FiltersClear all
Consulting services results
Showing results in consulting services.
Threat Protection Assessment & Zero Trust ArchitectureBDO Digital, LLCSet Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Architecture and Threat Protection Assessment
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
1 out of 60
Microsoft 365 Security Support Service BriefingTHREATSCAPE LIMITEDThreatscape’s Microsoft 365 Security Support Service helps organisations resolve security related technical issues experienced with the suite of Microsoft security products.
+2
Applicable to:
Compliance Advisory Services
Threat Protection
2 out of 60
Microsoft Intune Pilot ImplementationTechNet UC LLCTechNet UC’s Microsoft Intune Pilot Implementation is a comprehensive solution designed to propel enterprises toward superior IT management and security standards.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
3 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoiceThe Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 60
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data LtdWhether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
5 out of 60
Microsoft Intune Suite Pilot ImplementationTechNet UC LLCTechNet UC is proud to present our comprehensive Microsoft Intune Suite Pilot, designed to help enterprises explore and evaluate the extensive capabilities of Intune Suite tools.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
6 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO Digital, LLCProve the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITEDProfessional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 60
Microsoft Entra - Global Secure Access | Pilot DeploymentITC Secure LtdMicrosoft Entra Global Secure Access pilot deployment for improved security posture, streamlined access management & regulatory compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
9 out of 60
Microsoft 365 Copilot Data Security AssessmentCollective InsightsAccelerate your deployment of Microsoft Copilot while ensuring comprehensive data security and compliance across the enterprise.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
10 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
11 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
+2
Applicable to:
Cloud Security
Threat Protection
12 out of 60
Managed Support for Microsoft Defender and Endpoint Detection and Response (EDR) ServiceOlive + GooseA fully managed Microsoft Defender + EDR service designed to protect your organization from today’s most persistent cyber threats.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
13 out of 60
Trustwave Accelerator for Microsoft PurviewTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Purview to unlock full value for your organization
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
14 out of 60
Microsoft Intune Custom DeploymentTechNet UC LLCOur custom Microsoft Intune Deployment is designed to streamline your organization's device management with precision and personalization.
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
15 out of 60
Threat Landscape AssessmentProServeITGet critical cybersecurity insights with a global visualization of login attempts, dark web scan, & expert recommendations. We help secure your Microsoft 365 environment to protect your business.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
16 out of 60
Microsoft Defender for Endpoint DeploymentCitrin Cooperman Advisors, LLCFortify your business with Microsoft Defender for Endpoint that seamlessly integrates into Microsoft 365, safeguarding all devices and strengthening your Zero Trust framework.
+2
Applicable to:
Cloud Security
Threat Protection
17 out of 60
Microsoft Threat Protection EngagementRavanty Tech Consulting, Inc.Threat Protection Engagement helps you assess your security landscape, address most pressing security goals and challenges, and provide an immersive experience around Microsoft security capabilities.
+2
Applicable to:
Identity & Access Management
Threat Protection
18 out of 60
Microsoft Security Copilot Readiness AssessmentSoftchoiceAims to ensure organizations can securely utilize Microsoft’s Copilot for Security and identifying gaps in signal data from core Microsoft security products
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
19 out of 60
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
+2
Applicable to:
Cloud Security
Threat Protection
20 out of 60
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+1
Applicable to:
Threat Protection
21 out of 60
Threat Protection EngagementTierPointLearn how to put next-generation Microsoft Security tools to work for you.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
22 out of 60
Secure Productivity with Microsoft 365 Proof of Value & ImplementationBDO Digital, LLCMaximize your investment in the Microsoft 365 suite by activating and implementing all available features with security across your organization
+3
Applicable to:
Device Deployment & Management
Teamwork Deployment
Threat Protection
23 out of 60
Microsoft Defender for Endpoint QuickStartPresidioPresidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
24 out of 60
Microsoft Purview Insider Risk Management and Compliance: ImplementationITC Secure LtdThis engagement delivers setup and enablement for Microsoft Purview’s Insider Risk Management and Communication Compliance capabilities, supporting proactive risk mitigation.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
25 out of 60
eDiscovery, Data Lifecycle & Records ManagementITC Secure LtdManage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
26 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure LtdApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
27 out of 60
Data Governance - Threat Protection - AssessmentSkyTerra Technologies LLCThe goal is to assess your existing data governance posture as well as unearthing your organization's priorities and associated business needs.
