Invia feedback
Guida e supporto
Elementi salvati
Piani privati
Accesso in corso, attendi qualche istante...
FiltriCancella tutto


Servizi di consulenza risultati

Visualizzazione di risultati in servizi di consulenza.
Securing Identities WorkshopSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
1 out of 60
Microsoft Copilot Readiness Discovery: 3-Wk AssessmentProServeIT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A Microsoft Copilot Readiness Assessment will identify your AI foundational requirements & permission settings to prepare your organization for leading edge efficiency.
2 out of 60
Implementation of Microsoft Defender for EndpointCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
3 out of 60
Cloud App Security Information and Threat Protection: 3-Wk Professional serviceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
4 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
5 out of 60
Microsoft Secure Score - increase to 200: 3-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
The goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
6 out of 60
Modern Endpoint Management: 2-Hr AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
There’s a reason Microsoft chose us as their Modern Endpoint Management Partner of the Year for 2023. We believe you can reduce your threat risk by modernizing your Endpoint Management Strategy.
7 out of 60
Windows 365: 4 Week Readiness AssessmentNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Get an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
8 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Enhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
9 out of 60
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
10 out of 60
Zero Trust as a Service (ZTaaS)Aegis Innovators
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Digital transformation and adopting AI starts with building a secure foundation.
11 out of 60
Microsoft 365 Copilot: 2-Wk Readiness AssessmentInvoke
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Invoke's Microsoft 365 Copilot Readiness Assessment is a service that helps customers prepare for using Copilot 365, a solution that leverages data to enhance creativity, productivity, and skills.
12 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReply
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Valorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
13 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Multi-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
14 out of 60
Apply Information Rights Management protection to email: 5-Day Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Ensure that only authorized individuals can access and use the information. This can be especially useful for sensitive or confidential information that needs to be protected from unauthorized access
15 out of 60
Microsoft 365 Security BriefingCDI LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
16 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalyst
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
17 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalyst
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
18 out of 60
Microsoft 365 Copilot Readiness: 2 week AssessmentTOKIOTA
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
We help our clients to integrate Microsoft 365 Copilot in their organization in the most secure and efficent way
19 out of 60
Microsoft 365 Security: 30-Days ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Establish a foundational, secure environment for clients by configuring their Microsoft 365 tenant with core security features.
20 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Establish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
21 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Establish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
22 out of 60
Windows Virtual Desktop Implementation: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Provide a streamlined solution using Windows Virtual Desktop (WVD) on Microsoft Azure, offering efficient remote workstations, cost-effective licensing, and Windows 365 in a terminal server format.
23 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Strengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
24 out of 60
Zero Trust Security 10-Hour AssessmentJourneyTEAM
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
JourneyTeam’s Zero Trust Security Assessment is designed to provide a clear, actionable strategy for strengthening your organization’s Microsoft 365 security posture.
25 out of 60
Office 365 to Office 365 Migration: 4-Wk ImplementationExodus Integrity Services, Inc.
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Simplify the complexities of merging, consolidating, or transitioning your Office 365 environments with our specialized Office 365 Migration Service.
26 out of 60
BCN Intranet LiteBCN Group Ltd.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
27 out of 60
Microsoft 365 Copilot Everyday AI Adoption: 2wksInsight
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Insight’s Everyday AI Adoption for Microsoft 365 Copilot Program is designed to help organizations bring this technology to users in a way that promotes responsible adoption and drives productivity.
28 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
29 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Inspect events in your network to locate threat indicators and entities
30 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
31 out of 60
Cyber Security AssessmentAegis Innovators
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
32 out of 60
Hybrid Office 365 Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Hybrid migration integrates on-premises Exchange with Microsoft 365, facilitating migration or serving as a permanent state for both organizations.
33 out of 60
Cutover Exchange Online Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Mailbox migration from an Exchange Server hosted and managed by you to Exchange Online. All mailboxes will be migrated at once.
34 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Enhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
35 out of 60
MicroAge ManageWise Microsoft 365 Assessment & ServicesMicroAge
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
Comprehensive assessment of our clients Microsoft 365 tenant providing an Executive summary detailed report to reduce vulnerabilities improving Secure Score with 40 hours of Engineer time
36 out of 60
Cutover Exchange Online migration from any IMAP email system: 7-Days Professional serviceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Migrate users, email data, and email folders from any IMAP system to Microsoft 365 / Exchange Online.
37 out of 60
Cutover Google Workspace to Office 365 migration (IMAP migration). Just email and email folders: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Migration of email data and email folders from G Suite (Google Apps) to Microsoft 365 / Exchange Online.
38 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
39 out of 60
Fortis IR Compromise AssessmentSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A high-level forensics evaluation designed to identify current and past threat activity.
40 out of 60
Microsoft Entra in 30: 6-wk ImplementationLong View Systems
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Long View’s Entra in 30 offers a unified identity, access security, and data governance solution to help minimize these cybersecurity risks in 30 days.
