Envieu-nos un comentari
Ajuda i assistència tècnica
Elements desats
Plans privats
Espereu un moment i inicieu la sessió...
FiltresEsborra-ho tot

  • La vostra ubicació
  • Productes (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Adopció i administració de canvis
      • Trucades per al Microsoft Teams
      • Seguretat al núvol
      • Serveis d'assessorament de compliment
      • Implementació i administració de dispositius
      • Treballadors de primera línia
      • Administració d'identitat i accés
      • Protecció i govern de la informació
      • Risc intern
      • Coneixement i conclusions
      • Sales de reunions per al Microsoft Teams
      • Reunions per al Microsoft Teams
      • Microsoft 365 Live Events
      • Administració de dispositius mòbils
      • Power Platform for Teams
      • Solucions personalitzades per al Teams
      • Implementació del treball en equip
      • Protecció contra amenaces
      • Workplace Analytics
    • Power Platform
  • Sectors
  • Tipus de servei
  • Model de preus

Professional Services resultats

Es mostren  resultats a professional services.
Mostra resultats que hi tenen relació a núvols del sector.
Audit sécurité Microsoft 365 : 7 weeks AssessmentASI
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Dans un contexte de recrudescence des risques CYBER, vous souhaitez effectuer un audit de votre tenant Microsoft 365 et disposer d’un plan de remédiation au regard des risques potentiels.
1 out of 60
Threat Management – Modern SIEM & xDR : 3 Weeks PiloteMETSYS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Notre ambition : un device sécurisé pour nos clients Résistance aux menaces de type ransomware, solution de xDR avec Microsoft Defender for EndPoint pour les devices iOS/Android/Windows 10/11/Windows
2 out of 60
Device management with Intune: 2 Day WorkshopCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Gestion des appareils et ordinateurs grâce à Microsoft Intune
3 out of 60
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
4 out of 60
Microsoft 365 Security - 5-Day ImplementationSCC FRANCE
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Define and Deploy all MIcrosoft 365 features Azure AD Premium, MFA et Accès conditionnel Defender for Office 365 Microsoft Intune Defender for Endpoint Information Protection
5 out of 60
Azure AD Premium - 5-day - ImplementationSCC FRANCE
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Configuration et sécurisation d'un Tenant Azure AD. Mise en place des bonnes pratiques de synchronisation, d'authentification et de sécurisation via Azure AD Premium.
6 out of 60
Protect devices : 4 days assessmentSopra Steria France
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
4 days of assessment focused on device / EDR protection.
7 out of 60
Protect Data : 4 days assessmentSopra Steria France
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
4 days of assessment focused on data protection in Azure & Microsoft 365
8 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for EndpointCyderes
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Cyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
9 out of 60
Cyderes Microsoft Security Adoption AdvisoryCyderes
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
The Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
10 out of 60
Microsoft 365: 3-Week Security Configuration DiagnosisAdvens
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Vérifier les paramétrages de sécurité des composants du tenant Microsoft 365
11 out of 60
NVISO Microsoft 365 Security AssessmentNVISO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
12 out of 60
Mise en oeuvre Information Protection : 4 semaines ImplémentationArtemys
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Sécuriser vos données à l'aide d'une solution robuste et intégrée permettant de protéger les informations sensibles et confidentielles de l'organisation
13 out of 60
Microsoft 365 Copilot Workshop - 2 days WorkshopDEEP by POST Telecom S.A.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Microsoft 365 Copilot Workshop is designed to help organizations adopt Microsoft 365 Copilot
14 out of 60
Accompagnement à la mise en œuvre de Microsoft 365 Copilot 1-Week AssessmentEXAKIS NELITE (Test)
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Un accompagnement sur mesure pour faciliter le déploiement et l’adoption de Microsoft 365 Copilot pour votre entreprise.
15 out of 60
Audit de sécurité : 5 joursEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Evaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
16 out of 60
POC Securité IT : 2 semainesEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Validation des capacités des solutions de sécurité Microsoft dans votre environnement
17 out of 60
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Implémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
18 out of 60
Copilot for Microsoft 365 with Confidence - 2 weeks agoMETSYS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Déployer Microsoft Copilot for Microsoft 365 pour vos utilisateurs en toute confiance
19 out of 60
OCDFR - EMS E5Orange Business Services - OCD FR
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Advisory and design, deployement and support about all Microsoft EMS E5 solutions
20 out of 60
CS Microsoft 365 Copilot for Security 360° - ImplementationCampana & Schott GmbH
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Utilize Microsoft 365 Copilot for Security to leverage AI to secure your company.
