FiltersClear all
Consulting services results
Showing results in consulting services.
Data Security with Microsoft Purview 4-weeks workshopAlfa Connections Pte LtdThe Data Security Engagement helps identify and mitigate data security risks in organizational data
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
1 out of 18
Healthcare & Education Cybersecurity AssessmentPSM PartnersThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
2 out of 18
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITEDOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
3 out of 18
4Sight's Microsoft Data Security Engagement4Sight HoldingsIdentify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
4 out of 18
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology HoldingOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
5 out of 18
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
6 out of 18
Lighthouse Protect & Govern Sensitive Data Workshop: 4 WkLighthouse GlobalA hands-on engagement delivered in a workshop format with everything you need to better discover, protect, and govern your corporate data.
+2
Applicable to:
Information Protection & Governance
Insider Risk
7 out of 18
Microsoft Purview eDiscovery POC (5 Day)Epiq Global5-Day eDiscovery POC demonstrating standard & premium capabilities of Microsoft Purview components
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
8 out of 18
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
9 out of 18
Microsoft Compliance Workshop: 3-Day WorkshopWorld Wide TechnologyWWT offers a Microsoft Data Compliance and Risk workshop to help organizations with compliance risks and data protection.
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Knowledge & Insights
10 out of 18
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
11 out of 18
discover-sensitive-data-workshopECF Data LLCECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
12 out of 18
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 18
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
14 out of 18
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
15 out of 18
Compliance: 1 Day Workshop - Manage and Investigate RiskConvergeOneEveryone seems to be aware of external risk factors such as Ransomware, but what out Insider Risk? Find out the importance of proper controls and governance to protect yourself from bigger threats
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
16 out of 18
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse GlobalThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
17 out of 18
Build a Compliance Strategy - 4 weeks WorkshopINFOTECHTIONA data driven workshop to identify your information compliance maturity regards to privacy, regulatory and data exfiltration risks; and help you build a strategy for improvements.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
18 out of 18