Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
FiltrosBorrar todo


Servicios de consultoría resultados

Mostrando resultados en servicios de consultoría
Vista resultados relacionados en nubes del sector.
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Provide cross-domain threat protection and simplify breach prevention
1 out of 60
Data Security EngagementadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
2 out of 60
Microsoft Cybersecurity AssessmentThe Partner Masters
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
3 out of 60
Microsoft 365 Security AssessmentCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW’s Microsoft 365 Security Assessment allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
4 out of 60
Threat Protection EngagementadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
5 out of 60
Microsoft 365 Copilot Workshop: 2daysInsight
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Take the first steps toward helping your organization unleash creativity, unlock productivity, and level up skills with Insight’s Microsoft 365 Copilot Workshop.
6 out of 60
Microsoft Funded Workshop for Copilot for Microsoft 365 Adoption Acceleration: 2-Wk ImplementationProServeIT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
If your company is eligible, we can deliver a Microsoft funded adoption accelerator engagement for Copilot for Microsoft 365 to you free of charge ($10,000 USD value).
7 out of 60
Avanade Entra Verified ID Consulting ServicesAvanade, Inc.
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Microsoft Entra Verified ID is a Decentralized Identity implementation that streamlines any identity related process, simplifies it, reduce costs and increases convenience.
8 out of 60
Microsoft 365 Copilot Foundations ProgramHSO
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
From envisioning and assessment to deployment, embrace the power of Microsoft 365 Copilot - your Copilot for work!
9 out of 60
Intune Managed ServiceMobile Mentor
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Your endpoint ecosystem is constantly evolving and needs proactive management, so we designed the Intune Managed Service to help customers unlock the full potential of Intune.
10 out of 60
Introducing Microsoft Purview: 2 Hour WorkshopSlalom Consulting
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Learn about how Microsoft Purview brings together comprehensive solutions from their compliance & data governance portfolios and Slalom's approach that provides security in harmony with your business.
11 out of 60
Introduction to Microsoft Purview Data Protection: 4-Hour TrainingLong View Systems
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Gain hands-on knowledge in data protection, governance, and compliance with Long View’s expert-led Microsoft Purview training.
12 out of 60
Microsoft Entra – IAM Review and AssessmentCollective Insights
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Streamline your Microsoft 365 identity management and enhance your security with insights from our Microsoft Entra IAM Review and Assessment
13 out of 60
Okta to Microsoft Entra ID MigrationPerformanta
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Performanta's Okta to Microsoft Entra ID Application Migration service will give you a controlled, seamless and secure transition to Azure AD.
14 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 WksWipro Ltd
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
15 out of 60
Microsoft 365 Copilot Security and Compliance controlstrue org cloud
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Microsoft Copilot for Security: Enhance Your Organization's Security Posture
16 out of 60
Microsoft Purview Roadmap Deployment - 6 Week AssessmentProtiviti
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This engagement will provide clients with an understanding of Microsoft Purview capabilities and establish a strategic roadmap for deploying and using Purview to enhance their Data Protection Program.
17 out of 60
Active Directory Services: Implementation, Upgrade, and MigrationITX360 (Pvt) Ltd.
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Boost productivity and security with expert Active Directory services. Integrate seamlessly with Microsoft 365 through our implementation, upgrade, and migration solutions
18 out of 60
CGI - Managed Services for Microsoft 365 FY25CGI Inc.
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Leave the end-to-end Microsoft 365 support services to CGI so that your IT support team can focus on value-added tasks.
19 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
20 out of 60
Implementation of Microsoft Purview QuickStartPresidio
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Enhance security posture, data protection, and governance with Microsoft Purview QuickStart: implementation by Presidio offering.
21 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile IT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Agile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
22 out of 60
Copilot Value DiscoveryadaQuest
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Copilot Value Discovery is a three-phase process that helps customers grasp the benefits of AI reinvention, pinpoint key functional scenarios, create a business case, and develop a strategic plan.
23 out of 60
Microsoft Purview: 5-Day Fundamentals WorkshopeGroup Enabling Technologies
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Quickly reduce risk and enable compliance controls with an eGroup Enabling Technologies, LLC Microsoft Purview Fundamentals Workshop.
24 out of 60
Cloud Security Operations CenterReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Verified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
25 out of 60
Windows10 EOL to Windows11 Foundations - 1 Week QuickStartCoretek Services
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-firstline-workers product iconFrontline Workersm365-sa-identity-and-access-management product iconIdentity & Access Management
Windows 10 EOL is right around the corner, prepare with the Windows 11 foundations QuickStart for your organization today.
26 out of 60
Microsoft 365 Copilot Data and Security Readiness: 4-Week AssessmentSpyglass MTG, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our Microsoft 365 Copilot Data and Security Readiness Assessment is a scoped engagement that is designed to accelerate the ability to integrate and consume Copilot across your enterprise.
27 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365 GCC High for CMMC/ITAR: 6-Wk Assessment and PlanningAgile IT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Shorten the time to value from an M&A activity which includes partial or all going to Microsoft 365 GCC High by starting with an assessment and plan to rationalize identities, tenants, and costs.
28 out of 60
Copilot for Security Readiness AssessmentInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Invoke's Copilot for Security Readiness Assessment is a service that helps customers prepare for using Copilot, a solution that leverages data to enhance Modern Sec Ops.
29 out of 60
Full Cutover Google Workspace to Office 365 migration: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Migrate G Suite (Google Apps) to Microsoft 365, transferring mailboxes, calendars, tasks, contacts, files, and documents seamlessly to Exchange Online and OneDrive.
