Feedback geben
Hilfe und Support
Gespeicherte Elemente
Private Pläne
Nur einen Moment, wir melden Sie an...
FilterAlle löschen

  • Ihr Standort
  • Produkte (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Einführungs- und Änderungsverwaltung
      • Telefonsystem über Microsoft Teams
      • Cloud Security
      • Beratungsdienste zur Compliance
      • Gerätebereitstellung und -verwaltung
      • Mitarbeiter in Service und Produktion
      • Identity & Access Management
      • Information Protection & Governance
      • Insiderrisiko
      • Wissen und Erkenntnisse
      • Besprechungsräume für Microsoft Teams
      • Besprechungen für Microsoft Teams
      • Microsoft 365 Live Events
      • Verwaltung mobiler Geräte
      • Power Platform for Teams
      • Benutzerdefinierte Teams-Lösungen
      • Einsatz von Teamwork
      • Bedrohungsschutz
      • Workplace Analytics
    • Power Platform
  • Branchen
  • Diensttyp
  • Preismodell

Professional Services Ergebnisse

Es werden Ergebnisse in professional services angezeigt.
Anzeigen verknüpfte Ergebnisse in branchenclouds.
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Evaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
1 out of 60
Microsoft 365 Data oversharing report: 5-D Implementation and consultingReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-teamwork-deployment product iconTeamwork Deployment
Comprehensive Insights: Get a holistic overview of your environment and uncover overshared sites, documents, and items without the need for expensive Microsoft 365 E5 licenses.
2 out of 60
SecureBlu MDR Service for Microsoft 365 DefenderNew Era Technology
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
3 out of 60
ALFA Managed SOC with Microsoft Defender XDR and SentinelAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
ALFA Managed Security Operations Center (SOC) leverages the powerful capabilities of Microsoft Defender Extended Detection and Response (XDR) and Microsoft Sentinel (SIEM & SOAR) to provide a robust,
4 out of 60
Secure Data Management with Microsoft PurviewAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
5 out of 60
Copilot for Microsoft 365 WorkshopINOVASYS FOR SYSTEMS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Copilot for Microsoft 365 Workshop, delivered by certified Microsoft partner Inovasys, is a comprehensive three-phase engagement.
6 out of 60
Cloud App Security – Advanced CASB Solution for Cloud Data ProtectionITX360 (Pvt) Ltd.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Secure your cloud apps with real-time monitoring, Shadow IT discovery, and automated data protection. Integrated with Microsoft Information Protection for enhanced compliance and threat detection.
7 out of 60
Microsoft Defender for Business Managed Service: Monthly MDRe2e-assure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Maximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
8 out of 60
Defender for Endpoint Managed Servicee2e-assure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
9 out of 60
DLP Implementation and Tuning ServicesINFOTECHTION
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Reduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
10 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY25CGI Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
11 out of 60
Microsoft Sentinel Security Consulting ServiceComtrade System Integration
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
12 out of 60
Microsoft Copilot Readiness AssessmentInviso Corporation
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Get ready for Microsoft Copilot, by identifying best-in-class Microsoft 365 security solutions that will protect data and users by establishing a secure foundation, control content
13 out of 60
Microsoft Purview & Generative AI Synergy: Data Governance for the FutureBlack Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Usage of generative AI increases day by day in enterprise environments, in some cases without control. Act in time and prevent data breaches and exfiltration activities.
14 out of 60
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
15 out of 60
Introducing Microsoft Entra: 2 Hour WorkshopSlalom Consulting
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn about how Microsoft Entra will help your business step into tomorrow with modern identity and access solutions by introducing you to modern access security across a broad range of products.
16 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
17 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
18 out of 60
IN - Microsoft 365 Barracuda Cloud to Cloud BackupCrayon
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Secure, easy-to-use SaaS backup for your Microsoft 365 data
19 out of 60
Data Security & Protection: 8 weeks - ImplementationMazzy Technologies Corp.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
20 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
21 out of 60
SYSTEX Data Security and Compliance Solution精诚(中国)企业管理有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
22 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
23 out of 60
NEST ArenaNoibit
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Two-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
24 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
25 out of 60
Onesec’s Secure Access to Microsoft 365 with ZscalerSecure Nextgen Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
26 out of 60
Avanade Microsoft Security Service Edge Quick StartAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft’s new Security Service Edge (SSE) capability empowers organizations on their Zero Trust journey though unique in the market integration with Microsoft Entra.
27 out of 60
Pently PentestPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Simulated cyber attacks to uncover real vulnerabilities in your entire IT landscape.
28 out of 60
Microsoft Priva Assessment: 2 WkLighthouse Global
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Empowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
29 out of 60
MDR for Microsoft DefenderADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
30 out of 60