21 out of 60
BSE_Cybersecurity_Empower_CYRENProjetlys
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Blue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans la sécurisation de votre SI
22 out of 60
Data Security Envisioning : 10-W workshopSopra Steria France
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
This workshop helps organizations identify data security risks, understand how to mitigate them, and provide structured recommendations for risk mitigation through a comprehensive process.
23 out of 60
CS Role-Based Copilot EnvisioningCampana & Schott GmbH
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
We help to undersand how sales, customer service, and finance functions benefit by implenting role-based Copilots by identifying high-value scenarios, and developing a roadmap for implementation.
24 out of 60
Insight´s Microsoft Cloud Advisory ServiceInsight Technology Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Provides a 2 weeks assessment of our client’s estate across the following six areas: Microsoft 365, Azure, On-Premises, Business Critical Applications, Skills & Resourcing & Cost optimisation.
25 out of 60
Implementation of Copilot readiness assessmentDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
26 out of 60
Modern Security Operations EngagementFUJITSU
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Detect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
27 out of 60
Support services for Microsoft 365Senetic S.A.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Our offer includes 3 support service packages for Microsoft 365 environment, where we provide support in the correct configuration and implementation of tools.
28 out of 60
Service de sécurisation MicrosoftSTELOGY
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Sécurisation et gouvernance des services, et données sur Microsoft 365
29 out of 60
Secure Your Future: Cybersecurity PathwaysReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Discover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
30 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
31 out of 60
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
32 out of 60
Intune & Configuration Manager - Co-Management (5 jours) POCInetum (HO)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Inetum accompagne ses clients dans leur transformation digitale et notamment sur la partie Modern Workplace en intégrant les services Cloud Azure et notamment le Co-Management Intune
33 out of 60
Modern WorkPlace PME:15 days ImplementationAurera
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Mise en place d’un environnement de travail collaboratif à l’état de l’art pour les PME, comprenant une plate-forme digitale et des outils permettant une facilité de gestion et de déploiement.
34 out of 60
Security Assessment Microsoft 365: 2day assessmentProdware Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
A service for Office 365 and Microsoft 365 protection
35 out of 60
Microsoft 365 Level Up: 1-Year WorkshopWAKERS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Pour être toujours au top des dernières nouveautés de votre environnement Microsoft 365 pendant 1 an !
36 out of 60
Migration MSG vers Office 365,10J d'implémentationBSD
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Vous souhaitez migrer depuis Lotus Domino/Gmail/Exchange vers Office 365
37 out of 60
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UK
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Manage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
38 out of 60
Microsoft 365 - adoption: 6-Weeks ImplementationNeos-SDI
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Accompagner le changement vers Microsoft 365: Une approche transverse qui adresse les enjeux de gouvernance, de déploiement, d’adoption et de sécurisation des nouveaux usages Microsoft 365.
39 out of 60
Adoptez Microsoft Edge : 2-Wk ImplementationProjetlys
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Notre approche pour la mise en place et l'adoption de Microsoft Edge.
40 out of 60
Sécurisation des identités - 3-Week ImplementationEXAKIS NELITE
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Assurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
41 out of 60
Protection des applications -4-Week ImplementationEXAKIS NELITE
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Une vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
42 out of 60
Cybersecurity Infrastructure - 1d WorkshopBechtle AG
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Mission afin d’évaluer la sécurité de vos actifs Microsoft et proposer des correctifs pour mieux sécuriser votre environnement.
43 out of 60
Frontline Workers : 3 jours - ÉvaluationALFUN
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-firstline-workers product iconFrontline Workersm365-sa-power-platform-for-teams product iconPower Platform for Teams
Digitalisez vos métiers en fournissant des solutions adaptées à vos équipes sur le terrain !