30 out of 60
Threat Protection EngagementISA Cybersecurity Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you
31 out of 60
Sogeti SmartWorkspace: 4 Week ImplementationCapgemini Group
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Sogeti provides a one-stop shop set of offerings around the SharePoint solutions. Our offer comprises consultancy, discovery of the existing landscape, Solution Architecture, SharePoint migration etc.
32 out of 60
Copilot Readiness AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
33 out of 60
Microsoft Purview Records Management Assessment & Strategy for Government - 9 Week AssessmentProtiviti
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protiviti assists government departments and agencies with defining and documenting a strategy and roadmap to accomplish records management within Microsoft 365 leveraging Microsoft Purview.
34 out of 60
Microsoft Funded Workshop for Copilot for Microsoft 365: 2-Wk AssessmentProServeIT
+2
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
If your company is eligible, we can deliver a Microsoft funded readiness assessment for Copilot for Microsoft 365 to you free of charge ($5,000 USD value).
35 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk ImplementationNeway Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Streamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
36 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
37 out of 60
Incident Response RetainerSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
38 out of 60
Microsoft 365 Mergers and Acquisitions (M&A): 4-Week ImplementationSpyglass MTG, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Spyglass’s Microsoft 365 Mergers and Acquisitions (M&A) Implementation is a 4-week/ $50k engagement that focuses on quickly being able to move data to its desired destination.
39 out of 60
Threat Protection Engagement: 3-Day AssessmentPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Do more with less utilizing your investment in Microsoft 365. Get help achieving your broader security objectives with an assessment and roadmap.
40 out of 60
Avanade Microsoft 365 Copilot Information Management 4 wk Imp. FY24Avanade, Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Avanade Microsoft 365 Copilot Information Management Accelerator ensures your data meets high standards of security, privacy and compliance so you can confidently unlock Copilot's full potential.
41 out of 60
Windows Virtual Desktop Implementation: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Provide a streamlined solution using Windows Virtual Desktop (WVD) on Microsoft Azure, offering efficient remote workstations, cost-effective licensing, and Windows 365 in a terminal server format.
42 out of 60
Microsoft 365 consultancyOnex Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Get Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
43 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Breach and Attack Simulations — We Attack to Defend You
44 out of 60
Microsoft Sentinel - Monitor file access and permission changes in SharePoint Implementation: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Implement Microsoft Sentinel for monitoring file access and permission changes in SharePoint, ensuring prompt detection and notification of unauthorized or unwanted activities.
45 out of 60
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Evaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
46 out of 60
Red Canary MSSP FastTrack for SecurityRed Canary
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Leverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
47 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With the combination of SIEM+XDR, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
48 out of 60
Microsoft 365 Security: 3,5 Tage Tenant AssessmentAppSphere AG
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
Sicherheitslage analysieren und stärken: Ihr Weg zur sicheren Cloud
49 out of 60
Copilot Readiness: 2-Wk WorkshopCentric Consulting, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
A facilitated workshop to build a Roadmap to guide your organization in implementing Copilot
50 out of 60
Google to Microsoft 365 MigrationManaged Solution
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Empowering digital transformation through a Google to Microsoft 365 migration with world-class support, so you can focus on what matters most—your business.
51 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
52 out of 60
Microsoft Yammer Tenant-to-Tenant Migration: 1-Wk Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Facilitate a smooth transition of your Yammer network and its associated data from one Microsoft 365 tenant to another.
53 out of 60
Microsoft Endpoint Manager: 8-Hours WorkshopOnex Group
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Learn how to secure Windows 11 environments with Microsoft Endpoint Manager
54 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
55 out of 60
MDS - Data Security EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A 3-day engagement to help customers identify security risks in organizational data, understand how to mitigate them & prevent data security risks using Microsoft Purview (E5 Compliance) technologies.
56 out of 60
Threat Protection Engagement FY25The Partner Masters
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
57 out of 60
Mergers and Acquisitions PlaybookIvision, Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
ivision leverages an approach and methodology designed to help clients successfully plan and design for a M/A&D migrations to achieve successful mergers, consolidation or a separation outcome.
58 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
UNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
59 out of 60
Active Directory Security on DemandComtrade System Integration
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
60 out of 60
  • 1
  • 2
  • 3
  • 4
  • 5
  • Siguiente
Novedades
  • Microsoft Copilot
  • Microsoft 365
Microsoft Store
  • Perfil de la cuenta
  • Devoluciones
  • Seguimiento de pedidos
Educación
  • Microsoft Educación
  • Dispositivos para el sector educativo
  • Microsoft Teams para Educación
  • Microsoft 365 Educación
  • Office Educación
  • Entrenamiento y desarrollo para educadores
  • Ofertas para estudiantes y padres
  • Azure para estudiantes
Empresa
  • Microsoft Cloud
  • Seguridad de Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Desarrollador y TI
  • Desarrollador de Microsoft
  • Documentación
  • Microsoft Learn
  • Comunidad de Microsoft Tech
  • Marketplace de Azure
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
Compañía
  • Trabajos
  • Acerca de Microsoft
  • Inversionistas
  • Sustentabilidad
Español (Nicaragua) Icono de exclusión de opciones de privacidad Tus opciones de privacidad Privacidad de la salud del consumidor
  • Sitemap
  • Contáctenos
  • Privacidad
  • Aviso legal
  • Marcas Registradas
  • Sobre nuestra publicidad
  • Manage cookies
  • © Microsoft 2025