Изпращане на обратна връзка
Помощ и поддръжка
Записани елементи
Частни планове
Един момент, обработва се влизането ви...
ФилтриИзчистване на всички

  • Вашето местоположение
  • Продукти (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Управление на приемането и промените
      • Повикване за Microsoft Teams
      • Защита в облака
      • Консултантски услуги за съответствие
      • Разполагане и управление на устройство
      • Работници на предна линия
      • Управление на самоличността и достъпа
      • Управление и защита на информацията
      • Вътрешен риск
      • Знания и аналитични данни
      • Стаи за събрания за Microsoft Teams
      • Събрания за Microsoft Teams
      • Microsoft 365 Live Events
      • Управление на мобилни устройства
      • Power Platform for Teams
      • Персонализирани решения на Teams
      • Прилагане на екипна работа
      • Защита от заплахи
      • Workplace Analytics
    • Power Platform
  • Отрасли
  • Тип услуга
  • Модел на ценообразуване

Консултантски услуги резултата

Показват се резултати след консултантски услуги.
Intelligent Shield: 1d AssessmentCorporate Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
1 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
2 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
3 out of 60
Seguridad Corporativa: Evaluación 4 semanasCIBERIT SRL.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Con esta Solución usted podrá gestionar la seguridad en toda su empresa
4 out of 60
Avanade Microsoft Security Service Edge Quick StartAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft’s new Security Service Edge (SSE) capability empowers organizations on their Zero Trust journey though unique in the market integration with Microsoft Entra.
5 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
6 out of 60
Microsoft 365 Security: 3-Day Workshopdelaware
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
7 out of 60
Cybersecurity: 3-Wks Quick-AssessmentUnipartner IT Services, S.A.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Cybersecurity Quick-Assessment to have visibility of the areas where the organization is stronger or where more immediate intervention is needed.
8 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPO
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
9 out of 60
Modern Workplace Security 10-Wk ImplementationWipro Ltd
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
10 out of 60
Avanade Modern Sec OpsAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
11 out of 60
Microsoft Cloud App Security (MCAS) Solutions for Native Apps by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
12 out of 60
Pently PentestPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Simulated cyber attacks to uncover real vulnerabilities in your entire IT landscape.
13 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
14 out of 60
Pently SOCaaSPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Full Managed Security Service with a personal touch and individually build for each customer
15 out of 60
4security: Microsoft 365 Communication Protect4Sight Holdings
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
4security: Microsoft 365 Communication Protect, a solution to safeguard your organisation’s communications
16 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
17 out of 60
Microsoft 365 Threat Protection Workshop + 5 DayCyberwise Siber Güvenlik TIC. AS.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Is your Microsoft 365 environment secure? Do you wonder about your current security maturity? We will assist you with a full-fledged workshop on how to deploy and implement Microsoft 365 Security.
18 out of 60
KMicro Rapid Incident Response & Readiness ServiceKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
19 out of 60
4security: Backup as a Service for Microsoft 3654Sight Holdings
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Protect your data with 4Security's Microsoft 365 Backup as a Service. Seamless integration, automated backups, and reliable data recovery for businesses of all sizes.
20 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
21 out of 60
MDR for Microsoft DefenderADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
22 out of 60
Phishing, Malware & Spam protection- 2 weeks ImplementationAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Phishing, Spam, and Malware Protection 2 weeks Implementation secures your email with tailored policies, ensuring safe communication and protection against threats like phishing, spam, and malware.
23 out of 60
Neway Security proposition: 3-WK implementationNeWay Technologies Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
24 out of 60
Ransomware & Supply Chain Incident Management: 12 Hour AssessmentMaureen Data Systems
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Identify vulnerabilities within your organization, including those who pose a threat to your supply chain, provide & mature a tailored incident response & management program.
25 out of 60
Protect 365 App - 1 hour implementationCloud Life
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
26 out of 60
Microsoft Funded Workshop for Threat Protection envisioning WorkshopVM GLOBAL SOLUTIONS(PTY)LTD
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Microsoft Funded Workshop for Threat Protection envisioning Workshop for Microsoft 365 will upskill your team, provide knowledge Microsoft Security
27 out of 60
Data Security as a Service | Assure 365CyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Fully Managed Data Security, governance and compliance with 24x7 monitoring—Powered by Microsoft Purview.
28 out of 60
Microsoft 365 Security Review: AssessmentCyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Identify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
29 out of 60
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
