AppSource
Envoyer des commentaires
Aide et assistance
Éléments enregistrés
Plans privés
Juste un moment, connexion en cours...
Tout
Applications
Catégories
Secteurs d’activité
Services de conseil
Partenaires
Filtres
Tout effacer
Votre position
Produits (1)
Secteurs d'activité
Type de service
Services de conseil résultats
Affichage des résultats dans services de conseil.
Tous les résultats
DORA act assessment and implementation
Sii Sp. z o.o.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
1 out of 39
Microsoft Security Solution Strategy - 3 Hour workshop
INFOTECHTION
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
Learn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
2 out of 39
Security Accelerator Briefing on Copilot for Microsoft 365 Briefing
KMicro Tech, Inc.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
3 out of 39
Cybersecurity Assessment Engagement
adaQuest
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Get a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
4 out of 39
Quorum Cyber Data Security Assessment using Microsoft Purview
Quorum Cyber
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
Achieve a clear understanding of the storage, access and protection of one of your organisation’s most valuable assets.
5 out of 39
Microsoft Intune Service
Sii Sp. z o.o.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Insider Risk
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
6 out of 39
Pentest-4wks Assessment
adaQuest
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Gain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
7 out of 39
Microsoft 365 Defender Attack Simulation: 4 Weeks Deployment
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Microsoft 365 attack simulation training works to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack.
8 out of 39
Onesec’s Secure Access to Microsoft 365 with Zscaler
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
9 out of 39
Securing Copilot for Microsoft 365 in Microsoft 365 for Business 1hour Implementation
true org cloud
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
The security, compliance, and privacy policies that you have in place are adopted by Copilot for Microsoft 365.
10 out of 39
Integrating Microsoft Sentinel with Carbon Black EDR
AVA SOFTWARE INC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Improve endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
11 out of 39
Active Directory Security on Demand
Comtrade System Integration
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
12 out of 39
Microsoft 365 Copilot: Security Pre-Settings
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
Copilot was designed to optimize productivity and creativity within the suite of applications, from automating repetitive tasks to real-time collaboration.
13 out of 39
Beyondsoft Data Governance and Protection with Microsoft Purview Deployment: 8-Week Implementation
Beyondsoft Brasil
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
Beyondsoft will deploy a collection of solutions from Microsoft 365 and Microsoft Purview to address security challenges regarding Data protection, Data Compliance, Data Governance and Risk Management
14 out of 39
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk Assessment
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
15 out of 39
Quorum Cyber - Managed Insider Risk Management using Microsoft Purview
Quorum Cyber
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
Our Managed Insider Risk service provides a comprehensive solution that will help identify and mitigate risks of insider threats within your organisation.
16 out of 39
Insider Risk Management (Purview) Deployment: 1 Week Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
Information Protection & Governance
Insider Risk
Knowledge & Insights
Identify, investigate, and take swift action on internal risks intelligently.
17 out of 39
Egyptian Data Protection Law: 2 Days Workshop
GLOBAL BRANDS
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
18 out of 39
OneSec Defender for Endpoint – Migration offer
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
The OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
19 out of 39
Onesec Identity Governance Lifecycle Assessment
Secure Nextgen Systems
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
20 out of 39
Copilot Data Protection
Cloud Life
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
21 out of 39
Implementación Microsoft Purview con Suri Services
Suri Services SC
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
Con Suri Services y Microsoft Purview, estarás un paso adelante en la revolución de datos, desbloqueando el potencial de tu información.
22 out of 39
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk Worshops
ENCAMINA S.L.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
23 out of 39
True Managed Security Service- 3 day Workshop
true org cloud
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
You have a vision. We can help you secure it...
24 out of 39
Quorum Cyber - Data Loss Prevention Managed Service using Microsoft Purview
Quorum Cyber
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
Quorum Cyber's Data Loss Prevention Managed Service leveraging the power of Microsoft Purview
25 out of 39
Microsoft Purview Information Protection Deployment: 4 Weeks Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
Secure data wherever it is and support the protection of sensitive data in clouds, apps, and devices.
26 out of 39
Mitigate Compliance & Privacy Risk Workshop: 4 Weeks of Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
Cloud Security
Insider Risk
Designed to help organizations identify and reduce compliance and privacy risks associated with the use of the cloud.
27 out of 39
SecureBlu MDR Service for Microsoft 365 Defender
New Era Technology
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
28 out of 39
OAAA Advanced Adversary Assesment-1 month assesment
Secure Nextgen Systems
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Learn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
29 out of 39
Workshop Mitigate Compliance & Privacy Risks: 2 sesiones de 2 horas
Nebulan
+3
Applicable to:
Cloud Security
Insider Risk
Knowledge & Insights
Descubra como User Risk Check descubre riesgos que podrían ser perjudiciales para su organización en dos sesiones de dos horas
30 out of 39
Email protection with Microsoft Defender for Office 365: 2h briefing
SMART business LLC
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
31 out of 39
HPT Mitigate Compliance and Privacy Risk_1-Day Workshop
HPT Vietnam Corporation
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Understand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
32 out of 39
Microsoft Defender for Identity Deployment: 1 Week Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
Identity & Access Management
Insider Risk
Identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
33 out of 39
Microsoft Entra Deployment: 3 Week Implementation
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
Protect all identities and secure access to any resource with a family of multi-cloud identity and network access solutions.
34 out of 39
Identity Governance Lifecycle: 4 Weeks of Assessment
Soluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
The objective of the assessment is to identify areas for improvement and potential risks in the identity environment, based on the maturity level of the organization's identity governance model.
35 out of 39
Cybersecurity Assessment
Suri Services SC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Suri Services ofrece la mejor opción en ciberseguridad, con enfoque personalizado, experiencia técnica y herramientas avanzadas para proteger su organización de manera integral.
36 out of 39
Insider Risk Management: 8-Wk implementation
PwC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
37 out of 39
Discover Sensitive Data: 5-Week Workshop
Rackspace
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
38 out of 39
Microsoft Priva - Privacy Mgmt Implementation: 16-Wks
Wipro Ltd
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
Wipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
39 out of 39