Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
FiltrosBorrar todo

  • Su ubicación
  • Productos (1)
  • Sectores
  • Tipo de servicio

Servicios de consultoría resultados

Mostrando resultados en servicios de consultoría
Vista resultados relacionados en nubes del sector.
Microsoft Endpoint Management: 5-Day Proof of ConcepteGroup Enabling Technologies, LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-mobile-device-management product iconMobile Device Management
eGroup Enabling Technologies, LLC. Microsoft Endpoint Management Proof of Concept will allow you to modernize your endpoint management as part of an overall device management strategy.
1 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
2 out of 60
Microsoft Cloud PC - 4 Day Proof of Concept EngagementSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Our Microsoft Cloud PC offering is designed to help organizations simplify desktop management, increase security, streamline application delivery and increase end user satisfaction.
3 out of 60
Windows as a Service: 4-Wk ImplementationAMTRA Solutions Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure your data and devices, identities and your business with Windows 10/11.
4 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwoven
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Netwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
5 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalyst
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
6 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
7 out of 60
Security Copilot Value AcceleratorAvanade, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Designed to help organizations modernize their security operations and administration by leveraging Gen AI.
8 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
9 out of 60
Getting Ready for CoPilot with PurviewPatriot Consulting Technology Group LLC
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The "Getting Ready for CoPilot with Purview" workshop is crafted to prepare organizations for the eventual adoption of Microsoft's CoPilot, by first implementing Microsoft Purview
10 out of 60
Windows 365 Deployment : 12 month ImplementationPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Patriot will design, configure, test and deploy Microsoft Windows 365 for your environment.
11 out of 60
Data Security and Compliance Assessment for Microsoft 365Neway Technologies
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get more out of compliance using your orgnaizations data and behaviors to drive policy. Ensuring you maintain productivity while ensuring your business is safe and secure.
12 out of 60
Phishing, Malware & Spam protection- 2 weeks ImplementationAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
13 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
14 out of 60
Zero Trust Launchpad: 3-Wk AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
15 out of 60
Modern Work Services Proof of ConceptCrayon US
+3
Applicable to:
m365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-meetings-for-microsoft-teams product iconMeetings for Microsoft Teams
Crayon Modern Work Services PoC will help you pilot a subset of users with the best of Microsoft 365 prior to implementation. This will allow us to ensure a smooth transition for all users.
16 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure and manage your cloud environments by fortifying your infrastructure against emerging threats.
17 out of 60
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstream
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
18 out of 60
Microsoft Value Calculator: One Hour AssessmentPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Cost Takeout Opportunity shows the potential cost reductions from consolidating third party solutions with Microsoft 365.
19 out of 60
Identity as a Service | Assure 365CyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Fully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
20 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk EngagementCloudScale International
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
This assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
21 out of 60
Modern Endpoint Management Airlift: 2 Week POCSynergy Technical, LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Our Modern EndPoint Management Airfift will provide a deep dive into Microsoft's endpoint security solutions, as well as a proof of concept tailored to your specific concerns.
22 out of 60
Cloud Security Journey: 2 Hour Proof of Concept360 Visibility Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
23 out of 60
Microsoft 365 Azure AD 3-wk Implementation RoadmapCyclotron Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
24 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementationInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
25 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
26 out of 60
Security Assessment - 4-Week AssessmentCoretek Services
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Analysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
27 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
28 out of 60
Microsoft 365 Tenant to Tenant Migration​: 6 Week ImplementationAll Covered, a division of Konica Minolta
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Let All Covered help you assess, plan and skillfully implement your Microsoft 365 Tenant to Tenant migration.
29 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
30 out of 60
Microsoft Windows Autopilot Services: 5-Day Proof of ConcepteGroup Enabling Technologies
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Reduce IT complexity and eliminate time-consuming corporate re-imaging by shipping and deploying straight to users with Microsoft Windows Autopilot.
31 out of 60
Multifactor Authentication: 4-Day ImplementationFSI Strategies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Implementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
32 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
33 out of 60
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
34 out of 60
Modern EndPoint Management - Jumpstart: 1-Wk Proof of ConceptLogicalis, Inc.
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Intune Jumpstart will help showcase the value of Microsoft Intune, to show you how to more effectively manage endpoints within Intune. Proof of Concept deployment included!
