Envoyer des commentaires
Help & support
Éléments enregistrés
Plans privés
Juste un moment, connexion en cours...
FiltresTout effacer

  • Votre position
  • Produits (1)
    • Dynamics 365
    • Microsoft 365 (1)
      • Gestion de l'adoption et des modifications
      • Appel pour Microsoft Teams
      • Cloud Security
      • Services de conseil pour la conformité
      • Déploiement et gestion de l’appareil
      • Employés de première ligne
      • Gestion des identités et des accès
      • Protection des informations et gouvernance
      • Risque d’initié
      • Connaissances et insights
      • Meeting Rooms pour Microsoft Teams
      • Meetings pour Microsoft Teams
      • Microsoft 365 Live Events
      • Gestion des périphériques mobiles
      • Power Platform for Teams
      • Solutions personnalisées Teams
      • Déploiement de travail d'équipe
      • Protection contre les menaces
      • Analyse du temps de travail
    • Power Platform
  • Secteurs d'activité
  • Type de service

Services de conseil résultats

Affichage des résultats dans services de conseil.
Vue résultats associés dans clouds du secteur d’activité.
ADFS to Entra ID Migration ServiceMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Mobile Mentor’s ADFS to Entra ID Migration Service offers a secure, cloud-first Single Sign-On experience that eliminates outdated infrastructure and unlocks the full potential of Microsoft Entra ID.
1 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
2 out of 60
Microsoft Copilot Readiness Discovery: 3-Wk AssessmentProServeIT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A Microsoft Copilot Readiness Assessment will identify your AI foundational requirements & permission settings to prepare your organization for leading edge efficiency.
3 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
4 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Inspect events in your network to locate threat indicators and entities
5 out of 60
Microsoft 365 Threat Check Assessment: 3-Wk AssessmentInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
6 out of 60
Microsoft 365 Security Hardening; 4-Wk ServiceProArch Technologies, Inc
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
7 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
8 out of 60
Automate Identity Lifecycle Management: 8-16 Weeks Consulting + ImplementationAttosol
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Integrate HRMS with Microsoft Entra ID for an automated, efficient and secure Identity Lifecycle Management.
9 out of 60
Unified Access & Protection with Microsoft Entra Global Secure AccessMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Step confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
10 out of 60
Microsoft Cloud App Security (MCAS) for Custom Apps by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Know your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
11 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
12 out of 60
SmartStart for IntuneMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
13 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
14 out of 60
Teams & SharePoint Security HardeningAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teams-custom-solutions product iconTeams Custom Solutionsm365-sa-threat-protection product iconThreat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
15 out of 60
Infra & Network Monitoring with Microsoft SentinelAVASOFT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Boost security with Microsoft Sentinel. Proactive monitoring ensures resilience against threats. Focus on business goals while we manage infrastructure and network security.
16 out of 60
Identity Health CheckMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Mobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
17 out of 60
CGI - Managed Services for Microsoft 365 FY25CGI Inc.
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Leave the end-to-end Microsoft 365 support services to CGI so that your IT support team can focus on value-added tasks.
18 out of 60
Microsoft Defender for Endpoint - Vulnerability Assessment by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
19 out of 60
End-to-end Threat Protection Workshop and PilotExelegent
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
20 out of 60
Identity as a Service | Assure 365CyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Fully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
21 out of 60
Phishing, Malware & Spam protection- 2 weeks ImplementationAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
22 out of 60
Okta Migration to Azure AD: 3-Week AssessmentInvoke
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
The Okta Migration to Azure AD Assessment offering is designed to assess & plan your migration efforts to your existing investments in Azure AD.
23 out of 60
Defender for Endpoint: 5-Day ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Accelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
24 out of 60
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-WeeksInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Invoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
25 out of 60
Journey to Microsoft 365 Copilot: 4-hours WorkshopPROJECT INFORMATICA SRL
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Microsoft 365 Copilot workshop bring to you the opportunity to create awareness about holistic to Microsoft 365 Copilot
26 out of 60
Microsoft 365 Cyber Insurance Review: 2-5 Wk AssessmentKiZAN Technologies
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Map your business cyber insurance carrier requirements to Microsoft 365 environment controls, improve your security posture and enhance your security defenses.
27 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
28 out of 60
Microsoft 365 Security Review: 3-Wk AssessmentProArch Technologies, Inc
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Identifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
29 out of 60
Defender Pak365: Microsoft Defender ImplementationRavanty Tech Consulting, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Empower your organization with comprehensive, AI-driven protection tailored to meet evolving security needs with the help of Microsoft Defender.
30 out of 60
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
31 out of 60
Avanade Cyber Portfolio EvaluationAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
The Cyber Portfolio Evaluation maps your tools with Microsoft solutions, cutting costs and enhancing efficiency.
32 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
33 out of 60
Microsoft Purview Microsoft 365: 4-Week ImplementationSpyglass MTG, LLC
