Υποβολή σχολίων
Help & support
Αποθηκευμένα στοιχεία
Ιδιωτικά προγράμματα
Περιμένετε λίγο, συνδέεστε...
ΦίλτραΑπαλοιφή όλων

  • Η τοποθεσία σας
  • Προϊόντα (1)
    • Azure (1)
      • AI & Machine Learning
      • Ανάλυση
      • App Modernization
      • Archive
      • Backup
      • Big Data
      • Data Platform
      • DevOps
      • Disaster Recovery
      • Identity
      • Internet of Things
      • Migration
      • Networking
      • Security
      • Storage
    • Dynamics 365
    • Microsoft 365
    • Power Platform
  • Κλάδοι επιχειρηματικής δραστηριότητας
  • Τύπος υπηρεσίας
  • Μοντέλο τιμολόγησης

Professional Services αποτελέσματα

Εμφάνιση αποτελεσμάτων στο professional services.
Cloud Architecture Review: 3-Wk AssessmentSoftchoice
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Optimize your cloud footprint by acting on a prioritized remediation roadmap
1 out of 60
Cloud Security Approach: 2-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Through the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
2 out of 60
Secure SAP on Azure : 2-Hrs BriefingTCS - Security
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
2 Hrs briefing on TCS Managed Security services offering leveraging contextual and pre-integrated solution for protecting SAP ecosystem on Azure
3 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Evolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
4 out of 60
Cloud Security Posture: 2-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
5 out of 60
Cloud Security Deployment: 4-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Implementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
6 out of 60
Cloud Security Compliance: 4-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
7 out of 60
Cloud Security Services: 12-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
We audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
8 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield Ltd
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Spartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
9 out of 60
IGA and Zero Trust with Microsoft Entra ID and Saviynt: ImplementationOxford Computer Group LLC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Oxford Computer Group, Saviynt, and Microsoft's Identity Governance & Administration (IGA) solution propels enterprise organizations toward Zero Trust security.
10 out of 60
IBM Threat Management with Microsoft’s SAP Threat Monitoring Solution for Microsoft AzureIBM Security Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Consulting and managed security services from IBM Security supporting Microsoft Defender, Azure Sentinel, and the SAP Threat Monitoring solution for Sentinel
11 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Delivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
12 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.ai
+1
Applicable to:
identity product iconIdentity
Implementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
13 out of 60
HCLTech Unified Digital AccessHCL America Inc_HCLT
+1
Applicable to:
identity product iconIdentity
HCLTech’s Unified Digital Access solution protects enterprise users and apps from cybersecurity attacks by aiding with right enterprise security posture with easy access to Apps and services.
14 out of 60
Accelerating Cloud Virtual Desktops: 2-Hour WorkshopSlalom Consulting
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationnetworking product iconNetworking
This Free Workshop will introduce you to how Azure Virtual Desktops help you embrace a remote workforce while maintaining control through secure workstation experiences on any device.
15 out of 60
Transition To Cloud: 2-Day WorkshopSaportif Technology QFZ LLC
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Productivity and teamwork are fundamental to build resilience for your people, teams, and organization.
16 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Our offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
17 out of 60
Microsoft Sentinel: 2 Hour WorkshopSlalom Consulting
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
This FREE 2 Hour Workshop will help you learn how Microsoft Sentinel is a scalable, cloud-native solution for SIEM and SOAR, incorporating proven Azure services, like Log Analytics and Logic Apps.
18 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private Limited
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
We help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
19 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private Limited
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
We help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
20 out of 60
Azure Security Architecture Assessment - 3 weeksCGI Inc.
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Have confidence that your Azure tenant’s security posture meets your business needs with our security architecture and implementation assessment.
21 out of 60
Privileged Identity Management JumpstartSteeves
+2
Applicable to:
identity product iconIdentitymigration product iconMigration
Understand and control privileged accounts with a simple to implement solution
22 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Get a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
23 out of 60
Azure Virtual Desktop: 2-Wk ImplementationPetabytz Inc
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Start experiencing the best kind of virtualization with Azure Virtual Desktop in minutes to enable remote work. Provides employees the same experience they would have on a local desktop.
