Feedback geben
Hilfe und Support
Gespeicherte Elemente
Private Pläne
Nur einen Moment, wir melden Sie an...
FilterAlle löschen

  • Ihr Standort
  • Produkte (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Einführungs- und Änderungsverwaltung
      • Telefonsystem über Microsoft Teams
      • Cloud Security
      • Beratungsdienste zur Compliance
      • Gerätebereitstellung und -verwaltung
      • Mitarbeiter in Service und Produktion
      • Identity & Access Management
      • Information Protection & Governance
      • Insiderrisiko
      • Wissen und Erkenntnisse
      • Besprechungsräume für Microsoft Teams
      • Besprechungen für Microsoft Teams
      • Microsoft 365 Live Events
      • Verwaltung mobiler Geräte
      • Power Platform for Teams
      • Benutzerdefinierte Teams-Lösungen
      • Einsatz von Teamwork
      • Bedrohungsschutz
      • Workplace Analytics
    • Power Platform
  • Branchen
  • Diensttyp
  • Preismodell

Beratungsdienste Ergebnisse

Es werden Ergebnisse in beratungsdienste angezeigt.
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro Ltd
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Wipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
1 out of 60
Insider Risk Management: 8-Wk implementationPwC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
2 out of 60
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
3 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
4 out of 60
OAAA Advanced Adversary Assesment-1 month assesmentSecure Nextgen Systems
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Learn how to increase your resiliency against real world and advanced threats together with Microsoft 365 Security and Microsoft Sentinel.
5 out of 60
Microsoft Purview Protect & Govern Sensitive Data - 3 Day WorkshopEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Discover risks from dark data and learn how to address them with Microsoft Purview and Epiq.
6 out of 60
Microsoft 365 Legal & Compliance Assessment: 4 WkLighthouse Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
A customizable, strategic assessment designed to optimize efficiency of Microsoft Purview with a focus on archiving, records management, eDiscovery, Data Security, and information governance.
7 out of 60
Microsoft Purview Implementation AdvisoryEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Epiq Microsoft Purview information governance consulting and advisory services ensure secure, compliant and efficient information governance strategies and deployment for Microsoft Purview compliance.
8 out of 60
Microsoft Purview eDiscovery POC (5 Day)Epiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
5-Day eDiscovery POC demonstrating standard & premium capabilities of Microsoft Purview components
9 out of 60
Microsoft 365 Information Protection and Governance: 12 week ImplementationINFOTECHTION
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Develop a strategy and blueprint for protecting and governing your information in Microsoft365 and beyond. Implement and manage through Infotechtion managed services.
10 out of 60
Securing Identities Workshop: 4-Wk WorkshopProArch Technologies, Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
We will help you find identity risks happening now in your environment, gain insights on your application landscape, and improve your identity security posture
11 out of 60
Lighthouse Microsoft Purview Deployment: 10-Wk IntegrationLighthouse Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Implement and integrate Microsoft Purview into your organization with confidence knowing you have mitigated risk factors and maximized your investment.
12 out of 60
User Shield: 4-Wk ImplementationLong View Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
13 out of 60
Microsoft Purview eDiscovery POC (7 Day)Epiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
7-Day eDiscovery POC demonstrating in depth standard & premium capabilities of Microsoft Purview components
14 out of 60
Build a Compliance Strategy - 4 weeks WorkshopINFOTECHTION
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
A data driven workshop to identify your information compliance maturity regards to privacy, regulatory and data exfiltration risks; and help you build a strategy for improvements.
15 out of 60
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
16 out of 60
Microsoft Compliance Workshop: 3-Day WorkshopWorld Wide Technology
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Riskm365-sa-knowledge-and-insights product iconKnowledge & Insights
WWT offers a Microsoft Data Compliance and Risk workshop to help organizations with compliance risks and data protection.
17 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 WeeksNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Understand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
18 out of 60
Pentest-4wks AssessmentadaQuest
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Gain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
19 out of 60
Lighthouse Proof of Concept: 10 WkLighthouse Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Partner with Lighthouse to test Microsoft Purview technology and understand if it's meets requirements for your organization’s data security workflows.
20 out of 60
CloudCompass Managed Service: 12-mo SubscriptionLighthouse Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
A Lighthouse subscription service for Microsoft 365 designed to keep legal and compliance teams ahead of change in the dynamic cloud computing landscape.
21 out of 60
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
This hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
22 out of 60
Lighthouse Protect & Govern Sensitive Data Workshop: 4 WkLighthouse Global
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
A hands-on engagement delivered in a workshop format with everything you need to better discover, protect, and govern your corporate data.
23 out of 60
Lighthouse Microsoft SharePoint Premium Proof of Concept: 10 WkLighthouse Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
We deliver technology and workflow Proof of Concepts focused on use of Microsoft SharePoint Premium for information protection, information governance, legal, compliance, and eDiscovery use cases.
24 out of 60
Lighthouse Microsoft SharePoint Premium Security and Compliance Assessment: 4 WkLighthouse Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Interactive assessment to identify opportunities to increase efficiency using Microsoft SharePoint Premium for data security and data governance use cases.
25 out of 60
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLC
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
26 out of 60
Purview Compliance Manager Adoption WorkshopCDI LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The CDI professional services team intends to show you how to increase your Organizational Governance using a built-in service that you may not be fully aware of.
27 out of 60
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
28 out of 60
Microsoft Purview Data Security Advanced Quick Start 16-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The Microsoft Purview Data Security Quick Start is an accurate and reliable program that allows you to immediately leverage your Microsoft investments. You’ll receive high velocity, measurable outcome
29 out of 60
Data Protection and Compliance Quick StartSoftchoice
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
The Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
30 out of 60
Microsoft Intune ServiceSii Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-insider-risk product iconInsider Risk
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
31 out of 60
Insider Risk Management Quick Start 12-wk ImplementationEdgile, Inc.
+1
Applicable to:
m365-sa-insider-risk product iconInsider Risk
Achieve a Microsoft 365 Insider Risk Management (IRM) production pilot, which is expected to provide solutions, detection, and investigation for insider threat scenarios.
32 out of 60
Privacy Management Workshop | Microsoft PrivaEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Epiq's Privacy Management Workshop enables customers to safeguard personal information and manage privacy risk using Microsoft 365 Priva Priva Privacy Risk Management
33 out of 60
True Managed Security Service- 3 day Workshoptrue org cloud
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
You have a vision. We can help you secure it...
34 out of 60
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical Start
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Rapidly identify, contain, and remediate a breach.
35 out of 60
Purview Microsoft Information Protection (MIP) Getting Started WorkshopPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
This workshop focuses on Microsoft Information Protection (MIP) and provides attendees with the knowledge and tools necessary to understand and protect sensitive data within their organization. Partic
36 out of 60
Microsoft 365 Security WorkshopOlive + Goose
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Improve your organizations security posture by learning about the key components of Microsoft 365 and how to use them to protect your organization.
37 out of 60
MXDR Shield: 4-Wk ImplementationLong View Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
38 out of 60
Quorum Cyber Data Security Assessment using Microsoft PurviewQuorum Cyber
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Achieve a clear understanding of the storage, access and protection of one of your organisation’s most valuable assets.
39 out of 60
Microsoft Defender for Cloud Apps JumpstartSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft Defender for Cloud Apps address security gaps in an organization's environment.
40 out of 60
Microsoft Data Security and Compliance ServicesKiZAN Technologies
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Comprehensive technical services to manage and improve your organization’s security compliance.
41 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
The OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
42 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
43 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week ProgramWindows Management Experts, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
44 out of 60
Onesec’s Secure Access to Microsoft 365 with ZscalerSecure Nextgen Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Enhanced security and performance for Microsoft 365 with recommended network principles from Microsoft 365 Networking Partner Program and supported by Zscaler's security cloud
45 out of 60
Lighthouse Microsoft 365 Purview Art of the Possible: 1-Wk WorkshopLighthouse Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
A custom hands-on workshop to understand the full capabilities and value of the Microsoft Purview suite and how to maximize its benefits in your organization’s compliance framework.
46 out of 60
Legacy Data Migration and Optimization: 52-Wk MigrationLighthouse Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
This engagement delivers defensible migration from legacy on-prem archives to Microsoft 365, mapping to the Microsoft Purview suite of tools.
47 out of 60
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski Security
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Kudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
48 out of 60
Office 365 Tenant to Tenant Migration: 1-week AssessmentC1st Technologies LLC
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
We understand the complexities involved in such scenarios, and our experienced team is dedicated to guiding and supporting businesses throughout the entire migration process.
49 out of 60
Abacode Data Governance and Protection of Sensitive Data Implementation Powered by Microsoft 365Abacode Inc.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Assess data gaps and implement remediation actions to prevent sensitive data leaks leveraging Microsoft 365 stack.
50 out of 60
Abacode Data Governance and Protection of Sensitive Data (DLP) in Government Powered by Microsoft 365Abacode Inc.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Assess data gaps and implement remediation actions to prevent sensitive data leaks of Government entities leveraging Microsoft 365 Stack.
51 out of 60
DLP Implementation and Tuning ServicesINFOTECHTION
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Reduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
52 out of 60
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTION
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Learn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
53 out of 60
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
54 out of 60
Microsoft Purview Information Protection Deployment: 4 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Secure data wherever it is and support the protection of sensitive data in clouds, apps, and devices.
55 out of 60
Epiq Data SecurityEpiq Global
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Comprehensive safeguarding of sensitive data, enabling organizations to proactively identify and mitigate risks while protecting data and maintaining compliance with regulations.
56 out of 60
Epiq Compliance Cloud Migration with Microsoft PurviewEpiq Global
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Epiq provides a seamless and compliant transition of valuable archive data off legacy technology, while mitigating risks and maintaining regulatory compliance harnessing Microsoft Purview.
57 out of 60
Epiq eDiscovery Solution with Microsoft PurviewEpiq Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Streamline the entire discovery process within your environment, enabling efficient data retrieval and analysis while ensuring compliance with legal requirements with Microsoft Purview.
58 out of 60
Cybersecurity AssessmentCDI LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
59 out of 60
SecureBlu MDR Service for Microsoft 365 DefenderNew Era Technology
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
60 out of 60
  • 1
  • 2
  • 3
  • Weiter
Informationen zum Marketplace
  • Warum Microsoft Marketplace
  • Blogs
  • Kundenreferenzen
Für Kunden
  • Geschäftszeiten
  • Leitfaden „Erste Schritte“
  • Technische Dokumentation
  • Private Angebote
  • Microsoft Azure Consumption Commitment
  • Abrechnung und Fakturierung
Für Partner
  • Partner werden
  • Lassen Sie sich in unsere Partnerliste aufnehmen
  • Marketingsupport erhalten
  • Technische Dokumentation
  • Schritt-für-Schritt-Anleitung zum Erstellen, Veröffentlichen und Verkaufen
  • Co-Selling-Berechtigung erhalten
  • Marketplace-Community für Partner
  • Kanalbasierter Marketplace-Vertrieb
  • Private mehrteilige Angebote für Kanalpartner
Unternehmen
  • Microsoft KI
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Kleine Unternehmen
Im Unternehmen
  • Jobs & Karriere
  • Das Unternehmen Microsoft
  • Unternehmensnachrichten
  • Datenschutz bei Microsoft
  • Investoren
  • Nachhaltigkeit
  • LkSG Beschwerdeverfahren
Deutsch (Deutschland) Abwahlsymbol „Ihre Datenschutzoptionen“ Ihre Datenschutzoptionen Verbraucherdatenschutz für Gesundheitsdaten
  • Siteübersicht
  • Contact Us
  • Datenschutz und Cookies
  • Nutzungsbestimmungen
  • Marken
  • Informationen zu unseren Anzeigen
  • Cookies verwalten
  • © Microsoft 2026