筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 138 个结果。
内部风险Remove 内部风险
Microsoft 365Remove Microsoft 365
Data Security with Microsoft Purview 4-weeks workshopAlfa Connections Pte Ltd
Compliance Advisory Services
Information Protection & Governance
Insider RiskThe Data Security Engagement helps identify and mitigate data security risks in organizational data
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
1 out of 18
Healthcare & Education Cybersecurity AssessmentPSM Partners
Cloud Security
Identity & Access Management
Insider RiskThis assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
2 out of 18
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITED
Identity & Access Management
Insider Risk
Threat ProtectionOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
3 out of 18
4Sight's Microsoft Data Security Engagement4Sight Holdings
Cloud Security
Information Protection & Governance
Insider RiskIdentify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
4 out of 18
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology Holding
Cloud Security
Identity & Access Management
Insider RiskOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
5 out of 18
Insider Risk Management: 8-Wk implementationPwC
Cloud Security
Insider Risk
Threat ProtectionEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
6 out of 18
Lighthouse Protect & Govern Sensitive Data Workshop: 4 WkLighthouse Global
Information Protection & Governance
Insider RiskA hands-on engagement delivered in a workshop format with everything you need to better discover, protect, and govern your corporate data.
Applicable to:
Information Protection & Governance
Insider Risk
7 out of 18
Microsoft Purview eDiscovery POC (5 Day)Epiq Global
Compliance Advisory Services
Information Protection & Governance
Insider Risk5-Day eDiscovery POC demonstrating standard & premium capabilities of Microsoft Purview components
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
8 out of 18
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.
Device Deployment & Management
Insider Risk
Threat ProtectionNTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
9 out of 18
Microsoft Compliance Workshop: 3-Day WorkshopWorld Wide Technology
Compliance Advisory Services
Insider Risk
Knowledge & InsightsWWT offers a Microsoft Data Compliance and Risk workshop to help organizations with compliance risks and data protection.
Applicable to:
Compliance Advisory Services
Insider Risk
Knowledge & Insights
10 out of 18
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It Security
Cloud Security
Identity & Access Management
Insider RiskEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
11 out of 18
discover-sensitive-data-workshopECF Data LLC
Cloud Security
Insider Risk
Threat ProtectionECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
12 out of 18
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
Cloud Security
Insider Risk
Threat ProtectionThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 18
Security Solutions:2-Weeks ImplementationAlpine Health Technologies Corp
Cloud Security
Insider Risk
Threat ProtectionDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
Applicable to:
Cloud Security
Insider Risk
Threat Protection
14 out of 18
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.
Cloud Security
Identity & Access Management
Insider RiskWe will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
15 out of 18
Compliance: 1 Day Workshop - Manage and Investigate RiskConvergeOne
Compliance Advisory Services
Identity & Access Management
Insider RiskEveryone seems to be aware of external risk factors such as Ransomware, but what out Insider Risk? Find out the importance of proper controls and governance to protect yourself from bigger threats
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
16 out of 18
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse Global
Cloud Security
Information Protection & Governance
Insider RiskThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
17 out of 18
Build a Compliance Strategy - 4 weeks WorkshopINFOTECHTION
Compliance Advisory Services
Information Protection & Governance
Insider RiskA data driven workshop to identify your information compliance maturity regards to privacy, regulatory and data exfiltration risks; and help you build a strategy for improvements.
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
18 out of 18