ให้คำติชม
ความช่วยเหลือ + การสนับสนุน
รายการที่บันทึกไว้
แผนส่วนตัว
รอสักครู่ กําลังนําคุณเข้าสู่ระบบ...
ตัวกรองล้างทั้งหมด

  • ตำแหน่งที่ตั้งของคุณ
  • ผลิตภัณฑ์ (1)
  • อุตสาหกรรม
  • ประเภทของบริการ

ผลลัพธ์ บริการให้คำปรึกษา รายการ

กำลังแสดงผลลัพธ์ รายการใน บริการให้คำปรึกษา
ดู ผลลัพธ์ ที่เกี่ยวข้องใน ระบบคลาวด์ในอุตสาหกรรม.
Data Security EngagementSignal Alliance Technology Holding
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
As your company data expands and generative AI is being deployed rapidly, having an integrated approach that can help quickly identify, triage, and act on data security risks is super important.
1 out of 32
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology Holding
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Our goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
2 out of 32
Securing Copilot for Microsoft 365 in Microsoft 365 for Business 1hour Implementationtrue org cloud
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The security, compliance, and privacy policies that you have in place are adopted by Copilot for Microsoft 365.
3 out of 32
Microsoft Sentinel Integration with Carbon Black by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Improve endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
4 out of 32
DORA act assessment and implementationSii Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
5 out of 32
4Sight's Microsoft Data Security Engagement4Sight Holdings
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Identify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
6 out of 32
Quorum Cyber Data Security Assessment using Microsoft PurviewQuorum Cyber
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Achieve a clear understanding of the storage, access and protection of one of your organisation’s most valuable assets.
7 out of 32
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
8 out of 32
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
9 out of 32
Active Directory Security on DemandComtrade System Integration
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
10 out of 32
SecureBlu MDR Service for Microsoft 365 DefenderNew Era Technology
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
11 out of 32
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLC
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
12 out of 32
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
13 out of 32
True Managed Security Service- 3 day Workshoptrue org cloud
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
You have a vision. We can help you secure it...
14 out of 32
Identity and Access Management SolutionH One (Private) Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Entra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
15 out of 32
Microsoft Intune ServiceSii Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-insider-risk product iconInsider Risk
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
16 out of 32
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTION
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Learn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
17 out of 32
Microsoft Purview Information Protection ImplementationITX360 (Pvt) Ltd.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Secure your organization's sensitive data with Microsoft Purview Information Protection—classify, label, and protect data easily while ensuring compliance.
18 out of 32
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
19 out of 32
DLP Implementation and Tuning ServicesINFOTECHTION
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Reduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
20 out of 32
Copilot Data ProtectionCloud Life
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
21 out of 32
Data Leak DetectionAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Rapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
22 out of 32
Microsoft Defender XDR managed by InetumInetum Belgium
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Get insights into the threats for your IT environment and turn these insights into action
23 out of 32
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
24 out of 32
Ctelecoms Mitigate Compliance and Privacy Risks WorkshopConsolidated Telecoms (Ctelecoms)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
The Mitigate Compliance & Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organization.
25 out of 32
Ctelecoms Defend Against Threats with SIEM Plus XDR WorkshopConsolidated Telecoms (Ctelecoms)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Defend Against Threats with SIEM Plus XDR Workshop Learn how to put next-generation Microsoft security tools to work for you.
26 out of 32
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
27 out of 32
Microsoft Intune: 4-8 Week ImplementationWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our expert team will help you deploy and configure Microsoft Intune, ensuring seamless integration and optimal performance for your organization's needs
28 out of 32
Microsoft Purview Information Protection DeploymentESTE Bilisim
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
In today's business landscape grappling with data security incidents, our Microsoft Purview Information Protection Deployment solution empowers organizations to safeguard their sensitive data
29 out of 32
Insider Risk Management: 8-Wk implementationPwC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
30 out of 32
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro Ltd
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Wipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
31 out of 32
Teams Quality and Reliability: 4-days AssessmentNEWUP BİLGİ TEKNOLOJİLERİ A.Ş.
+3
Applicable to:
m365-sa-firstline-workers product iconFrontline Workersm365-sa-insider-risk product iconInsider Riskm365-sa-teams-custom-solutions product iconTeams Custom Solutions
This service is provide existing Teams Quality and Reliability assessment and solutions.
32 out of 32
มีอะไรใหม่
  • Surface Pro
  • Surface Laptop
  • Copilot สำหรับองค์กร
  • Copilot สำหรับใช้ส่วนตัว
  • Microsoft 365
  • สำรวจผลิตภัณฑ์ Microsoft
  • แอป Windows 11
Microsoft Store
  • โพรไฟล์บัญชีผู้ใช้
  • ศูนย์ดาวน์โหลด
  • คืนสินค้า
  • ติดตามการสั่งซื้อ
การศึกษา
  • Microsoft Education
  • อุปกรณ์สำหรับการศึกษา
  • Microsoft Teams สำหรับการศึกษา
  • Microsoft 365 Education
  • Office Education
  • การฝึกอบรมและการพัฒนานักการศึกษา
  • ข้อตกลงสำหรับนักศึกษาและผู้ปกครอง
  • Azure สำหรับนักศึกษา
ธุรกิจ
  • Microsoft Cloud
  • การรักษาความปลอดภัยของ Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
นักพัฒนาและไอที
  • นักพัฒนาของ Microsoft
  • Microsoft Learn
  • รองรับแอปตลาด AI
  • Microsoft Tech Community
  • Azure Marketplace
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
บริษัท
  • ตำแหน่งงาน
  • ข่าวบริษัท
  • สิทธิ์ส่วนบุคคลที่ Microsoft
  • นักลงทุน
  • ความยั่งยืน
ไทย (ไทย) ไอคอนการเลือกไม่รับตัวเลือกความเป็นส่วนตัวของคุณ ตัวเลือกความเป็นส่วนตัวของคุณ ความเป็นส่วนตัวด้านสุขภาพของผู้บริโภค
  • Sitemap
  • ติดต่อเรา
  • คำชี้แจงสิทธิ์ส่วนบุคคล
  • ข้อตกลงการใช้งาน
  • เครื่องหมายการค้า
  • เกี่ยวกับโฆษณาของเรา
  • Manage cookies
  • © Microsoft 2025