筛选器全部清除
行业云 个结果
显示 行业云 中的 21 个结果。
远程监视Remove 远程监视
标识和访问管理Remove 标识和访问管理
Microsoft 365Remove Microsoft 365
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvoke
Cloud Security
Identity & Access Management
Threat ProtectionProvide cross-domain threat protection and simplify breach prevention
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
1 out of 21
Microsoft 365 Security Hardening; 4-Wk ServiceProArch Technologies, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionThe Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
2 out of 21
Microsoft 365 Security Review: 3-Wk AssessmentProArch Technologies, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionIdentifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
3 out of 21
HSBS Cloud Modern Work Migração de Google para Microsoft 365HSBS
Adoption & Change Management
Frontline Workers
Identity & Access ManagementMigração de Google para Microsoft 365: Simplifique a transição com eficiência e segurança
Applicable to:
Adoption & Change Management
Frontline Workers
Identity & Access Management
4 out of 21
Avanade Hybrid Windows Endpoint Solutions FY24Avanade, Inc.
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementAvanade has developed the next generation of endpoint solutions for the modern workforce, with integrated physical, virtual and hybrid solutions
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
5 out of 21
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstream
Cloud Security
Identity & Access Management
Threat ProtectionLightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
6 out of 21
Co-pilot Technical ReadinessPHOENIX SOFTWARE LTD
Device Deployment & Management
Identity & Access Management
Knowledge & InsightsHelp your organisation ensure that they are technically ready for Co-pilot
Applicable to:
Device Deployment & Management
Identity & Access Management
Knowledge & Insights
7 out of 21
Non-Profit Security Essentials : 1 Day Workshoptrue org cloud
Cloud Security
Compliance Advisory Services
Identity & Access ManagementTrue.Org will conduct one-day Free Security Awareness Workshop to help nonprofits proactively understand security risks, and acknowledge the benefits of Microsoft's Security Program for Non-Profits
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
8 out of 21
Lightstream Data Security AssessmentLightstream
Cloud Security
Identity & Access Management
Information Protection & GovernanceLightstream will Identify data security risks in your organizational data.
Identify data security risks in your organizational data
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
9 out of 21
Solution Assessment for Security: 30 DayConcurrency, Inc.
Identity & Access Management
Information Protection & Governance
Threat ProtectionAn assessment to evaluate security posture, identify potential vulnerabilities and risks, and provide mitigation recommendations.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
10 out of 21
Microsoft Entra Permissions Management Multi-Cloud Risk Assessment: 3-WeeksInvoke
Cloud Security
Compliance Advisory Services
Identity & Access ManagementInvoke's Entra PM multi-cloud risk assessment analyzes Azure and multi-cloud permissions risk
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
11 out of 21
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstream
Cloud Security
Identity & Access Management
Threat ProtectionLightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
12 out of 21
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionEntra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
13 out of 21
AVASecure 360 - Microsoft 365 Security & Governance Solutions by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionAware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
14 out of 21
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Information Protection & GovernanceOur approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
15 out of 21
Entra ID Identity and Application Governance Solutions by AVASOFTAVASOFT
Identity & Access Management
Information Protection & Governance
Threat ProtectionOur solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
16 out of 21
Secure & Manage Devices using the Microsoft Intune Suite with AVASOFTAVASOFT
Identity & Access Management
Mobile Device Management
Threat ProtectionSeamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
Applicable to:
Identity & Access Management
Mobile Device Management
Threat Protection
17 out of 21
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionManage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
18 out of 21
Device Management Migration - On-Premises to Cloud by AVASOFTAVASOFT
Device Deployment & Management
Identity & Access Management
Mobile Device ManagementSeamlessly migrate devices to the cloud, gaining flexibility, scalability, and cost-efficiency. Minimize disruptions and embrace growth beyond traditional hardware limits.
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
19 out of 21
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFT
Cloud Security
Identity & Access Management
Threat ProtectionAre you informed about your endpoint's and cloud app's security?
Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
20 out of 21
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc.
Cloud Security
Identity & Access Management
Insider RiskWe will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
21 out of 21