Filters
Browse consulting services
Refine offers by selecting filters and sorting options.
All results
Modernize Communications WorkshopNTT LimitedThe Modernize Communications Workshop – a modular engagement to experience the vision for Microsoft Teams Phone and advanced communication scenarios
+3
Applicable to:
Adoption & Change Management
Calling for Microsoft Teams
Teamwork Deployment
1 out of 60
Microsoft Teams Calling : 6-weeks ImplementationGlobal Computing and TelecomsTo assist organizations to deploy and drive adoption of Microsoft Teams Calling to fully realise the benefit to their investment
+3
Applicable to:
Calling for Microsoft Teams
Meetings for Microsoft Teams
Teams Custom Solutions
2 out of 60
Consultancy Workshop for Microsoft TeamsIMPERIUM DYNAMICS LLCOpt for Microsoft Teams consultancy and get custom solutions designed.
+3
Applicable to:
Meetings for Microsoft Teams
Power Platform for Teams
Teams Custom Solutions
3 out of 60
Dynamics 365 Customer Service Express - Implementación en 1 mesAW LatamSolución Express para la gestión del Servicio al Cliente
+1
Applicable to:
Customer Service
4 out of 60
Dynamics 365 Sales Express - Implementación en 1 mesAW LatamSolución Express para la Fuerza de Ventas
+1
Applicable to:
Sales
5 out of 60
Dynamics 365 Field Service Express - Implementación en 2 mesesAW LatamSolución Express para Servicio Técnico Postventa
+1
Applicable to:
Field Service
6 out of 60
Custom Teams App Development: 1 Hour AssessmentSolutions2Share GmbHYour custom app for Microsoft Teams: In this free 1-hour assessment, we will get to know your specifications and requirements for a tailored app.
+1
Applicable to:
Teams Custom Solutions
Obsługa kas samoobsługowych dla MS Dynamics 365Retcon Sp. z o.o.Rozszerzenie Obsługi kas samoobsługowych POS/SCO do Microsoft Dynamics 365 Commerce umożliwia elastyczną obsługę punktów sprzedaży (POS) oraz kas samoobsługowych (SCO).
+3
Applicable to:
Commerce
Supply Chain Management
Finance
8 out of 60
MJ Flood Technology Complimentary Business Value AssessmentM.J. FLOOD TECHNOLOGY LIMITEDA complimentary Business Value Assessment focused on Microsoft Teams, aiming to provide you with valuable insights into how your organisation can leverage Teams to drive tangible business outcomes
+1
Applicable to:
Calling for Microsoft Teams
9 out of 60
Copilot 1wk Activation Assessment: Dynamics 365 Customer ServiceVelradaPrepare your organisation for the capabilities of Copilot in Dynamics 365 Customer Service
+3
Applicable to:
Customer Service
Power Virtual Agents
Power Apps
10 out of 60
Copilot 1wk Activation Assessment: Dynamics 365 SalesVelradaPrepare your organisation for the capabilities of Copilot in Dynamics 365 Sales.
+3
Applicable to:
Sales
Power Virtual Agents
Power Apps
11 out of 60
Microsoft Teams Custom App: 3-Day AssessmentTarasTechSimplify Processes and Boost Efficiency with Microsoft Teams Integration.
+1
Applicable to:
Adoption & Change Management
12 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense GlobalStop threats with a cloud-native SIEM adapted to your new business needs.
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Threat Protection
13 out of 60
Copilot for Microsoft 365 - Readiness Engagement: 2 Week-ImplementationHTGAfter assessing data availability and quality, we will provide and implement a robust set of recommendations for enhancing your security posture ahead of a Copilot deployment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
14 out of 60
Eviden's Copilot Adoption and Organizational Change Management 6 Months ImplementationEviden International France - SASWe provide customers with a comprehensive Organizational Change Management Adoption Plan that can transform, streamline, optimize, and empower people while transitioning to Microsoft 365 Copilot.
+1
Applicable to:
Adoption & Change Management
15 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFTEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
16 out of 60
Microsoft 365 complete security HardneningAVASOFTAre you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
17 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFTConfident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
18 out of 60
SharePoint and Teams Security - 2 week assessmentAVASOFTConfident in your Teams and SharePoint security? Our 2-week assessment fortifies platforms with custom policies, threat detection, and monitoring to ensure compliance.
+3
Applicable to:
Information Protection & Governance
Threat Protection
Workplace Analytics
Secure Data Management with Microsoft PurviewAVASOFTConfident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 60
Sensitive data risk assessmentAVASOFTConfident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
21 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
22 out of 60
Teams & SharePoint Security ImplementationAVASOFTConfident in your Teams and SharePoint security? Our solutions offer tailored protocols, threat detection, and monitoring to secure data, mitigate risks, and ensure compliance.
