FiltersClear all
Professional Services results
Showing results in professional services.
eDiscovery, Data Lifecycle & Records ManagementITC Secure LtdManage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
1 out of 42
Compliance Catalyst: 1 Hour WorkshopCloud EssentialsKickstart your compliance journey with a rapid assessment of your current situation followed by a 60-90 minute interactive workshop to discuss practical recommendations to make tangible improvements
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
2 out of 42
Data Security EngagementPerformantaThe Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
3 out of 42
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure LtdApply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
4 out of 42
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse GlobalThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
5 out of 42
Epiq Compliance Cloud Migration with Microsoft PurviewEpiq GlobalEpiq provides a seamless and compliant transition of valuable archive data off legacy technology, while mitigating risks and maintaining regulatory compliance harnessing Microsoft Purview.
+2
Applicable to:
Information Protection & Governance
Insider Risk
6 out of 42
Microsoft Purview Insider Risk Management and Compliance: ImplementationITC Secure LtdThis engagement delivers setup and enablement for Microsoft Purview’s Insider Risk Management and Communication Compliance capabilities, supporting proactive risk mitigation.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
7 out of 42
Lighthouse Protect & Govern Sensitive Data Workshop: 4 WkLighthouse GlobalA hands-on engagement delivered in a workshop format with everything you need to better discover, protect, and govern your corporate data.
+2
Applicable to:
Information Protection & Governance
Insider Risk
8 out of 42
impelSecure Data Security Engagement: Free 4-week workshopimpeltec Pty LtdIdentify data risks and evaluate user behavior for risky activities
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
9 out of 42
Cybersecurity Awareness: 12 month implementationProdware GroupCybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
10 out of 42
Data Security with Microsoft Purview SolutionsBDOEnhance data security control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
11 out of 42
DataGuard Managed ServiceCWSIDataGuard is a complete service designed to help you utilise the full range of capabilities within Microsoft Purview, from Data Discovery to creating and executing your Data Governance Strategy.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
12 out of 42
IdentityGuard Managed ServiceCWSIIdentityGuard helps customers understand, implement and utilise all of the capabilities of Entra ID Suite to execute their Identity & Access Management Strategy and deliver business benefits
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
13 out of 42
Rackspace Secure Remote WorkshopRackspace EMEAYour journey with Rackspace to keep your business running securely with M365 technologies.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Teamwork Deployment
14 out of 42
Trustwave Accelerator for Microsoft PurviewTrustwave Holdings, Inc.Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Purview to unlock full value for your organization
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
15 out of 42
Intune Implementation ServiceTHREATSCAPE SECURITY SOLUTIONS LIMITEDService is designed to accelerate the deployment and adoption of Microsoft Intune in alignment with Zero Trust principles, security best practice, and business productivity goals.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
16 out of 42
Microsoft Priva - Subject Rights Requests: 5-Day ImplementationCorporate Project SolutionsWith Microsoft Priva – Subject Rights Requests, such queries can be handled with workflow, collaboration, and automation capabilities. CPS can empower your organisation to meet these challenges.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
17 out of 42
Microsoft Priva - Privacy Risk Management: 5-Day ImplementationCorporate Project SolutionsSafeguard data from privacy issues such as data transfers, data overexposure, and hoarding. Monitor data based on sensitive information types or classification groups and take action.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
18 out of 42
PwC Information compliance: 4wk AssessmentPricewaterhouseCoopers UKPwC's Information compliance service helps customers to manage both structured and unstructured data across it's full lifecycle - discovery, classification, control, management and loss prevention.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
19 out of 42
PwC Business Aligned Zero Trust: 4-Wk AssessmentPricewaterhouseCoopers UKPwC's Zero trust proposition aims to help organisations to understand their current security state and develop a prioritised set of activities to improve their cyber maturity and resilience.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
20 out of 42
Compliance Success Pathway - 5 day discovery workshopKochoBespoke service to assess and continuously improve compliance posture
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
21 out of 42
Microsoft 365 Purview Compliance Assessment: 6-Wk AssessmentCloud EssentialsAn assessment process followed by an interactive workshop to deliver a tailored roadmap that provides the clarity and direction required to start deployment and adoption of Microsoft Purview
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
22 out of 42
Purview Compliance Accelerator Programme: 12-Months ImplementationCloud EssentialsA subscription to our managed services and multi-disciplinary team for delivery of a sustainable Microsoft Purview adoption programme.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
23 out of 42
Cybersecurity AssessmentCDI LLCThe Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
24 out of 42
Microsoft Copilot Data Structure Workshop: 5 day workshopBytes Software ServicesWork with Bytes to ensure that your business critical information stays protected.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
25 out of 42
SCC Data Security PathfinderSCCProtect Your Most Valuable Asset
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Threat Protection
26 out of 42
Microsoft Purview Proof of ConceptWanstorIn today's business environment, managing data effectively is challenging, especially as organizations grow, diversify, and adopt advanced technologies like AI. Data fragmentation.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
27 out of 42
Secure AILogicalis SolutionsComprehensive security for generative AI applications, ensuring safe usage and protection of sensitive data
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
28 out of 42
Information Lifecycle Management with Microsoft PurviewBridewell Consulting LimitedOperationalise Microsoft Purview’s Data Loss Prevention (DLP) and Insider Risk Management capabilities with this expert-led engagement
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
29 out of 42
Data Security EngagementANS Group LimitedGain visibility into hidden security risks that may exist in the data that resides in your Microsoft 365 Cloud while learning how Microsoft Purview can mitigate and protect your organisation.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
30 out of 42
Minsait Data Security Engagement over Microsoft PurviewMinsaitEvaluamos los riesgos asociados a la seguridad y privacidad de tus datos en Microsoft 365 y te ayudamos a definir una estrategia eficaz de protección basada en Microsoft Purview.
+2
Applicable to:
Information Protection & Governance
Insider Risk
31 out of 42
Viatel Data Security WorkshopViatel Technology GroupUncover the hidden risks that threaten your organisation’s most valuable assets, including shadow AI.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
32 out of 42
Data Security Envisioning WorkshopSoftwerx Ltd.Identify data security risks in your organisational data
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
33 out of 42
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
34 out of 42
S4B Email Attack Simulation TrainingS4BAttack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
35 out of 42
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4BInvestiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
36 out of 42
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4BDefensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
37 out of 42
Mobile Threat Defence 3 Week AssessmentBT BusinessMTD risk assessment using Microsoft 365 and Zimperium zIPS
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
38 out of 42
Email and Threat Protection 4 Week ImplementationHTGHTG’s Advanced Email Threat Protection pack ensures your Microsoft products such as Outlook, SharePoint, OneDrive & Microsoft Teams are hardened to best practice standards.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
39 out of 42
Microsoft 365 Threat Protect: 5 Day ImplementationCorporate Project SolutionsOur Security, Compliance, & Identity (SCI) Consultants and Architects will work with your organisation to identify where Threat Protection sits within your Cyber Security strategy.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
40 out of 42
Microsoft 365 Manage and Investigate Risk: 3-Day WorkshopComms-care Group LtdMicrosoft Funded Manage and Investigate Risk Consultancy Workshop
+2
Applicable to:
Cloud Security
Insider Risk
41 out of 42
Microsoft Information Protection Quick Deploy: 8-10 Days ImplementationCore Technology Systems (UK) LimitedMicrosoft Information Protection (MIP) Quick Deploy provides the necessary tools to help you understand and protect your users and your data.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
42 out of 42