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Microsoft Purview Microsoft 365 offering is a 4-week/$45,000 Minimum Viable Product (MVP) implementation of Microsoft 365 components of Purview to provide a jumpstart to your data governance.
34 out of 60
Empowering Digital Transformation with AI Microsoft Copilot SolutionsSonata Software Ltd.
+3
Applicable to:
m365-sa-firstline-workers product iconFrontline Workersm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-meetings-for-microsoft-teams product iconMeetings for Microsoft Teams
Our tailored Microsoft Copilot solutions blend human expertise with intelligent automation, delivering efficiency, productivity, and personalization across industries.
35 out of 60
NTT Americas - Microsoft Device ManagementNTT Limited
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Deployment of Microsoft Unified Endpoint Management Services. Assessment of your resources and business objectives to develop a fresh approach to your security strategy.
36 out of 60
Microsoft Defender for Endpoint QuickStartPresidio
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Presidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
37 out of 60
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
38 out of 60
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
39 out of 60
Microsoft Funded Workshop for Copilot for Microsoft 365: 2-Wk AssessmentProServeIT
+2
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
If your company is eligible, we can deliver a Microsoft funded readiness assessment for Copilot for Microsoft 365 to you free of charge ($5,000 USD value).
40 out of 60
Quadra Entra Permissions ManagementQuadrasystems.net (India) P Ltd
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Understand how permissions creep can impact the attack surface risk in your cloud infrastructure​ Understand how to manage user and identity risk
41 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SAS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
42 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
43 out of 60
Microsoft 365 Security AssessmentCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW’s Microsoft 365 Security Assessment allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
44 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO Digital, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prove the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
45 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
46 out of 60
Quadra DefendX Managed Threat Protection ServicesQuadrasystems.net (India) P Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Maximize Microsoft Defender XDR capabilities with DefendX - Quadra's Managed Threat Protection Services
47 out of 60
MDS Managed MXDR EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Designed to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
48 out of 60
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POCatQor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
49 out of 60
Cloud Security Operations CenterReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Verified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
50 out of 60
Microsoft Cybersecurity AssessmentThe Partner Masters
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
51 out of 60
Microsoft 365 Copilot Implementation ServiceSoftchoice
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-teamwork-deployment product iconTeamwork Deployment
Helping customers to be prepared to properly deploy and adopt Microsoft 365 Copilot.
52 out of 60
Guardian 365 Managed Security Services (Microsoft MXDR Verified)Forsyte IT Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Guardian 365 is the always-on security managed service offering end-to-end protection, monitoring, detection, and remediation of attacks on your infrastructure, data, users, and endpoints 24x7.
53 out of 60
Security Copilot Value AcceleratorAvanade, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Designed to help organizations modernize their security operations and administration by leveraging Gen AI.
54 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
55 out of 60
Office 365 Managment: 1 Day AssessmentEze Castle Integration
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
ECI will review your Office 365 Tennant Configuration and suggest on-going managment needs
56 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
UNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
57 out of 60
Microsoft 365 Security Readiness: 4-Wk AssessmentQuadrasystems.net (India) P Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Identify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
58 out of 60
Autopilot: 2-Wk Proof of ConceptFSI Strategies
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
FSi Strategies will review the deployment scenarios with the client and execute a proof of concept up to 25 devices in order to demonstrate the capabilities of Windows Autopilot
59 out of 60
Microsoft Purview: 5-Day Fundamentals WorkshopeGroup Enabling Technologies
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Quickly reduce risk and enable compliance controls with an eGroup Enabling Technologies, LLC Microsoft Purview Fundamentals Workshop.
60 out of 60
  • Précédent
  • 2
  • 3
  • 4
  • 5
  • 6
  • Suivant
Nouveautés
  • Surface Pro
  • Surface Laptop
  • Surface Laptop Studio 2
  • Copilot pour les organisations
  • Copilot pour une utilisation personnelle
  • Microsoft 365
  • Découvrir les produits Microsoft
  • Applications Windows 11
Microsoft Store
  • Profil du compte
  • Centre de téléchargement
  • Support du Microsoft Store
  • Retours
  • Suivi des commandes
  • Recycler
  • Garanties
Éducation
  • Microsoft Éducation
  • Appareils pour l’enseignement
  • Microsoft Teams pour l’éducation
  • Microsoft 365 Éducation
  • Office Éducation
  • Formation et développement des enseignants
  • Offres pour étudiants et parents
  • Azure pour les étudiants
Entreprises
  • Microsoft Cloud
  • Sécurité Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Développeur et IT
  • Développeur Microsoft
  • Microsoft Learn
  • Prise en charge des applications du marketplace d’IA
  • Microsoft Tech Community
  • Place de marché Azure
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
Société
  • Emploi
  • Actualités de la société
  • Confidentialité chez Microsoft
  • Investisseurs
  • Durabilité
Français (Suisse) Vos choix en matière de confidentialité – Icône Désactiver Vos choix de confidentialité Confidentialité de l’intégrité des consommateurs
  • Sitemap
  • Contactez Microsoft
  • Confidentialité et Cookies
  • Conditions d'utilisation
  • Marques
  • À propos de nos annonces
  • Manage cookies
  • © Microsoft 2025