24 out of 60
skillup_consulting_openedx_v1Flexible Road LLC
+3
Applicable to:
backup product iconBackupidentity product iconIdentitystorage product iconStorage
Open edX Learning Management System with Azure.
25 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitynetworking product iconNetworking
Secure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
26 out of 60
Secure Identities with Cognizant's Next-Gen Microsoft Defender for Identity ServiceCognizant
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Secure your identities with Cognizant’s Next-Gen Identity and Access Management Service, powered by Microsoft Defender for Identity and Azure Active Directory
27 out of 60
Azure Active Directory Migration: 3-Wk AssessmentiC Consult Gesellschaft für Systemintegration und Kommunikation mbH
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
This offer is ideal for customers that want to consolidate grown Identity and Access Management/MFA solutions to reach a best of breed approach for Azure AD infrastructure and Azure AD principles.
28 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Implementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
29 out of 60
ACE AVD: 4-Wk ImplementationDevoteam France
+2
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentity
Azure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
30 out of 60
SAP SuccessFactors and Microsoft Entra ID Integration: 6-wk ImplementationOxford Computer Group LLC
+1
Applicable to:
identity product iconIdentity
Enable User Lifecycle Management by integrating SAP SuccessFactors and Microsoft Entra ID.
31 out of 60
Assesment Azure Base4Base4 Security Chile SPA
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
32 out of 60
Azure Security Accelerator SuiteNeudesic
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Mitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
33 out of 60
Managed Services for Microsoft EntraDXC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Advisory and Managed Services for Microsoft Entra
34 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POCITC Secure Ltd
+3
Applicable to:
data-platform product iconData Platformidentity product iconIdentitysecurity product iconSecurity
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
35 out of 60
Azure Virtual Desktop: 4-Week ImplementationIT Weapons
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
A 4-week consulting implementation of Azure Virtual Desktop followed by an ongoing managed service that provides employees with secure access to their office desktop no matter where they work
36 out of 60
Security Discovery: 4-Wk AssessmentProServeIT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
A security discovery & assessment will provide a new understanding of cyber threat trends & let you know where to start. Ensure your business continuity, protect your reputation & instill trust.
37 out of 60
Cloud Assessment: 2-wk assessment on effective, secure use of Azure & Microsoft 365IMS Solutions Group
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Assess for efficient and secure deployment of Azure and Microsoft 365 with a focus on appropriate licenses, features, and resource usage - for small and medium businesses.
38 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARS
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitymigration product iconMigration
ALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
39 out of 60
Security Level Up: 4-Wk ImplementationProServeIT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Build your security baseline environment and level it up with the appropriate Microsoft cybersecurity technologies. Ensure your business continuity even after a cyberattack & protect your reputation.
40 out of 60
Security Managed Services Consulting: 12-Month ImplementationProServeIT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Enhance your cybersecurity baseline & take it to a higher standard with appropriate Microsoft cybersecurity technologies. Proactive measures & regular audits will ensure business continuity.
41 out of 60
Bulletproof 365 Enterprise: MXDR Service (Sentinel and Defender for Cloud)Bulletproof Solutions Inc.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
With the combination of SIEM+DfC, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
42 out of 60
CloudPOS: 4-Week ImplementationMediasoft Data Systems Limited
+3
Applicable to:
analytics product iconAnalyticsarchive product iconArchiveidentity product iconIdentity
The all-in-one cloud-based point-of-sale solution. Boost efficiency, streamline operations, and enhance the customer experience with the user-friendly, secure, and fast software solutions.
43 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitystorage product iconStorage
DotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
44 out of 60
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITED
+3
Applicable to:
analytics product iconAnalyticsdata-platform product iconData Platformidentity product iconIdentity
Provide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
45 out of 60
Red Canary Microsoft Sentinel WorkshopRed Canary
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Get an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
46 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. Israel
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Accelerate your digital transformation with Cloud and Collaboration tools
47 out of 60
Security as a Service: 3-Wk ImplementationA3Cloud Solutions
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Improve your security of your solutions and infrastructures in Azure Cloud.