41 out of 60
Modern Workplace - Cloud Endpoint ManagementArxus
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Our Cloud Endpoint offering includes device setup, lifecycle management, streamlined app updates, and device performance-, update- and application performance dashboards.
42 out of 60
Healthcare Innovations Strategic Alignment WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
At the start of 2020, the charge of the Healthcare Technology Executive focused on key areas for improvement & alignment with their business along with providing a secure environment that allowed for
43 out of 60
Identity WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
44 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
45 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
46 out of 60
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
According to multiple studies, breaches and ransomware have more than doubled in the past year.
47 out of 60
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
48 out of 60
Windows 365: 10-day Pilot ServiceUltima Business
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Ultima Business Solutions offers a 10 day, potentially funded, pilot service to help you explore the benefits of Windows 365, the cloud-based Windows experience that enables hybrid work scenarios.
49 out of 60
JourneyTEAM Security Solutions for Higher EducationJourneyTEAM
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Unlock the future of secure access in Higher Education environments using Microsoft 365.
50 out of 60
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstream
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Lightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
51 out of 60
Atos || Pilot program for Windows 365Atos International SAS
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Atos Microsoft Windows 365 7 days engagement pilots hybrid work scenarios in customer environments using Windows 11, enabling the implementation of configurations and Intune policies for CloudPC.
52 out of 60
UNITE: Exploring E5 Security Workshop_INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
UNITE: Exploring E5 Security Workshop_ by Infinity Group for CTOs/CSOs to evaluate and strengthen IT security, led by our expert consultants.
53 out of 60
Eviden Compliance Assessment (CSAT) zur Einhaltung der europäischen NIS-2-RichtlinieEviden International France - SAS
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Unternehmen stehen vor der Herausforderung, die europäische NIS2-Richtlinie bis zur nationalen Umsetzungsfrist im Oktober 2024 umzusetzen.
54 out of 60
Copilot for Microsoft 365 Pilot Launch: 2-Wk Proof of ConceptProServeIT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A rapid Copilot for Microsoft 365 pilot/proof of concept with an initial use case will provide quick value from AI and learnings to expand the roll out and more use cases to other groups.
55 out of 60
Varonis JumpstartSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
56 out of 60
SharePoint Premium Readiness Assessment & Roadmap - 5 Week AssessmentProtiviti
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
Evaluate and ensure your readiness for implementing SharePoint Premium, considering technical, business case, data lifecycle, and administration perspectives.
57 out of 60
Frontline Worker: 3-Wk Proof of ConcepteGroup Enabling Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Reimagine the frontline worker experience with an eGroup Enabling Technologies, LLC. Frontline Worker Proof of Concept
58 out of 60
Microsoft Endpoint Manager BaselineSHI International Corp
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Explore how SHI can help your organization solve what’s next by transforming and unifying your endpoint deployment and management strategy.
59 out of 60
Passwordless Authentication: 2 Week ImplementationCDI LLC
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Implement passwordless authentication solutions for up to twenty pilot users
60 out of 60
  • Indietro
  • 4
  • 5
  • 6
  • 7
  • 8
  • Avanti
Le novità
  • Surface Pro
  • Surface Laptop
  • Surface Laptop Studio 2
  • Surface Laptop Go 3
  • Microsoft Copilot
  • Microsoft 365
  • Esplora i prodotti Microsoft
  • App di Windows 11
Microsoft Store
  • Profilo account
  • Download Center
  • Supporto Microsoft Store
  • Resi
  • Monitoraggio ordini
  • Riciclaggio
  • Garanzie commerciali
Formazione
  • Microsoft Education
  • Dispositivi per l'istruzione
  • Microsoft Teams per l'istruzione
  • Microsoft 365 Education
  • Office Education
  • Formazione e sviluppo per gli insegnanti
  • Offerte per studenti e genitori
  • Azure per studenti
Aziende
  • Microsoft Cloud
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Piccole imprese
Sviluppatori e IT
  • Sviluppatore Microsoft
  • Microsoft Learn
  • Supporto per le app del marketplace di IA
  • Microsoft Tech Community
  • Azure Marketplace
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
Azienda
  • Opportunità di carriera
  • Informazioni su Microsoft
  • Notizie aziendali
  • Privacy in Microsoft
  • Investitori
  • Accessibilità
  • Sostenibilità
Italiano (Italia) Icona di rifiuto esplicito delle scelte di privacy Le tue scelte sulla privacy Privacy per l'integrità dei consumer
  • Sitemap
  • Contattaci
  • Privacy e cookie
  • Condizioni per l'utilizzo
  • Marchi
  • Informazioni sulle inserzioni
  • EU Compliance DoCs
  • Manage cookies
  • Accessibilità
  • © Microsoft 2025