Geri bildirim gönder
Yardım ve destek
Kaydedilen öğeler
Özel planlar
Lütfen bekleyin, oturumunuz açılıyor...
FiltrelerTümünü temizle

  • Konumunuz
  • Ürünler (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Benimseme ve Değişim Yönetimi
      • Microsoft Teams için arama
      • Bulut Güvenliği
      • Uyumluluk Danışmanı Hizmetleri
      • Cihaz Dağıtımı ve Yönetimi
      • Doğrudan Müşteri veya Ürünle Çalışanlar
      • Kimlik ve Erişim Yönetimi
      • Bilgi Koruması ve İdaresi
      • İçeriden Risk
      • Bilgi ve İçgörüler
      • Microsoft Teams için Toplantı Odaları
      • Microsoft Teams için Toplantılar
      • Microsoft 365 Live Events
      • Mobil Cihaz Yönetimi
      • Power Platform for Teams
      • Teams Özel Çözümleri
      • Ekip Çalışması Dağıtımı
      • Tehdit Koruması
      • Workplace Analytics
    • Power Platform
  • Endüstriler (1)
    • Savunma ve İstihbarat
    • Dağıtım
    • Eğitim
    • Enerji ve Kaynaklar
    • Finansal Hizmetler
    • Kamu
      • Kamu İşlemleri ve Altyapısı
      • Kamu Finansmanı
      • Halk Sağlığı ve Sosyal Hizmetler
      • Genel Güvenlik ve Adalet
    • Sağlık hizmetleri
    • Konaklama ve Seyahat
    • Üretim ve Ulaşım
    • Kar Amacı Gütmeyen
    • Profesyonel Hizmetler
    • Perakende ve Tüketim Malları
    • Sürdürülebilirlik
    • Telekomünikasyon ve Medya
  • Hizmet türü
  • Fiyatlandırma Modeli

Professional Services sonuç

içinde professional services sonuç gösteriliyor.
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology Holding
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Our goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
1 out of 12
Data Security EngagementSignal Alliance Technology Holding
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
As your company data expands and generative AI is being deployed rapidly, having an integrated approach that can help quickly identify, triage, and act on data security risks is super important.
2 out of 12
Active Directory Security on DemandComtrade System Integration
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
3 out of 12
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTION
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Learn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
4 out of 12
Microsoft Purview Information Protection Deployment: 4 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Secure data wherever it is and support the protection of sensitive data in clouds, apps, and devices.
5 out of 12
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
6 out of 12
Microsoft 365 Defender Attack Simulation: 4 Weeks DeploymentSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 attack simulation training works to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack.
7 out of 12
Insider Risk Management (Purview) Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-knowledge-and-insights product iconKnowledge & Insights
Identify, investigate, and take swift action on internal risks intelligently.
8 out of 12
Microsoft Entra Deployment: 3 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Protect all identities and secure access to any resource with a family of multi-cloud identity and network access solutions.
9 out of 12
Mitigate Compliance & Privacy Risk Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Risk
Designed to help organizations identify and reduce compliance and privacy risks associated with the use of the cloud.
10 out of 12
Identity Governance Lifecycle: 4 Weeks of AssessmentSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
The objective of the assessment is to identify areas for improvement and potential risks in the identity environment, based on the maturity level of the organization's identity governance model.
11 out of 12
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
12 out of 12
Market hakkında
  • Neden Microsoft Market?
  • Bloglar
  • Müşteri hikayeleri
Müşteriler için
  • Çalışma saatleri
  • Kullanmaya başlama kılavuzu
  • Teknik belgeler
  • Özel teklifler
  • Microsoft Azure tüketim taahhüdü
  • Faturalandırma ve fatura kesme
İş ortakları için
  • İş ortağı olun
  • Listelenin
  • Pazarlama desteği alın
  • Teknik belgeler
  • Oluşturma, yayımcı yapma ve satış için adım adım rehber
  • Ortak satışa uygun hale gelin
  • Ortaklar için Market Topluluğu
  • Kanal odaklı Market satışları
  • Kanal ortakları için çok taraflı özel teklifler
İşletme
  • Microsoft Yapay Zeka
  • Microsoft Güvenlik
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Şirket
  • Kariyer Fırsatları
  • Microsoft Hakkında
  • Microsoft'ta Gizlilik
  • Yatırımcılar
  • Sürdürülebilirlik
Türkçe (Türkiye) Gizlilik Tercihleriniz Geri Çevirme Simgesi Gizlilik Tercihleriniz Tüketici Durumu Gizliliği
  • Site Haritası
  • Bize Ulaşın
  • Gizlilik ve Tanımlama Bilgileri
  • Kullanım Koşulları
  • Ticari Markalar
  • Reklamlarımız hakkında
  • Tanımlama bilgilerini yönetin
  • © Microsoft 2026