+3
Applicable to:
Information Protection & Governance
Teams Custom Solutions
Workplace Analytics
Enhanced Data Privacy with Microsoft PurviewAVASOFTConfident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
24 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFTThe Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
25 out of 60
Entra ID Identity and Application Governance Solutions by AVASOFTAVASOFTOur solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
26 out of 60
Phishing, Malware & Spam protection- 2 weeks ImplementationAVASOFTPhishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
27 out of 60
Power BI Analytics: 32-Hour Workshop & AsessmentIT-Dev sp. z o.o.Power BI Analytics workshops help identify data analysis problems and inspire participants to seek Power BI-based solutions, addressing major challenges and ensuring a return on investment.
+1
Applicable to:
Power BI apps
28 out of 60
Power BI Starter Package: Immediate success with Power BI (Concepts, Blueprints)IT-Logix AGWith the IT-Logix Power BI Starter Package you are ideally equipped to develop and manage your Power BI landscape efficiently and securely. Lay the foundation for a datadriven decision-making culture!
+1
Applicable to:
Power BI apps
29 out of 60
Copilot - 2 Days Adoption WorkshopINSOMEA COMPUTER SOLUTIONS TUNISIE SARLINSOMEA will help users in adopting copilot within companies from different sectors and sizes
+2
Applicable to:
Frontline Workers
Threat Protection
30 out of 60
Social Sustainability: WorkshopLingaroReporting social aspect of sustainable development
+2
Applicable to:
Power BI apps
Power Apps
31 out of 60
Securing Copilot for Microsoft 365 in Microsoft 365 for Business 1hour Implementationtrue org cloudThe security, compliance, and privacy policies that you have in place are adopted by Copilot for Microsoft 365.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
32 out of 60
CO2e Emissions Reporting: WorkshopLingaroCertified Carbon Emissions Reporting
+2
Applicable to:
Power BI apps
Power Apps
33 out of 60
Sustainability Reporting: US SECLingaroUS SEC Reporting
+2
Applicable to:
Power BI apps
Power Apps
34 out of 60
Power Apps Process Coordination: 32-Hour Workshop & AssessmentIT-Dev sp. z o.o.Power Apps Workshops pinpoint process coordination challenges and motivate participants to develop solutions using Power Apps, tackling significant issues and ensuring effective results and ROI.
+1
Applicable to:
Power Apps
35 out of 60
Security and compliance assessment with Microsoft PurviewAVASOFTFortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
36 out of 60
Secure & Manage Devices using the Microsoft Intune Suite with AVASOFTAVASOFTSeamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
+3
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
37 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVASOFTEnhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
38 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFTEnhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
39 out of 60
Microsoft Sentinel Integration with Carbon Black by AVASOFTAVASOFTImprove endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
40 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFTManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Device Management Migration - On-Premises to Cloud by AVASOFTAVASOFTSeamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
42 out of 60
Proactive Security Monitoring - Consulting Service listingCloudWay Services ASTake the first and most important step in securing Microsoft 365: getting an overview over what you have in your environment.
+3
Applicable to:
Device Deployment & Management
Knowledge & Insights
Mobile Device Management
43 out of 60
Secure AILogicalis SolutionsComprehensive security for generative AI applications, ensuring safe usage and protection of sensitive data
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
44 out of 60
Viva Insights & GoalsH One (Private) LimitedElevate, Engage, Excel: Your Path to Employee Well-Being and Productivity Excellence
+3
Applicable to:
Knowledge & Insights
Teamwork Deployment
Workplace Analytics
45 out of 60
Copilot Readiness AssessmentM.J. FLOOD TECHNOLOGY LIMITEDGet a Microsoft Copilot Readiness Assessment for your organisation - See can you benefit from the power of AI
+2
Applicable to:
Adoption & Change Management
Knowledge & Insights
46 out of 60
Data Migration: 7 Days AssessmentAxapta MastersData Migration Assessment by Axapta Masters
+3
Applicable to:
Commerce
Supply Chain Management
Finance
47 out of 60
Infrastructure optimization: 3 week PoCELEKSThis service enhances system efficiency and reduces costs by streamlining and automating processes. Advanced analytics identify improvement areas, ensuring optimal performance to meet business needs.
+1
Applicable to:
Power BI apps
48 out of 60
Microsoft 365 Copilot workshop: 1-week consulting servicesUni Systems S.M.S.A.This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
49 out of 60
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFTBoost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
50 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFTSecure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
51 out of 60
Manage Corporate Data on Devices with IntuneAVASOFTCan you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
52 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFTBoost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
53 out of 60
LTIM Business Applications Dynamics 365 CRM Transformation OfferingLTIMindtree LimitedLTIMindtree's D365 CRM Transformation offering provides solutions for managing Customer Relationships and driving business growth. Our offerings range from implementation, customization and support.
+3
Applicable to:
Sales
Customer Service
Field Service
54 out of 60
Copilot for Microsoft 365 Data and Security Readiness AssessmentAwara IT Kazakhstan LLPElevate Your Data and Security with Copilot for Microsoft 365 Readiness Assessment by Awara IT's experts.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
55 out of 60
Microsoft Cloud App Security (MCAS) for Custom Apps by AVASOFTAVASOFTKnow your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
56 out of 60
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFTAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
57 out of 60
Microsoft Cloud Application for 3rd Party AppsAVASOFTSecure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
58 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFTIntegrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
59 out of 60
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFTIntegrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
60 out of 60