FiltraiValyti viską
Rezultatų: Konsultavimo paslaugos
Rodomi rezultatai konsultavimo paslaugos.
Data Security: 2-Weeks WorkshopConterraIdentify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
1 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week ProgramWindows Management Experts, Inc.Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
2 out of 60
Pentest-4wks AssessmentadaQuestGain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
3 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
4 out of 60
Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
5 out of 60
Microsoft 365 Security Assessment-1Wk AssessmentPoint Alliance IncOrganizations have diverse security needs and attitudes; thus, our assessment checklist provides general recommendations for various scenarios
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Insider Risk
6 out of 60
Data Security and Governance: 2 Hour Free BriefingNetwovenNetwoven Data Security and Governance free strategy workshop will help you get started on the path to discover, protect, and govern your sensitive corporate data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
7 out of 60
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLCWe understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
8 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance IncYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
9 out of 60
Data Security EngagementSignal Alliance Technology HoldingAs your company data expands and generative AI is being deployed rapidly, having an integrated approach that can help quickly identify, triage, and act on data security risks is super important.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
10 out of 60
Copilot for Microsoft 365: 18-Day Get Ready Standard Workshopwater IT Security GmbHGet ready for Copilot for Microsoft 365 – and learn how your organization can safely and confidently adopt AI technologies while actively protecting and managing sensitive data with Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
11 out of 60
Data Security with Microsoft Purview-4h AssessmentReplyThe Microsoft Purview Assessment offers advanced data security, integrating discovery, classification, and governance with Microsoft’s suite to enhance compliance and protection.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
12 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen SystemsThe OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 60
Beyondsoft Data Governance and Protection with Microsoft Purview Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of solutions from Microsoft 365 and Microsoft Purview to address security challenges regarding Data protection, Data Compliance, Data Governance and Risk Management
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
14 out of 60
Copilot Data ProtectionCloud LifeCopilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
15 out of 60
Abacode Data Governance and Protection of Sensitive Data Implementation Powered by Microsoft 365Abacode Inc.Assess data gaps and implement remediation actions to prevent sensitive data leaks leveraging Microsoft 365 stack.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
16 out of 60
Lighthouse Proof of Concept: 10 WkLighthouse GlobalPartner with Lighthouse to test Microsoft Purview technology and understand if it's meets requirements for your organization’s data security workflows.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
17 out of 60
Microsoft Intune: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur expert team will help you deploy and configure Microsoft Intune, ensuring seamless integration and optimal performance for your organization's needs
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
18 out of 60
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix GlobalA 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
19 out of 60
Mitigate Compliance & Privacy Risks: 1-Day WorkshopNetrix GlobalUnderstand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
20 out of 60
Secure Identities and Access: 4-Week Engagement & WorkshopCompuNet4-week engagement and workshop that helps customers design and plan out their optimal identity model to ensure they have a roadmap to enhanced security using Microsoft 365 and Azure Active Directory
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
21 out of 60
Microsoft Purview eDiscovery POC (7 Day)Epiq Global7-Day eDiscovery POC demonstrating in depth standard & premium capabilities of Microsoft Purview components
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
22 out of 60
OAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen SystemsLearn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
23 out of 60
Lighthouse Microsoft SharePoint Premium Proof of Concept: 10 WkLighthouse GlobalWe deliver technology and workflow Proof of Concepts focused on use of Microsoft SharePoint Premium for information protection, information governance, legal, compliance, and eDiscovery use cases.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
24 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLCGet introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
25 out of 60
Purview Compliance Manager Adoption WorkshopCDI LLCThe CDI professional services team intends to show you how to increase your Organizational Governance using a built-in service that you may not be fully aware of.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
26 out of 60
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
27 out of 60
Privacy Management Workshop | Microsoft PrivaEpiq GlobalEpiq's Privacy Management Workshop enables customers to safeguard personal information and manage privacy risk using Microsoft 365 Priva Priva Privacy Risk Management
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
28 out of 60
True Managed Security Service- 3 day Workshoptrue org cloudYou have a vision. We can help you secure it...
