Bộ lọcXóa tất cả
Đám mây trong ngành kết quả
Hiển thị kết quả trong đám mây trong ngành.
Tất cả kết quả
Cyber Security AssessmentONEFACTORYThe Cybersecurity Assessment helps customers assess their security posture and risk to insider threats
+2
Applicable to:
Information Protection & GovernanceInsider Risk
1 out of 9
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
2 out of 9
Microsoft 365 Baseline Security Hardening by AVASOFTAVASOFTAware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
3 out of 9
Lightstream Data Security AssessmentLightstreamLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
4 out of 9
Solution Assessment for Security: 30 DayConcurrency, Inc.An assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
5 out of 9
Modern Workplace Assessment: 4-day AssessmentHSO Assess your business against Microsoft 365 products, the Power Platform and Azure-related services to understand where it is on it's User Journey towards a Modern Workplace.
+3
Applicable to:
Adoption & Change ManagementInformation Protection & GovernanceTeamwork Deployment
6 out of 9
Microsoft 365 Security Review: 3-Wk AssessmentProArch Technologies, Inc.Identifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
7 out of 9
Microsoft 365 Security Hardening; 4-Wk ServiceProArch Technologies, Inc.The Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
8 out of 9
Discover Sensitive Data Workshop: 4-Wk WorkshopProArch Technologies, Inc.ProArch’s Discover Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInformation Protection & Governance
9 out of 9