FiltersClear all
Consulting services results
Showing results in consulting services.
All results
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
1 out of 60
Quorum Cyber - Data Loss Prevention Managed Service using Microsoft PurviewQuorum CyberQuorum Cyber's Data Loss Prevention Managed Service leveraging the power of Microsoft Purview
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
2 out of 60
Introduction to Microsoft Purview Data Protection: 4-Hour TrainingLong View SystemsGain hands-on knowledge in data protection, governance, and compliance with Long View’s expert-led Microsoft Purview training.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
3 out of 60
Bulletproof 365 Compliance: Managed Information Protection ServiceBulletproof Solutions Inc.We can help organizations understand their risks, define the strategy and path to mitigating these risks and provide the expertise to efficiently monitor and respond when internal and external threats
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
4 out of 60
Microsoft Sentinel Integration with Carbon Black by AVASOFTAVASOFTImprove endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
5 out of 60
Epiq Microsoft 365 Copilot Optimization with Microsoft PurviewEpiq GlobalEnable your organization with Microsoft Copilot’s AI capabilities while mitigating implementation risks.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Insider Risk
6 out of 60
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology HoldingOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
7 out of 60
Quorum Cyber Data Security Assessment using Microsoft PurviewQuorum CyberAchieve a clear understanding of the storage, access and protection of one of your organisation’s most valuable assets.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
8 out of 60
Microsoft 365 Security Assessment-1Wk AssessmentPoint Alliance IncOrganizations have diverse security needs and attitudes; thus, our assessment checklist provides general recommendations for various scenarios
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Insider Risk
9 out of 60
Copilot for Microsoft 365 Data Security QuickStartSoftchoiceSetting the foundation for data security and governance in preparation for Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
10 out of 60
Data Protection and Compliance Quick StartSoftchoiceThe Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
11 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
12 out of 60
Onesec’s Secure Access to Microsoft 365 with ZscalerSecure Nextgen SystemsEnhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 60
Microsoft Copilot Legal & Compliance Readiness Assessment: 4-Wk AssessmentLighthouse GlobalThis assessment helps identify information protection and data governance gaps to prepare your organization to safely and efficiently deploy Microsoft Copilot.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
14 out of 60
Quorum Cyber - Managed Insider Risk Management using Microsoft PurviewQuorum CyberOur Managed Insider Risk service provides a comprehensive solution that will help identify and mitigate risks of insider threats within your organisation.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
15 out of 60
SecureBlu MDR Service for Microsoft 365 DefenderNew Era TechnologySecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
16 out of 60
Microsoft Purview Protect & Govern Sensitive Data - 3 Day WorkshopEpiq GlobalDiscover risks from dark data and learn how to address them with Microsoft Purview and Epiq.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
17 out of 60
Microsoft Purview Implementation AdvisoryEpiq GlobalEpiq Microsoft Purview information governance consulting and advisory services ensure secure, compliant and efficient information governance strategies and deployment for Microsoft Purview compliance.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
18 out of 60
Copilot Data ProtectionCloud LifeCopilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
19 out of 60
Data Security with Microsoft Purview SolutionsBDO Digital, LLCEnhance data control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
20 out of 60
Data Security EngagementSignal Alliance Technology HoldingAs your company data expands and generative AI is being deployed rapidly, having an integrated approach that can help quickly identify, triage, and act on data security risks is super important.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
21 out of 60
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTIONLearn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
22 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
23 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLCGet introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
24 out of 60
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
25 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
26 out of 60
Microsoft 365 Information Protection and Governance: 12 week ImplementationINFOTECHTIONDevelop a strategy and blueprint for protecting and governing your information in Microsoft365 and beyond. Implement and manage through Infotechtion managed services.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
27 out of 60
Legacy Data Migration and Optimization: 52-Wk MigrationLighthouse GlobalThis engagement delivers defensible migration from legacy on-prem archives to Microsoft 365, mapping to the Microsoft Purview suite of tools.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
28 out of 60
CloudCompass Managed Service: 12-mo SubscriptionLighthouse GlobalA Lighthouse subscription service for Microsoft 365 designed to keep legal and compliance teams ahead of change in the dynamic cloud computing landscape.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
29 out of 60
User Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
30 out of 60
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDSEgyptian Data Protection Law offer aims to give you a brief description of the following:
Data Privacy Basics
The Egyptian Data Protection Law main highlights
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
31 out of 60
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CVIdentify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
+2
Applicable to:
Identity & Access Management
Insider Risk
32 out of 60
Lighthouse Proof of Concept: 10 WkLighthouse GlobalPartner with Lighthouse to test Microsoft Purview technology and understand if it's meets requirements for your organization’s data security workflows.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
33 out of 60
Microsoft 365 Copilot Readiness Assessment: 1-Wk AssessmentPoint Alliance IncEmbark on a transformative journey with our Microsoft Co-Pilot Readiness Assessment, designed to empower teams and organizations in embracing the future of AI collaboration.
