FiltersClear all
Consulting services results
Showing results in consulting services.
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
1 out of 18
Lighthouse Protect & Govern Sensitive Data Workshop: 4 WkLighthouse GlobalA hands-on engagement delivered in a workshop format with everything you need to better discover, protect, and govern your corporate data.
+2
Applicable to:
Information Protection & Governance
Insider Risk
2 out of 18
Microsoft 365 Legal & Compliance Assessment: 4 WkLighthouse GlobalA customizable, strategic assessment designed to optimize efficiency of Microsoft Purview with a focus on archiving, records management, eDiscovery, Data Security, and information governance.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
3 out of 18
Lighthouse Proof of Concept: 10 WkLighthouse GlobalPartner with Lighthouse to test Microsoft Purview technology and understand if it's meets requirements for your organization’s data security workflows.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
4 out of 18
CloudCompass Managed Service: 12-mo SubscriptionLighthouse GlobalA Lighthouse subscription service for Microsoft 365 designed to keep legal and compliance teams ahead of change in the dynamic cloud computing landscape.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
5 out of 18
Microsoft Purview eDiscovery POC (5 Day)Epiq Global5-Day eDiscovery POC demonstrating standard & premium capabilities of Microsoft Purview components
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
6 out of 18
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
+3
Applicable to:
Device Deployment & Management
Insider Risk
Threat Protection
7 out of 18
Microsoft Compliance Workshop: 3-Day WorkshopWorld Wide TechnologyWWT offers a Microsoft Data Compliance and Risk workshop to help organizations with compliance risks and data protection.
+3
Applicable to:
Compliance Advisory Services
Insider Risk
Knowledge & Insights
8 out of 18
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It SecurityEnable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
9 out of 18
discover-sensitive-data-workshopECF Data LLCECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
10 out of 18
Managing and Identifying Risk: 3-Day WorkshopECF Data LLCThis engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
11 out of 18
Security Solutions:2-Weeks ImplementationAlpine Health Technologies CorpDiscover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
12 out of 18
User Shield: 4-Wk ImplementationLong View SystemsComprehensive and straight-forward security services leveraging leading Partners and Technologies
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
13 out of 18
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
14 out of 18
Compliance: 1 Day Workshop - Manage and Investigate RiskConvergeOneEveryone seems to be aware of external risk factors such as Ransomware, but what out Insider Risk? Find out the importance of proper controls and governance to protect yourself from bigger threats
+3
Applicable to:
Compliance Advisory Services
Identity & Access Management
Insider Risk
15 out of 18
Bulletproof 365 Compliance: Managed Information Protection ServiceBulletproof Solutions Inc.We can help organizations understand their risks, define the strategy and path to mitigating these risks and provide the expertise to efficiently monitor and respond when internal and external threats
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
16 out of 18
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse GlobalThis hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
+3
Applicable to:
Cloud Security
Information Protection & Governance
Insider Risk
17 out of 18
Build a Compliance Strategy - 4 weeks WorkshopINFOTECHTIONA data driven workshop to identify your information compliance maturity regards to privacy, regulatory and data exfiltration risks; and help you build a strategy for improvements.
+3
Applicable to:
Compliance Advisory Services
Information Protection & Governance
Insider Risk
18 out of 18