Envieu-nos un comentari
Ajuda i assistència tècnica
Elements desats
Plans privats
Espereu un moment i inicieu la sessió...
FiltresEsborra-ho tot

  • La vostra ubicació
  • Productes (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Adopció i administració de canvis
      • Trucades per al Microsoft Teams
      • Seguretat al núvol
      • Serveis d'assessorament de compliment
      • Implementació i administració de dispositius
      • Treballadors de primera línia
      • Administració d'identitat i accés
      • Protecció i govern de la informació
      • Risc intern
      • Coneixement i conclusions
      • Sales de reunions per al Microsoft Teams
      • Reunions per al Microsoft Teams
      • Microsoft 365 Live Events
      • Administració de dispositius mòbils
      • Power Platform for Teams
      • Solucions personalitzades per al Teams
      • Implementació del treball en equip
      • Protecció contra amenaces
      • Workplace Analytics
    • Power Platform
  • Sectors
  • Tipus de servei
  • Model de preus

Professional Services resultats

Es mostren  resultats a professional services.
Mostra resultats que hi tenen relació a núvols del sector.
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Two-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
1 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
2 out of 60
Unified Access & Protection with Microsoft Entra Global Secure AccessMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Step confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
3 out of 60
Copilot for Microsoft 365: Taller De Seguridad Y Datos De 1 DíaAwara IT
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Desbloquea el máximo potencial de Copilot for Microsoft 365 mientras refuerzas la seguridad y protección de tus datos con un taller intensivo de un día dirigido por los expertos de Awara IT.
4 out of 60
Microsoft 365 Copilot Onboarding WorkshopSMART business LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Join our interactive workshop to learn about the capabilities of Microsoft Copilot for Microsoft 365!
5 out of 60
Data Security & Protection: 8 weeks - ImplementationMazzy Technologies Corp.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
6 out of 60
Hybrid Infrastructure Overview WorkshopAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Rapid hybrid‑cloud design workshop — learn best practices, pitfalls, and licensing tips for Microsoft on‑prem + Azure/Microsoft 365.
7 out of 60
Identity Health CheckMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Mobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
8 out of 60
Microsoft 365 Security Review: AssessmentCyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Identify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
9 out of 60
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
10 out of 60
Endpoint Management: 3 Days WorkshopINOVASYS FOR SYSTEMS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Microsoft funded Endpoint Management is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
11 out of 60
NEST ArenaNoibit
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Two-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
12 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyant
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Manage and Investigate Risk and Threat Protection
13 out of 60
Cloud App Security – Advanced CASB Solution for Cloud Data ProtectionITX360 (Pvt) Ltd.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Secure your cloud apps with real-time monitoring, Shadow IT discovery, and automated data protection. Integrated with Microsoft Information Protection for enhanced compliance and threat detection.
14 out of 60
Security Operations Center with Microsoft SentinelAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Monitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
15 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support. ​
16 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
17 out of 60
Copilot for Microsoft 365: 1-Day Data and Security WorkshopAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Unlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
18 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
19 out of 60
Microsoft 365 Copilot Risk Assessment: 1-Week Strategic WorkshopAtmosera
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Uncover data risks and prepare for secure Copilot adoption with a Microsoft 365 risk assessment.
20 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
21 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
22 out of 60
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
23 out of 60
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Office 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
24 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
25 out of 60
Pently SOCaaSPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Full Managed Security Service with a personal touch and individually build for each customer
26 out of 60
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyant
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
27 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
28 out of 60
Security Architecture Design and Implementation Service上海诺未网络科技有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
29 out of 60
IT Infrastructure OptimizationAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
IT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
30 out of 60
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Evaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
31 out of 60
Ctelecoms Threat Protection EngagementConsolidated Telecoms (Ctelecoms)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Ctelecoms offers you the opportunity to learn how to put next-generation Microsoft Security tools to work for you.
32 out of 60