AI Governance Workshop: 4-Hour WorkshopVitalyst
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Be introduced to Microsoft's AI Services, Azure Open AI and Copilot, and better understand the governance principles and practices tailored to them, like transparency, fairness, privacy, and security.
31 out of 60
Pently SOCaaSPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Full Managed Security Service with a personal touch and individually build for each customer
32 out of 60
Data Protection Impact Assessment: 8 WkLighthouse Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Empowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
33 out of 60
Avanade Modern Sec OpsAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
34 out of 60
Pently Microsoft 365 - AssessmentPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Structured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
35 out of 60
Microsoft 365 Copilot Risk Assessment: 1-Week Strategic WorkshopAtmosera
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Uncover data risks and prepare for secure Copilot adoption with a Microsoft 365 risk assessment.
36 out of 60
Implementation of Microsoft Security CopilotAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
37 out of 60
Trip to Microsoft 365 Copilot ImplementationSuri Services SC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Ofrecemos un servicio de capacitación y preparación estratégica para la adopción de Microsoft 365 Copilot, enfocado en acelerar la productividad y transformar los procesos clave
38 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
39 out of 60
Microsoft 365 Copilot - Technical ReadinessCrayon
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Jumpstart your journey with the Crayon Microsoft 365 Copilot Technical Readiness - your cornerstone for secure and efficient AI adoption within your organization.
40 out of 60
Threat Protection EngagementadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
41 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdge
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
42 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalyst
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
43 out of 60
Data Security EngagementadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
44 out of 60
Microsoft 365 Copilot AssessmentSuri Services SC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Asegura tu ruta de adopción con Suri Services y Microsoft 365 Copilot
45 out of 60
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
46 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Bulletproof Managed Security Elite is a Microsoft-native MXDR service that transforms Microsoft Sentinel and Defender XDR into a 24×7 cyber defense fabric.
47 out of 60
Microsoft 365 Copilot - AdvisoryCrayon
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Jumpstart your journey with the Crayon Microsoft 365 Copilot Readiness Workshop – your cornerstone for secure and efficient AI adoption within your organization.
48 out of 60
Protect 365 App - 1 hour implementationCloud Life
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
49 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
The OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
50 out of 60
Defender for Office365Suri Services SC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Suri Services y Office 365: La alianza impenetrable en ciberseguridad.
51 out of 60
Microsoft 365 Copilot Onboarding WorkshopSMART business LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Join our interactive workshop to learn about the capabilities of Microsoft Copilot for Microsoft 365!
52 out of 60
Data Security: 2-Weeks WorkshopConterra
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Identify data security risks in your organizational data​
53 out of 60
Nanyang Bandang security operation services上海南洋万邦软件技术有限公司
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Security operation services with Microsoft Denfender component and Sentinel
54 out of 60
Avanade Security Business Value 4-Wk AssessmentAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
55 out of 60
Identity Health CheckMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Mobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
56 out of 60
TGS Windows 11TEKsystems Global Services LLC.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
TEKsystems partners with you to navigate the transition to Windows 11
57 out of 60
Implementation of Copilot readiness assessmentDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
58 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protectionm365-sa-workplace-analytics product iconWorkplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
59 out of 60
Training & Support Solution for Protecting + Governing Sensitive Data Process AdoptionVitalyst
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
60 out of 60
  • Zurück
  • 1
  • 2
  • 3
  • 4
  • 5
  • Weiter
Informationen zum Marketplace
  • Warum Microsoft Marketplace
  • Blogs
  • Kundenreferenzen
Für Kunden
  • Geschäftszeiten
  • Leitfaden „Erste Schritte“
  • Technische Dokumentation
  • Private Angebote
  • Microsoft Azure Consumption Commitment
  • Abrechnung und Fakturierung
Für Partner
  • Partner werden
  • Lassen Sie sich in unsere Partnerliste aufnehmen
  • Marketingsupport erhalten
  • Technische Dokumentation
  • Schritt-für-Schritt-Anleitung zum Erstellen, Veröffentlichen und Verkaufen
  • Co-Selling-Berechtigung erhalten
  • Marketplace-Community für Partner
  • Kanalbasierter Marketplace-Vertrieb
  • Private mehrteilige Angebote für Kanalpartner
Unternehmen
  • Microsoft Cloud
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Kleine Unternehmen
Im Unternehmen
  • Jobs & Karriere
  • Das Unternehmen Microsoft
  • Unternehmensnachrichten
  • Datenschutz bei Microsoft
  • Investoren
  • Nachhaltigkeit
Deutsch (Deutschland) Abwahlsymbol „Ihre Datenschutzoptionen“ Ihre Datenschutzoptionen Verbraucherdatenschutz für Gesundheitsdaten
  • Siteübersicht
  • Contact Us
  • Datenschutz und Cookies
  • Nutzungsbestimmungen
  • Marken
  • Informationen zu unseren Anzeigen
  • Cookies verwalten
  • © Microsoft 2025