ให้คำติชม
ความช่วยเหลือ + การสนับสนุน
รายการที่บันทึกไว้
แผนส่วนตัว
รอสักครู่ กําลังนําคุณเข้าสู่ระบบ...
ตัวกรองล้างทั้งหมด

  • ตำแหน่งที่ตั้งของคุณ
  • ผลิตภัณฑ์ (1)
    • Dynamics 365
    • Microsoft 365 (1)
      • การจัดการการเปลี่ยนแปลงและการเริ่มนำไปใช้
      • การโทรสำหรับ Microsoft Teams
      • การรักษาความปลอดภัยในคลาวด์
      • บริการให้คําปรึกษาด้านการปฏิบัติตามข้อบังคับ
      • การจัดการและการปรับใช้งานอุปกรณ์
      • พนักงานแนวหน้า
      • ระบบบริหารจัดการตัวตนและการเข้าถึงทรัพยากร
      • นโยบายการกำกับดูแลและการป้องกันข้อมูล
      • ความเสี่ยงภายใน
      • ความรู้และข้อมูลเชิงลึก
      • ห้องประชุมสำหรับ Microsoft Teams
      • การประชุมสำหรับ Microsoft Teams
      • Microsoft 365 Live Events
      • การจัดการอุปกรณ์เคลื่อนที่
      • Power Platform for Teams
      • โซลูชันแบบกำหนดเองของ Teams
      • การปรับใช้ทีมเวิร์ก
      • การป้องกันภัยคุกคาม
      • Workplace Analytics
    • Power Platform
  • อุตสาหกรรม
  • ประเภทของบริการ

ผลลัพธ์ บริการให้คำปรึกษา รายการ

กำลังแสดงผลลัพธ์ รายการใน บริการให้คำปรึกษา
ดู ผลลัพธ์ ที่เกี่ยวข้องใน ระบบคลาวด์ในอุตสาหกรรม.
Microsoft 365 Plan for Success:3-d AssessmentCubesys Pty Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Microsoft 365 comes in a range of flavours and offers a tremendous set of capabilities for enable your business, maintain security, and address modern IT management needs. DO YOU HAVE A PLAN?
1 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
2 out of 60
Secure Remote Work: 3 Days Intro and Plan WorkshopLiveRoute FZ-LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Engagement to introduce benefits (of working from anywhere, anytime but securely for your productive workforce), assessment and establish a plan for enabling modern Secure Remote Work workplace.
3 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
4 out of 60
ADFS to Microsoft Entra ID Migration: 4-Wk ImplementationPerformanta
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Undertake a seamless ADFS to Microsoft Entra ID app migration, improving security, offering up new features, and getting your organisation back on track.
5 out of 60
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
6 out of 60
Eviden Compliance Assessment (CSAT) zur Einhaltung der europäischen NIS-2-RichtlinieEviden International France - SAS
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Unternehmen stehen vor der Herausforderung, die europäische NIS2-Richtlinie bis zur nationalen Umsetzungsfrist im Oktober 2024 umzusetzen.
7 out of 60
Windows10 EOL to Windows11 Foundations - 1 Week QuickStartCoretek Services
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-firstline-workers product iconFrontline Workersm365-sa-identity-and-access-management product iconIdentity & Access Management
Windows 10 EOL is right around the corner, prepare with the Windows 11 foundations QuickStart for your organization today.
8 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
9 out of 60
MFA JumpstartSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan.
10 out of 60
Office 365 GCC High Migration +Tenant Imp 4WkSummit 7 Systems, Inc
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Companies looking to migrate to Office 365 GCC High to meet regulatory compliance requirements can rely on a proven approach to securely transition from other cloud platforms (Google, etc) or on prem.
11 out of 60
Incident Response RetainerSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
12 out of 60
Capgemini Modern Workspace PortfolioCapgemini Group
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Capgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
13 out of 60
Microsoft 365 Security BriefingCDI LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
14 out of 60
Endpoint Ecosystem Technical Support: 12-month Support ImplementationMobile Mentor
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Provide support and advice to IT administrators on Microsoft Endpoint Manager
15 out of 60
Okta to Entra Migration: Roadmap ArchitectAscent Global, Inc.