44 out of 60
Microsoft 365 Sécurité : 1-S implémentationEFISENS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Bénéficiez d’une sécurité complète et protéger votre entreprise contre les menaces avancées en temps réel
45 out of 60
Audit de Sécurité Microsoft 365: 4-days WorkshopDEEPDEF
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Audit de sécurité d'un tenant Microsoft 365 avec des licences EMS E3 ou E5 avec plan de remédiation
46 out of 60
Data Classification and labelling: 6-Months Impl.Toreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Data classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
47 out of 60
Protection de l'identité : Implémentation 1 moisROXYS
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Vous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
48 out of 60
Secure Your SaaS/IaaS: 1-Mth Proof of ConceptVorstone
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Proof of Concept on how you can secure your Saas and/or IaaS
49 out of 60
Risk analysis Office 365, Azure: 3-Wk AssessmentVorstone
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Assessment to understand the risks exposure and how enhance your security posture
50 out of 60
Shadow IT: 6-Wk Proof of Concept.Vorstone
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Proof of Concept in order to identify applications not controlled by your IT department
51 out of 60
Passwordless: 3-Wk Proof of ConceptVorstone
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Remove the use of password on your Information System
52 out of 60
Audit SSI: 1-Wk AssessmentVorstone
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Assessment in order to identify the weaknesses of your IaaS/SaaS
53 out of 60
Evaluation Outils sécurité Microsoft 365: 5-D AssessmentELIADIS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Evaluez vos menaces et découvrez les outils sécurité Microsoft 365, à destination des DSI de sociétés de 300 à 5000 users. Découvrez, améliorez votre sécurité, élaborez un plan sécurité avec un expert
54 out of 60
Sécurisation-terminaux- Microsoft 365: 5-D AssessmentELIADIS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Découvrir, apprendre, protéger, sécuriser les identités de l'ensemble des terminaux avec Endoint manager. Obtenir des recommandations expertes sur les prochaines étapes de sécurisation des appareils.
55 out of 60
FONDATION ZERO TRUST - 2 Days AtelierJCD GROUPE
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Construire les fondations du modèle de sécurité « Zero Trust » avec la sécurité des identités
56 out of 60
Claranet - EDR Managé : 1-Hr Briefing.Claranet
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Solution EDR Managé par Claranet : Réunion d’information. Devenir proactif de la sécurité opérationnelle de vos endpoints !
57 out of 60
Smart Services - Security - 12 months ImplementationElgon S.A.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Smart Services, mise en place des bonne pratique sécurité pour vos service Microsoft 365 et Azure
58 out of 60
CLOUD PC - 3 Days - AtelierJCD GROUPE
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Offrez à vos employés l'accès à une expérience de bureau sécurisée, où qu'ils soient
59 out of 60
MODERN MANAGEMENT- 2 Days - AtelierJCD GROUPE
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Gérez et protégez matériels, données et utilisateurs avec Microsoft Endpoint Manager afin d'améliorer le niveau de sécurité global de votre plateforme
60 out of 60
  • Anterior
  • 1
  • 2
  • 3
  • 4
  • 5
Sobre el Marketplace
  • Per què el Microsoft Marketplace
  • Blogs
  • Històries de clients
Per a clients
  • Horari d'oficina
  • Guia d'inici
  • Documentació tècnica
  • Ofertes privades
  • Microsoft Azure Consumption Commitment
  • Facturació
Per a socis
  • Fes-te soci
  • Obtén la llista
  • Obtén suport de màrqueting
  • Documentació tècnica
  • Guia pas a pas per construir, publicar i vendre
  • Converteix-te en apte per a la venda conjunta
  • Comunitat del Marketplace per a socis
  • Vendes del Marketplace dirigides per canals
  • Ofertes privades multipart per a socis del canal
Negoci
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Empresa
  • Carreres professionals
  • Quant a Microsoft
  • Notícies de l'empresa
  • Privadesa a Microsoft
  • Inversors
  • Accessibilitat
  • Sostenibilitat
Català (català) Icona de desactivació de les vostres opcions de privadesa Opcions de privadesa Privacitat en l'estat del consumidor
  • Mapa del lloc
  • Contacte
  • Privadesa i galetes
  • Condicions d\'ús
  • Marques comercials
  • Quant als nostres anuncis
  • Administra les galetes
  • © Microsoft 2026