Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Transition to Office 365, Azure, or Dynamics 365 with the assurance of a distinguished Microsoft Gold Partner that has successfully migrated over 2 million accounts. Safeguard your organization and sensitive data using Microsoft 365, which includes the Enterprise Mobility + Security suite. Enable your team to fully leverage the capabilities of Microsoft Teams and SharePoint Online. Revolutionize your approach to endpoint support with Windows 10 managed through Microsoft 365. Collaborate with Microsoft specialists to ensure adherence to state, local, federal, and international compliance, security, and privacy standards. Move past merely using Microsoft 365 as a substitute for email and file storage. Streamline essential business operations with the integration of Teams, SharePoint, Power Platform, and Azure PaaS. Implement technological advancements that enhance your customers' experiences while providing proactive support and empowering end users. With these tools in place, everything operates seamlessly! Additionally, your organization will benefit from continuous innovation and improvement in workflows.
Description
Most tasks involving operations, support, and troubleshooting carried out by Microsoft staff and their sub-processors typically do not necessitate access to customer data. In those infrequent instances where such access becomes necessary, Customer Lockbox for Microsoft Azure offers a system through which customers can evaluate and either approve or deny requests for access to their data. This feature is particularly utilized when a Microsoft engineer requires access to customer data, either due to a support ticket initiated by the customer or a problem detected by Microsoft itself. Activity logs serve to document Customer Lockbox interactions, which can be accessed in the Azure portal by selecting Activity Logs, allowing for a review of auditing information linked to these requests. Users have the option to filter the logs to find specific actions. Furthermore, a new baseline control (3.13) has been introduced in the Azure Security Benchmark, addressing the relevance of Customer Lockbox. This enhancement enables customers to leverage the benchmark to assess the applicability of Customer Lockbox for their services effectively. By doing so, organizations can ensure they maintain a high standard of data security and compliance.
API Access
Has API
API Access
Has API
Integrations
Microsoft Azure
Azure AI Services
Azure API Management
Azure App Service
Azure Container Registry
Azure Data Factory
Azure Functions
Azure Kubernetes Service (AKS)
Azure Monitor
Azure SQL Database
Integrations
Microsoft Azure
Azure AI Services
Azure API Management
Azure App Service
Azure Container Registry
Azure Data Factory
Azure Functions
Azure Kubernetes Service (AKS)
Azure Monitor
Azure SQL Database
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
AgileIT
Founded
2006
Country
United States
Website
www.agileit.com
Vendor Details
Company Name
Microsoft
Founded
1975
Country
United States
Website
docs.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-overview
Product Features
Business VoIP
Call Parking
Call Recording
Contact Management
Encryption
IVR / Voice Recognition
Ring Groups
SIP Trunking
Unified Communications
Voice Quality Enhancement
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management