48 out of 60
Azure Security Essentials: 3-Wk ImplementationAgile IT
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Onboarding Azure for Security and Compliance (Essentials) seeks to reduce the mean time to detection by consolidating logging, analytics, detection, and response into a single cohesive solution
49 out of 60
Azure Penetration TestMazzy Technologies Corp.
+3
Applicable to:
data-platform product iconData Platformidentity product iconIdentitysecurity product iconSecurity
This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
50 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Azure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
51 out of 60
Microsoft Intune - Initial Setup for Windows devices: 2-Wk Consulting ServiceIT Partner LLC
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Comprehensive support to customers in their journey of leveraging Microsoft Azure, particularly in getting started with or expanding their utilization of the platform.
52 out of 60
Cloud Security Workshop: 2 half-days workshopMallow Oy
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitysecurity product iconSecurity
We'll check your Azure environment for security issues and suggest remedies for them
53 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
54 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland Oy
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitystorage product iconStorage
Azure Virtual Desktop is not a turnkey service – who is going to run it for you?
55 out of 60
Modern workplace Active DirectorySii Sp. z o.o.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Modern workplace Active Directory implementation, migration and support
56 out of 60
AVD Cost Optimization ProgramTechPlus Talent
+3
Applicable to:
backup product iconBackupidentity product iconIdentitysecurity product iconSecurity
Are you looking to maximize the value of your Azure Virtual Desktop (AVD) environment while minimizing costs? Look no further! Tech Plus Talent is thrilled to present our Azure AVD Cost Optimization P
57 out of 60
AD Domain Consolidation for Migration to Microsoft Entra ID: 6 wk ImpOxford Computer Group LLC
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Get started on your journey towards zero trust by consolidating your organization’s Active Directories for better visibility, efficiency, and security.
58 out of 60
Detection & Response Services (MXDR)Cloud Life
+3
Applicable to:
ai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentitysecurity product iconSecurity
Cloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
59 out of 60
FinOps Adoption ServicesSoftchoice
+2
Applicable to:
analytics product iconAnalyticsidentity product iconIdentity
Attain financial control over your Azure environment to realize your investment in cloud workloads
60 out of 60
  • 1
  • 2
  • 3
  • 4
  • 5
  • Επόμενο
Πληροφορίες για το Marketplace
  • Γιατί το Microsoft Marketplace
  • Ιστολόγια
  • Ιστορίες πελατών
Για πελάτες
  • Ώρες γραφείου
  • Οδηγός έναρξης
  • Τεχνική τεκμηρίωση
  • Ιδιωτικές προσφορές
  • Δέσμευση κατανάλωσης του Microsoft Azure
  • Χρέωση και τιμολόγηση
Για συνεργάτες
  • Γίνετε συνεργάτης
  • Καταχωρηθείτε
  • Λάβετε υποστήριξη μάρκετινγκ
  • Τεχνική τεκμηρίωση
  • Οδηγίες βήμα προς βήμα για τη δημιουργία, δημοσίευση και πώληση
  • Γίνετε επιλέξιμοι για συνεργατική πώληση
  • Κοινότητα Marketplace για Συνεργάτες
  • Πωλήσεις Marketplace με επικεφαλής το κανάλι
  • Ιδιωτικές προσφορές πολλών τμημάτων για συνεργάτες καναλιού
Επιχειρήσεις
  • Microsoft Cloud
  • Ασφάλεια Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Εταιρεία
  • Σταδιοδρομίες
  • Εταιρικά νέα
  • Προστασία προσωπικών δεδομένων στη Microsoft
  • Επενδυτές
  • Βιωσιμότητα
Ελληνικά (Ελλάδα) Εικονίδιο εξαίρεσης σχετικά με τις επιλογές προστασίας προσωπικών δεδομένων σας Οι επιλογές προστασίας προσωπικών δεδομένων σας Προστασία προσωπικών δεδομένων για την υγεία των καταναλωτών
  • Χάρτης τοποθεσίας
  • Επικοινωνήστε μαζί μας
  • Προστασία προσωπικών δεδομένων και cookies
  • Όροι χρήσης
  • Εμπορικά σήματα
  • Πληροφορίες σχετικά με τις διαφημίσεις μας
  • Διαχείριση cookie
  • © Microsoft 2025