Feedback geven
Help en ondersteuning
Opgeslagen items
Privéplannen
Een ogenblik geduld, u wordt aangemeld...
FiltersAlles wissen

  • Uw locatie
  • Producten (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Acceptatie- en wijzigingsbeheer
      • Bellen voor Microsoft teams
      • Cloudbeveiliging
      • Adviesservices voor naleving
      • Apparaatimplementatie en -beheer
      • Eerstelijnswerkers
      • Identiteits- en toegangsbeheer
      • Gegevensbescherming en -governance
      • Insiderrisico
      • Kennis en inzichten
      • Vergaderruimten voor Microsoft Teams
      • Vergaderingen voor Microsoft Teams
      • Microsoft 365 Live Events
      • Beheer van mobiele apparaten
      • Power Platform for Teams
      • Aangepaste oplossingen voor Teams
      • Implementatie van teamwerk
      • Bedreigingsbeveiliging
      • Workplace Analytics
    • Power Platform
  • Branches
  • Servicetype
  • Prijsmodel

Adviesdiensten resultaten

resultaten worden weergegeven in adviesdiensten.
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
1 out of 60
Microsoft 365 E5 NIST 800-171 -1 Week GAP AssessmtKAMIND IT, Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
This offer is for a NIST800-171 Gap Assessment for a single Host Unit, scoped to a single contract, single subnet using the Microsoft 365 E5 license
2 out of 60
Microsoft 365 Threat Check Assessment: 3-Wk AssessmentInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
3 out of 60
Mailbox Guardian - Security: 2 Week ImplementationProServeIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Cybersecurity review and lockdown of Microsoft 365 environment. Monitor and provide implementation recommendations Protect against phishing and other attacks Review desired state configuration
4 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
5 out of 60
Microsoft Security: 4-Week ImplementationApex Digital Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Establish industry best practices with planning, configuration, deployment, and management of Microsoft 365 E5 Security Services.
6 out of 60
Mobile Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Corporate Mobile Devices (iOS, Android and macOS)
7 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
8 out of 60
GDPR Assessment: 6-Week AssessmentHappiest Minds Technologies Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Enable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
9 out of 60
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
10 out of 60
Secure Endpoint Management - 5 Day - Proof of ConceptCoretek Services
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Protect your organization's endpoints. In this 5-Day quick start Coretek offers three options for providing unified endpoint management and security across all devices.
11 out of 60
Security Assessment - 4-Week AssessmentCoretek Services
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Analysis of customer’s cross platform security posture, evaluating vulnerabilities and identity risks with recommendations to mitigate.
12 out of 60
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile IT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
13 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
14 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk AssessmentApex Digital Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
15 out of 60
Microsoft 365 Security: 4-Week AssessmentApex Digital Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most and improving your security maturity over time.
16 out of 60
Microsoft 365 Risk 5-Days AssessmentKPCS CZ, s.r.o.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 Risk Assessment provides preventive and comprehensive check of the Customer's Microsoft 365 Environment.
17 out of 60
Microsoft 365 Defender: 2-Wk AssessmentAlithya Fullscope Solutions, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
18 out of 60
Microsoft Defender for Cloud Pilot Engagement: 4-6 WeeksNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Understand how Microsoft Defender for Cloud meets your evolving security requirements, while helping you to significantly reduce the tooling complexity.
19 out of 60
Microsoft Defender for Endpoint: 4-Week ImplementationInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Understand your current use cases for antimalware / endpoint detection and response, map those use cases to Defender, and execute on a migration and rollout to Defender for Endpoint.
20 out of 60
Zero Trust Security AssessmentConcurrency, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Assess and advance your Zero Trust security posture—and accelerate or expand your Microsoft 365 security strategy with expert-led guidance.
21 out of 60
Microsoft Security: 3-Day WorkshopApex Digital Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Develop a strategic security plan customized for your organization and based on the recommendations of Microsoft cybersecurity experts.
22 out of 60
Microsoft 365 Security: 4-hour AssessmentCatapult Systems, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Catapult’s Microsoft 365 Security Assessment provides an in-depth assessment of the your organization's security environment, guidance on overlapping tools, and a roadmap to remediation.
23 out of 60
Pentest-4wks AssessmentadaQuest
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Gain intelligence and insights into your organization's security by understanding how you can and are likely to be attacked, and what steps you need to take to protect your environment
24 out of 60
Microsoft 365 Defender 10-week ImplementationCyclotron Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Cyclotron offer provides a complete approach to implementing Microsoft 365 Defender for enterprises, resulting in improved detection rates, threat coverage, and organizational security posture.
25 out of 60
Windows Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Windows including demonstration and best practice
26 out of 60
Zero Trust Launchpad: 3-Wk AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
27 out of 60
Microsoft 365 Azure AD 3-wk Implementation RoadmapCyclotron Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
28 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
29 out of 60
Cloud Security Journey: 2 Hour Proof of Concept360 Visibility Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
30 out of 60
Multifactor Authentication: 4-Day ImplementationFSI Strategies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Implementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
31 out of 60
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
32 out of 60
Rapid Risk Assessment: 4-Wk AssessmentAscent Global, Inc.
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Immediate and long-term Microsoft security strategy assessment utilizing security tools such as Defender, Sentinel, and Cloud App Security.
33 out of 60
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
34 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
35 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Get a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
36 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
37 out of 60
Threat Protection and Cloud Security: 3 Day WorkshopNetwoven
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Improve your security posture with a Microsoft Threat Protection Assessment Workshop
38 out of 60
Windows as a Service: 4-Wk ImplementationAMTRA Solutions Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure your data and devices, identities and your business with Windows 10/11.
39 out of 60
Microsoft 365/Azure Cloud Secure 5 Day AssessmentDynTek Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
DynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
40 out of 60
Microsoft 365 Fundamentals: 1 Day WorkshopNETCOM LEARNING
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-teams-custom-solutions product iconTeams Custom Solutionsm365-sa-threat-protection product iconThreat Protection
Introduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
41 out of 60
Cloud Identity Foundation Workshop (5-day)DexMach
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
42 out of 60
Microsoft Value Calculator: One Hour AssessmentPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Cost Takeout Opportunity shows the potential cost reductions from consolidating third party solutions with Microsoft 365.
43 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SAS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
44 out of 60
Advanced Email Security: 4-Day ImplementationFSI Strategies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protectionm365-sa-workplace-analytics product iconWorkplace Analytics
Leverage Microsoft Defender for Office 365 to implement best in class email security
45 out of 60
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
46 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
47 out of 60
Defend Against Threats with SIEM Plus XDRNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
48 out of 60
Microsoft Purview Data Security Basic Quick Start 10-week ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Drive Data Protection Sustainability with Edgile's Data Protection Methodology
49 out of 60
Microsoft 365 Value Discovery - Workshop - 1 DayDynTek Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT OF MICROSOFT 365 IN YOUR ENVIRONMENT
50 out of 60
Microsoft 365 Roadmap: 1-Wk WorkshopeGroup Enabling Technologies, LLC
+3
Applicable to:
m365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Enable a Secure and Productive Workforce with a Modern Workplace Roadmap powered by Microsoft 365 solutions.
51 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
52 out of 60
TS As a Services (TSaaS): 5-day ImplementationE-Level Cloud Services S.A. de C.V.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
53 out of 60
Secure Productive Workplace: Implement 4-WkNetsurit
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Netsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
54 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementationInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
55 out of 60
Microsoft Information Protection Administrator: 3 Days WorkshopNETCOM LEARNING
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Information Protection Administrator course focuses on data governance and information protection within your organization.
56 out of 60
Retail Kiosk Program Workshop - 5 DaysCB5 Solutions
+3
Applicable to:
m365-sa-firstline-workers product iconFrontline Workersm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A secure kiosk management solution built for Zebra, Android and iOS devices in retail and finance services.
57 out of 60
Microsoft Defender for Endpoint Professional Services: 1-Wk ImplementationOptiv Security Inc.
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Provide comprehensive, powerful protection at your organization's endpoints from Optiv utilizing the Microsoft Defender for Endpoint solution.
58 out of 60
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
59 out of 60
"Threat Protection: 3 Day Workshop"Insentra Pty Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
60 out of 60
  • Vorige
  • 1
  • 2
  • 3
  • 4
  • 5
  • Volgende
Over Marketplace
  • Waarom Microsoft Marketplace
  • Blogs
  • Verhalen van klanten
Voor klanten
  • Kantooruren
  • Handleiding `Aan de slag´
  • Technische documentatie
  • Persoonlijke aanbiedingen
  • Microsoft Azure-verbruikstoezegging
  • Facturering en rekeningen
Voor partners
  • Een partner worden
  • Geef u op
  • Marketingondersteuning krijgen
  • Technische documentatie
  • Stapsgewijze instructies om te bouwen, publiceren en verkopen
  • In aanmerking komen voor collectieve verkoop
  • Marketplace-community voor partners
  • Door kanalen geleide Marketplace-verkoop
  • Privéaanbiedingen voor meerdere partijen voor kanaalpartners
Zakelijk
  • Microsoft AI
  • Microsoft Beveiliging
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Midden- en kleinbedrijf
Bedrijf
  • Vacatures
  • Over Microsoft
  • Bedrijfsnieuws
  • Privacy bij Microsoft
  • Investeerders
  • Duurzaamheid
Nederlands (België) Pictogram Uw privacykeuzes afmelden Uw Californië privacykeuzes Privacy van consumentenstatus
  • Siteoverzicht
  • Contact opnemen
  • Privacy en cookies
  • Gebruiksvoorwaarden
  • Handelsmerken
  • Over onze advertenties
  • Cookies beheren
  • © Microsoft 2026