FiltriCancella tutto
Cloud di settore risultati
Visualizzazione di risultati in cloud di settore.
Tutti i risultati
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvokeProvide cross-domain threat protection and simplify breach prevention
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
1 out of 18
Co-pilot Technical ReadinessPHOENIX SOFTWARE LTDHelp your organisation ensure that they are technically ready for Co-pilot
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementKnowledge & Insights
2 out of 18
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-WeeksInvokeInvoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
3 out of 18
Cloud App Security Data Access Control Services by AVASOFTAVASOFTAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
4 out of 18
Lightstream Data Security AssessmentLightstreamLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
5 out of 18
Microsoft 365 Baseline Security Hardening by AVASOFTAVASOFTAware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
6 out of 18
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInformation Protection & Governance
7 out of 18
Solution Assessment for Security: 30 DayConcurrency, Inc.An assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
8 out of 18
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstreamLightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
9 out of 18
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstreamLightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
10 out of 18
Microsoft Defender for Endpoint - Device Monitoring Solutions by AVASOFTAVASOFTManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementThreat Protection
11 out of 18
Device Management Migration - On-Premises to Cloud by AVASOFTAVASOFTSeamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
12 out of 18
Non-Profit Security Essentials : 1 Day Workshoptrue org cloudTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
+3
Applicable to:
Cloud SecurityCompliance Advisory ServicesIdentity & Access Management
13 out of 18
Avanade Hybrid Windows Endpoint Solutions FY24Avanade, Inc.Avanade has developed the next generation of endpoint solutions for the modern workforce, with integrated physical, virtual and hybrid solutions
+3
Applicable to:
Device Deployment & ManagementIdentity & Access ManagementMobile Device Management
14 out of 18
Microsoft 365 Security Review: 3-Wk AssessmentProArch Technologies, Inc.Identifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
15 out of 18
Microsoft 365 Security Hardening; 4-Wk ServiceProArch Technologies, Inc.The Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
+3
Applicable to:
Identity & Access ManagementInformation Protection & GovernanceThreat Protection
16 out of 18
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to:
Cloud SecurityIdentity & Access ManagementInsider Risk
17 out of 18
IAM Roadmap - 4 Weeks AssessmentArmis, Sistemas de Informação, LdaDevelop an outcome-based, design-led IAM strategy to secure access to your resources with Azure identity and access management solutions.
+1
Applicable to:
Identity & Access Management
18 out of 18