Envoyer des commentaires
Help & support
Éléments enregistrés
Plans privés
Juste un moment, connexion en cours...
FiltresTout effacer

  • Votre position
  • Produits (1)
    • Dynamics 365
    • Microsoft 365 (1)
      • Gestion de l'adoption et des modifications
      • Appel pour Microsoft Teams
      • Cloud Security
      • Services de conseil pour la conformité
      • Déploiement et gestion de l’appareil
      • Employés de première ligne
      • Gestion des identités et des accès
      • Protection des informations et gouvernance
      • Risque d’initié
      • Connaissances et insights
      • Meeting Rooms pour Microsoft Teams
      • Meetings pour Microsoft Teams
      • Microsoft 365 Live Events
      • Gestion des périphériques mobiles
      • Power Platform for Teams
      • Solutions personnalisées Teams
      • Déploiement de travail d'équipe
      • Protection contre les menaces
      • Analyse du temps de travail
    • Power Platform
  • Secteurs d'activité
  • Type de service

Services de conseil résultats

Affichage des résultats dans services de conseil.
Securing Copilot for Microsoft 365 in Microsoft 365 for Business 1hour Implementationtrue org cloud
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The security, compliance, and privacy policies that you have in place are adopted by Copilot for Microsoft 365.
1 out of 22
Microsoft Sentinel Integration with Carbon Black by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Improve endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
2 out of 22
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology Holding
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Our goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
3 out of 22
Active Directory Security on DemandComtrade System Integration
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
4 out of 22
DORA act assessment and implementationSii Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
5 out of 22
Data Security EngagementSignal Alliance Technology Holding
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
As your company data expands and generative AI is being deployed rapidly, having an integrated approach that can help quickly identify, triage, and act on data security risks is super important.
6 out of 22
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
7 out of 22
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLC
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
8 out of 22
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
9 out of 22
Insider Risk Management: 8-Wk implementationPwC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
10 out of 22
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro Ltd
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Wipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
11 out of 22
SecureBlu MDR Service for Microsoft 365 DefenderNew Era Technology
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
12 out of 22
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
13 out of 22
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
14 out of 22
Microsoft Purview Information Protection ImplementationITX360 (Pvt) Ltd.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Secure your organization's sensitive data with Microsoft Purview Information Protection—classify, label, and protect data easily while ensuring compliance.
15 out of 22
True Managed Security Service- 3 day Workshoptrue org cloud
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
You have a vision. We can help you secure it...
16 out of 22
Microsoft Intune ServiceSii Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-insider-risk product iconInsider Risk
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
17 out of 22
Pently PentestPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Simulated cyber attacks to uncover real vulnerabilities in your entire IT landscape.
18 out of 22
Data Leak DetectionAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Rapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
19 out of 22
Copilot Data ProtectionCloud Life
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
20 out of 22
Quorum Cyber Data Security Assessment using Microsoft PurviewQuorum Cyber
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Achieve a clear understanding of the storage, access and protection of one of your organisation’s most valuable assets.
21 out of 22
4Sight's Microsoft Data Security Engagement4Sight Holdings
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Identify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
22 out of 22
Nouveautés
  • Surface Pro
  • Surface Laptop
  • Surface Laptop Studio 2
  • Copilot pour les organisations
  • Copilot pour une utilisation personnelle
  • Microsoft 365
  • Découvrir les produits Microsoft
  • Applications Windows 11
Microsoft Store
  • Profil du compte
  • Centre de téléchargement
  • Support du Microsoft Store
  • Retours
  • Suivi des commandes
  • Recycler
  • Garanties
Éducation
  • Microsoft Éducation
  • Appareils pour l’enseignement
  • Microsoft Teams pour l’éducation
  • Microsoft 365 Éducation
  • Office Éducation
  • Formation et développement des enseignants
  • Offres pour étudiants et parents
  • Azure pour les étudiants
Entreprises
  • Microsoft Cloud
  • Sécurité Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • TPE & PME
Développeur et IT
  • Développeur Microsoft
  • Microsoft Learn
  • Prise en charge des applications du marketplace d’IA
  • Microsoft Tech Community
  • Microsoft Marketplace
  • Microsoft Power Platform
  • Visual Studio
Société
  • Emploi
  • À propos de Microsoft
  • Actualités de la société
  • Confidentialité chez Microsoft
  • Investisseurs
  • Durabilité
Français (Belgique) Vos choix en matière de confidentialité – Icône Désactiver Vos choix de confidentialité en Californie Confidentialité de l’intégrité des consommateurs
  • Sitemap
  • Contactez-nous
  • Confidentialité et Cookies
  • Conditions d'utilisation
  • Marques
  • À propos de nos annonces
  • EU Compliance DoCs
  • Manage cookies
  • © Microsoft 2025