FiltersClear all
Consulting services results
Showing results in consulting services.
All results
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
1 out of 26
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access ManagementInsider RiskThreat Protection
2 out of 26
Quorum Cyber Data Security Assessment using Microsoft PurviewQuorum CyberAchieve a clear understanding of the storage, access and protection of one of your organisation’s most valuable assets.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
3 out of 26
Securing Copilot for Microsoft 365 in Microsoft 365 for Business 1hour Implementationtrue org cloudThe security, compliance, and privacy policies that you have in place are adopted by Copilot for Microsoft 365.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
4 out of 26
Microsoft Intune ServiceSii Sp. z o.o.Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
+3
Applicable to:
Cloud SecurityDevice Deployment & ManagementInsider Risk
5 out of 26
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTIONLearn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
6 out of 26
SecureBlu MDR Service for Microsoft 365 DefenderNew Era TechnologySecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
7 out of 26
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro LtdWipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
8 out of 26
Paramount SecureData360Paramount Computer Systems LLCParamount SecureData360 | Learn and adopt an enterprise data protection & governance solution using "Microsoft Purview Information Protection" part of Microsoft 365 E5 Compliance licenses.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
9 out of 26
Quorum Cyber - Data Loss Prevention Managed Service using Microsoft PurviewQuorum CyberQuorum Cyber's Data Loss Prevention Managed Service leveraging the power of Microsoft Purview
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
10 out of 26
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInsider Risk
11 out of 26
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
12 out of 26
Quorum Cyber - Managed Insider Risk Management using Microsoft PurviewQuorum CyberOur Managed Insider Risk service provides a comprehensive solution that will help identify and mitigate risks of insider threats within your organisation.
+3
Applicable to:
Compliance Advisory ServicesInformation Protection & GovernanceInsider Risk
13 out of 26
Copilot Data ProtectionCloud LifeCopilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
14 out of 26
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
15 out of 26
True Managed Security Service- 3 day Workshoptrue org cloudYou have a vision. We can help you secure it...
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
16 out of 26
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDSEgyptian Data Protection Law offer aims to give you a brief description of the following:
Data Privacy Basics
The Egyptian Data Protection Law main highlights
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInsider Risk
17 out of 26
Microsoft Intune: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur expert team will help you deploy and configure Microsoft Intune, ensuring seamless integration and optimal performance for your organization's needs
+3
Applicable to:
Adoption & Change ManagementInsider RiskThreat Protection
18 out of 26
Trustwave Accelerator for Microsoft PurviewTrustwave Holdings, IncTrustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Purview to unlock full value for your organization
+1
Applicable to:
Insider Risk
19 out of 26
Ctelecoms Defend Against Threats with SIEM Plus XDR WorkshopConsolidated Telecoms (Ctelecoms)Defend Against Threats with SIEM Plus XDR Workshop Learn how to put next-generation Microsoft security tools to work for you.
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
20 out of 26
Ctelecoms Mitigate Compliance and Privacy Risks WorkshopConsolidated Telecoms (Ctelecoms)The Mitigate Compliance & Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organization.
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesInsider Risk
21 out of 26
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLCGet introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
+3
Applicable to:
Information Protection & GovernanceInsider RiskThreat Protection
22 out of 26
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
23 out of 26
Integrating Microsoft Sentinel with Carbon Black EDRAVASOFTImprove endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
+3
Applicable to:
Cloud SecurityInformation Protection & GovernanceInsider Risk
24 out of 26
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud SecurityInsider RiskThreat Protection
25 out of 26
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITEDOur comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
+3
Applicable to:
Identity & Access ManagementInsider RiskThreat Protection
26 out of 26