FiltersClear all
Consulting services results
Showing results in consulting services.
All results
DORA act assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
1 out of 60
Quorum Cyber - Data Loss Prevention Managed Service using Microsoft PurviewQuorum CyberQuorum Cyber's Data Loss Prevention Managed Service leveraging the power of Microsoft Purview
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
2 out of 60
Introduction to Microsoft Purview Data Protection: 4-Hour TrainingLong View SystemsGain hands-on knowledge in data protection, governance, and compliance with Long View’s expert-led Microsoft Purview training.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
3 out of 60
Data Security Engagement: 4-Wk WorkshopExelegentThe Data Security Engagement provides a summary of an organization’s data protection and compliance stature with actionable recommendations.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
4 out of 60
Microsoft Sentinel Integration with Carbon Black by AVASOFTAVASOFTImprove endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
5 out of 60
Epiq Delivery: The Microsoft Data Security EngagementEpiq GlobalIn this Microsoft Purview Data Security engagement, Epiq will provide you with insights to help you identify data security risks in your organization and discover strategies to mitigate them.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
6 out of 60
Incident Response Tabletop Exercises: 2-Wk BriefingeGroup Enabling TechnologiesBe proactive and prepare your IT team for emergencies with a Disaster Plan
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
7 out of 60
Lighthouse Proof of Concept: 10 WkLighthouse GlobalPartner with Lighthouse to test Microsoft Purview technology and understand if it's meets requirements for your organization’s data security workflows.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
8 out of 60
Quorum Cyber Data Security Assessment using Microsoft PurviewQuorum CyberAchieve a clear understanding of the storage, access and protection of one of your organisation’s most valuable assets.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
9 out of 60
Microsoft Purview Data Security Advanced Quick Start 16-wk ImplementationEdgile, Inc.The Microsoft Purview Data Security Quick Start is an accurate and reliable program that allows you to immediately leverage your Microsoft investments. You’ll receive high velocity, measurable outcome
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
10 out of 60
Epiq Microsoft 365 Copilot Optimization with Microsoft PurviewEpiq GlobalEnable your organization with Microsoft Copilot’s AI capabilities while mitigating implementation risks.
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Insider Risk
11 out of 60
Epiq eDiscovery Solution with Microsoft PurviewEpiq GlobalStreamline the entire discovery process within your environment, enabling efficient data retrieval and analysis while ensuring compliance with legal requirements with Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
12 out of 60
Data Protection and Compliance Quick StartSoftchoiceThe Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 60
Data Security EngagementSignal Alliance Technology HoldingAs your company data expands and generative AI is being deployed rapidly, having an integrated approach that can help quickly identify, triage, and act on data security risks is super important.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
14 out of 60
Bulletproof 365 Compliance: Managed Information Protection ServiceBulletproof Solutions Inc.We can help organizations understand their risks, define the strategy and path to mitigating these risks and provide the expertise to efficiently monitor and respond when internal and external threats
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
15 out of 60
Active Directory Security on DemandComtrade System IntegrationDiscover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
16 out of 60
Microsoft 365 Information Protection and Governance: 12 week ImplementationINFOTECHTIONDevelop a strategy and blueprint for protecting and governing your information in Microsoft365 and beyond. Implement and manage through Infotechtion managed services.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
17 out of 60
Copilot Data ProtectionCloud LifeCopilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
18 out of 60
Microsoft Purview Insider Risk Management (IRM): 2-Week ImplementationSpyglass MTG, LLCOur engagement is designed to accelerate the ability to integrate and consume IRM across your enterprise while better securing data and identities in the environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
19 out of 60
Purview Pak365: Microsoft Purview ImplementationRavanty Tech Consulting, Inc.Empower your enterprise Data protection and Compliance requirements across your Microsoft 365 data estate with the help of Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
20 out of 60
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical StartRapidly identify, contain, and remediate a breach.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
21 out of 60
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology HoldingOur goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
22 out of 60
Microsoft Purview Implementation AdvisoryEpiq GlobalEpiq Microsoft Purview information governance consulting and advisory services ensure secure, compliant and efficient information governance strategies and deployment for Microsoft Purview compliance.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
23 out of 60
Quorum Cyber - Managed Insider Risk Management using Microsoft PurviewQuorum CyberOur Managed Insider Risk service provides a comprehensive solution that will help identify and mitigate risks of insider threats within your organisation.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
24 out of 60
Copilot for Microsoft 365 Data Security QuickStartSoftchoiceSetting the foundation for data security and governance in preparation for Copilot for Microsoft 365
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
25 out of 60
Data Security with Microsoft Purview 4-weeks workshopAlfa Connections Pte LtdThe Data Security Engagement helps identify and mitigate data security risks in organizational data
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
26 out of 60
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLCWe understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
27 out of 60
Data Security with Microsoft Purview SolutionsBDO Digital, LLCEnhance data control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
28 out of 60
Microsoft Sentinel Migration and ModernizeCollective InsightsMigrate from legacy SIEM to Microsoft Sentinel; a cloud native SIEM + SOAR
+2
Applicable to:
Insider Risk
Threat Protection
29 out of 60
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTIONLearn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
30 out of 60
Data Security with Microsoft Purview-4h AssessmentReplyThe Microsoft Purview Assessment offers advanced data security, integrating discovery, classification, and governance with Microsoft’s suite to enhance compliance and protection.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
31 out of 60
Insider Risk Management: 8-Wk implementationPwCEnable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
32 out of 60
Defender Pak365: Microsoft Defender ImplementationRavanty Tech Consulting, Inc.Empower your organization with comprehensive, AI-driven protection tailored to meet evolving security needs with the help of Microsoft Defender.
