Beri maklum balas
Bantuan & sokongan
Item yang Disimpan
Pelan persendirian
Tunggu sebentar, melog masuk anda...
PenapisKosongkan semua

  • Lokasi anda
  • Produk (1)
    • Dynamics 365
    • Microsoft 365 (1)
      • Penggunaan & Pengurusan Perubahan
      • Memanggil Microsoft Team
      • Keselamatan Awan
      • Perkhidmatan Nasihat Pematuhan
      • Pelaksanaan & Pengurusan Peranti
      • Pekerja Barisan Hadapan
      • Pengurusan Identiti & Capaian
      • Perlindungan & Tadbir Urus Maklumat
      • Risiko Orang Dalam
      • Pengetahuan & Cerapan
      • Bilik Mesyuarat untuk Microsoft Teams
      • Mesyuarat untuk Microsoft Teams
      • Microsoft 365 Live Events
      • Pengurusan Peranti Mudah Alih
      • Power Platform for Teams
      • Penyelesaian Tersuai Teams
      • Pelaksanaan Kerja Berpasukan
      • Perlindungan Ancaman
      • Analitis Tempat Kerja
    • Power Platform
  • Industri (1)
    • Pertahanan & Perisikan
    • Edaran
    • Pendidikan
    • Tenaga & Sumber
    • Perkhidmatan Kewangan
      • Banking
      • Insurans
    • Kerajaan
    • Penjagaan Kesihatan
    • Hospitaliti & Pelancongan
    • Pengilangan & Mobiliti
    • Bukan untung
    • Professional Services
    • Barangan Runcit & Pengguna
    • Kemampanan
    • Telekomunikasi & Media
  • Jenis perkhidmatan

