提供意見反應
説明與支援
已儲存項目
私人方案
請稍候,正在登入...
篩選全部清除

  • 您的地點
  • 產品 (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • 採用與變更管理
      • Microsoft Teams 的通話功能
      • 雲端安全性
      • 合規性諮詢服務
      • 裝置部署與管理
      • 第一線員工
      • 身分識別與存取權管理
      • 資訊保護與治理
      • 內部風險
      • 知識與見解
      • Microsoft Teams 中的會議室
      • Microsoft Teams 中的會議
      • Microsoft 365 Live Events
      • 行動裝置管理
      • Power Platform for Teams
      • Teams 自訂解決方案
      • 團隊合作部署
      • 威脅防護
      • 工作場所分析
    • Power Platform
  • 產業
  • 服務類型
  • 計價模式

Professional Services 個結果

在 professional services 中顯示 個結果。
Securing Copilot for Microsoft 365 in Microsoft 365 for Business 1hour Implementationtrue org cloud
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The security, compliance, and privacy policies that you have in place are adopted by Copilot for Microsoft 365.
1 out of 41
Microsoft Sentinel Integration with Carbon Black by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Improve endpoint security with threat detection and response. Proactive support and optimization streamline compliance. Focus on business goals while we manage device security.
2 out of 41
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology Holding
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Our goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
3 out of 41
DORA act assessment and implementationSii Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
4 out of 41
Active Directory Security on DemandComtrade System Integration
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
5 out of 41
Email protection with Microsoft Defender for Office 365: 2h briefingSMART business LLC
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Get introduction to email protection functionality of Microsoft Defender for Office 365. How to protect Exchange Online service from common email attacks: spam, phishing, and others.
6 out of 41
Security Accelerator Briefing on Copilot for Microsoft 365 BriefingKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Boost security with KMicro's Copilot For Microsoft 365 Security Briefing: Tailored insights and strategies in a free 1-hour session.
7 out of 41
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
8 out of 41
Data Security EngagementSignal Alliance Technology Holding
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
As your company data expands and generative AI is being deployed rapidly, having an integrated approach that can help quickly identify, triage, and act on data security risks is super important.
9 out of 41
Assessment de Ciberseguridad de Microsoft 365: Protección Avanzada y Evaluación Integral de los sistemas - 2Wk AssessmentENCAMINA S.L.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Descubre, Evalúa y Mejora la Seguridad: Estrategias Avanzadas para una Ciberdefensa Proactiva
10 out of 41
Protección y Gobernanza de Datos Confidenciales: Eleva tu Cumplimiento con Microsoft - 3 Wk WorshopsENCAMINA S.L.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Descubre y Fortalece tus Prácticas de Cumplimiento en Datos (compliance) con Nuestro Workshop práctico
11 out of 41
Microsoft Security Solution Strategy - 3 Hour workshopINFOTECHTION
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Learn the best way to operate Microsoft Purview Data Security Features and build a high-level adoption strategy.
12 out of 41
SecureBlu MDR Service for Microsoft 365 DefenderNew Era Technology
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
13 out of 41
Microsoft Purview Information Protection ImplementationITX360 (Pvt) Ltd.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Secure your organization's sensitive data with Microsoft Purview Information Protection—classify, label, and protect data easily while ensuring compliance.
14 out of 41
DLP Implementation and Tuning ServicesINFOTECHTION
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Reduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
15 out of 41
True Managed Security Service- 3 day Workshoptrue org cloud
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
You have a vision. We can help you secure it...
16 out of 41
Pently PentestPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Simulated cyber attacks to uncover real vulnerabilities in your entire IT landscape.
17 out of 41
Microsoft Intune ServiceSii Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-insider-risk product iconInsider Risk
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM)
18 out of 41
Data Leak DetectionAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Rapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
19 out of 41
Quorum Cyber Data Security Assessment using Microsoft PurviewQuorum Cyber
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Achieve a clear understanding of the storage, access and protection of one of your organisation’s most valuable assets.
20 out of 41
Copilot Data ProtectionCloud Life
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
