Pateikti atsiliepimą
Žinynas ir palaikymas
Įrašyti elementai
Privatūs planai
Luktelėkite, prijungiame jus...
FiltraiValyti viską

  • Jūsų vieta
  • Produktai (1)
    • Azure
    • „Dynamics 365“
    • Microsoft 365 (1)
      • Priėmimas ir pakeitimų valdymas
      • Raginama „Microsoft Teams“
      • Debesies sauga
      • Konsultavimo atitikties klausimais paslaugos
      • Įrenginių diegimas ir valdymas
      • Tiesioginiai darbuotojai
      • Tapatybės ir prieigos valdymas
      • Informacijos apsauga ir valdymas
      • Vidinė rizika
      • Žinios ir įžvalgos
      • „Microsoft Teams“ susitikimų salės
      • „Microsoft Teams“ susitikimai
      • Microsoft 365 Live Events
      • Mobiliųjų įrenginių valdymas
      • Power Platform for Teams
      • Pasirinktiniai „Teams“ sprendimai
      • Komandinio darbo diegimas
      • Apsauga nuo grėsmių
      • Workplace Analytics
    • Power Platform
  • Pramonės šakos
  • Paslaugos tipas
  • Įkainių modelis

Rezultatų: Professional Services

Rodomi rezultatai professional services.
Defender PilotLevacloud LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
1 out of 57
Microsoft 365 Security & Protection: 2-Week ImplementationIT Weapons
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
IT Weapons can protect your Microsoft 365 tenant against cyber threats by reviewing the tenant and making key changes within it. We also include an ongoing managed service to keep your tenant secure.
2 out of 57
Microsoft 365 Defender Rapid Deployment - CanadaCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
3 out of 57
Sentinel Readiness WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
4 out of 57
Intune for Endpoint Management - Discovery ConsultationCBTS Technology Solutions LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Learn from CBTS how to utilize Microsoft Intune for Endpoint Management & Security in this free discovery consultation.
5 out of 57
Microsoft Defender XDR AcceleratorThe Tech Mavericks
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
We empower your security team to detect and respond to cyberthreats with expanded visibility, incident-level investigation tools, and built-in automation
6 out of 57
Intune Design and Deployment ServicesTrusted Tech Team
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Modernize deployment, configuration and management of your Windows devices while improving your security posture.
7 out of 57
Microsoft Managed Extended Detection & Response (MXDR)ISA Cybersecurity Inc.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Our Managed XDR service provides your environment with the ultimate protection against cyber attacks.
8 out of 57
Threat Protection EngagementONEFACTORY
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
The Threat Protection Engagement helps customers assess their security landscape and address their most pressing security goals and challenges and provides an immersive experience that brings the Micr
9 out of 57
Compugen Threat Protection WorkshopCompugen
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Empower Your Security Journey: Assess, Mitigate, and Accelerate with Microsoft’s Comprehensive Threat Protection
10 out of 57
Security Foundations Data: Assessment and ImplementationProServeIT
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Data security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
11 out of 57
Threat Protection EngagementISA Cybersecurity Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you
12 out of 57
Security Foundations Email: Assessment and ImplementationProServeIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
13 out of 57
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
14 out of 57
Trustwave Accelerator for Microsoft PurviewTrustwave Holdings, Inc.
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Purview to unlock full value for your organization
15 out of 57
Threat Landscape AssessmentProServeIT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get critical cybersecurity insights with a global visualization of login attempts, dark web scan, & expert recommendations. We help secure your Microsoft 365 environment to protect your business.
16 out of 57
Global Secure Access DeploymentSoftlanding Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Global Secure Access (GSA) provides a comprehensive security framework that protects against modern threats while ensuring seamless and secure connectivity.
17 out of 57
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITED
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
18 out of 57
Security Best Practices AssessmentTechNet UC LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Our assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
19 out of 57
Compugen Security Posture AssessmentCompugen
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The assessment is designed to evaluate and strengthen your organization's security posture by leveraging the robust tools available in Microsoft Defender.
20 out of 57
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
SkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
21 out of 57
SkyTerra's Cloud Security AssessmentSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Strengthen Microsoft cloud security with a structured assessment, an actionable roadmap, and enablement your team can run with
22 out of 57
Unified Identity & Secure Edge Modernization with Entra SuiteBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Modernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
23 out of 57
Microsoft Exchange Best Practices RemediationTechNet UC LLC
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure and optimize your Microsoft Exchange Online environment with expert remediation, ensuring compliance, reliability, and protection against email threats.
24 out of 57
Zero Trust Deployment and Optimization ServiceSoftchoice
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Deploy zero trust with confidence, optimize it to deliver lasting outcomes.
25 out of 57
Microsoft 365 Defender Deployment from BellBell Canada
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Keep your organization protected against cyber threats with a comprehensive security audit and risk assessment by Bell, backed by the threat detection capabilities of Microsoft Defender.
26 out of 57
Microsoft 365 Intune Deployment From BellBell Canada
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Enable Microsoft’s best-in-class compliance and identity management solution with start-to-finish support from Bell.
27 out of 57
Privileged Identity Management Configuration - AppSourceTechNet UC LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Configure Microsoft Entra PIM to enforce least privilege, enable just-in-time access, and reduce risk with real-time auditing, approval workflows, and Conditional Access integration.
28 out of 57
