AppSource
AplicacionesServicios de consultoríaNubes del sectorAsociados
Buscar consulting services de AppSource
AppSource
Más
Buscar consulting services de AppSource
AppSource
Más
Buscar consulting services de AppSource
AppSource
Buscar consulting services de AppSource
FiltrosBorrar todo


Servicios de consultoría resultados

Mostrando resultados en servicios de consultoría
Vista resultados relacionados en nubes del sector.
Todos los resultados
Microsoft 365 Migration: 3 Weeks Migration from Google Workspace / GsuiteRisksoft
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Migrate your emails, contacts. calendars and documents from Google Workspace to Microsoft 365
1 out of 60
cyber security threat analysis workshopU-BTech Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
the workshop is design to discover threats and risks
2 out of 60
Exchange Migration to Microsoft 365: 6-Week ImplementationAll Covered, a division of Konica Minolta
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
All Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
3 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
4 out of 60
Enable Windows 365 Cloud PCCofomo
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
With the right endpoint modernization strategy and tools, employees get a secure experience on every mobile device, tablet, or laptop they’re using, all while eliminating major management headaches.
5 out of 60
HPT Nextgen Windows Experience_02 days workshopHPT Vietnam Corporation
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
NextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
6 out of 60
HPT_Microsoft Secure Score Assessment - 4 weekHPT Vietnam Corporation
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Secure Score helps customers quickly figure out what actions they can take to improve your score. They can check their action queue and find the change they can make that most improves their security
7 out of 60
HPT_Microsoft Cyber Security Assessment_2 weekHPT Vietnam Corporation
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Strengthen your firm's defenses with our all-in-one cybersecurity platform
8 out of 60
HPT Defend Against Threats with SIEM Plus XDR_02 week workshopHPT Vietnam Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Defend Against Threats with SIEM Plus XDR workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products
9 out of 60
HPT Secure Identities and Access_03 days workshopHPT Vietnam Corporation
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
With identity attacks on the rise, this workshop will show you how to stop tomorrow’s data breaches by securing identities today.
10 out of 60
NTT Americas - Microsoft Device ManagementNTT Limited
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Deployment of Microsoft Unified Endpoint Management Services. Assessment of your resources and business objectives to develop a fresh approach to your security strategy.
11 out of 60
1ID Platform for EDUTelelink Business Services EAD
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-meetings-for-microsoft-teams product iconMeetings for Microsoft Teams
1ID Platform for EDU provides secure access to multiple custom applications and services offered by the customer organization via a variety of Microsoft 365 and Microsoft Azure services.
12 out of 60
Microsoft 365 GCC High Mig from Google (25 Users)Daymark Solutions
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
White-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Google G Suite
13 out of 60
Microsoft 365 GCC High Mig from Exchange: 6 Week ImplementationDaymark Solutions
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
White-glove migration to Microsoft 365 GCC High for organizations with regulatory compliance requirements and are currently using Microsoft Exchange On-Premises
14 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
15 out of 60
Avanade Entra Verified ID Consulting Services FY23Avanade, Inc.
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Microsoft Entra Verified ID is a Decentralized Identity implementation that streamlines any identity related process, simplifies it, reduce costs and increases convenience.
16 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
17 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Breach and Attack Simulations — We Attack to Defend You
18 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Evaluate and strengthen the current security posture of your environments in Microsoft365 and Microsoft Azure
19 out of 60
Microsoft 365 Tenant to Tenant Migration​: 6 Week ImplementationAll Covered, a division of Konica Minolta
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Let All Covered help you assess, plan and skillfully implement your Microsoft 365 Tenant to Tenant migration.
20 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era Technology
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
M&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
21 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POCITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
22 out of 60
Office 365: Setup, Demo Train: 3-Hr ImplementationTrue.org Cloud
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Gain a competitive edge and be more productive with a higher growth in your business with the help of True.org Cloud’s Microsoft 365 Business implementation.
23 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
24 out of 60
Intune for Windows: 6-week ImplementationMobile Mentor
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Intune for Windows is a configuration service that enables you manage Windows 10 devices in Intune.
25 out of 60
MDM Health Check (Mobile OS Only): 2-week AssessmentMobile Mentor
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
26 out of 60
BYOD 365: 6-week ImplementationMobile Mentor
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
The BYOD 365 services gives you the ability to secure company data without managing your employee’s personal devices.
27 out of 60
Advania: Intune Get Started: 2 d training and PoCAdvania AB
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Understand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
28 out of 60
Microsoft 365 Identity & Security: 2 wk assessmentPSM Partners
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Customized identity and security assessment focused on the Microsoft 365 platform
29 out of 60
G Suite to M365 Migration: 1-Day Proof of conceptTrue.org Cloud
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-meetings-for-microsoft-teams product iconMeetings for Microsoft Teams
Proof of concept for migration from G Suite to Microsoft 365
30 out of 60
Microsoft 365 E5 CMMC L1 3 Week ImplementationKAMIND IT, Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 1 using Microsoft 365 security Suite and Azure Sentinel SIEM.
