Pošljite povratne informacije
Pomoč in podpora
Shranjeni izdelki
Zasebni načrti
Počakajte trenutek, da vas prijavimo ...
FiltriPočisti vse

  • Vaša lokacija
  • Izdelki (1)
    • Dynamics 365
    • Microsoft 365 (1)
      • Uvajanje in upravljanje sprememb
      • Klicanje v aplikaciji Microsoft Teams
      • Varnost v oblaku
      • Svetovalne storitve za skladnost s predpisi
      • Uvajanje in upravljanje naprav
      • Delavci, ki so v neposrednem stiku s strankami
      • Identiteta in upravljanje dostopa
      • Zaščita in upravljanje informacij
      • Notranje tveganje
      • Znanje in vpogledi
      • Sobe za sestanke za Microsoft Teams
      • Sestanki za Microsoft Teams
      • Microsoft 365 Live Events
      • Upravljanje mobilnih naprav
      • Power Platform for Teams
      • Rešitve po meri za Teamse
      • Uvajanje skupinskega dela
      • Zaščita pred grožnjami
      • Analitika delovnega mesta
    • Power Platform
  • Panoge
  • Vrsta storitve

Št. rezultatov: Svetovalne storitve

Prikaz toliko rezultatov v aplikaciji svetovalne storitve:
Prikaži Toliko povezanih rezultatov v oblaki panoge: .
Secure Identities and Access: 4-Week Engagement & WorkshopCompuNet
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
4-week engagement and workshop that helps customers design and plan out their optimal identity model to ensure they have a roadmap to enhanced security using Microsoft 365 and Azure Active Directory
1 out of 23
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
2 out of 23
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical Start
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Rapidly identify, contain, and remediate a breach.
3 out of 23
MXDR Shield: 4-Wk ImplementationLong View Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
4 out of 23
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski Security
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Kudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
5 out of 23
Epiq Mergers and Acquisitions Risk ReductionEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Identify and exclude sensitive information from being migrated during mergers and acquisitions (M&A) data discovery and migration projects.
6 out of 23
Epiq Flex IG Talent for Microsoft PurviewEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Epiq Flex IG Talent is here to provide it clients with flexible talent surrounding Microsoft Purview eDiscovery, Information Governance, Compliance and Archiving.
7 out of 23
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Cyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
8 out of 23
Defender for Office 365: 5-Day AssessmenteGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
9 out of 23
Get Ready for Microsoft 365 Copilot with Zones Purview WorkshopZones Inc.
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The goal of the Zones' Purview Workshop is to provide organizations with a tailored, 6-week journey to master data governance, safeguard data,
10 out of 23
Virtual CISO Services: 1-Mo BriefingeGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
CIOs are busy leading the digital initiatives of the business, with security falling behind other priorities.
11 out of 23
Copilot for Microsoft 365 Data Security QuickStartSoftchoice
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Setting the foundation for data security and governance in preparation for Copilot for Microsoft 365
12 out of 23
Energy Cybersecurity Assessment: 5-Wk AssessmentPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
This assessment is designed to assist energy companies in understanding the significance of Microsoft security solutions and how to protect their organizations from potential threats.
13 out of 23
Cybersecurity: Protect Your Operations with Henson GroupThe Henson Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Henson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
14 out of 23
Healthcare & Education Cybersecurity AssessmentPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
This assessment is designed to help healthcare and education organizations understand the importance of Microsoft security solutions and safeguard against potential threats.
15 out of 23
Rapid Data Loss Prevention: 30-Day ImplementationLong View Systems
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Preserve your data and secure your future with Data Loss Prevention powered by Microsoft Purview in just 30 days.
16 out of 23
eDiscovery, Data Lifecycle & Records ManagementITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Manage the full information lifecycle—from classification and retention to eDiscovery and defensible deletion—using Microsoft Purview’s records management and compliance features.
17 out of 23
Data Security EngagementPC Connection, Inc.
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Our Microsoft Purview Data Security Engagement provides actionable insights into data security, privacy, and compliance risks.
18 out of 23
THInc Secure Managed Security Service for MicrosoftTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
19 out of 23
Security AssessmentSoteria, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Gain deep insights into your Secure Score, user and device health, application vulnerabilities, and data security with our security assessment.
20 out of 23
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It Security
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Enable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
21 out of 23
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
22 out of 23
Compliance: 1 Day Workshop - Manage and Investigate RiskConvergeOne
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Everyone seems to be aware of external risk factors such as Ransomware, but what out Insider Risk? Find out the importance of proper controls and governance to protect yourself from bigger threats
23 out of 23
  • Nazaj
  • 1
  • 2
  • 3
Kaj je novega?
  • Microsoft Copilot
  • Microsoft 365
  • Aplikacije za Windows 11
Microsoft Store
  • Profil računa
  • Središče za prenose
  • Vračila
  • Sledenje naročilom
  • Recikliranje
  • Commercial Warranties
Izobraževanje
  • Microsoft Education
  • Naprave za izobraževanje
  • Microsoft Teams za izobraževanje
  • Microsoft 365 Education
  • Office Education
  • Izobraževanje in razvoj učiteljev
  • Posebne ponudbe za študente in starše
  • Azure za študente
Poslovanje
  • Microsoft Cloud
  • Microsoftova varnost
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Razvijalci in IT
  • Razvijalec za Microsoft
  • Microsoft Learn
  • Podpora za aplikacije UI na tržnici
  • Microsoftova skupnost tehnikov
  • Microsoft Marketplace
  • Microsoft Power Platform
  • Visual Studio
Podjetje
  • Zaposlitev
  • O Microsoftu
  • Zasebnost pri Microsoftu
  • Vlagatelji
  • Trajnost
Slovenščina (Slovenija) Ikona za zavrnitev sodelovanja pri možnostih glede zasebnosti Vaše možnosti glede zasebnosti Zasebnost o zdravstvenem stanju potrošnikov
  • Sitemap
  • Stik z nami
  • Izjava o zasebnosti
  • Pogoji za uporabo
  • Blagovne znamke
  • O naših oglasih
  • EU Compliance DoCs
  • Manage cookies
  • © Microsoft 2025