FiltreRyd alle
Konsulenttjenester resultater
Viser resultater i konsulenttjenester.
Alle resultater
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
1 out of 60
Epiq Microsoft 365 Copilot Optimization with Microsoft PurviewEpiq GlobalEnable your organization with Microsoft Copilot’s AI capabilities while mitigating implementation risks.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceInsider Risk
2 out of 60
Microsoft Intune ServiceSii Sp. z o.o.Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementInsider Risk
3 out of 60
Microsoft Purview Implementation AdvisoryEpiq GlobalEpiq Microsoft Purview information governance consulting and advisory services ensure secure, compliant and efficient information governance strategies and deployment for Microsoft Purview compliance.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
4 out of 60
Quorum Cyber - Managed Insider Risk Management using Microsoft PurviewQuorum CyberOur Managed Insider Risk service provides a comprehensive solution that will help identify and mitigate risks of insider threats within your organisation.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
5 out of 60
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTIONLearn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
6 out of 60
Quorum Cyber - Data Loss Prevention Managed Service using Microsoft PurviewQuorum CyberQuorum Cyber's Data Loss Prevention Managed Service leveraging the power of Microsoft Purview
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
7 out of 60
DLP in 30: 6-wk ImplementationLong View SystemsPreserve your data wealth, secure your future with Data Loss Prevention powered by Microsoft Purview
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
8 out of 60
Bulletproof 365 Compliance: Managed Information Protection ServiceBulletproof Solutions Inc.We can help organizations understand their risks, define the strategy and path to mitigating these risks and provide the expertise to efficiently monitor and respond when internal and external threats
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
9 out of 60
Microsoft 365 Copilot Readiness Assessment: 1-Wk AssessmentPoint Alliance IncEmbark on a transformative journey with our Microsoft Co-Pilot Readiness Assessment, designed to empower teams and organizations in embracing the future of AI collaboration.
+3
Applicable to:
Adoption & Change ManagementIdentity & Access ManagementInsider Risk
10 out of 60
Beyondsoft Data Governance and Protection with Microsoft Purview Deployment: 8-Week ImplementationBeyondsoft BrasilBeyondsoft will deploy a collection of solutions from Microsoft 365 and Microsoft Purview to address security challenges regarding Data protection, Data Compliance, Data Governance and Risk Management
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
11 out of 60
Integrating Microsoft Sentinel with Carbon Black EDRAVA SOFTWARE INCImprove endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
12 out of 60
Lighthouse Microsoft Purview Deployment: 10-Wk IntegrationLighthouse GlobalImplement and integrate Microsoft Purview into your organization with confidence knowing you have mitigated risk factors and maximized your investment.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
13 out of 60
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
14 out of 60
Lighthouse Microsoft Data Security Check: 4-Wk AssessmentLighthouse GlobalIdentify data security risks in organizational data and receive expert guidance on operationalizing Microsoft 365 and the Purview suite of security and compliance technologies with this workshop.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
15 out of 60
Data Protection and Compliance Quick StartSoftchoiceThe Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
16 out of 60
Avanade Security Business Value 4-Wk AssessmentAvanade, Inc.Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
17 out of 60
SecureBlu MDR Service for Microsoft 365 DefenderNew Era TechnologySecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
18 out of 60
Quorum Cyber Data Security Assessment using Microsoft PurviewQuorum CyberAchieve a clear understanding of the storage, access and protection of one of your organisation’s most valuable assets.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
19 out of 60
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access ManagementInsider RiskThreat Protection
20 out of 60
Copilot Data ProtectionCloud LifeCopilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
21 out of 60
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDSEgyptian Data Protection Law offer aims to give you a brief description of the following:
Data Privacy Basics
The Egyptian Data Protection Law main highlights
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInsider Risk
22 out of 60
Securing Copilot for Microsoft 365 in Microsoft 365 for Business 1hour Implementationtrue org cloudThe security, compliance, and privacy policies that you have in place are adopted by Copilot for Microsoft 365.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
23 out of 60
Microsoft 365 Information Protection and Governance: 12 week ImplementationINFOTECHTIONDevelop a strategy and blueprint for protecting and governing your information in Microsoft365 and beyond. Implement and manage through Infotechtion managed services.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
24 out of 60
True Managed Security Service- 3 day Workshoptrue org cloudYou have a vision. We can help you secure it...