31 out of 60
Intune & Autopilot - 2 Week - Proof of ConceptArraya Solutions
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Arraya can help jumpstart customer initiatives, no matter where they stand, regarding device management and deployment using Microsoft Intune and Autopilot.
32 out of 60
Microsoft Intune: 4-Wk Implementation ServicesTechNet UC LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Microsoft Intune Design and Deployment Services
33 out of 60
Bitscape M365 Security Assessment: 3-Wk AssessmentBitscape
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
34 out of 60
Microsoft Intune Implementation 10 DaysEnabling Technologies Corporation
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Secure your Mobile Devices with Microsoft Intune designed with Enabling's Security experts.
35 out of 60
Microsoft 365: 2-Week AssessmentPractical Solutions, Inc
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Establish a clear roadmap and change management plan for your journey to a modern workplace. Prepare your organization for a secure and productive workplace by getting the most out of Microsoft 365.
36 out of 60
Insider Risk Management Proof of Concept -5 DaysEnabling Technologies Corporation
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Insider risk management is a compliance solution in Microsoft 365 that helps minimize internal risks by enabling the detection of malicious and inadvertent activities in your organization.
37 out of 60
Modern Workplace Security 10-Wk ImplementationWipro Ltd
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
38 out of 60
Microsoft 365 Security: 3 Day AssessmentNetwoven
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protect against evolving cybersecurity threats and implement a modern workplace using built-in solutions from Microsoft.
39 out of 60
Securing Identities Workshop - 3 DaysEnabling Technologies Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Sit down with the Security experts at Enabling Technologies to set up your security authentication and access policies for a secure and also productive workplace.
40 out of 60
Microsoft Threat Check 4-Week AssessmentInvoke, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
41 out of 60
Microsoft 365 Identity Protection: 2 Week WorkshopNetwoven
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure user identities and devices with our Microsoft 365 Enhanced Identity Protection Workshop
42 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
The Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
43 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
44 out of 60
Security Assessment: 2-Wk AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
45 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
46 out of 60
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
47 out of 60
Microsoft Value Calculator: One Hour AssessmentPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Cost Takeout Opportunity shows the potential cost reductions from consolidating third party solutions with Microsoft 365.
48 out of 60
EMS Energize: 1-month proof of conceptInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Interlink Cloud Advisors’ EMS Energize engagement provides you with security experts who can help guide your business into a secure, productive cloud platform.
49 out of 60
CMMC Implementation for Microsoft 365 (8 Wk Proj)Summit 7 Systems, Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Summit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) practices associated with Levels 1-3 for Microsoft 365, as well as Azure and AAD where appropriate.
50 out of 60
Remote Access to On-Prem Apps: 3 Wk ImplementationInvoke, LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Surface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
51 out of 60
Azure AD Implentation in 8 weeksArmis, Sistemas de Informação, Lda
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Porovide a design and build capability that enables organisations to secure, control and simplify employee access to company data and sensitive resources resources from wherever they are.
52 out of 60
Modern Management: 4 week ImplementationMobile Mentor
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Modern Management is a Microsoft 365 focused managed service that reduces cost, improves security and delights employees!
53 out of 60
Office 365 GCC High Migration +Tenant Imp 4WkSummit 7 Systems, Inc
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Companies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
54 out of 60
Microsoft 365 Security Assessment up to 6 weeksACTS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
ACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
55 out of 60
Microsoft Defender for Endpoint: 2-wk AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft Defender for Endpoint assessment will help the customers review the current state, evaluate existing AV and EDR solutions and expectations, deploy MDE, and plan for ongoing management.
56 out of 60
Microsoft 365 Security: 3-Day Workshopdelaware
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
57 out of 60
Microsoft 365 Security: 2-Week ImplementationTelelink Business Services EAD
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
58 out of 60
Windows Autopilot 5 Day POCEnabling Technologies Corporation
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Enabling Tech walks customers through the process of provisioning Intune/Autopilot settings to distribute PCs directly from OEMs to end-users, and to reduce the effort with building new machines.
59 out of 60
The Modern IT Enterprise Security Five Day POCEnabling Technologies Corporation
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The Modern IT Enterprise Security 5 Day Proof-of-Concept provides a path to becoming a secure modern enterprise through strategic investments in both digital transformation and security enhancements
60 out of 60
  • 1
  • 2
  • 3
  • 4
  • Siguiente