21 out of 41
4Sight's Microsoft Data Security Engagement4Sight Holdings
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Identify and Mitigate Data Risks, Ensure Compliance, and Protect Sensitive Information
22 out of 41
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
23 out of 41
Microsoft Intune: 4-8 Week ImplementationWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our expert team will help you deploy and configure Microsoft Intune, ensuring seamless integration and optimal performance for your organization's needs
24 out of 41
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
25 out of 41
Identity and Access Management SolutionH One (Private) Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Entra ID streamlines your identity needs with core directory services, app access management, and advanced identity protection, ensuring secure, seamless operations.
26 out of 41
Data Security EngagementPerformanta
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
27 out of 41
Compliance Overview Workshop 4 hoursCloud Essentials
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Practical introduction to Microsoft Purview Compliance Center
28 out of 41
Compliance Catalyst: 1 Hour WorkshopCloud Essentials
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Kickstart your compliance journey with a rapid assessment of your current situation followed by a 60-90 minute interactive workshop to discuss practical recommendations to make tangible improvements
29 out of 41
Microsoft Purview Compliance Enablement Microsoft 365Gijima
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Leveraging Microsoft Purview for data governance and management, providing organizations a unified data governance service. Defining strategy and enabling features such as data classification, risk
30 out of 41
First Technology - Darktrace POVFirst Technology (Pty) Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Reduce risk and harden security in Microsoft 365 with the Darktrace Cyber AI Loop - Proof of Value (POV)
31 out of 41
FastTrack-Microsoft 365: 6-Wk ImplementationGlobal Computing and Telecoms
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Global Computing and Telecoms a Microsoft Partner, will assist your organization to securely move on Microsoft Cloud use a combination of resources, best practices, and engineering expertise.
32 out of 41
Cybersecurity AssessmentGlobal Computing and Telecoms
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
The Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products.
33 out of 41
Managed Purview Data Protection - Managed Service - 12 MonthsNetsurit
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The Netsurit Managed Purview Data Protection service provides continuous oversight of your Microsoft Purview environment, empowering your organisation to meet evolving compliance obligations
34 out of 41
Minsait Data Security Engagement over Microsoft PurviewMinsait
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Evaluamos los riesgos asociados a la seguridad y privacidad de tus datos en Microsoft 365 y te ayudamos a definir una estrategia eficaz de protección basada en Microsoft Purview.
35 out of 41
Insider Risk Management: 8-Wk implementationPwC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
36 out of 41
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
37 out of 41
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
38 out of 41
Purview Data Protection - Assessment and Implementation - 4 WeeksNetsurit
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
A comprehensive delivery model for structured implementation of Microsoft 365 E5 Compliance. This consists of a set of predefined workshops, implementation activities and documentation.
39 out of 41
Manage and Investigate Risk: 2 weeks WorkshopCloud Essentials
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
A risk check followed by advisory workshop to build a sustainable strategy around insider risk within Microsoft 365 and further accelerate your compliance journey.
40 out of 41
Microsoft Priva - Privacy Mgmt Implementation: 16-WksWipro Ltd
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Wipro will assess organization's privacy posture and implement controls to reduce privacy risks on Microsoft 365 environment by leveraging Wipro's framework and Microsoft Priva solution.
41 out of 41
關於 Marketplace
  • 為什麼選擇 Microsoft Marketplace
  • 部落格
  • 客戶案例
適用於客戶
  • 辦公時間
  • 使用者入門指南
  • 技術文件
  • 私人供應項目
  • Microsoft Azure 使用量承諾
  • 計費與發票開立
就合作夥伴而言
  • 成為合作夥伴
  • 列入清單
  • 取得行銷支援
  • 技術文件
  • 建置、發佈和銷售的逐步指導
  • 符合共同銷售資格
  • 合作夥伴的 Marketplace 社群
  • 以通路為導向的 Marketplace 銷售
  • 頻道合作夥伴的多方私人供應項目
商務
  • Microsoft Cloud
  • Microsoft 安全性
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
公司
  • 人才招募
  • 公司新聞
  • Microsoft 隱私權
  • 投資者
  • 永續性
中文(台灣) 您的隱私權選擇退出圖示 您的隱私選擇 消費者健康情況隱私權
  • 網站地圖
  • Contact Us
  • 隱私權與 Cookie
  • 使用條款
  • 商標
  • 關於我們的廣告
  • 管理 Cookie
  • © Microsoft 2025