Feedback geben
Hilfe und Support
Gespeicherte Elemente
Private Pläne
Nur einen Moment, wir melden Sie an...
FilterAlle löschen

  • Ihr Standort
  • Produkte (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Einführungs- und Änderungsverwaltung
      • Telefonsystem über Microsoft Teams
      • Cloud Security
      • Beratungsdienste zur Compliance
      • Gerätebereitstellung und -verwaltung
      • Mitarbeiter in Service und Produktion
      • Identity & Access Management
      • Information Protection & Governance
      • Insiderrisiko
      • Wissen und Erkenntnisse
      • Besprechungsräume für Microsoft Teams
      • Besprechungen für Microsoft Teams
      • Microsoft 365 Live Events
      • Verwaltung mobiler Geräte
      • Power Platform for Teams
      • Benutzerdefinierte Teams-Lösungen
      • Einsatz von Teamwork
      • Bedrohungsschutz
      • Workplace Analytics
    • Power Platform
  • Branchen
  • Diensttyp
  • Preismodell

Professional Services Ergebnisse

Es werden Ergebnisse in professional services angezeigt.
Anzeigen verknüpfte Ergebnisse in branchenclouds.
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Boost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
1 out of 40
Pently SOCaaSPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Full Managed Security Service with a personal touch and individually build for each customer
2 out of 40
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
3 out of 40
Identity and Access Control ImplementationSMART business LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Cybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
4 out of 40
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Discover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
5 out of 40
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
6 out of 40
Purview Information Protection: setup and adoptionDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
7 out of 40
Microsoft 365 Copilot for Executives WorkshopSMART business LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Join our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
8 out of 40
Dell Implementation Services for Copilot SecurityDell Technologies Services
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Readiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
9 out of 40
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
10 out of 40
Minsait Cyber SmartMDR SOC ServiceMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Servicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
11 out of 40
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Get started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
12 out of 40
Liquid C2 Secure360 MDR & MXDRLiquid Telecommunications South Africa (PTY) LTD
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Proactive Threat Detection and Rapid Response—Simplified. Powered by Microsoft Sentinel & Defender
13 out of 40
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
14 out of 40
Microsoft 365 Security Design and Deployment: 1 Hour BriefingCloud Essentials
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
An initial briefing to understand business requirements in advance of a design workshop and deployment of advanced Microsoft 365 cloud security features
15 out of 40
First Technology - Darktrace POVFirst Technology (Pty) Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Reduce risk and harden security in Microsoft 365 with the Darktrace Cyber AI Loop - Proof of Value (POV)
16 out of 40
Cyber_Protection_Pack_for_Microsoft_365Global Micro Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Security baselines and best practices for Microsoft 365 customers
17 out of 40
Gijima Microsoft 365 Zero Trust FrameworkGijima
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
The Gijima implementation of Microsoft 365 E5 follows the cutting-edge principles of zero trust security.
18 out of 40
NEC Africa - Microsoft Security Solution ImplementationNEC XON Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Do you have a Microsoft Security Ecosystem but are unsure how to effectively utilize it for your cyber resilience journey? NEC Africa Systems provides full security solution implementation services
19 out of 40
Copilot for Security 5-Day enablementNetsurit
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
This short enablement engagement will assess the state of your security environment, identify opportunities to enhance your solution by adding Copilot for Security.
20 out of 40
DotCom SECaaS SolutionsDotcom Software Projects
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Comprehensive Solutions for Enhanced Protection by Dotcom Software
21 out of 40
Implementation of Copilot readiness assessmentDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
22 out of 40
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
23 out of 40
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Professional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