Microsoft 365 Best Practices RemediationTechNet UC LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure, optimize, and align your Microsoft 365 environment with Microsoft’s latest standards—improving collaboration, compliance, and protection across Exchange, Teams, SharePoint, and OneDrive.
29 out of 57
Microsoft Purview QuickStart: ImplementationKraft Kennedy
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Kraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
30 out of 57
Assessment and Remediation on Microsoft 365 by CompugenCompugen
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The Security Assessment and Remediation evaluates your Microsoft 365 tenant's security posture, aligned with the best practices outlined by the Center for Information Security (CIS) benchmark.
31 out of 57
Microsoft 365 Security Best PracticesTechNet UC LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure your Microsoft 365 environment by aligning with Microsoft’s latest security standards—enhancing threat protection, data governance, and compliance across Exchange, Teams, and SharePoint.
32 out of 57
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
33 out of 57
Compugen's Threat Protection EngagementCompugen
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Discover and gain visibility into threats to your Microsoft 365 cloud and on-premises environments. Get a better understanding, prioritize, and mitigate potential cyberattack vectors.
34 out of 57
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
35 out of 57
CBTS Microsoft 365 Managed ServiceCBTS Technology Solutions LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Partner with CBTS for ongoing management and support of Microsoft 365
36 out of 57
Cybersecurity Incident Response Retainer with Microsoft DefenderCBTS Technology Solutions LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Partner with CBTS to ensure assistance when you need it most during a significant security event.
37 out of 57
S4B_XDR_Recuperacion_Automatica_RecursosS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
38 out of 57
S4B Email Attack Simulation TrainingS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Attack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
39 out of 57
Threat Investigation and Analysis Service with Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
40 out of 57
Server Endpoint Protection Implementation Service using Microsoft Defender for EndpointS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Provides comprehensive protection for physical and virtual servers with Microsoft Defender for Server, combined with continuous security monitoring to detect, investigate, and respond to threats.
41 out of 57
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
42 out of 57
Advanced Hybrid Identity Security with Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Hybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
43 out of 57
Implementation of security for Endpoint with Microsoft EDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Advanced defense for on-premises devices with Microsoft Defender for Endpoint, automated detection and response.
44 out of 57
Entrenamiento de Phishing con Microsoft Office 365S4B
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Ofrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
45 out of 57
On-premise enviroment Identity Protection service with Microsoft IdentityS4B
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
On-Premises Identity Protection service detects and mitigates threats in Active Directory using Microsoft Defender for Identity.
46 out of 57
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Seguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
47 out of 57
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Investiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
48 out of 57
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
49 out of 57
Servicio de Implementación de Protección de Identidades Locales con Microsoft Defender for IdentityS4B
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Refuerza Active Directory local con Microsoft Defender for Identity, detectando ataques, credenciales comprometidas y movimientos laterales en controladores de dominio.
50 out of 57
Defend Against Threats with SIEM Plus XDRNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
51 out of 57
Threat Protection - 1 Day BriefingAvaleris
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Avaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Threat Protection policies, procedures and technology against best practices.
52 out of 57
microsoft365_security_identity_protection_1 Day_Workshop_CanadaCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Identity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to manage your access quickly and accurately
53 out of 57
Microsoft 365 Security Device Protection 1 Day Workshop - CanadaCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
As more and more users become mobile and are using a wider variety of devices, applications and documents need to keep up.
54 out of 57
Microsoft365_security_information_protection_1Day_Workshop_CanadaCDW
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Information is one of your most valuable assets and can easily be shared, even outside the organization.
55 out of 57
Microsoft 365 Security Identity Protection 1 Day Workshop- CanadaCDW
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Identity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to manage your access quickly and accurately.
56 out of 57
Microsoft 365 Security 1 Day Workshop- CanadaCDW
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Security is at the forefront of every organization’s concerns. A lack of security poses a real threat to your business.
57 out of 57
  • Atgal
  • 1
  • 2
  • 3
  • 4
  • 5
Apie parduotuvę
  • Kodėl verta naudoti „Microsoft“ parduotuvę
  • Tinklaraščiai
  • Klientų istorijos
Klientams
  • Darbo valandos
  • Darbo pradžios vadovas
  • Techninė dokumentacija
  • Privatūs pasiūlymai
  • „Microsoft Azure“ vartojimo įsipareigojimas
  • Atsiskaitymas ir SF išrašymas
Partneriams
  • Tapkite partneriu
  • Būkite įtraukti
  • Gaukite rinkodaros palaikymą
  • Techninė dokumentacija
  • Nuoseklūs nurodymai, kaip kurti, publikuoti ir parduoti
  • Atitikite bendro pardavimo reikalavimus
  • Parduotuvės bendruomenė partneriams
  • Kanalo valdomas parduotuvės pardavimas
  • Kelių dalių privatūs pasiūlymai kanalo partneriams
Verslas
  • „Microsoft“ dirbtinis intelektas
  • „Microsoft“ sauga
  • „Azure”
  • „Dynamics 365“
  • „Microsoft 365“
  • „Microsoft Advertising“
  • Microsoft 365 Copilot
  • „Microsoft Teams“
Įmonė
  • Karjera
  • Apie „Microsoft“
  • „Microsoft“ privatumas
  • Investuotojai
  • Tvarumas
Lietuvių (Lietuva) Jūsų privatumo pasirinkimų atsisakymo piktograma Jūsų privatumo pasirinkimai Vartotojų sveikatos privatumas
  • Svetainės struktūra
  • Susisiekite su mumis
  • Privatumas ir slapukai
  • Naudojimo sąlygos
  • Prekių ženklai
  • Apie mūsų skelbimus
  • Valdyti slapukus
  • © Microsoft 2026