Average Ratings 0 Ratings
Average Ratings 2 Ratings
Description
Microsoft Graph acts as a central hub for data and intelligence within the Microsoft 365 ecosystem. This platform offers a cohesive programmability model, enabling users to tap into the vast array of information available through Microsoft 365, Windows, and Enterprise Mobility + Security. By leveraging the extensive data accessible via Microsoft Graph, developers can create applications that engage with millions of users across various organizations and consumer markets.
What does Microsoft Graph encompass?
Microsoft Graph provides REST APIs and client libraries that facilitate data access across several Microsoft cloud services, which include:
- Core Microsoft 365 services such as Bookings, Calendar, Delve, Excel, compliance tools like eDiscovery, Microsoft Search, OneDrive, OneNote, Outlook/Exchange, People (contacts), Planner, SharePoint, Teams, To Do, and Viva Insights.
- Services under Enterprise Mobility + Security, including Advanced Threat Analytics, Advanced Threat Protection, Azure Active Directory, Identity Manager, and Intune.
- Windows services that cover activities, devices, notifications, and Universal Print.
- Additionally, it encompasses Dynamics 365 Business Central, enhancing its functionality and integration capabilities.
Description
Symantec Endpoint Security offers the most comprehensive and integrated platform for endpoint security available globally. Whether deployed on-premises, in a hybrid environment, or in the cloud, the unified Symantec solution safeguards all types of endpoint devices, including traditional and mobile, while leveraging artificial intelligence (AI) to enhance security decision-making. The streamlined cloud-based management system facilitates the protection, detection, and response to complex threats aimed at your endpoints. Maintaining uninterrupted business operations is crucial, as compromised endpoints can severely disrupt productivity. By employing innovative techniques for attack prevention and reducing the attack surface, this solution provides robust security throughout the entire attack life cycle, addressing various threats such as stealthy malware, credential theft, fileless attacks, and “living off the land” tactics. Avoiding worst-case scenarios is essential, as full-scale breaches represent a major concern for CISOs. With advanced attack analytics, the platform enables effective detection and remediation of persistent threats, while also preventing the theft of Active Directory credentials, ensuring a secure environment for your organization. Additionally, this comprehensive approach helps organizations stay one step ahead in an ever-evolving threat landscape.
API Access
Has API
API Access
Has API
Integrations
Google Digital Risk Protection
BrainStorm QuickHelp
Kore.ai
Microsoft 365
Microsoft 365 Copilot Chat
Microsoft Entra ID
Microsoft Exchange
Microsoft Outlook
Microsoft Planner
Microsoft Teams
Integrations
Google Digital Risk Protection
BrainStorm QuickHelp
Kore.ai
Microsoft 365
Microsoft 365 Copilot Chat
Microsoft Entra ID
Microsoft Exchange
Microsoft Outlook
Microsoft Planner
Microsoft Teams
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Microsoft
Founded
1975
Country
United States
Website
learn.microsoft.com/en-us/graph/overview
Vendor Details
Company Name
Broadcom
Founded
1991
Country
United States
Website
www.broadcom.com/products/cyber-security/endpoint/end-user
Product Features
Data Management
Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge
Product Features
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting