Geri bildirim gönder
Yardım ve destek
Kaydedilen öğeler
Özel planlar
Lütfen bekleyin, oturumunuz açılıyor...
FiltrelerTümünü temizle

  • Konumunuz
  • Ürünler (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Benimseme ve Değişim Yönetimi
      • Microsoft Teams için arama
      • Bulut Güvenliği
      • Uyumluluk Danışmanı Hizmetleri
      • Cihaz Dağıtımı ve Yönetimi
      • Doğrudan Müşteri veya Ürünle Çalışanlar
      • Kimlik ve Erişim Yönetimi
      • Bilgi Koruması ve İdaresi
      • İçeriden Risk
      • Bilgi ve İçgörüler
      • Microsoft Teams için Toplantı Odaları
      • Microsoft Teams için Toplantılar
      • Microsoft 365 Live Events
      • Mobil Cihaz Yönetimi
      • Power Platform for Teams
      • Teams Özel Çözümleri
      • Ekip Çalışması Dağıtımı
      • Tehdit Koruması
      • Workplace Analytics
    • Power Platform
  • Endüstriler (1)
    • Savunma ve İstihbarat
    • Dağıtım
    • Eğitim
    • Enerji ve Kaynaklar
    • Finansal Hizmetler
    • Kamu
      • Kamu İşlemleri ve Altyapısı
      • Kamu Finansmanı
      • Halk Sağlığı ve Sosyal Hizmetler
      • Genel Güvenlik ve Adalet
    • Sağlık hizmetleri
    • Konaklama ve Seyahat
    • Üretim ve Ulaşım
    • Kar Amacı Gütmeyen
    • Profesyonel Hizmetler
    • Perakende ve Tüketim Malları
    • Sürdürülebilirlik
    • Telekomünikasyon ve Medya
  • Hizmet türü
  • Fiyatlandırma Modeli

Professional Services sonuç

içinde professional services sonuç gösteriliyor.
MDS - Modern Security Operations EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
A 2-day engagement to demonstrate how intelligent security analytics and threat intelligence can detect and stop active threats, encouraging organizations to deploy and adopt Modern SecOps solutions.
1 out of 22
Active Directory Security on DemandComtrade System Integration
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
2 out of 22
Defend, Protect, Secure with Microsoft Defender XDRComtrade System Integration
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
3 out of 22
4-Day Security AssesmentHSO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
4 out of 22
Microsoft 365 - Threat Protection: 2-week workshopFortevento
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
5 out of 22
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data Ltd
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Whether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
6 out of 22
Microsoft Sentinel Security Consulting ServiceComtrade System Integration
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
7 out of 22
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Introducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
8 out of 22
Synergy Advisor POC-in-a-box for Microsoft Security CopilotSynergy Advisors LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance your security posture with Synergy Advisors POC-in-a-box for Microsoft Security Copilot
9 out of 22
Synergy Advisors Microsoft Security Copilot E-mmersion ExperienceSynergy Advisors LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
AI-powered security for rapid, scalable, and effective defense
10 out of 22
Synergy Advisors Architecture Design Sessions (ADS) for Microsoft Security CopilotSynergy Advisors LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
A Next-Gen AI-Powered Security Solution for Enhanced Efficiency and Capabilities of defenders to improve security outcomes at machine speed and scale.
11 out of 22
Microsoft Funded Workshop for Threat Protection envisioning WorkshopVM GLOBAL SOLUTIONS(PTY)LTD
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Microsoft Funded Workshop for Threat Protection envisioning Workshop for Microsoft 365 will upskill your team, provide knowledge Microsoft Security
12 out of 22
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Conditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
13 out of 22
MDS - Threat Protection EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
14 out of 22
Threatscape CSI EngagementsTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
15 out of 22
Microsoft 365 Defender for Cloud Apps Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Provides integral protection for SaaS applications, helping you monitor and protect application data in the cloud.
16 out of 22
Microsoft 365 Defender Attack Simulation: 4 Weeks DeploymentSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 attack simulation training works to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack.
17 out of 22
Microsoft 365 Defender for Endpoints Deployment: 2 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect your organization's devices against advanced threats such as malware, ransomware, phishing and zero-day attacks.
18 out of 22
Microsoft Entra Deployment: 3 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Protect all identities and secure access to any resource with a family of multi-cloud identity and network access solutions.
19 out of 22
Secure Multicloud Environment Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The workshop aims to present best practices and tools for designing, implementing and managing a secure multi-cloud environment, leveraging the capabilities of Microsoft Azure, Microsoft 365, etc.
20 out of 22
Defend Against Threats with SIEM Plus XDR Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The goal of the workshop is to show how Microsoft's security solutions can help organizations protect themselves from cyberthreats
21 out of 22
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
22 out of 22
Market hakkında
  • Neden Microsoft Market?
  • Bloglar
  • Müşteri hikayeleri
Müşteriler için
  • Çalışma saatleri
  • Kullanmaya başlama kılavuzu
  • Teknik belgeler
  • Özel teklifler
  • Microsoft Azure tüketim taahhüdü
  • Faturalandırma ve fatura kesme
İş ortakları için
  • İş ortağı olun
  • Listelenin
  • Pazarlama desteği alın
  • Teknik belgeler
  • Oluşturma, yayımcı yapma ve satış için adım adım rehber
  • Ortak satışa uygun hale gelin
  • Ortaklar için Market Topluluğu
  • Kanal odaklı Market satışları
  • Kanal ortakları için çok taraflı özel teklifler
İşletme
  • Microsoft Yapay Zeka
  • Microsoft Güvenlik
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Şirket
  • Kariyer Fırsatları
  • Microsoft Hakkında
  • Microsoft'ta Gizlilik
  • Yatırımcılar
  • Sürdürülebilirlik
Türkçe (Türkiye) Gizlilik Tercihleriniz Geri Çevirme Simgesi Gizlilik Tercihleriniz Tüketici Durumu Gizliliği
  • Site Haritası
  • Bize Ulaşın
  • Gizlilik ve Tanımlama Bilgileri
  • Kullanım Koşulları
  • Ticari Markalar
  • Reklamlarımız hakkında
  • Tanımlama bilgilerini yönetin
  • © Microsoft 2026