Enviar comentarios
Help & support
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
FiltrosBorrar todo

  • Su ubicación
  • Productos (1)
    • Dynamics 365
    • Microsoft 365 (1)
      • Adopción y administración de los cambios
      • Llamada para Microsoft Teams
      • Seguridad en la nube
      • Servicios de asesoría de cumplimiento
      • Implementación y administración de dispositivos
      • Trabajadores de primera línea
      • Administración de identidad y acceso
      • Information Protection y Gobernanza
      • Riesgo interno
      • Conocimiento e información
      • Salas de reuniones para Microsoft Teams
      • Reuniones para Microsoft Teams
      • Microsoft 365 Live Events
      • Administración de dispositivos móviles
      • Power Platform for Teams
      • Soluciones personalizadas de Teams
      • Implementación de trabajo en equipo
      • Protección contra amenazas
      • Workplace Analytics
    • Power Platform
  • Sectores
  • Tipo de servicio

Servicios de consultoría resultados

Mostrando resultados en servicios de consultoría
Vista resultados relacionados en nubes del sector.
Comprehensive Microsoft 365 Security Assessment: 1-Week ProgramWindows Management Experts, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
1 out of 23
Cybersecurity AssessmentCDI LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
2 out of 23
Security Solutions:2-Weeks ImplementationAlpine Health Technologies Corp
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
3 out of 23
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
4 out of 23
Microsoft Purview Insider Risk Management and Compliance: ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement delivers setup and enablement for Microsoft Purview’s Insider Risk Management and Communication Compliance capabilities, supporting proactive risk mitigation.
5 out of 23
Epiq Flex IG Talent for Microsoft PurviewEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Epiq Flex IG Talent is here to provide it clients with flexible talent surrounding Microsoft Purview eDiscovery, Information Governance, Compliance and Archiving.
6 out of 23
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Apply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
7 out of 23
Copilot for Microsoft 365 Data Security QuickStartSoftchoice
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Setting the foundation for data security and governance in preparation for Copilot for Microsoft 365
8 out of 23
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Cyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
9 out of 23
discover-sensitive-data-workshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
10 out of 23
Defender for Office 365: 5-Day AssessmenteGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
11 out of 23
Cybersecurity: Protect Your Operations with Henson GroupThe Henson Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Henson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
12 out of 23
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski Security
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Kudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
13 out of 23
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
14 out of 23
Purview Compliance Manager Adoption WorkshopCDI LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The CDI professional services team intends to show you how to increase your Organizational Governance using a built-in service that you may not be fully aware of.
15 out of 23
Epiq Mergers and Acquisitions Risk ReductionEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Identify and exclude sensitive information from being migrated during mergers and acquisitions (M&A) data discovery and migration projects.
16 out of 23
Compliance: 1 Day Workshop - Manage and Investigate RiskConvergeOne
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Everyone seems to be aware of external risk factors such as Ransomware, but what out Insider Risk? Find out the importance of proper controls and governance to protect yourself from bigger threats
17 out of 23
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical Start
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Rapidly identify, contain, and remediate a breach.
18 out of 23
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
This assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
19 out of 23
Healthcare & Education Cybersecurity AssessmentPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
This assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
20 out of 23
Data Security EngagementPC Connection, Inc.
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Our Microsoft Purview Data Security Engagement provides actionable insights into data security, privacy, and compliance risks.
21 out of 23
THInc Secure Managed Security Service for MicrosoftTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
22 out of 23
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It Security
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Enable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
23 out of 23
  • Anterior
  • 1
  • 2
  • 3
Novedades
  • Copilot para organizaciones
  • Copilot para uso personal
  • Microsoft 365
  • Explora los productos de Microsoft
Microsoft Store
  • Perfil de la cuenta
  • Devoluciones
  • Seguimiento de pedidos
Educación
  • Microsoft Educación
  • Dispositivos para el sector educativo
  • Microsoft Teams para Educación
  • Microsoft 365 Educación
  • Office Educación
  • Entrenamiento y desarrollo para educadores
  • Ofertas para estudiantes y padres
  • Azure para estudiantes
Empresa
  • Microsoft Cloud
  • Seguridad de Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Desarrollador y TI
  • Desarrollador de Microsoft
  • Documentación
  • Microsoft Learn
  • Comunidad de Microsoft Tech
  • Microsoft Marketplace
  • Microsoft Power Platform
  • Visual Studio
Compañía
  • Trabajos
  • Acerca de Microsoft
  • Privacidad en Microsoft
  • Inversionistas
  • Sustentabilidad
Español (Ecuador) Icono de exclusión de opciones de privacidad Tus opciones de privacidad Privacidad de la salud del consumidor
  • Sitemap
  • Contáctenos
  • Privacidad
  • Aviso legal
  • Marcas Registradas
  • Sobre nuestra publicidad
  • Manage cookies
  • © Microsoft 2025