筛选器全部清除
咨询服务 个结果
显示 咨询服务 中的 495 个结果。
威胁防护Remove 威胁防护
Microsoft 365Remove Microsoft 365
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuest
Cloud Security
Information Protection & Governance
Threat ProtectionGet help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
1 out of 15
Microsoft 365 Fundamentals: 1 Day WorkshopNETCOM LEARNING
Cloud Security
Teams Custom Solutions
Threat ProtectionIntroduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
2 out of 15
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile IT
Cloud Security
Identity & Access Management
Threat ProtectionA 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 15
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLC
Cloud Security
Identity & Access Management
Threat ProtectionCollaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 15
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLC
Cloud Security
Identity & Access Management
Threat ProtectionSecure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
5 out of 15
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.
Cloud Security
Identity & Access Management
Threat ProtectionWorkshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 15
Neway Security proposition: 3-WK implementationNeWay Technologies Ltd
Device Deployment & Management
Identity & Access Management
Threat ProtectionThe Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
7 out of 15
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyant
Cloud Security
Threat ProtectionThe accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
Applicable to:
Cloud Security
Threat Protection
8 out of 15
Zero Trust Assessment - 3 WeeksArmis, Sistemas de Informação, Lda
Cloud Security
Information Protection & Governance
Threat ProtectionSet Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Assessment
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
9 out of 15
Secure Hybrid Identity - Defender for Identity: 6 week ImplementationPerformanta
Identity & Access Management
Threat ProtectionSecure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
Applicable to:
Identity & Access Management
Threat Protection
10 out of 15
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdge
Cloud Security
Device Deployment & Management
Threat ProtectionEndpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
11 out of 15
Microsoft Information Protection Administrator: 3 Days WorkshopNETCOM LEARNING
Cloud Security
Information Protection & Governance
Threat ProtectionMicrosoft Information Protection Administrator course focuses on data governance and information protection within your organization.
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
12 out of 15
Microsoft 365 Risk 5-Days AssessmentKPCS CZ, s.r.o.
Compliance Advisory Services
Mobile Device Management
Threat ProtectionMicrosoft 365 Risk Assessment provides preventive and comprehensive check of the Customer's Microsoft 365 Environment.
Applicable to:
Compliance Advisory Services
Mobile Device Management
Threat Protection
13 out of 15
Zero Trust Launchpad: 3-Wk AssessmentAscent Global, Inc.
Cloud Security
Identity & Access Management
Threat ProtectionAscent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
14 out of 15
Endpoint Management Advisory Service: 6-Wk ImplementationWragby Business Solutions & Technologies Limited
Information Protection & Governance
Mobile Device Management
Threat ProtectionThis advisory service enables organizations efficiently manage end points leveraging Microsoft Intune & Configuration Manager through assessments, 1-day workshops and six weeks deployment
Applicable to:
Information Protection & Governance
Mobile Device Management
Threat Protection
15 out of 15