Pošljite povratne informacije
Help & support
Shranjeni izdelki
Zasebni načrti
Počakajte trenutek, da vas prijavimo ...
FiltriPočisti vse

  • Vaša lokacija
  • Izdelki (1)
    • Dynamics 365
    • Microsoft 365 (1)
      • Uvajanje in upravljanje sprememb
      • Klicanje v aplikaciji Microsoft Teams
      • Varnost v oblaku
      • Svetovalne storitve za skladnost s predpisi
      • Uvajanje in upravljanje naprav
      • Delavci, ki so v neposrednem stiku s strankami
      • Identiteta in upravljanje dostopa
      • Zaščita in upravljanje informacij
      • Notranje tveganje
      • Znanje in vpogledi
      • Sobe za sestanke za Microsoft Teams
      • Sestanki za Microsoft Teams
      • Microsoft 365 Live Events
      • Upravljanje mobilnih naprav
      • Power Platform for Teams
      • Rešitve po meri za Teamse
      • Uvajanje skupinskega dela
      • Zaščita pred grožnjami
      • Analitika delovnega mesta
    • Power Platform
  • Panoge
  • Vrsta storitve

Št. rezultatov: Svetovalne storitve

Prikaz toliko rezultatov v aplikaciji svetovalne storitve:
Prikaži Toliko povezanih rezultatov v oblaki panoge: .
Microsoft Sentinel Workshop and PilotCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
1 out of 37
Windows 365 PilotCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
2 out of 37
Intune for Endpoint Management - Discovery ConsultationCBTS Technology Solutions LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Learn from CBTS how to utilize Microsoft Intune for Endpoint Management & Security in this free discovery consultation.
3 out of 37
MXDR ConsultationCBTS Technology Solutions LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
4 out of 37
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
5 out of 37
Microsoft 365 GCC High Migration for CMMC ComplianceSysArc Inc
+2
Applicable to:
m365-sa-teamwork-deployment product iconTeamwork Deploymentm365-sa-threat-protection product iconThreat Protection
We provide a seamless migration to a secure, and compliant Microsoft 365 GCC High environment.
6 out of 37
Managed XDR Service for Microsoft 365 Government Commercial Cloud (GCC) High environmentsSysArc Inc
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Our Managed XDR Service ensures regulatory compliance, and security for your organization’s needs.
7 out of 37
Implementation of Microsoft Defender for Cloud AppsCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
8 out of 37
Implementation of Microsoft Defender for Office 365CDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
9 out of 37
Fixing vulnerabilities based on Defender with ASR Module: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This service provides a comprehensive approach to identifying and fixing vulnerabilities in organization's devices, helping mitigate the risks of cyber-attacks.
10 out of 37
C1st Implementation of Microsoft Defender for EndpointC1st Technologies LLC
+2
Applicable to:
m365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The C1st Microsoft Defender for Endpoint Implementation enhances security by deploying advanced threat protection across all endpoints, configuring licenses, setting up connections, and assigning role
11 out of 37
C1st Implementation of Microsoft Defender for Office 365C1st Technologies LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Enhance email security for businesses by implementing Defender for Office 365 with Exchange Online Protection (EOP). Our goal is to protect organizational email from spam, phishing, and sophisticated
12 out of 37
Security Foundations Data: Assessment and ImplementationProServeIT
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Data security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
13 out of 37
Security Foundations Email: Assessment and ImplementationProServeIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
14 out of 37
Fortis Business Email Compromise Incident Response JumpstartSentinel Technologies Inc.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Fortis by Sentinel’s Incident Response team will use best efforts, as specified in the Service Level Agreement below, to address a Business Email Compromise incident within your organization.
15 out of 37
Threat Protection EngagementFIS Managed IT Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
16 out of 37
Zero Trust: Microsoft Security BriefingRavanty Tech Consulting, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Learn and Embrace Modern Work Zero Trust Pillars across Identity, Devices, Apps, and Data
17 out of 37
Threat Protection EngagementTierPoint
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
18 out of 37
Security Foundations for Microsoft 365Cyclotron Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure and govern Microsoft 365 with best practices for thread detection, compliance & data protection, identity access, device & app management with Microsoft’s security and governance framework.