35 out of 60
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
36 out of 60
Pentest-4wks AssessmentadaQuest
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Gain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
37 out of 60
On-Prem Exchange to Office 365 Migration: 4-Wk MigrationExodus Integrity Services, Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Simplify your email migration process to Office 365 with ease and efficiency.
38 out of 60
Windows 365 Jumpstart: 3 Week ImplementationSteeves
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
We'll discuss the value of Windows 365 and its key functionalities, followed by a workshop to expose key areas and document decisions that drive implementation to ensure a successful adoption.
39 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
40 out of 60
Managed IT Services for DentalOlive + Goose
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Comprehensive managed IT services for dental offices, ensuring security, compliance, and continuity.
41 out of 60
C1st End-user Device Security Zero TrustC1st Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
C1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
42 out of 60
Office 365: Setup, Demo Train: 3-Hr Implementationtrue org cloud
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Gain a competitive edge and be more productive with a higher growth in your business with the help of True.org Cloud’s Microsoft 365 Business implementation.
43 out of 60
Microsoft Entra Verified ID and Credivera: 3-day Planning WorkshopOxford Computer Group LLC
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
This Planning Workshop is designed to help you get started with a verifiable credentials solution using Credivera and Microsoft Entra Verified ID.
44 out of 60
Managed Services - Microsoft 365ConvergeOne
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Fully utilize your Microsoft 365 Solution with all the Identity, Security, and Collaboration portions available to you
45 out of 60
Microsoft 365 Roadmap: 1-Wk WorkshopeGroup Enabling Technologies, LLC
+3
Applicable to:
m365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Enable a Secure and Productive Workforce with a Modern Workplace Roadmap powered by Microsoft 365 solutions.
46 out of 60
CMMC Assessment Ready SolutionPlanet Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Based off the Planet secure collaboration enclave, this provides customers with CMMC Assessment Ready artifacts.
47 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Stop threats with a cloud-native SIEM adapted to your new business needs.
48 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance. ​
49 out of 60
Copilot for Microsoft 365: 4 weeks Proof of ConceptReliance Infosystems Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
We are thrilled to present our Copilot Seed Investment Offer, crafted to help organizations validate and achieve their AI objectives using Microsoft 365.
50 out of 60
Exchange Migration to Microsoft 365: 6-Week ImplementationAll Covered, a division of Konica Minolta
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
All Covered’s migration team can help plan and execute your move to Microsoft 365. Let our expert engineers guide you through the process of your Exchange Migration to Microsoft 365.
51 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Environment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
52 out of 60
Ransomware Protection: 1 Day-WorkshopConvergeOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
53 out of 60
Microsoft 365 Security: 2-Week ImplementationTelelink Business Services EAD
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
54 out of 60
BCN Intranet LiteBCN Group Ltd.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
55 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
56 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
57 out of 60
Teams Hosted Direct Routing: 2-week ImplementationQuisitive
+3
Applicable to:
m365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teams-custom-solutions product iconTeams Custom Solutions
Quisitive Hosted Direct Routing (HDR) service for Microsoft Teams is a cloud-based service that securely connects new or existing phone lines, numbers, and service plans to Microsoft Teams.
58 out of 60
Remote Access to On-Prem Apps: 3 Wk ImplementationInvoke
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Surface on-premises applications to remote users through zero trust, while leveraging the advanced identity security controls of Azure Active Directory. No VPN required!
59 out of 60
Securing Identities WorkshopSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
60 out of 60
  • Anterior
  • 4
  • 5
  • 6
  • 7
  • 8
  • Siguiente
Novedades
  • Surface Pro
  • Surface Laptop
  • Surface Laptop Studio 2
  • Copilot para organizaciones
  • Copilot para uso personal
  • Microsoft 365
  • Explora los productos de Microsoft
  • Aplicaciones de Windows 11
Microsoft Store
  • Perfil de la cuenta
  • Centro de descarga
  • Soporte de Microsoft Store
  • Devoluciones
  • Seguimiento de pedidos
  • Reciclar
  • Garantías comerciales
Educación
  • Microsoft Educación
  • Dispositivos para educación
  • Microsoft Teams para Educación
  • Microsoft 365 Educación
  • Office Educación
  • Formación y desarrollo de educadores
  • Ofertas para estudiantes y padres
  • Azure para estudiantes
Empresas
  • Microsoft Cloud
  • Seguridad de Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Pequeñas empresas
Desarrolladores y TI
  • Desarrollador de Microsoft
  • Microsoft Learn
  • Soporte técnico para aplicaciones del marketplace de IA
  • Microsoft Tech Community
  • Azure Marketplace
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
Compañía
  • Oportunidades de empleo
  • Acerca de Microsoft
  • Noticias de la compañía
  • Privacidad en Microsoft
  • Inversores
  • Sostenibilidad
Español (España, alfabetización internacional) Icono de exclusión de opciones de privacidad Tus opciones de privacidad Privacidad de la salud del consumidor
  • Sitemap
  • Contacte con Microsoft
  • Privacidad y Cookies
  • Condiciones de uso
  • Marcas registradas
  • Sobre nuestra publicidad
  • EU Compliance DoCs
  • Manage cookies
  • © Microsoft 2025