+1
Applicable to:
Threat Protection
28 out of 60
Microsoft Purview Readiness and Environment SetupITC Secure LtdAssess the data governance maturity and establish a secure Microsoft Purview environment. Ensure technical and organizational readiness, delivering a strong foundation for data governance success.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
29 out of 60
Microsoft 365 Security & Compliance AssessmentITX360 (Pvt) Ltd.Microsoft 365 security assessment with a detailed report and recommendations to improve your security and compliance
+1
Applicable to:
Threat Protection
30 out of 60
Zero Trust Assessment: 3-Week WorkshopAccountabilITOur Microsoft Zero Trust Assessment: 3-Week Workshop is designed to evaluate an organization's security posture and provide guidance on implementing a Zero Trust security model.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
31 out of 60
Hyperbolt Secure DeployDelphi ConsultingHyperbolt Secure Deploy offers automated Microsoft 365 Security implementation, delivering enterprise-grade protection in weeks using industry-standard policies.
+3
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
32 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLPTwo-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
33 out of 60
Information Protection & DLP PilotAwara IT Kazakhstan LLPInformation Protection & DLP Pilot — secure your data with sensitivity labels, automated classification, and DLP policy testing.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Threat Protection
34 out of 60
Endpoint Security Posture AssessmentBridewell Consulting LimitedSecure your Windows 11 endpoints with a posture assessment using industry benchmarks (eg. CIS).
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
35 out of 60
Secure and Maximize Your Microsoft 365 Tenant with Manage & ProtectAll Covered, a division of Konica MinoltaMicrosoft 365 tenant management to provide you with continuous security & compliance, enhanced administration, and actionable insights.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
36 out of 60
Security Copilot Value AcceleratorAvanade, Inc.Designed to help organizations modernize their security operations and administration by leveraging Gen AI.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
37 out of 60
Zero Trust Security AssessmentCitrin Cooperman Advisors, LLCOur Zero Trust Security Assessment will evaluate identity, email, data, and endpoint device controls, threat protection, management, and licensing to strengthen your organization's security posture.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
38 out of 60
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLPEvaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
39 out of 60
Secure Productive Workplace: Implement 4-WkNetsuritNetsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
40 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLCThe Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
41 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
42 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, IncKAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
43 out of 60
Microsoft Security: 3-Day WorkshopApex Digital SolutionsDevelop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
44 out of 60
Microsoft 365 E5 Cyber Range 2 Week ImplementationKAMIND IT, IncKAMIND's cybersecurity immersive learning deployment utilizing Project Ares Cyber Range for Microsoft 365 Security Suites.
+2
Applicable to:
Cloud Security
Threat Protection
45 out of 60
G Suite to Office 365 migration: 1-Hour Assessmenttrue org cloudAssessment of your current G Suite environment to plan migration to Office 365
+3
Applicable to:
Adoption & Change Management
Mobile Device Management
Threat Protection
46 out of 60
Microsoft Security: 4-Week ImplementationApex Digital SolutionsEstablish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
47 out of 60
Microsoft 365 - Threat Protection: 2-week workshopForteventoWorkshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
48 out of 60
Cloud Security Journey: 2 Hour Proof of Concept360 Visibility Inc.See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
49 out of 60
Microsoft 365/Azure Cloud Secure 5 Day AssessmentDynTek Inc.DynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
50 out of 60
4-Day Security AssesmentHSO From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
51 out of 60
Microsoft 365 E5 CMMC L1 3 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 1 using Microsoft 365 security Suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
52 out of 60
Microsoft 365 E5 CMMC L3 8 Week ImplementationKAMIND IT, IncKAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
53 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT LimitedCybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
54 out of 60
atQor Microsoft 365 Security Assessment: 3-Wk AssessmentatQorGet expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
55 out of 60
Modern Workplace Security 10-Wk ImplementationWipro LtdWipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
56 out of 60
Microsoft 365 Incident Response - 5 Week AssessmentProtivitiAssessing the advanced security capabilities of Microsoft 365
+2
Applicable to:
Cloud Security
Threat Protection
57 out of 60
Microsoft 365 Value Discovery - Workshop - 1 DayDynTek Inc.OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT
OF MICROSOFT 365 IN YOUR ENVIRONMENT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
58 out of 60
Microsoft 365 Security: 4-Week AssessmentApex Digital SolutionsAchieve better security with Microsoft 365 while receiving focused expertise where it matters most and improving your security maturity over time.
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
59 out of 60
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, LdaThe engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
60 out of 60