筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Data Security EngagementSignal Alliance Technology HoldingAs your company data expands and generative AI is being deployed rapidly, having an integrated approach that can help quickly identify, triage, and act on data security risks is super important.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
1 out of 16
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology HoldingOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
2 out of 16
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
3 out of 16
Microsoft Purview Information Protection Deployment: 4 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVSecure data wherever it is and support the protection of sensitive data in clouds, apps, and devices.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
4 out of 16
Defender Pak365: Microsoft Defender ImplementationRavanty Tech Consulting, Inc.Empower your organization with comprehensive, AI-driven protection tailored to meet evolving security needs with the help of Microsoft Defender.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
5 out of 16
Purview Pak365: Microsoft Purview ImplementationRavanty Tech Consulting, Inc.Empower your enterprise Data protection and Compliance requirements across your Microsoft 365 data estate with the help of Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
6 out of 16
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
7 out of 16
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLCGet introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
8 out of 16
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTIONLearn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
9 out of 16
CS Data Security 360°: 2-Wk AssessmentCampana & Schott GmbHUtilize Microsoft Purview suite and Copilot for Security to safeguard your content and information.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
10 out of 16
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLCWe understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
11 out of 16
Microsoft Data Security EngagementRavanty Tech Consulting, Inc.Data Security Engagement is an immersive experience to help you assess your data security, privacy, and regulatory requirements, and address your most pressing data security goals and challenges.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
12 out of 16
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVIdentify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
+2
Applicable to:
Identity & Access Management
Insider Risk
13 out of 16
Abacode Data Governance and Protection of Sensitive Data (DLP) in Government Powered by Microsoft 365Abacode Inc.Assess data gaps and implement remediation actions to prevent sensitive data leaks of Government entities leveraging Microsoft 365 Stack.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
14 out of 16
Implementación Microsoft Purview con Suri ServicesSuri Services SCCon Suri Services y Microsoft Purview, estarás un paso adelante en la revolución de datos, desbloqueando el potencial de tu información.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
15 out of 16
Information Lifecycle Management with Microsoft PurviewBridewell Consulting LimitedOperationalise Microsoft Purview’s Data Loss Prevention (DLP) and Insider Risk Management capabilities with this expert-led engagement
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
16 out of 16