Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Microsoft Graph acts as a central hub for data and intelligence within the Microsoft 365 ecosystem. This platform offers a cohesive programmability model, enabling users to tap into the vast array of information available through Microsoft 365, Windows, and Enterprise Mobility + Security. By leveraging the extensive data accessible via Microsoft Graph, developers can create applications that engage with millions of users across various organizations and consumer markets.
What does Microsoft Graph encompass?
Microsoft Graph provides REST APIs and client libraries that facilitate data access across several Microsoft cloud services, which include:
- Core Microsoft 365 services such as Bookings, Calendar, Delve, Excel, compliance tools like eDiscovery, Microsoft Search, OneDrive, OneNote, Outlook/Exchange, People (contacts), Planner, SharePoint, Teams, To Do, and Viva Insights.
- Services under Enterprise Mobility + Security, including Advanced Threat Analytics, Advanced Threat Protection, Azure Active Directory, Identity Manager, and Intune.
- Windows services that cover activities, devices, notifications, and Universal Print.
- Additionally, it encompasses Dynamics 365 Business Central, enhancing its functionality and integration capabilities.
Description
A cost-effective suite of network security solutions features a Managed Network Detection and Response team, the innovative Network Cloaking™ approach, and CINS Active Threat Intelligence. This comprehensive managed security service is tailored for lean IT teams, allowing them to refocus on other important projects. We collaborate with you to thwart external attacks, identify harmful threats, and respond swiftly to critical incidents. Our Autonomous Threat Defense and Active Threat Intelligence extend protection beyond the firewall, offering an additional layer of scrutiny for internal network traffic. Sentinel Outpost delivers sophisticated threat defense at the network edge using Network Cloaking™, successfully preventing malware, exploitation attempts, and various other dangers from breaching the firewall. With our services, you can enhance your overall security posture and ensure your network remains resilient against evolving threats.
API Access
Has API
API Access
Has API
Integrations
BrainStorm QuickHelp
Carbide
Fleece AI
FlowMate
GigaSECURE
Intapp Walls
Kore.ai
Microsoft 365
Microsoft 365 Copilot Chat
Microsoft Entra ID
Integrations
BrainStorm QuickHelp
Carbide
Fleece AI
FlowMate
GigaSECURE
Intapp Walls
Kore.ai
Microsoft 365
Microsoft 365 Copilot Chat
Microsoft Entra ID
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Microsoft
Founded
1975
Country
United States
Website
learn.microsoft.com/en-us/graph/overview
Vendor Details
Company Name
Sentinel IPS
Founded
1995
Country
United States
Website
sentinelips.com
Product Features
Data Management
Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge
Product Features
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning