筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski SecurityKudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
1 out of 60
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLCWe understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
2 out of 60
Abacode Data Governance and Protection of Sensitive Data (DLP) in Government Powered by Microsoft 365Abacode Inc.Assess data gaps and implement remediation actions to prevent sensitive data leaks of Government entities leveraging Microsoft 365 Stack.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
3 out of 60
DLP Implementation and Tuning ServicesINFOTECHTIONReduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
4 out of 60
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVIdentify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
+2
Applicable to:
Identity & Access Management
Insider Risk
5 out of 60
Microsoft Purview Information Protection Deployment: 4 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVSecure data wherever it is and support the protection of sensitive data in clouds, apps, and devices.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
6 out of 60
Epiq Compliance Cloud Migration with Microsoft PurviewEpiq GlobalEpiq provides a seamless and compliant transition of valuable archive data off legacy technology, while mitigating risks and maintaining regulatory compliance harnessing Microsoft Purview.
+2
Applicable to:
Information Protection & Governance
Insider Risk
7 out of 60
Epiq Mergers and Acquisitions Risk ReductionEpiq GlobalIdentify and exclude sensitive information from being migrated during mergers and acquisitions (M&A) data discovery and migration projects.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
8 out of 60
Epiq Microsoft Purview Separated Employee DefensibilityEpiq GlobalMitigate the potential risks associated with departing employees, ensuring a secure and legally compliant transition while safeguarding sensitive Microsoft 365 data with Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
9 out of 60
Epiq Data Privacy with Microsoft PrivaEpiq GlobalEffectively manage and safeguard sensitive personal information with Microsoft 365 and Microsoft Priva, ensuring compliance with privacy regulations and maintaining the trust of your stakeholders.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
10 out of 60
Epiq Flex IG Talent for Microsoft PurviewEpiq GlobalEpiq Flex IG Talent is here to provide it clients with flexible talent surrounding Microsoft Purview eDiscovery, Information Governance, Compliance and Archiving.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
11 out of 60
Avanade Security Business Value 4-Wk AssessmentAvanade, Inc.Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
12 out of 60
Security Modernization: 3 Day WorkshopNetwovenSafeguard your business with a three-step security modernization solution from Netwoven
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
13 out of 60
Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
14 out of 60
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling TechnologiesCyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
15 out of 60
Beyondsoft Data Governance and Protection with Microsoft Purview Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of solutions from Microsoft 365 and Microsoft Purview to address security challenges regarding Data protection, Data Compliance, Data Governance and Risk Management
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
16 out of 60
Cybersecurity Assessment EngagementadaQuestGet a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
17 out of 60
Implementación Microsoft Purview con Suri ServicesSuri Services SCCon Suri Services y Microsoft Purview, estarás un paso adelante en la revolución de datos, desbloqueando el potencial de tu información.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
18 out of 60
Copilot Data ProtectionCloud LifeCopilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
19 out of 60
Defender for Office 365: 5-Day AssessmenteGroup Enabling TechnologiesMicrosoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
20 out of 60
Get Ready for Microsoft 365 Copilot with Zones Purview WorkshopZones, LLCThe goal of the Zones' Purview Workshop is to provide organizations with a tailored, 6-week journey to master data governance, safeguard data,
+2
Applicable to:
Information Protection & Governance
Insider Risk
21 out of 60
Copilot for Microsoft 365: 26-Day Get Ready All You Can Eat Workshopwater IT Security GmbHGet ready for Copilot for Microsoft 365 – and learn how your organization can safely and confidently adopt AI technologies while actively protecting and managing sensitive data with Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
22 out of 60
Copilot for Microsoft 365: 18-Day Get Ready Standard Workshopwater IT Security GmbHGet ready for Copilot for Microsoft 365 – and learn how your organization can safely and confidently adopt AI technologies while actively protecting and managing sensitive data with Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
23 out of 60
Copilot for Microsoft 365 Data Security QuickStartSoftchoiceSetting the foundation for data security and governance in preparation for Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
24 out of 60
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
25 out of 60
CS Data Security 360°: 2-Wk AssessmentCampana & Schott GmbHUtilize Microsoft Purview suite and Copilot for Security to safeguard your content and information.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
26 out of 60
Microsoft 365 Copilot Readiness Assessment: 1-Wk AssessmentPoint Alliance IncEmbark on a transformative journey with our Microsoft Co-Pilot Readiness Assessment, designed to empower teams and organizations in embracing the future of AI collaboration.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Insider Risk
27 out of 60
Microsoft 365 Security Assessment-1Wk AssessmentPoint Alliance IncOrganizations have diverse security needs and attitudes; thus, our assessment checklist provides general recommendations for various scenarios
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Insider Risk
28 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance IncYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