Perkhidmatan perundingan hasil

Menunjukkan dalam perkhidmatan perundingan%1!s!.
Active Directory Security on DemandComtrade System Integration
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
1 out of 60
Defend, Protect, Secure with Microsoft Defender XDRComtrade System Integration
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
2 out of 60
MDS - Microsoft Security Copilot WorkshopMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Discover how Microsoft Security Copilot can enhance your security operations, streamline incident response, and empower your security teams
3 out of 60
Microsoft 365 Security AssessmentSii Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
4 out of 60
Managed Extended Detection & Response (MXDR) for Workplace - ImplementationDXC
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Secure your business with Managed XDR for Workplace
5 out of 60
Enhanced Data Privacy with Microsoft PurviewAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
6 out of 60
Copilot For Microsoft 365 Readiness AssessmentTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Threatscape’s Copilot for Microsoft 365 Readiness Assessment (CRA) service can help you understand, and begin to address, the risks of Copilot for Microsoft 365 adoption.
7 out of 60
Copilot for Security Readiness AssessmentPerformanta
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Futureproof your Business Security with Microsoft Security Copilot and Performanta
8 out of 60
Barracuda Office 365 email-based securityCrayon
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defense, API-based inbox defense, incident response, data protection, and compliance capabilities.
9 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
10 out of 60
MDS - Modern Security Operations EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
A 2-day engagement to demonstrate how intelligent security analytics and threat intelligence can detect and stop active threats, encouraging organizations to deploy and adopt Modern SecOps solutions.
11 out of 60
Red Canary Cloud Security AssessmentRed Canary
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
12 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed Canary
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
13 out of 60
Entra ID Identity and Application Governance Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Our solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
14 out of 60
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data Ltd
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Whether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
15 out of 60
Cyber Security AssessmentELEVATE Solutions Limited
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
The Cybersecurity Assessment helps customers assess their security posture and risk to insider threats.
16 out of 60
AVASecure 360 - Microsoft 365 Security & Governance Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Aware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
17 out of 60
Defender for Endpoint Managed Servicee2e-assure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
18 out of 60
Secure Data Management with Microsoft PurviewAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
19 out of 60
Microsoft Defender for Business Managed Service: Monthly MDRe2e-assure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Maximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
20 out of 60
ALFA Managed SOC with Microsoft Defender XDR and SentinelAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
ALFA Managed Security Operations Center (SOC) leverages the powerful capabilities of Microsoft Defender Extended Detection and Response (XDR) and Microsoft Sentinel (SIEM & SOAR) to provide a robust,
21 out of 60
Microsoft Sentinel Security Consulting ServiceComtrade System Integration
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
22 out of 60
Synergy Advisor POC-in-a-box for Microsoft Security CopilotSynergy Advisors LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance your security posture with Synergy Advisors POC-in-a-box for Microsoft Security Copilot
23 out of 60
Synergy Advisors Architecture Design Sessions (ADS) for Microsoft Security CopilotSynergy Advisors LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
A Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
24 out of 60
Onesec Digital IdentitySecure Nextgen Systems
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Having a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
25 out of 60
MDR for Microsoft DefenderADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
26 out of 60
Synergy Advisors Microsoft Security Copilot E-mmersion ExperienceSynergy Advisors LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
AI-powered security for rapid, scalable, and effective defense
27 out of 60
Avanade Modern Sec OpsAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
28 out of 60
Avanade Microsoft Security Service Edge Quick StartAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft’s new Security Service Edge (SSE) capability empowers organizations on their Zero Trust journey though unique in the market integration with Microsoft Entra.
29 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Bulletproof Managed Security Elite is a Microsoft-native MXDR service that transforms Microsoft Sentinel and Defender XDR into a 24×7 cyber defense fabric.
30 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
31 out of 60
Implementation of Microsoft Security CopilotAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
32 out of 60
Microsoft 365 Security Health Check Assessment 3-WkBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
33 out of 60
MDS - Threat Protection EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
34 out of 60
HCLTech Business Email Protection: 10-Days ImplementationHCL America Inc_HCLT
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
HCLTech Business Email Protection (BEP) Powered By Microsoft EOP and MDO, Enable real time Business Email Protection alerting and automated remediation for email service hosted on Microsoft platform
35 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
36 out of 60
Microsoft Defender for Endpoint QuickStartPresidio
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Presidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
37 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prove the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
38 out of 60
Data Governance - Threat Protection - AssessmentSkyTerra Technologies LLC
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
The goal is to assess your existing data governance posture as well as unearthing your organization's priorities and associated business needs.
39 out of 60
Threat Protection Assessment & Zero Trust ArchitectureBDO
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Set future-proof security goals & build a roadmap to strengthen your Microsoft 365 posture with Modern SecOps on a unified platform, leveraging Zero Trust architecture and threat protection assessment
40 out of 60
Microsoft Platform Support ImplementationManaged Solution
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protectionm365-sa-workplace-analytics product iconWorkplace Analytics
Microsoft Platform Support Services provides comprehensive support that optimizes performance, enhances security and drives adoption across your Microsoft ecosystem.
41 out of 60
Microsoft 365 E5 Shield Deployment: 8 Week Imp.KAMIND IT, Inc
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack
42 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
2-week assessment of Microsoft 365 security posture and compliance gaps (HIPAA, GDPR, PCI-DSS, SOC2), with remediation roadmap and license alignment (Microsoft 365 E3/E5/Business Premium).
43 out of 60
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLC
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
We understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
44 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
45 out of 60
Deployment of Copilot for Microsoft 365Windows Management Experts, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance the productivity of Microsoft 365 with our premium Deployment service for Copilot for Microsoft 365.
46 out of 60
MDR WorkshopGrant Thornton LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
47 out of 60
Microsoft Defender for Endpoint Professional Services: 1-Wk ImplementationOptiv Security Inc.
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Provide comprehensive, powerful protection at your organization's endpoints from Optiv utilizing the Microsoft Defender for Endpoint solution.
48 out of 60
iT1's Security AssessmentIt1 Source LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Improve your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
49 out of 60
Copilot and AI Readiness AssessmentCloudServus
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Run an AI Readiness Assessment to pinpoint gaps using Copilot adoption; align next steps to Copilot & Agents at Work.
50 out of 60
Microsoft Purview QuickStart: ImplementationKraft Kennedy
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Kraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
51 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
52 out of 60
Cloud Security Journey: 2 Hour Proof of Concept360 Visibility Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
53 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
54 out of 60
atQor Microsoft 365 Security Assessment: 3-Wk AssessmentatQor
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get expert recommendations and deep analysis for your Microsoft 365 environment to detect unknown anomalies and mitigate them reviewing enterprise level scenarios following best practice.
55 out of 60
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, Lda
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
The engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
56 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SAS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
57 out of 60
TS As a Services (TSaaS): 5-day ImplementationE-Level Cloud Services S.A. de C.V.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
58 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
59 out of 60
Microsoft Purview Data Security Basic Quick Start 10-week ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Drive Data Protection Sustainability with Edgile's Data Protection Methodology
60 out of 60
  • 1
  • 2
  • Seterusnya
What's new
  • Surface Pro
  • Surface Laptop
  • Microsoft Copilot
  • Microsoft 365
Microsoft Store
  • Profil akaun
  • Pemulangan
Pendidikan
  • Microsoft Education
  • Peranti untuk pendidikan
  • Microsoft Teams for Education
  • Microsoft 365 Education
  • Office Education
  • Latihan dan pembangunan pendidik
  • Tawaran untuk pelajar dan ibu bapa
  • Azure for students
Perniagaan
  • Microsoft Cloud
  • Keselamatan Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Pemaju & IT
  • Pusat Pembangun
  • Dokumentasi
  • Microsoft Learn
  • Microsoft Tech Community
  • Azure Marketplace
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
Melayu (Malaysia) Ikon Pilih Keluar Pilihan Privasi Anda Pilihan Privasi Anda Privasi Kesihatan Pengguna
  • Sitemap
  • Contact Us
  • Privacy & Cookies
  • Terms of Use
  • Trademarks
  • About our ads
  • Manage cookies
  • © Microsoft 2025