प्रतिक्रिया दें
मदद और सहायता
सहेजे गए आइटम्स
निजी योजनाएँ
बस एक क्षण, आप लॉगिन हो रहे हैं...
फ़िल्टरसभी साफ़ करें

  • आपका स्थान
  • उत्पाद (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • अपनाना और प्रबंधन परिवर्तन
      • Microsoft Teams के लिए कॉलिंग
      • क्लाउड सुरक्षा
      • अनुपालन सलाहकार सेवाएँ
      • डिवाइस परिनियोजन और प्रबंधन
      • फ़्रंटलाइन कार्यकर्ता
      • पहचान और पहुँच प्रबंधन
      • जानकारी सुरक्षा और प्रशासन
      • इनसाइडर जोखिम
      • ज्ञान और इनसाइट्स
      • Microsoft Teams के लिए मीटिंग रूम
      • Microsoft Teams के लिए मीटिंग
      • Microsoft 365 Live Events
      • मोबाइल डिवाइस प्रबंधन
      • Power Platform for Teams
      • Teams कस्टम समाधान
      • टीमवर्क परिनियोजन
      • थ्रेट से सुरक्षा
      • कार्यस्थल विश्लेषण
    • Power Platform
  • उद्योग
  • सेवा प्रकार
  • मूल्य मॉडल