+3
Applicable to:
Adoption & Change Management
Identity & Access Management
Insider Risk
34 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance IncYou may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
35 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen SystemsThe OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
36 out of 60
Cyber Security AssessmentONEFACTORYThe Cybersecurity Assessment helps customers assess their security posture and risk to insider threats
+2
Applicable to:
Information Protection & Governance
Insider Risk
37 out of 60
Data Security: 2-Weeks WorkshopConterraIdentify data security risks in your organizational data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
38 out of 60
Lighthouse Microsoft SharePoint Premium Security and Compliance Assessment: 4 WkLighthouse GlobalInteractive assessment to identify opportunities to increase efficiency using Microsoft SharePoint Premium for data security and data governance use cases.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
39 out of 60
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
40 out of 60
Rapid Data Loss Prevention: 30-Day ImplementationLong View SystemsPreserve your data and secure your future with Data Loss Prevention powered by Microsoft Purview in just 30 days.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
41 out of 60
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
42 out of 60
Lighthouse Microsoft Data Security Check: 4-Wk AssessmentLighthouse GlobalIdentify data security risks in organizational data and receive expert guidance on operationalizing Microsoft 365 and the Purview suite of security and compliance technologies with this workshop.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
43 out of 60
Beyondsoft Data Governance and Protection with Microsoft Purview Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of solutions from Microsoft 365 and Microsoft Purview to address security challenges regarding Data protection, Data Compliance, Data Governance and Risk Management
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
44 out of 60
Securing Copilot for Microsoft 365 in Microsoft 365 for Business 1hour Implementationtrue org cloudThe security, compliance, and privacy policies that you have in place are adopted by Copilot for Microsoft 365.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
45 out of 60
Pentest-4wks AssessmentadaQuestGain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
46 out of 60
Lighthouse Protect & Govern Sensitive Data Workshop: 4 WkLighthouse GlobalA hands-on engagement delivered in a workshop format with everything you need to better discover, protect, and govern your corporate data.
+2
Applicable to:
Information Protection & Governance
Insider Risk
47 out of 60
Microsoft 365 Legal & Compliance Assessment: 4 WkLighthouse GlobalA customizable, strategic assessment designed to optimize efficiency of Microsoft Purview with a focus on archiving, records management, eDiscovery, Data Security, and information governance.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
48 out of 60
Lighthouse Microsoft Purview Deployment: 10-Wk IntegrationLighthouse GlobalImplement and integrate Microsoft Purview into your organization with confidence knowing you have mitigated risk factors and maximized your investment.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
49 out of 60
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
50 out of 60
Insider Risk Management Assessment: 4 WksLixar ITBDO's Insider Risk Management Assessment can help you identify insider data risks and establish a plan to reduce data leakage using Microsoft 365 to ensure compliance and security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
51 out of 60
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro LtdWipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
52 out of 60
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse GlobalThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
53 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 WeeksNetrix GlobalUnderstand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
54 out of 60
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix GlobalA 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
55 out of 60
Mitigate Compliance & Privacy Risks: 1-Day WorkshopNetrix GlobalUnderstand the risks and vulnerabilities related to organizational insiders and address their most pressing regulatory goals and challenges.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
56 out of 60
OAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen SystemsLearn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
57 out of 60
Ctelecoms Defend Against Threats with SIEM Plus XDR WorkshopConsolidated Telecoms (Ctelecoms)Defend Against Threats with SIEM Plus XDR Workshop Learn how to put next-generation Microsoft security tools to work for you.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
58 out of 60
Ctelecoms Mitigate Compliance and Privacy Risks WorkshopConsolidated Telecoms (Ctelecoms)The Mitigate Compliance & Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organization.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
59 out of 60
Microsoft Intune ServiceSii Sp. z o.o.Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
+3
Applicable to:
Cloud Security
Device Deployment & Management
Insider Risk
60 out of 60