Feedback geven
Help en ondersteuning
Opgeslagen items
Privéplannen
Een ogenblik geduld, u wordt aangemeld...
FiltersAlles wissen

  • Uw locatie
  • Producten (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Acceptatie- en wijzigingsbeheer
      • Bellen voor Microsoft teams
      • Cloudbeveiliging
      • Adviesservices voor naleving
      • Apparaatimplementatie en -beheer
      • Eerstelijnswerkers
      • Identiteits- en toegangsbeheer
      • Gegevensbescherming en -governance
      • Insiderrisico
      • Kennis en inzichten
      • Vergaderruimten voor Microsoft Teams
      • Vergaderingen voor Microsoft Teams
      • Microsoft 365 Live Events
      • Beheer van mobiele apparaten
      • Power Platform for Teams
      • Aangepaste oplossingen voor Teams
      • Implementatie van teamwerk
      • Bedreigingsbeveiliging
      • Workplace Analytics
    • Power Platform
  • Branches
  • Servicetype
  • Prijsmodel

Adviesdiensten resultaten

resultaten worden weergegeven in adviesdiensten.
Weergave gerelateerde resultaten weergeven in brancheclouds.
ADFS to Entra ID Migration ServiceMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Mobile Mentor’s ADFS to Entra ID Migration Service offers a secure, cloud-first Single Sign-On experience that eliminates outdated infrastructure and unlocks the full potential of Microsoft Entra ID.
1 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
2 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
3 out of 60
Okta Migration to Azure AD: 3-Week AssessmentInvoke
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
The Okta Migration to Azure AD Assessment offering is designed to assess & plan your migration efforts to your existing investments in Azure AD.
4 out of 60
Enhance Identity Security with Microsoft Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Bulletproof’s six-week Microsoft Entra ID P2 implementation empowers your organization to significantly strengthen identity security by ensuring only authorized access to critical systems and data.
5 out of 60
IT Infrastructure OptimizationAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
IT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
6 out of 60
Microsoft 365 Copilot Readiness AssessmentPresidio
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-teamwork-deployment product iconTeamwork Deployment
Review data protection, preparation, and governance with a Microsoft Copilot readiness assessment from Presidio.
7 out of 60
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
8 out of 60
Ctelecoms Threat Protection EngagementConsolidated Telecoms (Ctelecoms)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
9 out of 60
Incident Response Tabletop Exercises: 1-Wk BriefingeGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Be proactive and prepare your IT team for emergencies with a Disaster Plan
10 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Two-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
11 out of 60
Identity and Access Control ImplementationSMART business LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Cybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
12 out of 60
Cybersecurity Assessment: 3-Wk WorkshopExelegent
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The Cybersecurity Assessment is designed to evaluate your cybersecurity posture and reduce risks exposure by using advanced Microsoft 365 Security products
13 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
14 out of 60
AI Security and Microsoft 365 Copilot Readiness Assessment ProgramExelegent
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Master control over your data and get ready to deploy Copilot in 60-90 days with a simple engagement process
15 out of 60
MDS Managed MXDR EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Designed to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
16 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Get started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
17 out of 60
Complete MXDR Threat Protection Powered by Microsoft SentinelKiZAN Technologies
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Managed security services to protect against an evolving cyber threat landscape 24x7x365 with Microsoft Entra ID Protection, Microsoft Sentinel, and Microsoft Defender.
18 out of 60
Cloud App Security – Advanced CASB Solution for Cloud Data ProtectionITX360 (Pvt) Ltd.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Secure your cloud apps with real-time monitoring, Shadow IT discovery, and automated data protection. Integrated with Microsoft Information Protection for enhanced compliance and threat detection.
19 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
20 out of 60
Microsoft 365 consultancyOnex Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Get Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
21 out of 60
Vulnerability ManagementBlack Cell Magyarország Korlatolt Felelossegu Tarsasag
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Rapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
22 out of 60
Microsoft Defender for Endpoint QuickStartPresidio
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Presidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
23 out of 60
Microsoft Security Solutions - 4 Week AssessmentProtiviti
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
24 out of 60
Defender for IoT Operational Technology: 8-Week POCITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
ITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
25 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
UNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
26 out of 60
Zero Trust Model - 4h assessmentReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Zero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
27 out of 60
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom Consulting
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
28 out of 60
Deploying Purview Data Security - Labels and DLPBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A dependable approach to deployment of Data Security workloads led by governance and following our standard framework for Microsoft 365 customers
29 out of 60
UNITE: AI Aware Workshop_INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
For business leaders who seek to understand AI in a business context, UNITE: AI Aware_ is an expert-led workshop for all departments. Participants can learn about AI types, capabilities and benefits.
30 out of 60
Copilot Business Value DiscoveryNetwoven
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Ready to embrace AI? Join our Microsoft 365 Copilot Value Discovery Workshop and learn how to maximize its potential for your business
