Visszajelzés küldése
Help & support
Mentett elemek
Privát csomagok
Kis türelmet, bejelentkezés folyamatban...
SzűrőkAz összes törlése

  • Az Ön tartózkodási helye
  • Termékek (1)
    • Dynamics 365
    • Microsoft 365 (1)
      • Adoptáció és változáskezelés
      • Microsoft Teams-hívás
      • Felhőbiztonság
      • Megfelelőségi tanácsadói szolgáltatások
      • Eszközök üzembe helyezése és kezelése
      • Élvonalbeli dolgozók
      • Identitás- és hozzáférés-kezelés
      • Információvédelem és -gazdálkodás
      • Belső kockázat
      • Ismeretek és elemzések
      • Microsoft Teams tárgyalók
      • Microsoft Teams értekezletek
      • Microsoft 365 Live Events
      • Mobileszköz-felügyelet
      • Power Platform for Teams
      • Egyéni Teams-megoldások
      • Csapatmunkán alapuló telepítés
      • Veszélyforrások elleni védelem
      • Munkahelyi elemzés
    • Power Platform
  • Iparágak
  • Szolgáltatástípus

Tanácsadási szolgáltatások eredmény

találat látható innen: tanácsadási szolgáltatások.
Nézet kapcsolódó eredmény itt: iparági felhők.
Fortis Assessment SOC2Sentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
1 out of 36
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
According to multiple studies, breaches and ransomware have more than doubled in the past year.
2 out of 36
Microsoft Cybersecurity: 1 Month AssessmentBig Cloud Consultants
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Our expert team will work with you to assess your current security posture and develop recommendations for appropriate improvements.
3 out of 36
Defender Implementation, Tuning, and TestingSecurity Risk Advisors Intl, LLC
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Implement Windows Defender for Endpoint on Windows OS.
4 out of 36
Windows 365 PilotCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
5 out of 36
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
6 out of 36
Microsoft 365 GCC High Migration for CMMC ComplianceSysArc Inc
+2
Applicable to:
m365-sa-teamwork-deployment product iconTeamwork Deploymentm365-sa-threat-protection product iconThreat Protection
We provide a seamless migration to a secure, and compliant Microsoft 365 GCC High environment.
7 out of 36
Managed XDR Service for Microsoft 365 Government Commercial Cloud (GCC) High environmentsSysArc Inc
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Our Managed XDR Service ensures regulatory compliance, and security for your organization’s needs.
8 out of 36
Implementation of Microsoft Defender for Cloud AppsCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
9 out of 36
Fixing vulnerabilities based on Defender with ASR Module: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This service provides a comprehensive approach to identifying and fixing vulnerabilities in organization's devices, helping mitigate the risks of cyber-attacks.
10 out of 36
C1st Implementation of Microsoft Defender for EndpointC1st Technologies LLC
+2
Applicable to:
m365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The C1st Microsoft Defender for Endpoint Implementation enhances security by deploying advanced threat protection across all endpoints, configuring licenses, setting up connections, and assigning role
11 out of 36
C1st Implementation of Microsoft Defender for Office 365C1st Technologies LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Enhance email security for businesses by implementing Defender for Office 365 with Exchange Online Protection (EOP). Our goal is to protect organizational email from spam, phishing, and sophisticated
12 out of 36
Security Foundations Email: Assessment and ImplementationProServeIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
13 out of 36
Security Foundations IdentityProServeIT
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Fortify your online identity and access controls. Evaluate your risks and deploy modern security controls to mitigate against the most common identity-based vulnerabilities and attacks.
14 out of 36
Fortis Business Email Compromise Incident Response JumpstartSentinel Technologies Inc.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Fortis by Sentinel’s Incident Response team will use best efforts, as specified in the Service Level Agreement below, to address a Business Email Compromise incident within your organization.
15 out of 36
Threat Protection EngagementFIS Managed IT Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
16 out of 36
Zero Trust: Microsoft Security BriefingRavanty Tech Consulting, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Learn and Embrace Modern Work Zero Trust Pillars across Identity, Devices, Apps, and Data
17 out of 36
Threat Protection EngagementTierPoint
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
18 out of 36