29 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
30 out of 60
Managed Information Protection & GovernanceInfolockInfolock addresses the challenges of understaffed organizations by providing skilled and specialized professionals to optimize and administer their data protection program
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
31 out of 60
Cyber Security AssessmentONEFACTORYThe Cybersecurity Assessment helps customers assess their security posture and risk to insider threats
+2
Applicable to:
Information Protection & Governance
Insider Risk
32 out of 60
Microsoft Sentinel Migration and ModernizeCollective InsightsMigrate from legacy SIEM to Microsoft Sentinel; a cloud native SIEM + SOAR
+2
Applicable to:
Insider Risk
Threat Protection
33 out of 60
Data Security with Microsoft Purview 4-weeks workshopAlfa Connections Pte LtdThe Data Security Engagement helps identify and mitigate data security risks in organizational data
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
34 out of 60
Healthcare & Education Cybersecurity AssessmentPSM PartnersThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
35 out of 60
Data Security: 2-Weeks WorkshopConterraIdentify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
36 out of 60
Defender Pak365: Microsoft Defender ImplementationRavanty Tech Consulting, Inc.Empower your organization with comprehensive, AI-driven protection tailored to meet evolving security needs with the help of Microsoft Defender.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
37 out of 60
Data Security Engagement: 4-Wk WorkshopExelegentThe Data Security Engagement provides a summary of an organization’s data protection and compliance stature with actionable recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
38 out of 60
Rapid Data Loss Prevention: 30-Day ImplementationLong View SystemsPreserve your data and secure your future with Data Loss Prevention powered by Microsoft Purview in just 30 days.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
39 out of 60
impelSecure Data Security Engagement: Free 4-week workshopimpeltec Pty LtdIdentify data risks and evaluate user behavior for risky activities
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
40 out of 60
Introduction to Microsoft Purview Data Protection: 4-Hour TrainingLong View SystemsGain hands-on knowledge in data protection, governance, and compliance with Long View’s expert-led Microsoft Purview training.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
41 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
42 out of 60
Microsoft Intune: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur expert team will help you deploy and configure Microsoft Intune, ensuring seamless integration and optimal performance for your organization's needs
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
43 out of 60
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITEDOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
44 out of 60
Identity and Access Management SolutionH One (Private) LimitedEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
45 out of 60
4Sight's Microsoft Data Security Engagement4Sight HoldingsIdentify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
46 out of 60
Purview Pak365: Microsoft Purview ImplementationRavanty Tech Consulting, Inc.Empower your enterprise Data protection and Compliance requirements across your Microsoft 365 data estate with the help of Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
47 out of 60
Data Security EngagementSignal Alliance Technology HoldingAs your company data expands and generative AI is being deployed rapidly, having an integrated approach that can help quickly identify, triage, and act on data security risks is super important.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
48 out of 60
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology HoldingOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
49 out of 60
Data Security with Microsoft Purview SolutionsBDO Digital, LLCEnhance data control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
50 out of 60
Trustwave Accelerator for Microsoft PurviewTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Purview to unlock full value for your organization
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
51 out of 60
Microsoft Purview Information Protection ImplementationITX360 (Pvt) Ltd.Secure your organization's sensitive data with Microsoft Purview Information Protection—classify, label, and protect data easily while ensuring compliance.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
52 out of 60
Microsoft Data Security EngagementRavanty Tech Consulting, Inc.Data Security Engagement is an immersive experience to help you assess your data security, privacy, and regulatory requirements, and address your most pressing data security goals and challenges.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
53 out of 60
Microsoft Purview Insider Risk Management and Compliance: ImplementationITC Secure LtdThis engagement delivers setup and enablement for Microsoft Purview’s Insider Risk Management and Communication Compliance capabilities, supporting proactive risk mitigation.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
54 out of 60
eDiscovery, Data Lifecycle & Records ManagementITC Secure LtdManage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
55 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure LtdApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
56 out of 60
Microsoft Purview Readiness and Environment SetupITC Secure LtdAssess the data governance maturity and establish a secure Microsoft Purview environment. Ensure technical and organizational readiness, delivering a strong foundation for data governance success.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
57 out of 60
Data Security EngagementPC Connection, Inc.Our Microsoft Purview Data Security Engagement provides actionable insights into data security, privacy, and compliance risks.
+2
Applicable to:
Information Protection & Governance
Insider Risk
58 out of 60
Data Leak DetectionAwara IT Kazakhstan LLPRapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Threat Protection
59 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
60 out of 60