筛选器全部清除
行业云 个结果
显示 行业云 中的 12 个结果。
内容创建与管理Remove 内容创建与管理
云安全Remove 云安全
Microsoft 365Remove Microsoft 365
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvoke
Cloud Security
Identity & Access Management
Threat ProtectionProvide cross-domain threat protection and simplify breach prevention
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 12
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstream
Cloud Security
Identity & Access Management
Threat ProtectionLightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
2 out of 12
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-WeeksInvoke
Cloud Security
Compliance Advisory Services
Identity & Access ManagementInvoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
3 out of 12
CT - Microsoft 365 Copilot Readiness AssessmentCloud Target
Adoption & Change Management
Cloud Security
Teamwork DeploymentAssessment in Microsoft 365 environment to enable Microsoft 365 Copilot deploy
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
4 out of 12
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Information Protection & GovernanceOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
5 out of 12
Lightstream Data Security AssessmentLightstream
Cloud Security
Identity & Access Management
Information Protection & GovernanceLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
6 out of 12
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstream
Cloud Security
Identity & Access Management
Threat ProtectionLightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
7 out of 12
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
8 out of 12
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
9 out of 12
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.
Cloud Security
Identity & Access Management
Insider RiskWe will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
10 out of 12
Discover Sensitive Data Workshop: 4-Wk WorkshopProArch Technologies, Inc.
Cloud Security
Compliance Advisory Services
Information Protection & GovernanceProArch’s Discover Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
11 out of 12
System Center Endpoint Manager 40 hour Quick Start Proof of Concept with Co-Management with Endpoint Manager in Office 365York Telecom Corp
Cloud Security
Device Deployment & Management
Mobile Device ManagementSystem Center Endpoint Manager 40-Hour Quick Start Proof-of-Concept. Design, deploy and learn SCEM in 40-hour proof-of-concept with Co-Management with Endpoint Manager Office 365
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
12 out of 12