Zero Trust Model - 4h assessmentReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Zero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
33 out of 60
Identity as a Service | Assure 365CyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Fully Managed Identity & Access Management (IAM) solution, ensuring secure authentication, access control and compliance enforcement—Powered by Microsoft Entra ID.
34 out of 60
Identity and Access Control ImplementationSMART business LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Cybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
35 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
36 out of 60
SYSTEX Data Security and Compliance Solution精诚(中国)企业管理有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
37 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
38 out of 60
Rapid Remediation of Microsoft Secure ScoreCyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost your Microsoft Secure Score, reduce risk and increase cyber resilience with expert-led rapid remediation.
39 out of 60
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/S
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
We can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
40 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/S
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Conscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
41 out of 60
Microsoft 365 Copilot for Executives WorkshopSMART business LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Join our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
42 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
43 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
44 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Get started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
45 out of 60
AI Agents In CopilotINOVASYS FOR SYSTEMS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Inovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
46 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies Services
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Readiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
47 out of 60
SEIDOR Modern Workplace with Microsoft 365 1-Month ImplementationSEIDOR SA
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
We promote and respond to the current needs of companies in terms of mobility, security, productivity, communication and collaboration through the evolution of their workstations
48 out of 60
Ctelecoms Mitigate Compliance and Privacy Risks WorkshopConsolidated Telecoms (Ctelecoms)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
The Mitigate Compliance & Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organization.
49 out of 60
Ctelecoms Protect and Govern Sensitive Data WorkshopConsolidated Telecoms (Ctelecoms)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The Protect & Govern Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
50 out of 60
Ctelecoms Secure Identities and Access WorkshopConsolidated Telecoms (Ctelecoms)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure Identities and Access Workshop helps you find and mitigate identity risks and safeguard their organizations with a seamless identity solution.
51 out of 60
Ctelecoms Defend Against Threats with SIEM Plus XDR WorkshopConsolidated Telecoms (Ctelecoms)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Defend Against Threats with SIEM Plus XDR Workshop Learn how to put next-generation Microsoft security tools to work for you.
52 out of 60
Minsait Threath Protection Engagement WorkshopMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Evaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
53 out of 60
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security Kft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and harden Microsoft Security configurations based on industry best practices
54 out of 60
Purview Information Protection: setup and adoptionDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
55 out of 60
Quadra BluForge Managed XDRQuadrasystems.net (India) P Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Discover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
56 out of 60
ITE ZeroTrust360™Information Technology of Egypt Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
ITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
57 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Servicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
58 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
59 out of 60
Microsoft Copilot Solutions: 4 Weeks ImplementationQatar Datamation Systems
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Provide Assessment and Implementation of Copilot for Microsoft 365 and Copilot for Security
60 out of 60
  • Anterior
  • 1
  • 2
  • 3
  • 4
  • Següent
Sobre el Marketplace
  • Per què el Microsoft Marketplace
  • Blogs
  • Històries de clients
Per a clients
  • Horari d'oficina
  • Guia d'inici
  • Documentació tècnica
  • Ofertes privades
  • Microsoft Azure Consumption Commitment
  • Facturació
Per a socis
  • Fes-te soci
  • Obtén la llista
  • Obtén suport de màrqueting
  • Documentació tècnica
  • Guia pas a pas per construir, publicar i vendre
  • Converteix-te en apte per a la venda conjunta
  • Comunitat del Marketplace per a socis
  • Vendes del Marketplace dirigides per canals
  • Ofertes privades multipart per a socis del canal
Negoci
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Empresa
  • Carreres professionals
  • Quant a Microsoft
  • Notícies de l'empresa
  • Privadesa a Microsoft
  • Inversors
  • Accessibilitat
  • Sostenibilitat
Català (català) Icona de desactivació de les vostres opcions de privadesa Opcions de privadesa Privacitat en l'estat del consumidor
  • Mapa del lloc
  • Contacte
  • Privadesa i galetes
  • Condicions d\'ús
  • Marques comercials
  • Quant als nostres anuncis
  • Administra les galetes
  • © Microsoft 2026