筛选器全部清除
保险 有 行业云 个结果
显示 行业云 中的 个结果。
Windows 365 Proof of ConceptWanstorWanstor’s Windows 365 solution is designed to meet the standard requirements for building out a robust, secure, and efficient digital workspace for our customers.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
1 out of 8
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFTOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
2 out of 8
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFTManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
3 out of 8
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFTAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
4 out of 8
Cloud Security Assesment - 4 Wks AssessmentYouCC Technologies LTD.YouCC Technology a leader in the Israeli Cloud Security consulting provider will assess your current cloud security situation and recommend key Microsoft 365 suite deployment.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
5 out of 8
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
6 out of 8
Discover Sensitive Data Workshop: 4-Wk WorkshopProArch Technologies, Inc.ProArch’s Discover Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
7 out of 8
System Center Endpoint Manager 40 hour Quick Start Proof of Concept with Co-Management with Endpoint Manager in Office 365York Telecom CorpSystem Center Endpoint Manager 40-Hour Quick Start Proof-of-Concept. Design, deploy and learn SCEM in 40-hour proof-of-concept with Co-Management with Endpoint Manager Office 365
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
8 out of 8