Filters
Search results for “itc secure”
Showing results in consulting services.
Sort By:
Microsoft Entra - Global Secure Access | Pilot DeploymentITC Secure LtdMicrosoft Entra Global Secure Access pilot deployment for improved security posture, streamlined access management & regulatory compliance.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
1 out of 25
Secure Hybrid & Multi-Cloud: 8-Week POCITC Secure LtdExperience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
+3
Applicable to:
Data Platform
Identity
Security
2 out of 25
Defender for IoT Enterprise: 8-Week POCITC Secure LtdUnderstanding risk with unmanaged IoT devices can be difficult. Our Defender for Enterprise IoT Proof of Concept helps you visualise and understand the threats to your environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
3 out of 25
Defender for IoT Operational Technology: 8-Week POCITC Secure LtdITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
4 out of 25
Mobile Intune: 1-Wk Accelerated ImplementionITC Secure LtdAccelerated Deployment of Microsoft Intune for Corporate Mobile Devices (iOS, Android and macOS)
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
5 out of 25
Defender for Endpoint: 5-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
6 out of 25
Windows Intune: 1-Wk Accelerated ImplementionITC Secure LtdAccelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Threat Protection
7 out of 25
Mobile Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure LtdAccelerated Deployment of Microsoft Endpoint Manager for Corporate Mobile Devices (iOS, Android and macOS)
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
8 out of 25
Defender for Office 365: 3-Day ImplementationITC Secure LtdAccelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
9 out of 25
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure LtdKnow your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
10 out of 25
Windows Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure LtdAccelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
11 out of 25
Private Access Pilot for Microsoft Entra ID - ImplementationITC Secure LtdITC Secure delivers a Microsoft Entra Private Access pilot for secure, VPN-less app access with Zero Trust, covering setup, policy config, user testing, monitoring, and knowledge transfer.
+2
Applicable to:
Identity
Security
12 out of 25
Internet Access Pilot for Microsoft Entra ID - ImplementationITC Secure LtdITC Secure offers a Microsoft Entra Internet Access pilot to protect user access to internet and SaaS apps, enabling secure web filtering, policy control, and Zero Trust-based threat protection.
+2
Applicable to:
Identity
Security
13 out of 25
Identity Cleanse: 5-Day WorkshopITC Secure LtdA workshop to review and reconcile an organisation's identity status, enabling Azure AD planning, changing or improving
+3
Applicable to:
Identity
Migration
Security
14 out of 25
Microsoft Sentinel Smart Ingestion; 4-Day AssessmentITC Secure LtdAlign your security posture and understand your data, agent deployment and Microsoft Azure usage options to optimise investments within Microsoft Sentinel.
+2
Applicable to:
Identity
Security
15 out of 25
Identity Maturity Assessment: 3-4 Day AssessmentITC Secure LtdITC’s Identity Maturity Assessment gives you a clear understanding of your current identity posture with prioritised recommendations for the next steps following industry and Microsoft best practice.
+2
Applicable to:
Identity
Security
16 out of 25
BYOD Intune 1-Wk Accelerated ImplementationITC Secure LtdAccelerated Deployment of Microsoft Intune for Bring Your Own Device (BYOD) capability
+3
Applicable to:
Device Deployment & Management
Mobile Device Management
Threat Protection
17 out of 25
Azure & Multi-Cloud Framework Compliance Assessment with MDfC: 4-Day AssessmentITC Secure LtdITC Secure’s Azure & Multi-Cloud Framework Compliance Assessment uses Microsoft Defender for Cloud (MDfC) to give you deep insight into your current and ongoing framework compliance
+2
Applicable to:
Identity
Security
18 out of 25
Microsoft Purview Readiness and Environment SetupITC Secure LtdAssess the data governance maturity and establish a secure Microsoft Purview environment. Ensure technical and organizational readiness, delivering a strong foundation for data governance success.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
19 out of 25
Microsoft Purview Insider Risk Management and Compliance: ImplementationITC Secure LtdThis engagement delivers setup and enablement for Microsoft Purview’s Insider Risk Management and Communication Compliance capabilities, supporting proactive risk mitigation.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
20 out of 25
eDiscovery, Data Lifecycle & Records ManagementITC Secure LtdManage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
21 out of 25
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure LtdApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
22 out of 25
Enhancing Security & Access Management with Microsoft EntraITC Secure LtdThis offer focuses on strengthening access control and security through advanced technologies that ensure users only have the necessary permissions when they need them, from any device, anywhere
+2
Applicable to:
Identity
Networking
23 out of 25
JML Automation for Azure: 4-Wk ImplementationITC Secure LtdITC’s Joiner, Mover, Leaver Automation service helps organisations to reduce manual processes and risks, better manage and secure user accounts; supporting the new hybrid working models.
+3
Applicable to:
Identity
Migration
Security
24 out of 25
3 Day Sustainability Assessment for Manufacturing & CPGITC Infotech India LimitedOffering helps build digital framework for Sustainability for Manufacturing & Consumer enterprises and covers data collection, governance and reporting aspects of Emissions, Energy , Waste & Water.
+3
Applicable to:
Power BI apps
Power Automate
Power Apps
25 out of 25