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Roadmap and architect the shift from Okta to Microsoft Entra’s enhanced data security
16 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk ImplementationNeway Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Streamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
17 out of 60
Microsoft Security: 4-Week ImplementationApex Digital Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Establish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
18 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
19 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Entra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
20 out of 60
Varonis JumpstartSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
21 out of 60
Enhanced Data Privacy with Microsoft PurviewAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
22 out of 60
Fortis Assessment Microsoft Online SecuritySentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
23 out of 60
Defend Against Threats with SIEM Plus XDRNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
24 out of 60
PlanB. Acceleration Workshops for Microsoft CopilotPlanB. GmbH
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The PlanB. Copilot Accelerator - Workshop Series helps organizations seamlessly integrate AI, ensure compliance, and maximize the benefits of Microsoft Copilot.
25 out of 60
Rapid Zero Trust Deployment : 8-WK ImplementationMaureen Data Systems
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The purpose and objectives of this engagement are to develop a Zero Trust Implementation Strategy
26 out of 60
HPT Nextgen Windows Experience_02 days workshopHPT Vietnam Corporation
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
NextGen Windows 2 days workshop provides insights how to leverage Cloud PCs, manage virtual endpoints, leverage Windows 11 to enable hybrid work, and implement best practices for endpoint management
27 out of 60
Implementation on Microsoft IntuneITX360 (Pvt) Ltd.
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Enhance security and efficiency with Microsoft Intune Implementation. Manage and secure devices across Windows, Android, iOS, and macOS with a seamless cloud-based solution.
28 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Advanced endpoint security and threat protection: detect, investigate, and respond to attacks.
29 out of 60
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
30 out of 60
Intune for Android: 4-Week ImplementationMobile Mentor
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Android devices need to be managed to ensure corporate security. Leaving Android users on their own is not a good strategy. Intune offers excellent management of Android devices.
31 out of 60
Threat Protection Engagement FY25The Partner Masters
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
32 out of 60
Modernize Endpoints with Windows 365 Cloud PC: 2-3Wk POCatQor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Our Windows 365 Jumpstart engagement helps your business start using Microsoft’s Cloud PC during a pilot form that lets you immediately see the advantages of adoption for your users.
33 out of 60
Offer Name: Microsoft 365 CrashCourse - 1 week WorkshopVirteva LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-mobile-device-management product iconMobile Device Management
Empower organizations to gain a deeper understanding of Microsoft 365 and its vast array of services, features, and capabilities through Virteva's Microsoft 365 CrashCourse Workshop.
34 out of 60
Microsoft 365 Security: 3-Day Workshopdelaware
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
35 out of 60
Secure Your Hybrid WorkplaceRackspace Technology
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
The purpose of this offer is to provide a comprehensive endpoint security and management solution aimed at enhancing hybrid workplaces
36 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReply
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Valorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
37 out of 60
Microsoft Security Immersion: 1 Day BriefingSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Knowing that your time is valuable, we have developed a true to life, hands-on, interactive session designed to give you a deep understanding of the Microsoft 365 Security suite of products.
38 out of 60
Secure Hybrid Identity - Defender for Identity: 6 week ImplementationPerformanta
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
39 out of 60
Red Canary Defend Against Threats Siem Plus XDR WorkshopRed Canary
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Gain visibility into immediate threats across email, identity, and data, plus clarity and support on how to upgrade your security posture with a strategic plan customized for your organization.
40 out of 60
Identity and Access Management Quick StartSoftchoice
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Prioritizing security services to combat identity breaches by prioritizing security services, and protecting against mismanaged privileges, and access-related data breaches.
41 out of 60
Modern Device Management ImplementationDXC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Improve the employee experience with a secure and reliable modern device management solution using Device as a Service (DaaS) or Virtual Desktop and Application Services.
