Feedback geben
Hilfe und Support
Gespeicherte Elemente
Private Pläne
Nur einen Moment, wir melden Sie an...
FilterAlle löschen

  • Ihr Standort
  • Produkte (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Einführungs- und Änderungsverwaltung
      • Telefonsystem über Microsoft Teams
      • Cloud Security
      • Beratungsdienste zur Compliance
      • Gerätebereitstellung und -verwaltung
      • Mitarbeiter in Service und Produktion
      • Identity & Access Management
      • Information Protection & Governance
      • Insiderrisiko
      • Wissen und Erkenntnisse
      • Besprechungsräume für Microsoft Teams
      • Besprechungen für Microsoft Teams
      • Microsoft 365 Live Events
      • Verwaltung mobiler Geräte
      • Power Platform for Teams
      • Benutzerdefinierte Teams-Lösungen
      • Einsatz von Teamwork
      • Bedrohungsschutz
      • Workplace Analytics
    • Power Platform
  • Branchen
  • Diensttyp
  • Preismodell

Professional Services Ergebnisse

Es werden Ergebnisse in professional services angezeigt.
Cyderes Microsoft Security Adoption AdvisoryCyderes
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
The Microsoft Security Adoption Service is designed to help our clients effective integrate the Microsoft security stack into their production environments.
1 out of 60
Microsoft 365: 3-Week Security Configuration DiagnosisAdvens
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Vérifier les paramétrages de sécurité des composants du tenant Microsoft 365
2 out of 60
NVISO Microsoft 365 Security AssessmentNVISO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
3 out of 60
Mise en oeuvre Information Protection : 4 semaines ImplémentationArtemys
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Sécuriser vos données à l'aide d'une solution robuste et intégrée permettant de protéger les informations sensibles et confidentielles de l'organisation
4 out of 60
Microsoft 365 Copilot Workshop - 2 days WorkshopDEEP by POST Telecom S.A.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Microsoft 365 Copilot Workshop is designed to help organizations adopt Microsoft 365 Copilot
5 out of 60
Accompagnement à la mise en œuvre de Microsoft 365 Copilot 1-Week AssessmentEXAKIS NELITE (Test)
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Un accompagnement sur mesure pour faciliter le déploiement et l’adoption de Microsoft 365 Copilot pour votre entreprise.
6 out of 60
Audit de sécurité : 5 joursEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Evaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
7 out of 60
POC Securité IT : 2 semainesEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Validation des capacités des solutions de sécurité Microsoft dans votre environnement
8 out of 60
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Implémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
9 out of 60
Copilot for Microsoft 365 with Confidence - 2 weeks agoMETSYS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Déployer Microsoft Copilot for Microsoft 365 pour vos utilisateurs en toute confiance
10 out of 60
OCDFR - EMS E5Orange Business Services - OCD FR
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Advisory and design, deployement and support about all Microsoft EMS E5 solutions
11 out of 60
Microsoft 365 Copilot workshop: 1-week consulting servicesUni Systems S.M.S.A.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
12 out of 60
CS Microsoft 365 Copilot for Security 360° - ImplementationCampana & Schott GmbH
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Utilize Microsoft 365 Copilot for Security to leverage AI to secure your company.
13 out of 60
BSE_Cybersecurity_Empower_CYRENProjetlys
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Blue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans la sécurisation de votre SI
14 out of 60
Data Security Envisioning : 10-W workshopSopra Steria France
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
This workshop helps organizations identify data security risks, understand how to mitigate them, and provide structured recommendations for risk mitigation through a comprehensive process.
15 out of 60
CS Role-Based Copilot EnvisioningCampana & Schott GmbH
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
We help to undersand how sales, customer service, and finance functions benefit by implenting role-based Copilots by identifying high-value scenarios, and developing a roadmap for implementation.
16 out of 60
Insight´s Microsoft Cloud Advisory ServiceInsight Technology Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Provides a 2 weeks assessment of our client’s estate across the following six areas: Microsoft 365, Azure, On-Premises, Business Critical Applications, Skills & Resourcing & Cost optimisation.
