddy and other third-party entities from your tenant, reclaiming internal control over your systems.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
29 out of 60
Securing Identities WorkshopSynergy Technical, LLCThe foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
30 out of 60
Microsoft Copilot Readiness Discovery: 3-Wk AssessmentProServeITA Microsoft Copilot Readiness Assessment will identify your AI foundational requirements & permission settings to prepare your organization for leading edge efficiency.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
31 out of 60
Endpoint Security AssessmentJourneyTEAMUnlock the untapped potential of your device management strategy and enlist Microsoft 365's proactive threat mitigation with JourneyTEAM's comprehensive Endpoint Security Assessment.
+1
Applicable to:
Information Protection & Governance
32 out of 60
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLCWe understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
33 out of 60
File Modernization for Microsoft 365CDWCDW’s File Modernization provides your organization with a path to move file content to Microsoft 365 from sources such as on-premises file servers and cloud storage providers such as Box or Google.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceTeamwork Deployment
34 out of 60
Atos || Microsoft 365 Copilot TransformationAtos International SASAtos helps you prepare your Microsoft 365 data and teams for fast adoption of the AI benefits of Microsoft 365 copilot with extensibility and ongoing proactive support/nurturing
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceTeamwork Deployment
35 out of 60
Abacode Data Governance and Protection of Sensitive Data Implementation Powered by Microsoft 365Abacode Inc.Assess data gaps and implement remediation actions to prevent sensitive data leaks leveraging Microsoft 365 stack.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
36 out of 60
Abacode Data Governance and Protection of Sensitive Data (DLP) in Government Powered by Microsoft 365Abacode Inc.Assess data gaps and implement remediation actions to prevent sensitive data leaks of Government entities leveraging Microsoft 365 Stack.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
37 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLCThe goal of the service is to securely remove your previous Exchange Server, ensuring it doesn't disrupt your operations and enabling a smooth transition to Exchange Online.
+3
Applicable to:
Adoption & Change ManagementCloud SecurityInformation Protection & Governance
38 out of 60
Ctelecoms Threat Protection EngagementConsolidated Telecoms (Ctelecoms)Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
39 out of 60
Microsoft Purview Roadmap Deployment - 6 Week AssessmentProtivitiThis engagement will provide clients with an understanding of Microsoft Purview capabilities and establish a strategic roadmap for deploying and using Purview to enhance their Data Protection Program.
+3
Applicable to:
Compliance Advisory ServicesIdentity & Access ManagementInformation Protection & Governance
40 out of 60
Defend Against Threats with SIEM Plus XDR WorkshopThe Partner MastersThe Defend Against Threats with SIEM Plus XDR Workshop will help you achieve broader security objectives—and identify current and real threats.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceThreat Protection
41 out of 60
Quorum Cyber - Data Loss Prevention Managed Service using Microsoft PurviewQuorum CyberQuorum Cyber's Data Loss Prevention Managed Service leveraging the power of Microsoft Purview
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
42 out of 60
DLP Implementation and Tuning ServicesINFOTECHTIONReduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
43 out of 60
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTIONLearn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
44 out of 60
Additional Spam and Email Protection: 3-Days Professional ServiceIT Partner LLCAdditional protection for organizations experiencing problems with emails.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceThreat Protection
45 out of 60
Microsoft Yammer Tenant-to-Tenant Migration: 1-Wk Professional ServiceIT Partner LLCFacilitate a smooth transition of your Yammer network and its associated data from one Microsoft 365 tenant to another.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
46 out of 60
Data Governance with PurviewCDWLet our skilled Microsoft engineers help you craft governance to discover, plan, protect and retain your Microsoft 365 data with technology like Microsoft Purview.
+1
Applicable to:
Information Protection & Governance
47 out of 60
Microsoft 365 Copilot Data Protection: 6-Wk ImplementationCyclotron Inc.Microsoft 365 Copilot Data Protection with Microsoft Purview: Get the toughest data protection using Copilot – the best Microsoft has to offer today.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceTeamwork Deployment
48 out of 60
Microsoft Purview Information Protection Deployment: 4 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVSecure data wherever it is and support the protection of sensitive data in clouds, apps, and devices.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
49 out of 60
IN - Crayon's SharePoint Assessment ServiceCrayonCrayon's SharePoint Assessment enhances architecture, performance, security, usability, and migration readiness, delivering expert insights for optimization.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceKnowledge & Insights
Epiq Data SecurityEpiq GlobalComprehensive safeguarding of sensitive data, enabling organizations to proactively identify and mitigate risks while protecting data and maintaining compliance with regulations.
+2
Applicable to:
Information Protection & GovernanceInsider Risk
51 out of 60
Azure Innovate AI JumpstartKiZAN TechnologiesKiZAN has created a jumpstart that will help you understand how Microsoft’s Generative AI capabilities can transform your business and accelerate innovation by changing the ways we work.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceKnowledge & Insights
52 out of 60
Microsoft 365 Copilot Implementation ServiceSoftchoiceHelping customers to be prepared to properly deploy and adopt Microsoft 365 Copilot.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceTeamwork Deployment
53 out of 60
Epiq Compliance Cloud Migration with Microsoft PurviewEpiq GlobalEpiq provides a seamless and compliant transition of valuable archive data off legacy technology, while mitigating risks and maintaining regulatory compliance harnessing Microsoft Purview.
+2
Applicable to:
Information Protection & GovernanceInsider Risk
54 out of 60
Microsoft 365 Copilot Readiness AssessmentKiZAN TechnologiesJoin our transformative workshop and discover a new era of efficiency, security, and productivity.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceTeamwork Deployment
55 out of 60
Copilot Discovery Workshop: 1-day WorkshopVitalystAlithya’s one-day Copilot Discovery Workshop can help your organization unlock the power of Copilot to transform how you and your employees do business.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceKnowledge & Insights
56 out of 60
Microsoft 365 Copilot: 2-Wk Readiness AssessmentInvokeInvoke's Microsoft 365 Copilot Readiness Assessment is a service that helps customers prepare for using Copilot 365, a solution that leverages data to enhance creativity, productivity, and skills.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInformation Protection & Governance
57 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReplyValorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
58 out of 60
Defender for Office 365 Professional Security Services | Customized Deployment in as Little as 6-WeeksDifendaTake the next step in your Defender for Office 365 journey with Difenda, the 2023 Microsoft Security Impact Award Winner.
+2
Applicable to:
Information Protection & GovernanceThreat Protection
59 out of 60
Microsoft Copilot for Microsoft 365 Tenant Readiness: 3-Month Assess & ConfigureFinchloomCopilot Readiness is a comprehensive two-part process that involves assessment and implementation & training to prepare your organization to harness the power of AI with Copilot in Microsoft 365.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
60 out of 60