FiltersClear all
Consulting services results
Showing results in consulting services.
All results
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
1 out of 60
Introduction to Microsoft Purview Data Protection: 4-Hour TrainingLong View SystemsGain hands-on knowledge in data protection, governance, and compliance with Long View’s expert-led Microsoft Purview training.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceInsider Risk
2 out of 60
Insider Risk Management Quick Start 12-wk ImplementationEdgile, Inc.Achieve a Microsoft 365 Insider Risk Management (IRM) production pilot, which is expected to provide solutions, detection, and investigation for insider threat scenarios.
+1
Applicable to:
Insider Risk
3 out of 60
Microsoft Sentinel Integration with Carbon Black by AVASOFTAVASOFTImprove endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
4 out of 60
Rapid Data Loss Prevention: 30-Day ImplementationLong View SystemsPreserve your data and secure your future with Data Loss Prevention powered by Microsoft Purview in just 30 days.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
5 out of 60
Data Security Engagement: 4-Wk WorkshopExelegentThe Data Security Engagement provides a summary of an organization’s data protection and compliance stature with actionable recommendations.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
6 out of 60
Quorum Cyber Data Security Assessment using Microsoft PurviewQuorum CyberAchieve a clear understanding of the storage, access and protection of one of your organisation’s most valuable assets.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
7 out of 60
Microsoft Intune ServiceSii Sp. z o.o.Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementInsider Risk
8 out of 60
Cybersecurity Assessment: 3-Wk WorkshopExelegentThe Cybersecurity Assessment is designed to evaluate your cybersecurity posture and reduce risks exposure by using advanced Microsoft 365 Security products
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
9 out of 60
Incident Response Tabletop Exercises: 2-Wk BriefingeGroup Enabling TechnologiesBe proactive and prepare your IT team for emergencies with a Disaster Plan
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
10 out of 60
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access ManagementInsider RiskThreat Protection
11 out of 60
Quorum Cyber - Managed Insider Risk Management using Microsoft PurviewQuorum CyberOur Managed Insider Risk service provides a comprehensive solution that will help identify and mitigate risks of insider threats within your organisation.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
12 out of 60
Microsoft Purview Data Security Advanced Quick Start 16-wk ImplementationEdgile, Inc.The Microsoft Purview Data Security Quick Start is an accurate and reliable program that allows you to immediately leverage your Microsoft investments. You’ll receive high velocity, measurable outcome
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
13 out of 60
Lighthouse Microsoft SharePoint Premium Security and Compliance Assessment: 4 WkLighthouse GlobalInteractive assessment to identify opportunities to increase efficiency using Microsoft SharePoint Premium for data security and data governance use cases.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
14 out of 60
Pentest-4wks AssessmentadaQuestGain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
+3
Applicable to:
Identity & Access ManagementInsider RiskThreat Protection
15 out of 60
Bulletproof 365 Compliance: Managed Information Protection ServiceBulletproof Solutions Inc.We can help organizations understand their risks, define the strategy and path to mitigating these risks and provide the expertise to efficiently monitor and respond when internal and external threats
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
16 out of 60
Avanade Security Business Value 4-Wk AssessmentAvanade, Inc.Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
17 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInsider Risk
18 out of 60
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro LtdWipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
19 out of 60
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTIONLearn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
20 out of 60
Identity and Access Management SolutionH One (Private) LimitedEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInsider Risk
21 out of 60
Data Security with Microsoft Purview-4h AssessmentReplyThe Microsoft Purview Assessment offers advanced data security, integrating discovery, classification, and governance with Microsoft’s suite to enhance compliance and protection.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
22 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
23 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen SystemsThe OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
24 out of 60
Microsoft Purview Insider Risk Management (IRM): 2-Week ImplementationSpyglass MTG, LLCOur engagement is designed to accelerate the ability to integrate and consume IRM across your enterprise while better securing data and identities in the environment.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
25 out of 60
Enforced Data Security Implementation - 12 weeksBDO Digital, LLCSecure and control access to your company's data, no matter where it lives
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
26 out of 60
Lighthouse Microsoft 365 Purview Art of the Possible: 1-Wk WorkshopLighthouse GlobalA custom hands-on workshop to understand the full capabilities and value of the Microsoft Purview suite and how to maximize its benefits in your organization’s compliance framework.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
27 out of 60
Epiq eDiscovery Solution with Microsoft PurviewEpiq GlobalStreamline the entire discovery process within your environment, enabling efficient data retrieval and analysis while ensuring compliance with legal requirements with Microsoft Purview.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
28 out of 60
Microsoft Purview eDiscovery POC (5 Day)Epiq Global5-Day eDiscovery POC demonstrating standard & premium capabilities of Microsoft Purview components
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
29 out of 60