Security Foundations for Microsoft 365Cyclotron Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure and govern Microsoft 365 with best practices for thread detection, compliance & data protection, identity access, device & app management with Microsoft’s security and governance framework.
19 out of 36
THInc.Ops Managed ServiceTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Premium managed IT service solution that provides a higher quality of service supporting your staff and stronger protection against cyberattacks.
20 out of 36
THInc Secure Managed Security Service for MicrosoftTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
21 out of 36
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
SkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
22 out of 36
DSPM for AI - Free 2-Hour AssessmentNetwoven Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To help enterprises identify blind spots in Microsoft 365's AI data security, assess DSPM maturity, and establish a governance-first approach to safely accelerate AI innovation with Microsoft Purview.
23 out of 36
SkyTerra's Cloud Security AssessmentSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Strengthen Microsoft cloud security with a structured assessment, an actionable roadmap, and enablement your team can run with
24 out of 36
Unified Identity & Secure Edge Modernization with Entra SuiteBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Modernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
25 out of 36
Redapt Threat Protection EngagementRedapt, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Proactive Cybersecurity for Resilient Enterprises
26 out of 36
Threat Protection Envisioning Engagement SentinelSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Organizations today are managing a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Get help achieving your broader security objectives.
27 out of 36
NuHarbor's Quick Start for PurviewNuharbor Security Inc.
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Activate Purview quickly with expert guidance to improve visibility, reduce risk, and support compliance.
28 out of 36
NuHarbor’s Defender Health CheckNuharbor Security Inc.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Uncover gaps and optimize Microsoft Defender for stronger threat protection.
29 out of 36
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
30 out of 36
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
31 out of 36
Security Assessment: 2-Wk AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
32 out of 36
Threat Protection: 3-Wk POCFPT/Intellinet
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Identify security threats and begin to respond and mitigate.
33 out of 36
Microsoft 365 Secure Score: 4 Week ImplementationRazor Technology, LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Audit, review, and improve security posture of Microsoft 365 Estate through Secure Score methodology. Receive expert advice for identity, compliance, and threat protection improvements.
34 out of 36
Office 365 Protection: Design & Pilot 1-Wk POCManaged Solution
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protect Your Employees from External Email Threats with Defender for Office 365 Protection
35 out of 36
Security Assessment: 2 Week AssessmentTallan
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
36 out of 36
  • Vissza
  • 5
  • 6
  • 7
  • 8
  • 9
Újdonságok
  • Copilot szervezeteknek
  • Copilot személyes használatra
  • Microsoft 365
  • Fedezze fel a Microsoft termékeit
  • Windows 11-alkalmazások
Microsoft Store
  • Fiókprofil
  • Letöltőközpont
  • Microsoft Store-támogatás
  • Visszaküldés
  • Rendeléskövetés
  • Újrahasznosítás
  • Commercial Warranties
Oktatás
  • Microsoft Education
  • Oktatási eszközök
  • Microsoft Teams oktatáshoz
  • Microsoft 365 Education
  • Office oktatási verzió
  • Oktatóképzés és -fejlesztés
  • Ajánlatok diákoknak és szülőknek
  • Azure diákoknak
Üzlet
  • Microsoft Cloud
  • Microsoft-biztonság
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teamshez készült
Fejlesztők és IT
  • Microsoft-fejlesztő
  • Microsoft Learn
  • AI piactéri alkalmazások támogatása
  • Microsoft Tech Community
  • Microsoft Marketplace
  • Microsoft Power Platform
  • Visual Studio
Vállalat
  • Karrier
  • A Microsoft bemutatása
  • Vállalati hírek
  • Adatvédelem a Microsoftnál
  • Befektetők
  • Korrupció- és Vesztegetésellenes Elkötelezettségünk
  • Fenntarthatóság
Magyar (Magyarország) Adatvédelmi beállítások elutasítása ikon Adatvédelemmel kapcsolatos választási lehetőségek Fogyasztói állapot adatainak védelme
  • Sitemap
  • Kapcsolatfelvétel
  • Adatvédelem és cookie-k
  • Használati feltételek
  • Védjegyek
  • A hirdetéseinkről
  • EU Compliance DoCs
  • Manage cookies
  • © Microsoft 2025