筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology HoldingOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
1 out of 26
Data Security EngagementSignal Alliance Technology HoldingAs your company data expands and generative AI is being deployed rapidly, having an integrated approach that can help quickly identify, triage, and act on data security risks is super important.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
2 out of 26
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
3 out of 26
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro LtdWipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
4 out of 26
Microsoft Purview Information Protection Deployment: 4 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVSecure data wherever it is and support the protection of sensitive data in clouds, apps, and devices.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
5 out of 26
Defender Pak365: Microsoft Defender ImplementationRavanty Tech Consulting, Inc.Empower your organization with comprehensive, AI-driven protection tailored to meet evolving security needs with the help of Microsoft Defender.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
6 out of 26
Purview Pak365: Microsoft Purview ImplementationRavanty Tech Consulting, Inc.Empower your enterprise Data protection and Compliance requirements across your Microsoft 365 data estate with the help of Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
7 out of 26
Microsoft Compliance Workshop: 3-Day WorkshopWorld Wide TechnologyWWT offers a Microsoft Data Compliance and Risk workshop to help organizations with compliance risks and data protection.
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Knowledge & Insights
8 out of 26
Bulletproof 365 Compliance: Managed Information Protection ServiceBulletproof Solutions Inc.We can help organizations understand their risks, define the strategy and path to mitigating these risks and provide the expertise to efficiently monitor and respond when internal and external threats
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
9 out of 26
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLCGet introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
10 out of 26
Microsoft Purview Protect & Govern Sensitive Data - 3 Day WorkshopEpiq GlobalDiscover risks from dark data and learn how to address them with Microsoft Purview and Epiq.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
11 out of 26
CS Data Security 360°: 2-Wk AssessmentCampana & Schott GmbHUtilize Microsoft Purview suite and Copilot for Security to safeguard your content and information.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
12 out of 26
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTIONLearn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
13 out of 26
Microsoft Copilot Legal & Compliance Readiness Assessment: 4-Wk AssessmentLighthouse GlobalThis assessment helps identify information protection and data governance gaps to prepare your organization to safely and efficiently deploy Microsoft Copilot.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
14 out of 26
Data Security and Governance: 2 Hour Free BriefingNetwovenNetwoven Data Security and Governance free strategy workshop will help you get started on the path to discover, protect, and govern your sensitive corporate data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
15 out of 26
Microsoft 365 Information Protection and Governance: 12 week ImplementationINFOTECHTIONDevelop a strategy and blueprint for protecting and governing your information in Microsoft365 and beyond. Implement and manage through Infotechtion managed services.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
16 out of 26
Microsoft Data Security EngagementRavanty Tech Consulting, Inc.Data Security Engagement is an immersive experience to help you assess your data security, privacy, and regulatory requirements, and address your most pressing data security goals and challenges.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
17 out of 26
Data Security: 2-Weeks WorkshopConterraIdentify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
18 out of 26
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLCWe understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
19 out of 26
Security Modernization: 3 Day WorkshopNetwovenSafeguard your business with a three-step security modernization solution from Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
20 out of 26
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVIdentify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
+2
Applicable to:
Identity & Access Management
Insider Risk
21 out of 26
DLP Implementation and Tuning ServicesINFOTECHTIONReduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
22 out of 26
Implementación Microsoft Purview con Suri ServicesSuri Services SCCon Suri Services y Microsoft Purview, estarás un paso adelante en la revolución de datos, desbloqueando el potencial de tu información.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
23 out of 26
Legacy Data Migration and Optimization: 52-Wk MigrationLighthouse GlobalThis engagement delivers defensible migration from legacy on-prem archives to Microsoft 365, mapping to the Microsoft Purview suite of tools.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
24 out of 26
Cyber Security AssessmentONEFACTORYThe Cybersecurity Assessment helps customers assess their security posture and risk to insider threats
+2
Applicable to:
Information Protection & Governance
Insider Risk
25 out of 26
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
26 out of 26