AppSource
AplikasiLayanan KonsultasiIndustry CloudsMitra
Cari consulting services AppSource
AppSource
Lainnya
Cari consulting services AppSource
AppSource
Lainnya
Cari consulting services AppSource
AppSource
Cari consulting services AppSource
FilterHapus semua


Layanan konsultan hasil

Menampilkan hasil dalam layanan konsultan
Tampilkan hasil terkait di industry clouds.
Semua hasil
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLC
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
1 out of 54
Purview Compliance Manager Adoption WorkshopCDI LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The CDI professional services team intends to show you how to increase your Organizational Governance using a built-in service that you may not be fully aware of.
2 out of 54
HPT_Microsoft Secure Score Assessment - 4 weekHPT Vietnam Corporation
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Secure Score helps customers quickly figure out what actions they can take to improve your score. They can check their action queue and find the change they can make that most improves their security
3 out of 54
HPT_Microsoft Cyber Security Assessment_2 weekHPT Vietnam Corporation
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Strengthen your firm's defenses with our all-in-one cybersecurity platform
4 out of 54
HPT Mitigate Compliance and Privacy Risk_1-Day WorkshopHPT Vietnam Corporation
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Understand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
5 out of 54
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
6 out of 54
Microsoft Purview Data Security Advanced Quick Start 16-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The Microsoft Purview Data Security Quick Start is an accurate and reliable program that allows you to immediately leverage your Microsoft investments. You’ll receive high velocity, measurable outcome
7 out of 54
Data Protection and Compliance Quick StartSoftchoice
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
The Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
8 out of 54
Microsoft Intune ServiceSii sp. z oo
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-insider-risk product iconInsider Risk
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM).
9 out of 54
Insider Risk Management Quick Start 12-wk ImplementationEdgile, Inc.
+1
Applicable to:
m365-sa-insider-risk product iconInsider Risk
Achieve a Microsoft 365 Insider Risk Management (IRM) production pilot, which is expected to provide solutions, detection, and investigation for insider threat scenarios.
10 out of 54
Privacy Management Workshop | Microsoft PrivaEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Epiq's Privacy Management Workshop enables customers to safeguard personal information and manage privacy risk using Microsoft 365 Priva Priva Privacy Risk Management
11 out of 54
Microsoft 365 CISO Security 1 Day WorkshopCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
The CISO Security 1 Day Workshop is designed as a day engagement for Business Decision Makers (BDM) to help showcase the value proposition of Microsoft Security.
12 out of 54
True Managed Security Service- 3 day WorkshopTrue.org Cloud
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
You have a vision. We can help you secure it...
13 out of 54
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical Start
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Rapidly identify, contain, and remediate a breach.
14 out of 54
Insider Risk Management: 8-Wk implementationPwC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
15 out of 54
Insider Risk Management Proof of Concept -5 DaysEnabling Technologies Corporation
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Insider risk management is a compliance solution in Microsoft 365 that helps minimize internal risks by enabling the detection of malicious and inadvertent activities in your organization.
16 out of 54
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
17 out of 54
Lighthouse Discover Sensitive Data Workshop: 4 WkLighthouse Global
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft 365 Discover Sensitive Data Workshop provides insights organizations need to better discover, protect, and govern its corporate data.
18 out of 54
Microsoft 365 Legal & Compliance Assessment: 4 WkLighthouse Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft 365 Legal and Compliance Assessment optimizes the efficiency of Microsoft 365 for ediscovery, defensible data migrations, records management, and information governance.
19 out of 54
Microsoft Purview Protect & Govern Sensitive Data - 3 Day WorkshopEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Discover risks from dark data and learn how to address them with Microsoft Purview and Epiq.
20 out of 54
Lighthouse Proof of Concept: 10 WkLighthouse Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Lighthouse provides visibility and expertise around the use of Microsoft 365 within the legal, regulatory, compliance and security space.
21 out of 54
Keep Secure 5 weeks implementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
With this product we are achivent our customers to use all security features that have with their licenses; we bring them BI dashboards that help IT and security admins
22 out of 54
Microsoft Purview eDiscovery POC (5 Day)Epiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
5-Day eDiscovery POC demonstrating standard & premium capabilities of Microsoft Purview components
23 out of 54
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
24 out of 54
Microsoft Compliance Workshop: 3-Day WorkshopWorld Wide Technology
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Riskm365-sa-knowledge-and-insights product iconKnowledge & Insights
WWT offers a Microsoft Data Compliance and Risk workshop to help organizations with compliance risks and data protection.
