FilterAlle löschen
Beratungsdienste Ergebnisse
Es werden Ergebnisse in beratungsdienste angezeigt.
Microsoft Data Security EngagementRavanty Tech Consulting, Inc.Data Security Engagement is an immersive experience to help you assess your data security, privacy, and regulatory requirements, and address your most pressing data security goals and challenges.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
1 out of 29
Microsoft Purview Insider Risk Management and Compliance: ImplementationITC Secure LtdThis engagement delivers setup and enablement for Microsoft Purview’s Insider Risk Management and Communication Compliance capabilities, supporting proactive risk mitigation.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
2 out of 29
eDiscovery, Data Lifecycle & Records ManagementITC Secure LtdManage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
3 out of 29
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure LtdApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
4 out of 29
Microsoft Purview Readiness and Environment SetupITC Secure LtdAssess the data governance maturity and establish a secure Microsoft Purview environment. Ensure technical and organizational readiness, delivering a strong foundation for data governance success.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
5 out of 29
Data Security EngagementPC Connection, Inc.Our Microsoft Purview Data Security Engagement provides actionable insights into data security, privacy, and compliance risks.
+2
Applicable to:
Information Protection & Governance
Insider Risk
6 out of 29
Data Leak DetectionAwara IT Kazakhstan LLPRapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Threat Protection
7 out of 29
THInc Secure Managed Security Service for MicrosoftTECH HEADS INCComprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
8 out of 29
Information Lifecycle Management with Microsoft PurviewBridewell Consulting LimitedOperationalise Microsoft Purview’s Data Loss Prevention (DLP) and Insider Risk Management capabilities with this expert-led engagement
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
9 out of 29
Data Security EngagementPerformantaThe Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
10 out of 29
Data Security with Microsoft Purview SolutionsBDOEnhance data security control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
11 out of 29
Pently PentestPently GmbHSimulated cyber attacks to uncover real vulnerabilities in your entire IT landscape.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
12 out of 29
AI Security Readiness AssessmentProArch Technologies, IncProArch’s AI Security Readiness Assessment delivers a comprehensive evaluation of your cloud and AI environment, identifies critical security gaps, and provides a prioritized roadmap for remediation.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
13 out of 29
Security AssessmentSoteria, LLCGain deep insights into your Secure Score, user and device health, application vulnerabilities, and data security with our security assessment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
14 out of 29
Cloud Security Envisioning WorkshopTierPointThe Cloud Security Envisioning engagement helps you explore how to detect threats, understand your security posture, and identify risks and opportunities across all your cloud environments.
+2
Applicable to:
Cloud Security
Insider Risk
15 out of 29
Minsait Data Security Engagement over Microsoft PurviewMinsaitEvaluamos los riesgos asociados a la seguridad y privacidad de tus datos en Microsoft 365 y te ayudamos a definir una estrategia eficaz de protección basada en Microsoft Purview.
+2
Applicable to:
Information Protection & Governance
Insider Risk
16 out of 29
Intune Implementation ServiceTHREATSCAPE SECURITY SOLUTIONS LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Intune in alignment with Zero Trust principles, security best practice, and business productivity goals.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
17 out of 29
Administración y protección de identidadesWolk LAB SCLa solución "Administración y protección de identidades" permite proteger identidades y accesos con MFA, SSO y monitoreo, optimizando la seguridad y gestión en entornos empresariales híbridos.
+2
Applicable to:
Identity & Access Management
Insider Risk
18 out of 29
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
19 out of 29
Data Security Envisioning WorkshopPSM PartnersIdentify hidden data risks, assess insider threats, and gain clear, actionable guidance to strengthen security, compliance, and governance with a Microsoft Purview–driven workshop.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
20 out of 29
S4B Email Attack Simulation TrainingS4BAttack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
21 out of 29
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4BInvestiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
22 out of 29
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4BDefensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
23 out of 29
AI-Ready Data Security AssessmentOPTIExecutive data security and AI readiness assessment using Microsoft Purview. Identifies Copilot, Shadow AI, and oversharing risks, delivering an actionable roadmap for secure AI adoption.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
24 out of 29
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
25 out of 29
discover-sensitive-data-workshopECF Data LLCECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
26 out of 29
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
27 out of 29
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
28 out of 29
Compliance: 1 Day Workshop - Manage and Investigate RiskConvergeOneEveryone seems to be aware of external risk factors such as Ransomware, but what out Insider Risk? Find out the importance of proper controls and governance to protect yourself from bigger threats
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
29 out of 29