30 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
31 out of 60
Microsoft Cloud App Security (MCAS) for Custom Apps by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Know your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
32 out of 60
Device as a Service with Windows 11 and Intune: 4 Week ImplementationCognizant
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Windows 10 has revolutionized how organizations manage operating systems, delivering the features that you have come to know and rely on, while enhancing mobility and agility without losing data.
33 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
34 out of 60
Copilot Data ProtectionCloud Life
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Copilot Data Protection ensures a tenant is ready for Copilot from a Data Security perspective
35 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight Holdings
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Strengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
36 out of 60
XDR as a Service | Assure 365CyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Fully Managed XDR with 24x7 detection, response and threat protection—Powered by Microsoft Defender XDR.
37 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
38 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdge
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
39 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
40 out of 60
Security Operations Center with Microsoft SentinelAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Monitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
41 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
42 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance. ​
43 out of 60
NEST ArenaNoibit
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Two-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
44 out of 60
Onevinn Secure Microsoft Copilot Journey WorkshopOnevinn AB
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
This workshop will enable you to take full advantage of Microsoft 365 Copilot with focus on Compliance and Information Protection.
45 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protectionm365-sa-workplace-analytics product iconWorkplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
46 out of 60
Copilot for Microsoft 365 WorkshopCloudGate LLC
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Copilot for Microsoft 365 Workshop, delivered by Cloud Gate LLC, is a comprehensive three-phase engagement.
47 out of 60
Data Leak DetectionAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Rapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
48 out of 60
Security and compliance assessment with Microsoft PurviewAVASOFT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Fortify data with Microsoft Purview. Use encryption, access controls, and governance. Enhance security, ensure compliance, and streamline deployment with real-time insights.
49 out of 60
Microsoft Intune DeploymentSecure Future Bilgi Tek. ve Hiz. Tic A.S.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
50 out of 60
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
51 out of 60
CCPA CPRA: 6 - Wk AssessmentHappiest Minds Technologies Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Enable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
52 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Identify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
53 out of 60
Threatscape CSI EngagementsTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
54 out of 60
Copilot - 2 Days Adoption WorkshopINSOMEA COMPUTER SOLUTIONS TUNISIE SARL
+2
Applicable to:
m365-sa-firstline-workers product iconFrontline Workersm365-sa-threat-protection product iconThreat Protection
INSOMEA will help users in adopting copilot within companies from different sectors and sizes
55 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
56 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Inspect events in your network to locate threat indicators and entities
57 out of 60
G Suite to Office 365 migration: 1-Hour Assessmenttrue org cloud
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Assessment of your current G Suite environment to plan migration to Office 365
58 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies Services
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Dell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
59 out of 60
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/S
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
We can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
60 out of 60
  • Назад
  • 1
  • 2
  • 3
  • 4
  • Напред
За пазара
  • Защо Microsoft Пазар
  • Блогове
  • Истории на клиенти
За клиенти
  • Работно време
  • Ръководство за първи стъпки
  • Техническа документация
  • Частни предложения
  • Microsoft Azure Consumption Commitment
  • Плащане и фактуриране
За партньори
  • Станете партньор
  • Включване в списъка
  • Получаване на маркетингова поддръжка
  • Техническа документация
  • Указания стъпка по стъпка за създаване, публикуване и продажба
  • Станете отговарящи на условията за съвместна продажба
  • Общност на пазара за партньори
  • Продажби на пазара, ръководени от канал
  • Частни предложения с много дялове за партньори в канала
Бизнес
  • ИИ на Microsoft
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Реклами на Microsoft
  • Microsoft 365 Copilot
  • Microsoft Teams
Компания
  • Кариери
  • Поверителност в Microsoft
  • Инвеститори
  • устойчивост
Български (България) Вашите избори за поверителност Икона за отписване Вашите избори за поверителност Поверителност на здравето на потребителите
  • Карта на сайта
  • Връзка с нас
  • Поверителност и бисквитки
  • Условия на използване
  • Търговски марки
  • Относно нашите реклами
  • Управление на бисквитките
  • © Microsoft 2026