परामर्श सेवाएँ परिणाम

परामर्श सेवाएँ में परिणाम दिखाना/दिखा रहे हैं.
देखें उद्योग क्लाउड्स में संबंधित परिणाम.
Endpoint as a Service | Assure 365CyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Fully Managed Endpoint Security with 24x7 monitoring, compliance and Zero Trust enforcement—powered by Microsoft Intune.
1 out of 60
NEST ArenaNoibit
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Two-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
2 out of 60
Microsoft 365 Copilot Risk Assessment: 1-Week Strategic WorkshopAtmosera
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Uncover data risks and prepare for secure Copilot adoption with a Microsoft 365 risk assessment.
3 out of 60
Microsoft Priva Assessment: 2 WkLighthouse Global
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Empowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
4 out of 60
Data Security as a Service | Assure 365CyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Fully Managed Data Security, governance and compliance with 24x7 monitoring—Powered by Microsoft Purview.
5 out of 60
Microsoft 365 Security Review: AssessmentCyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Identify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
6 out of 60
Cloud Security Operations CenterReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Verified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
7 out of 60
Cloud Endpoints AssessmentInviso Corporation
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Maximize your Endpoints! Find out how a Cloud PC could potentially save you money!
8 out of 60
Unified Access & Protection with Microsoft Entra Global Secure AccessMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Step confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
9 out of 60
Data Security: 2-Weeks WorkshopConterra
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Identify data security risks in your organizational data​
10 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight Holdings
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Strengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
11 out of 60
Identity as a Service | Assure 365CyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Fully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
12 out of 60
XDR as a Service | Assure 365CyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Fully Managed XDR with 24x7 detection, response and threat protection—Powered by Microsoft Defender XDR.
13 out of 60
Avanade Security Business Value 4-Wk AssessmentAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Understand, prioritize & analyze the overall risk posture for your IT environment. Proactively protect your organization from cyber and insider threats, ransomware, and vulnerabilities.
14 out of 60
Citrix Endpoint Management to Microsoft Intune Migration PlanMobile Mentor
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Mobile Mentor’s Citrix Endpoint Management to Microsoft Intune services include a series of workshops designed to create a tailored roadmap, timeline, and best practices for a successful migration.
15 out of 60
TGS Windows 11TEKsystems Global Services LLC.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
TEKsystems partners with you to navigate the transition to Windows 11
16 out of 60
Microsoft Purview Insider Risk Management (IRM): 2-Week ImplementationSpyglass MTG, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Our engagement is designed to accelerate the ability to integrate and consume IRM across your enterprise while better securing data and identities in the environment.
17 out of 60
Hybrid Infrastructure Overview WorkshopAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Rapid hybrid‑cloud design workshop — learn best practices, pitfalls, and licensing tips for Microsoft on‑prem + Azure/Microsoft 365.
18 out of 60
Microsoft 365 Copilot AssessmentSuri Services SC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Asegura tu ruta de adopción con Suri Services y Microsoft 365 Copilot
19 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
20 out of 60
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Provide cross-domain threat protection and simplify breach prevention
21 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
22 out of 60
Health-Check for Microsoft 365 Tenant: AssessmentnovaCapta GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
Microsoft 365 nach höchsten Sicherheitsstandards und Best Practices absichern, schützen und optimieren
23 out of 60
Copilot for Microsoft 365: Data Governance WorkshopReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Secure and Enhance Your Microsoft 365 Experience with WM Reply's One-Day Copilot Data Governance Workshop
24 out of 60
Trip to Microsoft 365 Copilot ImplementationSuri Services SC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Ofrecemos un servicio de capacitación y preparación estratégica para la adopción de Microsoft 365 Copilot, enfocado en acelerar la productividad y transformar los procesos clave
25 out of 60
SmartStart for IntuneMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
26 out of 60
Security Operations Center with Microsoft SentinelAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Monitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
27 out of 60
Copilot for Microsoft 365: Taller De Seguridad Y Datos De 1 DíaAwara IT
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Desbloquea el máximo potencial de Copilot for Microsoft 365 mientras refuerzas la seguridad y protección de tus datos con un taller intensivo de un día dirigido por los expertos de Awara IT.
28 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support. ​
29 out of 60
Microsoft 365 Copilot for Executives WorkshopSMART business LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Join our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
30 out of 60
Microsoft 365 Copilot Onboarding WorkshopSMART business LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Join our interactive workshop to learn about the capabilities of Microsoft Copilot for Microsoft 365!
31 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance. ​
32 out of 60
Threat Protection WorkshopMobile Mentor
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
During this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
33 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protectionm365-sa-workplace-analytics product iconWorkplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
34 out of 60
Security and Operations with Expert Microsoft 365 SupportAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-workplace-analytics product iconWorkplace Analytics
Maximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
35 out of 60
Identity Health CheckMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Mobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
36 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
37 out of 60
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Evaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
38 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
39 out of 60
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
40 out of 60
Entra ID Governance and Guest AccessMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Empower your business with Mobile Mentor’s Microsoft Entra ID Governance and Guest Access service, built on Microsoft’s cutting-edge Entra Identity Governance platform.
41 out of 60
Threatscape CSI EngagementsTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
42 out of 60
Implementation of Copilot readiness assessmentDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
43 out of 60
NIST800-171-Microsoft 365-Accelerator-Guided-DeploymentKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Provides expert guidance to help organizations achieve NIST 800-171 compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
44 out of 60
Virtual CISO (vCISO) Managed ServicesNetrix Global
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Our virtual CISO offering provides organizations a senior level security executive for ongoing security program management and governance.
45 out of 60
Avanade Cyber Portfolio EvaluationAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
The Cyber Portfolio Evaluation maps your tools with Microsoft solutions, cutting costs and enhancing efficiency.
46 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
47 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoice
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
48 out of 60
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Office 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
49 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Inspect events in your network to locate threat indicators and entities
50 out of 60
Microsoft 365 Security Health Check Assessment 3-WkBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
51 out of 60
End-to-end Threat Protection Workshop and PilotExelegent
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
52 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
53 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
54 out of 60
Rapid Remediation of Microsoft Secure ScoreCyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost your Microsoft Secure Score, reduce risk and increase cyber resilience with expert-led rapid remediation.
55 out of 60
Purview Information Protection: setup and adoptionDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
56 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
57 out of 60
Defender for Office365Suri Services SC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Suri Services y Office 365: La alianza impenetrable en ciberseguridad.
58 out of 60
MDS - Threat Protection EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
59 out of 60
Implementation of Microsoft Security CopilotAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
60 out of 60
  • पिछला
  • 1
  • 2
  • 3
  • 4
  • 5
  • अगला
मार्केटप्लेस के बारे में
  • Why Microsoft Marketplace
  • ब्लॉग्स
  • ग्राहक की कहानियाँ
ग्राहकों के लिए
  • Office के घंटे
  • शुरू करने के लिए मार्गदर्शिका
  • तकनीकी दस्तावेज़ीकरण
  • निजी ऑफ़र
  • Microsoft Azure कंज़म्प्शन कमिटमेंट
  • बिलिंग और इनवॉइसिंग
भागीदारों के लिए
  • भागीदार बनें
  • सूचीबद्ध हो जाएँ
  • विपणन समर्थन प्राप्त करें
  • तकनीकी दस्तावेज़ीकरण
  • बनाने, प्रकाशित करने और बेचने के लिए चरण-दर-चरण मार्गदर्शन
  • सह-विक्रय के योग्य बनें
  • भागीदारों के लिए मार्केटप्लेस समुदाय
  • चैनल-आधारित मार्केटप्लेस बिक्री
  • चैनल भागीदारों के लिए मल्टीपार्टी का निजी ऑफ़र
व्यवसाय
  • Microsoft AI
  • Microsoft सुरक्षा
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft विज्ञापन
  • Microsoft 365 Copilot
  • Microsoft Teams
कंपनी
  • करियर
  • गोपनीयता
  • स्थिरता
हिन्दी (भारत) आपके गोपनीयता विकल्प का Opt-Out आइकन आपके गोपनीयता विकल्प उपभोक्ता की स्वास्थ्य गोपनीयता
  • साइटमैप
  • हमसे संपर्क करें
  • गोपनीयता & कुकीज़
  • उपयोग की शर्तें
  • ट्रेडमार्क
  • हमारे विज्ञापनों के बारे में
  • कुकीज़ प्रबंधित करें
  • © Microsoft 2026