24 out of 40
Netsurit Security Optimization Service (NSOS) - Managed Service - 12 MonthsNetsurit
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Netsurit Security Optimization Service is designed to enhance and maintain the security posture of its customers' Microsoft environments.
25 out of 40
Advanced Microsoft Entra Verified ID - Implementation - 3 WeeksNetsurit
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Netsurit’s Secure your Identity solution enables automated user lifecycle management across HR systems both on-premises and in the cloud.
26 out of 40
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security Kft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and harden Microsoft Security configurations based on industry best practices
27 out of 40
ITE ZeroTrust360™Information Technology of Egypt Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
ITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
28 out of 40
Liquid C2 SECaaS Bundles for SMBsLiquid Telecommunications South Africa (PTY) LTD
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Trusted Cyber Defense for Growing Businesses. Powered by Microsoft Business Premium + Defender & Purview Suites Add-ons
29 out of 40
Cloudmania Security Posture AssessmentsLiquid Telecommunications South Africa (PTY) LTD
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Gain complete visibility and eliminate cloud security blind spots with Cloudmania’s Microsoft Security Posture Assessment
30 out of 40
Frontier Firm LiveSulava Oy
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Frontier Firm Live is Sulava MEA’s flagship subscription service designed to help organisations transition into AI-native enterprises.
31 out of 40
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
32 out of 40
Liquid C2 Secure360 SOCMonAlertLiquid Telecommunications South Africa (PTY) LTD
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Stay Ahead of Threats with Real-Time SOC Alerts. Powered by Microsoft Sentinel
33 out of 40
SOC as a Service_1 day ImplementationTarsus On Demand (Pty) Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SOC is a managed service that leverages a bespoke Threat Monitoring Platform. This platform detects malicious and suspicious activity across 3 critical attack vectors: Endpoint, Network & Cloud.
34 out of 40
Compliance Manager Training: 1/2 day WorkshopCloud Essentials
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Compliance Manager Training - a 1/2 day training session about Microsoft 365 Compliance Manager facilitated by an experienced member of our team
35 out of 40
Manage and Investigate Risk: 2 weeks WorkshopCloud Essentials
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
A risk check followed by advisory workshop to build a sustainable strategy around insider risk within Microsoft 365 and further accelerate your compliance journey.
36 out of 40
Discover Sensitive Data: 2 weeks WorkshopCloud Essentials
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Discover Sensitive Data Workshop - an automated data risk check to uncover dark data risks with analysis and recommendations
37 out of 40
Microsoft 365 Security Assessment and Roadmap: 1 Day WorkshopCloud Essentials
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Accelerating your Zero Trust strategy through a readiness assessment, workshop and roadmap
38 out of 40
Microsoft 365 Security Assessment: 6-day AssessmentPerformanta
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Performanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
39 out of 40
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
40 out of 40
  • Zurück
  • 1
  • 2
  • 3
  • 4
Informationen zum Marketplace
  • Warum Microsoft Marketplace
  • Blogs
  • Kundenreferenzen
Für Kunden
  • Geschäftszeiten
  • Leitfaden „Erste Schritte“
  • Technische Dokumentation
  • Private Angebote
  • Microsoft Azure Consumption Commitment
  • Abrechnung und Fakturierung
Für Partner
  • Partner werden
  • Lassen Sie sich in unsere Partnerliste aufnehmen
  • Marketingsupport erhalten
  • Technische Dokumentation
  • Schritt-für-Schritt-Anleitung zum Erstellen, Veröffentlichen und Verkaufen
  • Co-Selling-Berechtigung erhalten
  • Marketplace-Community für Partner
  • Kanalbasierter Marketplace-Vertrieb
  • Private mehrteilige Angebote für Kanalpartner
Unternehmen
  • Microsoft KI
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Kleine Unternehmen
Im Unternehmen
  • Jobs & Karriere
  • Das Unternehmen Microsoft
  • Unternehmensnachrichten
  • Datenschutz bei Microsoft
  • Investoren
  • Nachhaltigkeit
  • LkSG Beschwerdeverfahren
Deutsch (Deutschland) Abwahlsymbol „Ihre Datenschutzoptionen“ Ihre Datenschutzoptionen Verbraucherdatenschutz für Gesundheitsdaten
  • Siteübersicht
  • Contact Us
  • Datenschutz und Cookies
  • Nutzungsbestimmungen
  • Marken
  • Informationen zu unseren Anzeigen
  • Cookies verwalten
  • © Microsoft 2026