FiltersClear all
Consulting services results
Showing results in consulting services.
All results
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
1 out of 28
Microsoft Intune ServiceSii Sp. z o.o.Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
+3
Applicable to:
Cloud Security
Device Deployment & Management
Insider Risk
2 out of 28
Quorum Cyber - Data Loss Prevention Managed Service using Microsoft PurviewQuorum CyberQuorum Cyber's Data Loss Prevention Managed Service leveraging the power of Microsoft Purview
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
3 out of 28
Copilot Data ProtectionCloud LifeCopilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
4 out of 28
Quorum Cyber - Managed Insider Risk Management using Microsoft PurviewQuorum CyberOur Managed Insider Risk service provides a comprehensive solution that will help identify and mitigate risks of insider threats within your organisation.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
5 out of 28
Quorum Cyber Data Security Assessment using Microsoft PurviewQuorum CyberAchieve a clear understanding of the storage, access and protection of one of your organisation’s most valuable assets.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
6 out of 28
Trustwave Accelerator for Microsoft PurviewTrustwave Holdings, IncTrustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Purview to unlock full value for your organization
+1
Applicable to:
Insider Risk
7 out of 28
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTIONLearn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
8 out of 28
4Sight's Microsoft Data Security Engagement4Sight HoldingsIdentify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
9 out of 28
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLCGet introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
10 out of 28
SecureBlu MDR Service for Microsoft 365 DefenderNew Era TechnologySecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
11 out of 28
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
12 out of 28
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDSEgyptian Data Protection Law offer aims to give you a brief description of the following:
Data Privacy Basics
The Egyptian Data Protection Law main highlights
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
13 out of 28
Paramount SecureData360Paramount Computer Systems LLCParamount SecureData360 | Learn and adopt an enterprise data protection & governance solution using "Microsoft Purview Information Protection" part of Microsoft 365 E5 Compliance licenses.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
14 out of 28
Identity and Access Management SolutionH One (Private) LimitedEntra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
15 out of 28
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
16 out of 28
Microsoft Sentinel Integration with Carbon Black by AVASOFTAVASOFTImprove endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
17 out of 28
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
18 out of 28
Microsoft Intune: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur expert team will help you deploy and configure Microsoft Intune, ensuring seamless integration and optimal performance for your organization's needs
+3
Applicable to:
Adoption & Change Management
Insider Risk
Threat Protection
19 out of 28
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro LtdWipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
20 out of 28
Ctelecoms Defend Against Threats with SIEM Plus XDR WorkshopConsolidated Telecoms (Ctelecoms)Defend Against Threats with SIEM Plus XDR Workshop Learn how to put next-generation Microsoft security tools to work for you.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
21 out of 28
Ctelecoms Mitigate Compliance and Privacy Risks WorkshopConsolidated Telecoms (Ctelecoms)The Mitigate Compliance & Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organization.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
22 out of 28
True Managed Security Service- 3 day Workshoptrue org cloudYou have a vision. We can help you secure it...
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
23 out of 28
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
24 out of 28
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
25 out of 28
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
26 out of 28
Securing Copilot for Microsoft 365 in Microsoft 365 for Business 1hour Implementationtrue org cloudThe security, compliance, and privacy policies that you have in place are adopted by Copilot for Microsoft 365.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
27 out of 28
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITEDOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
28 out of 28