25 out of 54
Insider Risk Management: 4 week AssessmentBDO Digital, LLC
+2
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
Have a plan on how to reduce data leakage focused on insider risk from within your organizational walls
26 out of 54
Discover Sensitive Data: 5-Week WorkshopRackspace
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover sensitive data with a report on current threats in your Microsoft Azure Active Directory and Microsoft 365 environments and a customized assessment of your security posture.
27 out of 54
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It Security
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Enable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
28 out of 54
discover-sensitive-data-workshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
29 out of 54
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
30 out of 54
Microsoft Purview Advisory: 30 Day ImplementationEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Epiq Microsoft Purview information governance consulting and advisory services ensure secure, compliant and efficient information governance strategies and deployment for Microsoft Purview compliance.
31 out of 54
Security Solutions:2-Weeks ImplementationAlpine Health Technologies Corp
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
32 out of 54
Avanade Protect & Govern Sensitive Data FY23Avanade, Inc.
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-mobile-device-management product iconMobile Device Management
Implementing strategic information protection and secure collaboration solutions
33 out of 54
Avanade Mitigate Compliance and Privacy Risks FY23Avanade, Inc.
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Control and help secure sensitive business information and protect against insider threats.
34 out of 54
Email and Threat Protection 4 Week ImplementationHTG
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
HTG’s Advanced Email Threat Protection pack ensures your Microsoft products such as Outlook, SharePoint, OneDrive & Microsoft Teams are hardened to best practice standards.
35 out of 54
Manage and Investigate Risk: 4-Week WorkshopBlueVoyant
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Discovering the hidden compliance risks in your organization.
36 out of 54
Compliance: 1 Day Workshop - Manage and Investigate RiskConvergeOne
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Everyone seems to be aware of external risk factors such as Ransomware, but what out Insider Risk? Find out the importance of proper controls and governance to protect yourself from bigger threats
37 out of 54
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro Ltd
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Wipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
38 out of 54
Bulletproof 365 Compliance: Managed Information Protection ServiceBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
We can help organizations understand their risks, define the strategy and path to mitigating these risks and provide the expertise to efficiently monitor and respond when internal and external threats
39 out of 54
Lighthouse Manage and Investigate Risk Workshop - 4 WkLighthouse Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
Lighthouse experts show you how to leverage Microsoft 365 technology to develop and implement a simplified compliance strategy for long-term data protection and security.
40 out of 54
Microsoft 365 Information Protection and Governance: 12 week ImplementationINFOTECHTION
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Develop a strategy and blueprint for protecting and governing your information in Microsoft365 and beyond. Implement and manage through Infotechtion managed services.
41 out of 54
Build a Compliance Strategy - 4 weeks WorkshopINFOTECHTION
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
A data driven workshop to identify your information compliance maturity regards to privacy, regulatory and data exfiltration risks; and help you build a strategy for improvements.
42 out of 54
Manage and Investigate Risk: 3W - WorkshopExelegent
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
This workshop will help to identify risky users and find a strategy for protecting data in an automated and privacy-oriented way.
43 out of 54
Microsoft 365 Backup & Recovery with AvePoint: 5-Day WorkshopEgroup, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
With Microsoft 365 Backup and AvePoint we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
44 out of 54
Pentest-4wks AssessmentadaQuest
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Gain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
45 out of 54
Protect and Govern Sensitive Data: 4-Week Engagement & WorkshopCompuNet
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Four week engagement that helps customers identify privacy and regulatory risks in Dark Data and understanding how to mitigate them with Microsoft 365.
46 out of 54
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
A 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
47 out of 54
Mitigate Compliance & Privacy Risks: 1-Day WorkshopNetrix LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Understand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
48 out of 54
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
49 out of 54
Secure Multi-Cloud Environments: Engagement & WorkshopCompuNet
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
Five week engagement that helps customers gain insights on active threats and vulnerabilities related to their hybrid and multi-cloud workloads within Microsoft 365.
50 out of 54
Secure Identities and Access: 4-Week Engagement & WorkshopCompuNet
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
4-week engagement and workshop that helps customers design and plan out their optimal identity model to ensure they have a roadmap to enhanced security using Microsoft 365 and Azure Active Directory
51 out of 54
Microsoft Purview eDiscovery POC (7 Day)Epiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
7-Day eDiscovery POC demonstrating in depth standard & premium capabilities of Microsoft Purview components
52 out of 54
SAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen Systems
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Learn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
53 out of 54
Security Assessment: 4-WeeksBlueVoyant
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Enhance overall security posture with an analysis of an organization, evaluating vulnerabilities and identity risks with remediation recommendations.
54 out of 54