31 out of 60
Microsoft 365 Security Readiness: 4-Wk AssessmentQuadrasystems.net (India) P Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Identify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
32 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
33 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
34 out of 60
Security Architecture Design and Implementation Service上海诺未网络科技有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
35 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies Services
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Readiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
36 out of 60
SoftwareOne Managed Detection and Response Service for Microsoft SentinelSoftwareOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protectionm365-sa-workplace-analytics product iconWorkplace Analytics
Future-proof your cyber security with Managed Detection and Response (MDR)
37 out of 60
Identity and Access Management SolutionH One (Private) Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Entra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
38 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
39 out of 60
Microsoft 365 CMMC: 4-Wk WorkshopKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Provides expert guidance to help organizations in the Defense Industrial Base achieve CMMC compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
40 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
You may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
41 out of 60
Defender for IoT Enterprise: 8-Week POCITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Understanding risk with unmanaged IoT devices can be difficult. Our Defender for Enterprise IoT Proof of Concept helps you visualise and understand the threats to your environment.
42 out of 60
Data Protection and Compliance Quick StartSoftchoice
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
The Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
43 out of 60
Copilot for Security Readiness AssessmentBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Get a Copilot for Security Readiness + a Security Health Check on your Microsoft 365 environment
44 out of 60
Invoke Data Risk AssessmentInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
This assessment is designed to identify privacy and regulatory risks in Dark Data present in Microsoft 365 and on-prem stores and mitigate them using Microsoft 365 compliance solutions.
45 out of 60
Protect and Govern your Data in Microsoft 365 1 day workshopCloudWay AS
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
With data growing exponentially over time, it’s more important than ever for organisations to implement the right tools and processes to ensure data protection and governance
46 out of 60
Managed XDR Shield: 4-Week ImplementationLong View Systems
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Address all your proactive security needs, engage the Managed XDR Shield plan to monitor, alert, and respond to threats effectively.
47 out of 60
Microsoft 365 E5 CMMC L3 8 Week ImplementationKAMIND IT, Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
48 out of 60
Microsoft 365 Security AssessmentCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW’s Microsoft 365 Security Assessment allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
49 out of 60
Microsoft 365 Copilot Adoption: 2-3 Week AssessmentCoretek Services
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
Evaluate the current customer Microsoft investments adoption of Microsoft Cloud Services and overall Security posture in an effort to develop a "Art of the Possible" to Adopt Microsoft 365 Copilot.
50 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure and manage your cloud environments by fortifying your infrastructure against emerging threats.
51 out of 60
Microsoft 365 Strategy, guidance and governance workshop by Nexer: 1 DayNexer Group AB
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
We will help you go through your Microsoft 365 implementation and make sure that you follow Microsofts Best Practices.
52 out of 60
SYSTEX Data Security and Compliance Solution精诚(中国)企业管理有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
53 out of 60
Microsoft Cybersecurity AssessmentThe Tech Mavericks
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
54 out of 60
Discover Sensitive Data: 6W - WorkshopExelegent
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
55 out of 60
Your Smart Workplace AssessmentRackspace Technology
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Your Smart Workplace Assessment helps organizations develop secure, cost-effective, and productivity-enhancing strategies for modern work environments.
56 out of 60
Copilot adoption for legalConterra
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Security
Transform legal service processes with Copilot and Conterra Copilot Adoption Offer: 4-Wk Imp
57 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
58 out of 60
Varonis JumpstartSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
59 out of 60
Data Security Engagement: 4-Wk WorkshopExelegent
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The Data Security Engagement provides a summary of an organization’s data protection and compliance stature with actionable recommendations.
60 out of 60
  • Vorige
  • 2
  • 3
  • 4
  • 5
  • 6
  • Volgende
Over Marketplace
  • Waarom Microsoft Marketplace
  • Blogs
  • Verhalen van klanten
Voor klanten
  • Kantooruren
  • Handleiding `Aan de slag´
  • Technische documentatie
  • Persoonlijke aanbiedingen
  • Microsoft Azure-verbruikstoezegging
  • Facturering en rekeningen
Voor partners
  • Een partner worden
  • Geef u op
  • Marketingondersteuning krijgen
  • Technische documentatie
  • Stapsgewijze instructies om te bouwen, publiceren en verkopen
  • In aanmerking komen voor collectieve verkoop
  • Marketplace-community voor partners
  • Door kanalen geleide Marketplace-verkoop
  • Privéaanbiedingen voor meerdere partijen voor kanaalpartners
Zakelijk
  • Microsoft AI
  • Microsoft Beveiliging
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Midden- en kleinbedrijf
Bedrijf
  • Vacatures
  • Over Microsoft
  • Bedrijfsnieuws
  • Privacy bij Microsoft
  • Investeerders
  • Duurzaamheid
Nederlands (België) Pictogram Uw privacykeuzes afmelden Uw Californië privacykeuzes Privacy van consumentenstatus
  • Siteoverzicht
  • Contact opnemen
  • Privacy en cookies
  • Gebruiksvoorwaarden
  • Handelsmerken
  • Over onze advertenties
  • Cookies beheren
  • © Microsoft 2026