AppSource
Beri maklum balas
Bantuan + sokongan
Item yang Disimpan
Pelan persendirian
Tunggu sebentar, melog masuk anda...
Semua
Aplikasi
Kategori
Industri
Perkhidmatan Perundingan
Rakan Kongsi
Penapis
Kosongkan semua
Lokasi anda
Produk (1)
Industri
Kategori
Percubaan
Penarafan
Awan Industri hasil
Menunjukkan dalam awan industri%1!s!.
Lihat
yang berkaitan dalam perkhidmatan perundingan
.
Semua keputusan
Solution Assessment for Security: 30 Day
Concurrency, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
An assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
1 out of 9
Managed Extended Detection & Response for Workplace - Implementation
DXC
+1
Applicable to:
Threat Protection
Secure your business with Managed XDR for Workplace
2 out of 9
Microsoft Intune (Windows): 1-Wk Proof of Concept
Invoke
+2
Applicable to:
Mobile Device Management
Threat Protection
Map the use cases for, and benefits of, Intune all-up for endpoint management, and learn how to modernize your approach to endpoint management at cloud-scale.
3 out of 9
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed Service
Invoke
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Provide cross-domain threat protection and simplify breach prevention
4 out of 9
Threat Protection with MXDR: Consultation
CBTS Technology Solutions LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
5 out of 9
4-Day Security Assesment
HSO
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
6 out of 9
Microsoft 365 Security Review: 3-Wk Assessment
ProArch Technologies, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
Identifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
7 out of 9
Microsoft 365 Security Hardening; 4-Wk Service
ProArch Technologies, Inc.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
The Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
8 out of 9
Microsoft Threat Protection Workshop: 5-Wk Wrkshop
ProArch Technologies, Inc.
+1
Applicable to:
Threat Protection
Improve your Microsoft 365 security posture with a Microsoft Threat Protection Workshop
9 out of 9