19 out of 37
THInc.Ops Managed ServiceTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Premium managed IT service solution that provides a higher quality of service supporting your staff and stronger protection against cyberattacks.
20 out of 37
THInc Secure Managed Security Service for MicrosoftTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
21 out of 37
DSPM for AI - Free 2-Hour AssessmentNetwoven Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To help enterprises identify blind spots in Microsoft 365's AI data security, assess DSPM maturity, and establish a governance-first approach to safely accelerate AI innovation with Microsoft Purview.
22 out of 37
Frontier Firm Transformation - Free 2 Hour AI Security Risk AssessmentNetwoven Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To help businesses securely adopt AI within Microsoft 365, enabling confident use of Copilots and other AI solutions while protecting sensitive data.
23 out of 37
Redapt Threat Protection EngagementRedapt, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Proactive Cybersecurity for Resilient Enterprises
24 out of 37
Threat Protection Envisioning Engagement SentinelSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Organizations today are managing a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Get help achieving your broader security objectives.
25 out of 37
NuHarbor's Quick Start for PurviewNuharbor Security Inc.
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Activate Purview quickly with expert guidance to improve visibility, reduce risk, and support compliance.
26 out of 37
NuHarbor’s Defender Health CheckNuharbor Security Inc.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Uncover gaps and optimize Microsoft Defender for stronger threat protection.
27 out of 37
Microsoft Exchange Best Practices RemediationTechNet UC LLC
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure and optimize your Microsoft Exchange Online environment with expert remediation, ensuring compliance, reliability, and protection against email threats.
28 out of 37
Zero Trust Deployment and Optimization ServiceSoftchoice
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Deploy zero trust with confidence, optimize it to deliver lasting outcomes.
29 out of 37
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
30 out of 37
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
31 out of 37
Security Assessment: 2-Wk AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
32 out of 37
Threat Protection: 3-Wk POCFPT/Intellinet
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Identify security threats and begin to respond and mitigate.
33 out of 37
Microsoft 365 Secure Score: 4 Week ImplementationRazor Technology, LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Audit, review, and improve security posture of Microsoft 365 Estate through Secure Score methodology. Receive expert advice for identity, compliance, and threat protection improvements.
34 out of 37
Office 365 Protection: Design & Pilot 1-Wk POCManaged Solution
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protect Your Employees from External Email Threats with Defender for Office 365 Protection
35 out of 37
Security Assessment: 2 Week AssessmentTallan
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
36 out of 37
Zero Trust Launchpad: 3-Wk AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
37 out of 37
  • Nazaj
  • 5
  • 6
  • 7
  • 8
  • 9
Kaj je novega?
  • Microsoft Copilot
  • Microsoft 365
  • Aplikacije za Windows 11
Microsoft Store
  • Profil računa
  • Središče za prenose
  • Vračila
  • Sledenje naročilom
  • Recikliranje
  • Commercial Warranties
Izobraževanje
  • Microsoft Education
  • Naprave za izobraževanje
  • Microsoft Teams za izobraževanje
  • Microsoft 365 Education
  • Office Education
  • Izobraževanje in razvoj učiteljev
  • Posebne ponudbe za študente in starše
  • Azure za študente
Poslovanje
  • Microsoft Cloud
  • Microsoftova varnost
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Razvijalci in IT
  • Razvijalec za Microsoft
  • Microsoft Learn
  • Podpora za aplikacije UI na tržnici
  • Microsoftova skupnost tehnikov
  • Microsoft Marketplace
  • Microsoft Power Platform
  • Visual Studio
Podjetje
  • Zaposlitev
  • O Microsoftu
  • Zasebnost pri Microsoftu
  • Vlagatelji
  • Trajnost
Slovenščina (Slovenija) Ikona za zavrnitev sodelovanja pri možnostih glede zasebnosti Vaše možnosti glede zasebnosti Zasebnost o zdravstvenem stanju potrošnikov
  • Sitemap
  • Stik z nami
  • Izjava o zasebnosti
  • Pogoji za uporabo
  • Blagovne znamke
  • O naših oglasih
  • EU Compliance DoCs
  • Manage cookies
  • © Microsoft 2025