+3
Applicable to:
Identity & Access Management
Insider Risk
Threat Protection
33 out of 60
Microsoft 365 Security WorkshopOlive + GooseImprove your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
34 out of 60
Microsoft Copilot Legal & Compliance Readiness Assessment: 4-Wk AssessmentLighthouse GlobalThis assessment helps identify information protection and data governance gaps to prepare your organization to safely and efficiently deploy Microsoft Copilot.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
35 out of 60
Microsoft Purview Protect & Govern Sensitive Data - 3 Day WorkshopEpiq GlobalDiscover risks from dark data and learn how to address them with Microsoft Purview and Epiq.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
36 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITEDOur service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
37 out of 60
Onesec’s Secure Access to Microsoft 365 with ZscalerSecure Nextgen SystemsEnhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
38 out of 60
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling TechnologiesCyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
39 out of 60
Epiq Microsoft Purview Separated Employee DefensibilityEpiq GlobalMitigate the potential risks associated with departing employees, ensuring a secure and legally compliant transition while safeguarding sensitive Microsoft 365 data with Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
40 out of 60
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
41 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLCGet introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
42 out of 60
Lighthouse Microsoft 365 Purview Art of the Possible: 1-Wk WorkshopLighthouse GlobalA custom hands-on workshop to understand the full capabilities and value of the Microsoft Purview suite and how to maximize its benefits in your organization’s compliance framework.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
43 out of 60
Copilot for Microsoft 365: 18-Day Get Ready Standard Workshopwater IT Security GmbHGet ready for Copilot for Microsoft 365 – and learn how your organization can safely and confidently adopt AI technologies while actively protecting and managing sensitive data with Microsoft Purview.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
44 out of 60
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDSEgyptian Data Protection Law offer aims to give you a brief description of the following:
Data Privacy Basics
The Egyptian Data Protection Law main highlights
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
45 out of 60
Microsoft Purview eDiscovery POC (5 Day)Epiq Global5-Day eDiscovery POC demonstrating standard & premium capabilities of Microsoft Purview components
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
46 out of 60
Get Ready for Microsoft 365 Copilot with Zones Purview WorkshopZones, LLCThe goal of the Zones' Purview Workshop is to provide organizations with a tailored, 6-week journey to master data governance, safeguard data,
+2
Applicable to:
Information Protection & Governance
Insider Risk
47 out of 60
Insider Risk Management: 4 week AssessmentBDO Digital, LLCHave a plan on how to reduce data leakage focused on insider risk from within your organizational walls
+2
Applicable to:
Compliance Advisory Services
Insider Risk
48 out of 60
Enforced Data Security Implementation - 12 weeksBDO Digital, LLCSecure and control access to your company's data, no matter where it lives
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
49 out of 60
Insider Risk Management Quick Start 12-wk ImplementationEdgile, Inc.Achieve a Microsoft 365 Insider Risk Management (IRM) production pilot, which is expected to provide solutions, detection, and investigation for insider threat scenarios.
+1
Applicable to:
Insider Risk
50 out of 60
Microsoft 365 Security Assessment-1Wk AssessmentPoint Alliance IncOrganizations have diverse security needs and attitudes; thus, our assessment checklist provides general recommendations for various scenarios
+3
Applicable to:
Adoption & Change Management
Information Protection & Governance
Insider Risk
51 out of 60
CloudCompass Managed Service: 12-mo SubscriptionLighthouse GlobalA Lighthouse subscription service for Microsoft 365 designed to keep legal and compliance teams ahead of change in the dynamic cloud computing landscape.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
52 out of 60
Build a Compliance Strategy - 4 weeks WorkshopINFOTECHTIONA data driven workshop to identify your information compliance maturity regards to privacy, regulatory and data exfiltration risks; and help you build a strategy for improvements.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
53 out of 60
True Managed Security Service- 3 day Workshoptrue org cloudYou have a vision. We can help you secure it...
+3
Applicable to:
Information Protection & Governance
Insider Risk
Threat Protection
54 out of 60
CS Data Security 360°: 2-Wk AssessmentCampana & Schott GmbHUtilize Microsoft Purview suite and Copilot for Security to safeguard your content and information.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Insider Risk
55 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson GroupHenson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
56 out of 60
Beyondsoft Data Governance and Protection with Microsoft Purview Deployment: 8-Week ImplementationBeyondsoftBeyondsoft will deploy a collection of solutions from Microsoft 365 and Microsoft Purview to address security challenges regarding Data protection, Data Compliance, Data Governance and Risk Management
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
57 out of 60
Lighthouse Microsoft SharePoint Premium Proof of Concept: 10 WkLighthouse GlobalWe deliver technology and workflow Proof of Concepts focused on use of Microsoft SharePoint Premium for information protection, information governance, legal, compliance, and eDiscovery use cases.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
58 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
59 out of 60
Microsoft Defender for Cloud Apps JumpstartSentinel Technologies Inc.Microsoft Defender for Cloud Apps address security gaps in an organization's environment.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
60 out of 60