Berikan umpan balik
Help & support
Item tersimpan
Paket privat
Tunggu sebentar, kami sedang memasukkan Anda...
FilterHapus semua

  • Lokasi Anda
  • Produk (1)
    • Dynamics 365
    • Microsoft 365 (1)
      • Manajemen Perubahan & Adopsi
      • Panggilan untuk Microsoft Teams
      • Keamanan Cloud
      • Layanan Penasihat Kepatuhan
      • Manajemen & Penyebaran Perangkat
      • Pekerja Garis Depan
      • Manajemen Identitas & Akses
      • Perlindungan & Tata Kelola Informasi
      • Risiko Dari Dalam
      • Pengetahuan & Wawasan
      • Ruang Rapat untuk Microsoft Teams
      • Rapat untuk Microsoft Teams
      • Microsoft 365 Live Events
      • Manajemen Perangkat Seluler
      • Power Platform for Teams
      • Solusi Kustom Teams
      • Penyebaran Kerja Tim
      • Perlindungan Terhadap Ancaman
      • Workplace Analytics
    • Power Platform
  • Industri
  • Jenis layanan

Layanan konsultan hasil

Menampilkan hasil dalam layanan konsultan
Tampilkan hasil terkait di industry clouds.
Epiq eDiscovery Solution with Microsoft PurviewEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Streamline the entire discovery process within your environment, enabling efficient data retrieval and analysis while ensuring compliance with legal requirements with Microsoft Purview.
1 out of 23
Get Ready for Microsoft 365 Copilot with Zones Purview WorkshopZones Inc.
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The goal of the Zones' Purview Workshop is to provide organizations with a tailored, 6-week journey to master data governance, safeguard data,
2 out of 23
Secure Identities and Access: 4-Week Engagement & WorkshopCompuNet
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
4-week engagement and workshop that helps customers design and plan out their optimal identity model to ensure they have a roadmap to enhanced security using Microsoft 365 and Azure Active Directory
3 out of 23
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
4 out of 23
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Apply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
5 out of 23
Epiq Flex IG Talent for Microsoft PurviewEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Epiq Flex IG Talent is here to provide it clients with flexible talent surrounding Microsoft Purview eDiscovery, Information Governance, Compliance and Archiving.
6 out of 23
Microsoft Purview Insider Risk Management and Compliance: ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement delivers setup and enablement for Microsoft Purview’s Insider Risk Management and Communication Compliance capabilities, supporting proactive risk mitigation.
7 out of 23
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Cyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
8 out of 23
Cybersecurity: Protect Your Operations with Henson GroupThe Henson Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Henson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
9 out of 23
discover-sensitive-data-workshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
10 out of 23
Copilot for Microsoft 365 Data Security QuickStartSoftchoice
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Setting the foundation for data security and governance in preparation for Copilot for Microsoft 365
11 out of 23
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski Security
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Kudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
12 out of 23
Purview Compliance Manager Adoption WorkshopCDI LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The CDI professional services team intends to show you how to increase your Organizational Governance using a built-in service that you may not be fully aware of.
13 out of 23
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
14 out of 23
Defender for Office 365: 5-Day AssessmenteGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
15 out of 23
Compliance: 1 Day Workshop - Manage and Investigate RiskConvergeOne
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Everyone seems to be aware of external risk factors such as Ransomware, but what out Insider Risk? Find out the importance of proper controls and governance to protect yourself from bigger threats
16 out of 23
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical Start
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Rapidly identify, contain, and remediate a breach.
17 out of 23
Epiq Mergers and Acquisitions Risk ReductionEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Identify and exclude sensitive information from being migrated during mergers and acquisitions (M&A) data discovery and migration projects.
18 out of 23
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
This assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
19 out of 23
Healthcare & Education Cybersecurity AssessmentPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
This assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
20 out of 23
Data Security EngagementPC Connection, Inc.
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Our Microsoft Purview Data Security Engagement provides actionable insights into data security, privacy, and compliance risks.
21 out of 23
THInc Secure Managed Security Service for MicrosoftTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
22 out of 23
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It Security
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Enable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
23 out of 23
  • Sebelumnya
  • 1
  • 2
  • 3
Yang Baru
  • Copilot untuk organisasi
  • Copilot untuk penggunaan pribadi
  • Microsoft 365
  • Microsoft 365 Family
  • Microsoft 365 Personal
  • Windows 11 apps
Microsoft Store
  • Profil akun
  • Pusat Unduh
  • Pengembalian
  • Pelacakan pesanan
Pendidikan
  • Microsoft Education
  • Perangkat untuk pendidikan
  • Microsoft Teams untuk Pendidikan
  • Microsoft 365 Education
  • Office Education
  • Pelatihan dan pengembangan pengajar
  • Diskon untuk pelajar dan orang tua
  • Azure untuk pelajar
Bisnis
  • Microsoft Cloud
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Pengembang & TI
  • Pengembang Microsoft
  • Microsoft Learn
  • Dukungan aplikasi marketplace AI
  • Microsoft Tech Community
  • Microsoft Marketplace
  • Microsoft Power Platform
  • Visual Studio
Perusahaan
  • Karier
  • Tentang Microsoft
  • Berita perusahaan
  • Privasi di Microsoft
  • Investor
  • Keberlanjutan
Indonesia (Indonesia) Ikon Penolakan Pilihan Privasi Anda Pilihan Privasi Anda Privasi Kesehatan Konsumen
  • Sitemap
  • Hubungi kami
  • Pernyataan privasi
  • Persyaratan penggunaan
  • Merek dagang
  • Mengenai iklan kami
  • Manage cookies
  • © Microsoft 2025