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
29 out of 60
Purview Microsoft Information Protection (MIP) Getting Started WorkshopPatriot Consulting Technology Group LLCThis workshop focuses on Microsoft Information Protection (MIP) and provides attendees with the knowledge and tools necessary to understand and protect sensitive data within their organization. Partic
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
30 out of 60
Microsoft 365 Security WorkshopOlive + GooseImprove your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
31 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen SystemsThe Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
32 out of 60
Lighthouse Microsoft 365 Purview Art of the Possible: 1-Wk WorkshopLighthouse GlobalA custom hands-on workshop to understand the full capabilities and value of the Microsoft Purview suite and how to maximize its benefits in your organization’s compliance framework.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
33 out of 60
Legacy Data Migration and Optimization: 52-Wk MigrationLighthouse GlobalThis engagement delivers defensible migration from legacy on-prem archives to Microsoft 365, mapping to the Microsoft Purview suite of tools.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
34 out of 60
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski SecurityKudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
35 out of 60
Abacode Data Governance and Protection of Sensitive Data (DLP) in Government Powered by Microsoft 365Abacode Inc.Assess data gaps and implement remediation actions to prevent sensitive data leaks of Government entities leveraging Microsoft 365 Stack.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
36 out of 60
DLP Implementation and Tuning ServicesINFOTECHTIONReduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
37 out of 60
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTIONLearn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
38 out of 60
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVIdentify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
+2
Applicable to:
Identity & Access Management
Insider Risk
39 out of 60
Microsoft Purview Information Protection Deployment: 4 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVSecure data wherever it is and support the protection of sensitive data in clouds, apps, and devices.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
40 out of 60
Epiq Compliance Cloud Migration with Microsoft PurviewEpiq GlobalEpiq provides a seamless and compliant transition of valuable archive data off legacy technology, while mitigating risks and maintaining regulatory compliance harnessing Microsoft Purview.
+2
Applicable to:
Information Protection & Governance
Insider Risk
41 out of 60
Epiq Mergers and Acquisitions Risk ReductionEpiq GlobalIdentify and exclude sensitive information from being migrated during mergers and acquisitions (M&A) data discovery and migration projects.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
42 out of 60
Epiq Microsoft Purview Separated Employee DefensibilityEpiq GlobalMitigate the potential risks associated with departing employees, ensuring a secure and legally compliant transition while safeguarding sensitive Microsoft 365 data with Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
43 out of 60
Epiq Flex IG Talent for Microsoft PurviewEpiq GlobalEpiq Flex IG Talent is here to provide it clients with flexible talent surrounding Microsoft Purview eDiscovery, Information Governance, Compliance and Archiving.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
44 out of 60
Avanade Security Business Value 4-Wk AssessmentAvanade, Inc.Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
45 out of 60
Security Modernization: 3 Day WorkshopNetwovenSafeguard your business with a three-step security modernization solution from Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
46 out of 60
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling TechnologiesCyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
47 out of 60
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
48 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
49 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
50 out of 60
Cybersecurity Assessment: 3-Wk WorkshopExelegentThe Cybersecurity Assessment is designed to evaluate your cybersecurity posture and reduce risks exposure by using advanced Microsoft 365 Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
51 out of 60
Enforced Data Security Implementation - 12 weeksBDO Digital, LLCSecure and control access to your company's data, no matter where it lives
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
52 out of 60
Defender for Office 365: 5-Day AssessmenteGroup Enabling TechnologiesMicrosoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
53 out of 60
Virtual CISO Services: 1-Mo BriefingeGroup Enabling TechnologiesCIOs are busy leading the digital initiatives of the business, with security falling behind other priorities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
54 out of 60
Copilot for Microsoft 365 Data Security QuickStartSoftchoiceSetting the foundation for data security and governance in preparation for Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
55 out of 60
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
56 out of 60
Microsoft 365 Copilot Readiness Assessment: 1-Wk AssessmentPoint Alliance IncEmbark on a transformative journey with our Microsoft Co-Pilot Readiness Assessment, designed to empower teams and organizations in embracing the future of AI collaboration.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Insider Risk
57 out of 60
Managed Information Protection & GovernanceInfolockInfolock addresses the challenges of understaffed organizations by providing skilled and specialized professionals to optimize and administer their data protection program
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
58 out of 60
Cyber Security AssessmentONEFACTORYThe Cybersecurity Assessment helps customers assess their security posture and risk to insider threats
+2
Applicable to:
Information Protection & Governance
Insider Risk
59 out of 60
Microsoft Sentinel Migration and ModernizeCollective InsightsMigrate from legacy SIEM to Microsoft Sentinel; a cloud native SIEM + SOAR
+2
Applicable to:
Insider Risk
Threat Protection
60 out of 60