17 out of 60
Implementation of Copilot readiness assessmentDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
18 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
19 out of 60
Modern Security Operations EngagementFUJITSU
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Detect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
20 out of 60
Support services for Microsoft 365Senetic S.A.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Our offer includes 3 support service packages for Microsoft 365 environment, where we provide support in the correct configuration and implementation of tools.
21 out of 60
Service de sécurisation MicrosoftSTELOGY
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Sécurisation et gouvernance des services, et données sur Microsoft 365
22 out of 60
Secure Your Future: Cybersecurity PathwaysReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Discover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
23 out of 60
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security Kft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and harden Microsoft Security configurations based on industry best practices
24 out of 60
ITE ZeroTrust360™Information Technology of Egypt Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
ITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
25 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
26 out of 60
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
27 out of 60
Microsoft 365 Tenant Setup, 1-Day ImplementationTec Networks GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
We provide you a good-practice configured tenant for the best experience with Microsoft 365
28 out of 60
Intune & Configuration Manager - Co-Management (5 jours) POCInetum (HO)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Inetum accompagne ses clients dans leur transformation digitale et notamment sur la partie Modern Workplace en intégrant les services Cloud Azure et notamment le Co-Management Intune
29 out of 60
Modern WorkPlace PME:15 days ImplementationAurera
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Mise en place d’un environnement de travail collaboratif à l’état de l’art pour les PME, comprenant une plate-forme digitale et des outils permettant une facilité de gestion et de déploiement.
30 out of 60
Security Assessment Microsoft 365: 2day assessmentProdware Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
A service for Office 365 and Microsoft 365 protection
31 out of 60
Microsoft 365 Level Up: 1-Year WorkshopWAKERS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Pour être toujours au top des dernières nouveautés de votre environnement Microsoft 365 pendant 1 an !
32 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
33 out of 60
Migration MSG vers Office 365,10J d'implémentationBSD
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Vous souhaitez migrer depuis Lotus Domino/Gmail/Exchange vers Office 365
34 out of 60
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UK
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Manage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
35 out of 60
Microsoft 365 - adoption: 6-Weeks ImplementationNeos-SDI
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Accompagner le changement vers Microsoft 365: Une approche transverse qui adresse les enjeux de gouvernance, de déploiement, d’adoption et de sécurisation des nouveaux usages Microsoft 365.
36 out of 60
Adoptez Microsoft Edge : 2-Wk ImplementationProjetlys
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Notre approche pour la mise en place et l'adoption de Microsoft Edge.
37 out of 60
Sécurisation des identités - 3-Week ImplementationEXAKIS NELITE
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Assurer la sécurisation des identités puisqu’elles sont la porte d’entrée du système d’information pour les attaquants.
38 out of 60
Protection des applications -4-Week ImplementationEXAKIS NELITE
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Une vision de tous les usages d’applications Cloud réalisée par ses utilisateurs afin de mettre en place des règles de sécurité et de contrôle pour empêcher des comportements comme le Shadow IT.
39 out of 60
Cybersecurity Infrastructure - 1d WorkshopBechtle AG
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Mission afin d’évaluer la sécurité de vos actifs Microsoft et proposer des correctifs pour mieux sécuriser votre environnement.
40 out of 60
Frontline Workers : 3 jours - ÉvaluationALFUN
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-firstline-workers product iconFrontline Workersm365-sa-power-platform-for-teams product iconPower Platform for Teams
Digitalisez vos métiers en fournissant des solutions adaptées à vos équipes sur le terrain !
