Pateikti atsiliepimą
Žinynas ir palaikymas
Įrašyti elementai
Privatūs planai
Luktelėkite, prijungiame jus...
FiltraiValyti viską

  • Jūsų vieta
  • Produktai (1)
    • Azure
    • „Dynamics 365“
    • Microsoft 365 (1)
      • Priėmimas ir pakeitimų valdymas
      • Raginama „Microsoft Teams“
      • Debesies sauga
      • Konsultavimo atitikties klausimais paslaugos
      • Įrenginių diegimas ir valdymas
      • Tiesioginiai darbuotojai
      • Tapatybės ir prieigos valdymas
      • Informacijos apsauga ir valdymas
      • Vidinė rizika
      • Žinios ir įžvalgos
      • „Microsoft Teams“ susitikimų salės
      • „Microsoft Teams“ susitikimai
      • Microsoft 365 Live Events
      • Mobiliųjų įrenginių valdymas
      • Power Platform for Teams
      • Pasirinktiniai „Teams“ sprendimai
      • Komandinio darbo diegimas
      • Apsauga nuo grėsmių
      • Workplace Analytics
    • Power Platform
  • Pramonės šakos (1)
    • Gynyba ir žvalgyba
    • Paskirstymas
    • Švietimas
    • Energija ir ištekliai
    • Finansinės paslaugos
    • Valstybinės institucijos
      • Valstybinės operacijos ir infrastruktūra
      • Viešieji finansai
      • Visuomenės sveikatos ir socialinės paslaugos
      • Viešasis saugumas ir teisingumas
    • Sveikatos priežiūra
    • Apgyvendinimo bei maitinimo paslaugos ir kelionės
    • Gamyba ir mobilumas
    • Ne pelno siekianti organizacija
    • Profesionalios paslaugos
    • Mažmeninė prekyba ir bendrojo vartojimo prekės
    • Tvarumas
    • Telekomunikacijos ir medija
  • Paslaugos tipas
  • Įkainių modelis

Rezultatų: Professional Services

Rodomi rezultatai professional services.
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology Holding
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Our goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
1 out of 12
Data Security EngagementSignal Alliance Technology Holding
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
As your company data expands and generative AI is being deployed rapidly, having an integrated approach that can help quickly identify, triage, and act on data security risks is super important.
2 out of 12
Active Directory Security on DemandComtrade System Integration
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
3 out of 12
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTION
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Learn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
4 out of 12
Microsoft Purview Information Protection Deployment: 4 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Secure data wherever it is and support the protection of sensitive data in clouds, apps, and devices.
5 out of 12
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
6 out of 12
Microsoft 365 Defender Attack Simulation: 4 Weeks DeploymentSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 attack simulation training works to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack.
7 out of 12
Insider Risk Management (Purview) Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-knowledge-and-insights product iconKnowledge & Insights
Identify, investigate, and take swift action on internal risks intelligently.
8 out of 12
Microsoft Entra Deployment: 3 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Protect all identities and secure access to any resource with a family of multi-cloud identity and network access solutions.
9 out of 12
Mitigate Compliance & Privacy Risk Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Risk
Designed to help organizations identify and reduce compliance and privacy risks associated with the use of the cloud.
10 out of 12
Identity Governance Lifecycle: 4 Weeks of AssessmentSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
The objective of the assessment is to identify areas for improvement and potential risks in the identity environment, based on the maturity level of the organization's identity governance model.
11 out of 12
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
12 out of 12
Apie parduotuvę
  • Kodėl verta naudoti „Microsoft“ parduotuvę
  • Tinklaraščiai
  • Klientų istorijos
Klientams
  • Darbo valandos
  • Darbo pradžios vadovas
  • Techninė dokumentacija
  • Privatūs pasiūlymai
  • „Microsoft Azure“ vartojimo įsipareigojimas
  • Atsiskaitymas ir SF išrašymas
Partneriams
  • Tapkite partneriu
  • Būkite įtraukti
  • Gaukite rinkodaros palaikymą
  • Techninė dokumentacija
  • Nuoseklūs nurodymai, kaip kurti, publikuoti ir parduoti
  • Atitikite bendro pardavimo reikalavimus
  • Parduotuvės bendruomenė partneriams
  • Kanalo valdomas parduotuvės pardavimas
  • Kelių dalių privatūs pasiūlymai kanalo partneriams
Verslas
  • „Microsoft“ dirbtinis intelektas
  • „Microsoft“ sauga
  • „Azure”
  • „Dynamics 365“
  • „Microsoft 365“
  • „Microsoft Advertising“
  • Microsoft 365 Copilot
  • „Microsoft Teams“
Įmonė
  • Karjera
  • Apie „Microsoft“
  • „Microsoft“ privatumas
  • Investuotojai
  • Tvarumas
Lietuvių (Lietuva) Jūsų privatumo pasirinkimų atsisakymo piktograma Jūsų privatumo pasirinkimai Vartotojų sveikatos privatumas
  • Svetainės struktūra
  • Susisiekite su mumis
  • Privatumas ir slapukai
  • Naudojimo sąlygos
  • Prekių ženklai
  • Apie mūsų skelbimus
  • Valdyti slapukus
  • © Microsoft 2026