Securing Copilot for Microsoft 365 in Microsoft 365 for Business 1hour Implementationtrue org cloudThe security, compliance, and privacy policies that you have in place are adopted by Copilot for Microsoft 365.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
30 out of 60
Cybersecurity AssessmentCDI LLCThe Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
31 out of 60
Data Protection and Compliance Quick StartSoftchoiceThe Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
32 out of 60
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling TechnologiesCyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
33 out of 60
Lighthouse Microsoft Data Security Check: 4-Wk AssessmentLighthouse GlobalIdentify data security risks in organizational data and receive expert guidance on operationalizing Microsoft 365 and the Purview suite of security and compliance technologies with this workshop.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
34 out of 60
Manage and Investigate Risk: 3W - WorkshopExelegentThis workshop will help to identify risky users and find a strategy for protecting data in an automated and privacy-oriented way.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
35 out of 60
Microsoft 365 Information Protection and Governance: 12 week ImplementationINFOTECHTIONDevelop a strategy and blueprint for protecting and governing your information in Microsoft365 and beyond. Implement and manage through Infotechtion managed services.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
36 out of 60
DLP Implementation and Tuning ServicesINFOTECHTIONReduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
37 out of 60
SecureBlu MDR Service for Microsoft 365 DefenderNew Era TechnologySecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
38 out of 60
Microsoft 365 Security WorkshopOlive + GooseImprove your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
39 out of 60
Security Modernization: 3 Day WorkshopNetwovenSafeguard your business with a three-step security modernization solution from Netwoven
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
40 out of 60
Copilot for Microsoft 365 Data Security QuickStartSoftchoiceSetting the foundation for data security and governance in preparation for Copilot for Microsoft 365
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
41 out of 60
Abacode Data Governance and Protection of Sensitive Data (DLP) in Government Powered by Microsoft 365Abacode Inc.Assess data gaps and implement remediation actions to prevent sensitive data leaks of Government entities leveraging Microsoft 365 Stack.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
42 out of 60
Multi Cloud Security: Secure Multi & Hybrid Cloud Environments WorkshopCompuNetFive week engagement that helps customers gain insights on active threats and vulnerabilities related to their hybrid and multi-cloud workloads within Microsoft 365.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInsider Risk
43 out of 60
Copilot for Microsoft 365: 18-Day Get Ready Standard Workshopwater IT Security GmbHGet ready for Copilot for Microsoft 365 – and learn how your organization can safely and confidently adopt AI technologies while actively protecting and managing sensitive data with Microsoft Purview.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
44 out of 60
Defender for Office 365: 5-Day AssessmenteGroup Enabling TechnologiesMicrosoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
45 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
46 out of 60
Quorum Cyber - Data Loss Prevention Managed Service using Microsoft PurviewQuorum CyberQuorum Cyber's Data Loss Prevention Managed Service leveraging the power of Microsoft Purview
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
47 out of 60
Lighthouse Microsoft Purview Deployment: 10-Wk IntegrationLighthouse GlobalImplement and integrate Microsoft Purview into your organization with confidence knowing you have mitigated risk factors and maximized your investment.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
48 out of 60
Copilot Data ProtectionCloud LifeCopilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
49 out of 60
True Managed Security Service- 3 day Workshoptrue org cloudYou have a vision. We can help you secure it...
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
50 out of 60
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDSEgyptian Data Protection Law offer aims to give you a brief description of the following:
Data Privacy Basics
The Egyptian Data Protection Law main highlights
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInsider Risk
51 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen SystemsThe Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInsider Risk
52 out of 60
Virtual CISO Services: 1-Mo BriefingeGroup Enabling TechnologiesCIOs are busy leading the digital initiatives of the business, with security falling behind other priorities.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
53 out of 60
Privacy Management Workshop | Microsoft PrivaEpiq GlobalEpiq's Privacy Management Workshop enables customers to safeguard personal information and manage privacy risk using Microsoft 365 Priva Priva Privacy Risk Management
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
54 out of 60
Get Ready for Copilot for Microsoft 365 with Zones Purview WorkshopZones, LLCThe goal of the Zones' Purview Workshop is to provide organizations with a tailored, 6-week journey to master data governance, safeguard data,
+2
Applicable to:
Information Protection & GovernanceInsider Risk
55 out of 60
Epiq Data SecurityEpiq GlobalComprehensive safeguarding of sensitive data, enabling organizations to proactively identify and mitigate risks while protecting data and maintaining compliance with regulations.
+2
Applicable to:
Information Protection & GovernanceInsider Risk
56 out of 60
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical StartRapidly identify, contain, and remediate a breach.
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
57 out of 60
Microsoft 365 Security Assessment-1Wk AssessmentPoint Alliance IncOrganizations have diverse security needs and attitudes; thus, our assessment checklist provides general recommendations for various scenarios
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceInsider Risk
58 out of 60
User Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
59 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLCGet introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
60 out of 60