筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 个结果。
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITEDOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
1 out of 18
Data Security EngagementSignal Alliance Technology HoldingAs your company data expands and generative AI is being deployed rapidly, having an integrated approach that can help quickly identify, triage, and act on data security risks is super important.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
2 out of 18
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology HoldingOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
3 out of 18
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
4 out of 18
Lighthouse Protect & Govern Sensitive Data Workshop: 4 WkLighthouse GlobalA hands-on engagement delivered in a workshop format with everything you need to better discover, protect, and govern your corporate data.
+2
Applicable to:
Information Protection & Governance
Insider Risk
5 out of 18
Lighthouse Proof of Concept: 10 WkLighthouse GlobalPartner with Lighthouse to test Microsoft Purview technology and understand if it's meets requirements for your organization’s data security workflows.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
6 out of 18
CloudCompass Managed Service: 12-mo SubscriptionLighthouse GlobalA Lighthouse subscription service for Microsoft 365 designed to keep legal and compliance teams ahead of change in the dynamic cloud computing landscape.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
7 out of 18
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
8 out of 18
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
9 out of 18
discover-sensitive-data-workshopECF Data LLCECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
10 out of 18
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
11 out of 18
Microsoft Purview Implementation AdvisoryEpiq GlobalEpiq Microsoft Purview information governance consulting and advisory services ensure secure, compliant and efficient information governance strategies and deployment for Microsoft Purview compliance.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
12 out of 18
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 18
User Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
14 out of 18
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
15 out of 18
Compliance: 1 Day Workshop - Manage and Investigate RiskConvergeOneEveryone seems to be aware of external risk factors such as Ransomware, but what out Insider Risk? Find out the importance of proper controls and governance to protect yourself from bigger threats
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
16 out of 18
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro LtdWipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
17 out of 18
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse GlobalThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
18 out of 18