42 out of 60
Data Protection Impact Assessment: 8 WkLighthouse Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Empowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
43 out of 60
Microsoft 365 Copilot & Sales Readiness AssessmentJourneyTEAM
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
Accelerate your sales team's performance with JourneyTEAM's Copilot & Sales Readiness Assessment
44 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoice
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
45 out of 60
Modern Management for EndpointsIvision, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
46 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era Technology
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
M&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
47 out of 60
Microsoft 365 Inter-Tenant Migration: 2 days AssessmentPreeminent Solutions, Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Preeminent, a Microsoft Gold Partner, can deliver a consulting engagement of 2-Day Assessment & Recommendation to help you planning your migration from one Microsoft 365 tenant to another tenant
48 out of 60
Email Security Threat AssessmentAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
49 out of 60
Lightstream Data Security AssessmentLightstream
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Lightstream will Identify data security risks in your organizational data. Identify data security risks in your organizational data
50 out of 60
Microsoft Data Security EngagementRackspace Technology
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Data Security Engagement is designed to help organizations identify and mitigate data security risks, especially in the context of the increasing deployment of generative AI applications.
51 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwoven
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Netwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
52 out of 60
Your Smart Workplace AssessmentRackspace Technology
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Your Smart Workplace Assessment helps organizations develop secure, cost-effective, and productivity-enhancing strategies for modern work environments.
53 out of 60
Managed Endpoint AssessmentFSI Strategies
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This four-week engagement will determine the level of effort required for a migration to a fully modern desktop using Microsoft 365 services.
54 out of 60
Protect & Govern Sensitive Data: 3-Day WorkshopNetrix Global
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
A 3-day engagement designed to address compliance risks head-on and equip you with the insights needed to better discover, protect, and govern your corporate data.
55 out of 60
Microsoft 365 Security Health Check: 3 day AssessmentISCG SP Z O O
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Microsoft 365 is a multi-layer solution with the right security policies you can block over 99.9 percent of account compromise attacks!
56 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
57 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Roadmap to increase your security score with cost-effective security tools
58 out of 60
MDM Migration Plan: 1-week AssessmentMobile Mentor
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
MDM Migration is an assessment and planning service that guides your move to Intune.
59 out of 60
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstream
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Lightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
60 out of 60
  • ก่อนหน้า
  • 2
  • 3
  • 4
  • 5
  • 6
  • ถัดไป
มีอะไรใหม่
  • Surface Pro
  • Surface Laptop
  • Copilot สำหรับองค์กร
  • Copilot สำหรับใช้ส่วนตัว
  • Microsoft 365
  • สำรวจผลิตภัณฑ์ Microsoft
  • แอป Windows 11
Microsoft Store
  • โพรไฟล์บัญชีผู้ใช้
  • ศูนย์ดาวน์โหลด
  • คืนสินค้า
  • ติดตามการสั่งซื้อ
การศึกษา
  • Microsoft Education
  • อุปกรณ์สำหรับการศึกษา
  • Microsoft Teams สำหรับการศึกษา
  • Microsoft 365 Education
  • Office Education
  • การฝึกอบรมและการพัฒนานักการศึกษา
  • ข้อตกลงสำหรับนักศึกษาและผู้ปกครอง
  • Azure สำหรับนักศึกษา
ธุรกิจ
  • Microsoft Cloud
  • การรักษาความปลอดภัยของ Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
นักพัฒนาและไอที
  • นักพัฒนาของ Microsoft
  • Microsoft Learn
  • รองรับแอปตลาด AI
  • Microsoft Tech Community
  • Azure Marketplace
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
บริษัท
  • ตำแหน่งงาน
  • ข่าวบริษัท
  • สิทธิ์ส่วนบุคคลที่ Microsoft
  • นักลงทุน
  • ความยั่งยืน
ไทย (ไทย) ไอคอนการเลือกไม่รับตัวเลือกความเป็นส่วนตัวของคุณ ตัวเลือกความเป็นส่วนตัวของคุณ ความเป็นส่วนตัวด้านสุขภาพของผู้บริโภค
  • Sitemap
  • ติดต่อเรา
  • คำชี้แจงสิทธิ์ส่วนบุคคล
  • ข้อตกลงการใช้งาน
  • เครื่องหมายการค้า
  • เกี่ยวกับโฆษณาของเรา
  • Manage cookies
  • © Microsoft 2025