筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Epiq Flex IG Talent for Microsoft PurviewEpiq GlobalEpiq Flex IG Talent is here to provide it clients with flexible talent surrounding Microsoft Purview eDiscovery, Information Governance, Compliance and Archiving.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
1 out of 23
Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
2 out of 23
Copilot for Microsoft 365: 26-Day Get Ready All You Can Eat Workshopwater IT Security GmbHGet ready for Copilot for Microsoft 365 – and learn how your organization can safely and confidently adopt AI technologies while actively protecting and managing sensitive data with Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
3 out of 23
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling TechnologiesCyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
4 out of 23
Cybersecurity AssessmentCDI LLCThe Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
5 out of 23
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
6 out of 23
Purview Compliance Manager Adoption WorkshopCDI LLCThe CDI professional services team intends to show you how to increase your Organizational Governance using a built-in service that you may not be fully aware of.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
7 out of 23
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
8 out of 23
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
9 out of 23
Defender for Office 365: 5-Day AssessmenteGroup Enabling TechnologiesMicrosoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
10 out of 23
Data Security EngagementPerformantaThe Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
11 out of 23
discover-sensitive-data-workshopECF Data LLCECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
12 out of 23
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
13 out of 23
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski SecurityKudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
14 out of 23
Healthcare & Education Cybersecurity AssessmentPSM PartnersThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
15 out of 23
Epiq Mergers and Acquisitions Risk ReductionEpiq GlobalIdentify and exclude sensitive information from being migrated during mergers and acquisitions (M&A) data discovery and migration projects.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
16 out of 23
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical StartRapidly identify, contain, and remediate a breach.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
17 out of 23
Compliance: 1 Day Workshop - Manage and Investigate RiskConvergeOneEveryone seems to be aware of external risk factors such as Ransomware, but what out Insider Risk? Find out the importance of proper controls and governance to protect yourself from bigger threats
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
18 out of 23
Data Security EngagementPC Connection, Inc.Our Microsoft Purview Data Security Engagement provides actionable insights into data security, privacy, and compliance risks.
+2
Applicable to:
Information Protection & Governance
Insider Risk
19 out of 23
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM PartnersThis assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
20 out of 23
THInc Secure Managed Security Service for MicrosoftTECH HEADS INCComprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
21 out of 23
Pently PentestPently GmbHSimulated cyber attacks to uncover real vulnerabilities in your entire IT landscape.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
22 out of 23
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
23 out of 23