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
25 out of 60
Microsoft 365 Security Assessment-1Wk AssessmentPoint Alliance IncOrganizations have diverse security needs and attitudes; thus, our assessment checklist provides general recommendations for various scenarios
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceInsider Risk
26 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
27 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen SystemsThe OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
28 out of 60
Microsoft Purview Protect & Govern Sensitive Data - 3 Day WorkshopEpiq GlobalDiscover risks from dark data and learn how to address them with Microsoft Purview and Epiq.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
29 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
30 out of 60
Pentest-4wks AssessmentadaQuestGain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
+3
Applicable to:
Identity & Access ManagementInsider RiskThreat Protection
31 out of 60
Ctelecoms Defend Against Threats with SIEM Plus XDR WorkshopConsolidated Telecoms (Ctelecoms)Defend Against Threats with SIEM Plus XDR Workshop Learn how to put next-generation Microsoft security tools to work for you.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
32 out of 60
Copilot for Microsoft 365 Data Security QuickStartSoftchoiceSetting the foundation for data security and governance in preparation for Copilot for Microsoft 365
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
33 out of 60
Onesec’s Secure Access to Microsoft 365 with ZscalerSecure Nextgen SystemsEnhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
34 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance IncYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
35 out of 60
User Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
36 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
37 out of 60
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro LtdWipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
38 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInsider Risk
39 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLCGet introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
40 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
41 out of 60
Microsoft Copilot Legal & Compliance Readiness Assessment: 4-Wk AssessmentLighthouse GlobalThis assessment helps identify information protection and data governance gaps to prepare your organization to safely and efficiently deploy Microsoft Copilot.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
42 out of 60
OAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen SystemsLearn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
+3
Applicable to:
Identity & Access ManagementInsider RiskThreat Protection
43 out of 60
Lighthouse Microsoft SharePoint Premium Security and Compliance Assessment: 4 WkLighthouse GlobalInteractive assessment to identify opportunities to increase efficiency using Microsoft SharePoint Premium for data security and data governance use cases.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
44 out of 60
Legacy Data Migration and Optimization: 52-Wk MigrationLighthouse GlobalThis engagement delivers defensible migration from legacy on-prem archives to Microsoft 365, mapping to the Microsoft Purview suite of tools.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
45 out of 60
Lighthouse Proof of Concept: 10 WkLighthouse GlobalPartner with Lighthouse to test Microsoft Purview technology and understand if it's meets requirements for your organization’s data security workflows.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
46 out of 60
Ctelecoms Mitigate Compliance and Privacy Risks WorkshopConsolidated Telecoms (Ctelecoms)The Mitigate Compliance & Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organization.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInsider Risk
47 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 WeeksNetrix GlobalUnderstand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
48 out of 60
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix GlobalA 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceInsider Risk
49 out of 60
Mitigate Compliance & Privacy Risks: 1-Day WorkshopNetrix GlobalUnderstand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
50 out of 60
Privacy Management Workshop | Microsoft PrivaEpiq GlobalEpiq's Privacy Management Workshop enables customers to safeguard personal information and manage privacy risk using Microsoft 365 Priva Priva Privacy Risk Management
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
51 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen SystemsThe Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInsider Risk
52 out of 60
DLP Implementation and Tuning ServicesINFOTECHTIONReduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
53 out of 60
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVIdentify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
+2
Applicable to:
Identity & Access ManagementInsider Risk
54 out of 60
Microsoft Purview Information Protection Deployment: 4 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVSecure data wherever it is and support the protection of sensitive data in clouds, apps, and devices.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
55 out of 60
Lighthouse Protect & Govern Sensitive Data Workshop: 4 WkLighthouse GlobalA hands-on engagement delivered in a workshop format with everything you need to better discover, protect, and govern your corporate data.
+2
Applicable to:
Information Protection & GovernanceInsider Risk
56 out of 60
Microsoft 365 Legal & Compliance Assessment: 4 WkLighthouse GlobalA customizable, strategic assessment designed to optimize efficiency of Microsoft Purview with a focus on archiving, records management, eDiscovery, Data Security, and information governance.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
57 out of 60
CloudCompass Managed Service: 12-mo SubscriptionLighthouse GlobalA Lighthouse subscription service for Microsoft 365 designed to keep legal and compliance teams ahead of change in the dynamic cloud computing landscape.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
58 out of 60
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
+3
Applicable to:
Device Deployment & ManagementInsider RiskThreat Protection
59 out of 60
Discover Sensitive Data: 5-Week WorkshopRackspaceDiscover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
60 out of 60