41 out of 60
Microsoft 365 Sécurité : 1-S implémentationEFISENS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Bénéficiez d’une sécurité complète et protéger votre entreprise contre les menaces avancées en temps réel
42 out of 60
Audit de Sécurité Microsoft 365: 4-days WorkshopDEEPDEF
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Audit de sécurité d'un tenant Microsoft 365 avec des licences EMS E3 ou E5 avec plan de remédiation
43 out of 60
Data Classification and labelling: 6-Months Impl.Toreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Data classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
44 out of 60
Protection de l'identité : Implémentation 1 moisROXYS
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Vous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
45 out of 60
Secure Your SaaS/IaaS: 1-Mth Proof of ConceptVorstone
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Proof of Concept on how you can secure your Saas and/or IaaS
46 out of 60
Risk analysis Office 365, Azure: 3-Wk AssessmentVorstone
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Assessment to understand the risks exposure and how enhance your security posture
47 out of 60
Shadow IT: 6-Wk Proof of Concept.Vorstone
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Proof of Concept in order to identify applications not controlled by your IT department
48 out of 60
Passwordless: 3-Wk Proof of ConceptVorstone
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Remove the use of password on your Information System
49 out of 60
Audit SSI: 1-Wk AssessmentVorstone
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Assessment in order to identify the weaknesses of your IaaS/SaaS
50 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
51 out of 60
ModernIdentity: 3-Months ImplementationEconocom Workplace infra Innovation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Unifier la gestion des identités et des accès grâce à Microsoft 365
52 out of 60
Evaluation Outils sécurité Microsoft 365: 5-D AssessmentELIADIS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Evaluez vos menaces et découvrez les outils sécurité Microsoft 365, à destination des DSI de sociétés de 300 à 5000 users. Découvrez, améliorez votre sécurité, élaborez un plan sécurité avec un expert
53 out of 60
Sécurisation-terminaux- Microsoft 365: 5-D AssessmentELIADIS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Découvrir, apprendre, protéger, sécuriser les identités de l'ensemble des terminaux avec Endoint manager. Obtenir des recommandations expertes sur les prochaines étapes de sécurisation des appareils.
54 out of 60
FONDATION ZERO TRUST - 2 Days AtelierJCD GROUPE
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Construire les fondations du modèle de sécurité « Zero Trust » avec la sécurité des identités
55 out of 60
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
This hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
56 out of 60
Claranet - EDR Managé : 1-Hr Briefing.Claranet
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Solution EDR Managé par Claranet : Réunion d’information. Devenir proactif de la sécurité opérationnelle de vos endpoints !
57 out of 60
Microsoft 365 Governance: 1 month AssessmentCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Crayon Microsoft 365 Governance Assessment will assess your configuration and build recommendation report
58 out of 60
Modernize Endpoints (Microsoft Intune): 1 Day WorkshopCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Endpoint Management Workshop is a one-day engagement that will help you showcase the value of Microsoft Endpoint Manager and how to manage users’ devices and apps from anywhere.
59 out of 60
Road to Microsoft 365: 1 month ImplementationCrayon
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Crayon Microsoft 365 migration services brings best practices and expertise to assure seamless migration.
60 out of 60
  • Zurück
  • 2
  • 3
  • 4
  • 5
  • 6
  • Weiter
Informationen zum Marketplace
  • Warum Microsoft Marketplace
  • Blogs
  • Kundenreferenzen
Für Kunden
  • Geschäftszeiten
  • Leitfaden „Erste Schritte“
  • Technische Dokumentation
  • Private Angebote
  • Microsoft Azure Consumption Commitment
  • Abrechnung und Fakturierung
Für Partner
  • Partner werden
  • Lassen Sie sich in unsere Partnerliste aufnehmen
  • Marketingsupport erhalten
  • Technische Dokumentation
  • Schritt-für-Schritt-Anleitung zum Erstellen, Veröffentlichen und Verkaufen
  • Co-Selling-Berechtigung erhalten
  • Marketplace-Community für Partner
  • Kanalbasierter Marketplace-Vertrieb
  • Private mehrteilige Angebote für Kanalpartner
Unternehmen
  • Microsoft KI
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Kleine Unternehmen
Im Unternehmen
  • Jobs & Karriere
  • Das Unternehmen Microsoft
  • Unternehmensnachrichten
  • Datenschutz bei Microsoft
  • Investoren
  • Nachhaltigkeit
  • LkSG Beschwerdeverfahren
Deutsch (Deutschland) Abwahlsymbol „Ihre Datenschutzoptionen“ Ihre Datenschutzoptionen Verbraucherdatenschutz für Gesundheitsdaten
  • Siteübersicht
  • Contact Us
  • Datenschutz und Cookies
  • Nutzungsbestimmungen
  • Marken
  • Informationen zu unseren Anzeigen
  • Cookies verwalten
  • © Microsoft 2026