Υποβολή σχολίων
Βοήθεια και υποστήριξη
Αποθηκευμένα στοιχεία
Ιδιωτικά προγράμματα
Περιμένετε λίγο, συνδέεστε...
ΦίλτραΑπαλοιφή όλων

  • Η τοποθεσία σας
  • Προϊόντα (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Διαχείριση υιοθετήσεων και αλλαγών
      • Κλήσεις για το Microsoft Teams
      • Ασφάλεια Cloud
      • Συμβουλευτικές υπηρεσίες συμμόρφωσης
      • Ανάπτυξη και διαχείριση συσκευών
      • Εργαζόμενοι πρώτης γραμμής
      • Διαχείριση ταυτοτήτων και πρόσβασης
      • Προστασία πληροφοριών και διαχείριση
      • Εσωτερικός κίνδυνος
      • Γνώση και πληροφορίες
      • Αίθουσες συσκέψεων για το Microsoft Teams
      • Συσκέψεις για το Microsoft Teams
      • Microsoft 365 Live Events
      • Διαχείριση κινητών συσκευών
      • Power Platform for Teams
      • Προσαρμοσμένες λύσεις teams
      • Ανάπτυξη ομαδικής εργασίας
      • Προστασία από απειλές
      • Workplace Analytics
    • Power Platform
  • Κλάδοι επιχειρηματικής δραστηριότητας
  • Τύπος υπηρεσίας
  • Μοντέλο τιμολόγησης

Συμβουλευτικές υπηρεσίες αποτελέσματα

Εμφάνιση αποτελεσμάτων στο συμβουλευτικές υπηρεσίες.
Προβολή Υπάρχουν σχετικά αποτελέσματα στην cloud κλάδου επιχειρηματικής δραστηριότητας.
TCS Agent Governance as a Service - Implementation - 12 weeksTCS - Digital Workplace
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Transition from “Shadow AI” to a “governed, enterprise‑grade innovation model”—controlling agent sprawl, data leakage risks, and unvetted maker behavior.
1 out of 47
Foundations Agent 365 Assessment & RoadmapProtiviti
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Executive-ready strategy engagement for Microsoft Agent 365 that helps organizations learn how to prepare for and govern AI agents as a ‘digital workforce,’ with visibility, security, and audit-ready
2 out of 47
Erste Schritte zur NIS-2-Readiness: AppSphere NIS-2 Readiness EngagementAppSphere AG
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Das Engagement umfasst einen NIS‑2 Compliance Check zur Bewertung des aktuellen Compliance‑Stands sowie ein Microsoft 365-Tenant Assessment, das sicherheitsrelevante Schwachstellen sichtbar macht.
3 out of 47
Enabling Secure AI Adoption with Agent 365PwC (Global)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
PwC will help enhance visibility across the agent estate, define critical governance and security controls, and deliver an Agent 365 roadmap ready for action
4 out of 47
Microsoft 365 E7 Frontier Transformation ServiceExquitech
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Accelerate your AI journey with a secure, governed, and scalable solution—combining Microsoft 365 E7, Copilot, and Agent 365 with expert-led deployment and adoption services.
5 out of 47
Threat Protection Envisioning Workshop Marketplace OfferOlive + Goose
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
A guided security envisioning workshop that helps organizations assess current threat protection capabilities and define a practical roadmap using Microsoft security solutions.
6 out of 47
Microsoft 365 Security Confidence AcceleratorReliance Infosystems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A structured Microsoft 365 security posture accelerator that identifies and reduces security risk across identity, devices, applications, and data — delivering clear outcomes.
7 out of 47
Microsoft 365 Security Readiness & Assurance AcceleratorReliance Infosystems Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A structured Microsoft 365 security readiness engagement that identifies, prioritises, and reduces risk across identity, devices, applications, and data — delivering audit confidence, & Clarity
8 out of 47
Hitachi Solutions – Agent 365 Governance AcceleratorHitachi Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Establish governance, control, and operating model for AI agents using Microsoft Agent 365 to enable secure, scalable enterprise adoption.
9 out of 47
Salesforce and Microsoft Defender IntegrationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure Salesforce with Defender to detect compromised accounts, monitor exfiltration, and automate threats. Enforce Conditional Access and Sentinel. Pricing/timeline customized post-scoping.
10 out of 47
GCCH Enclave Rapid Deployment in 2 WeeksR3
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Deploy a secure, GCCH enclave in just two weeks with a standardized approach for rapid CMMC readiness.
11 out of 47
Salesforce and OneDrive for Business IntegrationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Automate doc management by linking OneDrive files to Salesforce records securely. Cuts manual uploads, ensures version control, & maintains compliance. Pricing/timeline scoped per project.
12 out of 47
Salesforce and Microsoft Intune IntegrationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Secure Salesforce access with Intune. Enforce device compliance, conditional access, and data protection for CRM. Pricing and timeline customized post-scoping.
13 out of 47
Microsoft 365 E7 Envisioning by SoftwareOneSoftwareOne
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-meetings-for-microsoft-teams product iconMeetings for Microsoft Teams
Microsoft E7 Envisioning is a focused, advisory-led engagement that gives you a clear, defensible path to E7 adoption.
14 out of 47
Red Teaming by H OneH One (Private) Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
By H One, powered by Axiata Cyber Fusion Center (ACFC) Simulate real-world adversaries to uncover hidden vulnerabilities and strengthen your cyber resilience.
15 out of 47
HCLTech Frontline Worker Digital Experience – Assessment & Implementation support for Empowering Frontline WorkersHCL America Inc_HCLT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-firstline-workers product iconFrontline Workers
HCLTech’s solution streamlines frontline communication, digital workflows, and secure device management, powered by HCLTech, Microsoft, and Zebra for a modern, sustainable frontline workplace.
16 out of 47
Endpoint Management: 3-Day WorkshopApex Digital Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Begin the steps to manage and protect your devices, your apps, and your users
17 out of 47
Microsoft 365 Identity & Security: 2-Wk AssessmentPSM Partners
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Customized identity and security assessment focused on the Microsoft 365 platform
18 out of 47
Microsoft 365 Value Discovery - Workshop - 1 DayDynTek Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
OUR TEAM OF MICROSOFT CONSULTANTS REVIEW AND EVALUATE THE IMPACT OF MICROSOFT 365 IN YOUR ENVIRONMENT OF MICROSOFT 365 IN YOUR ENVIRONMENT
19 out of 47
Healthcare Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 Healthcare Security Briefing: 60 minute briefing to address unique threats that a healthcare organization faces
20 out of 47
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Ravenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
21 out of 47
Big Green IT Security Assessment: 3-WeekBig Green IT - Dev
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
22 out of 47
Managed Security for Compliance: 1 yr Mgd ServiceInsight
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
Discover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
23 out of 47
Microsoft 365 License Optimization:1-hr AssessmentFrontier Technology, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Review current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
24 out of 47
Microsoft Managed Security ServicesNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Netrix’s 24x7x365 virtual Security Operations Center (SOC) leverages Microsoft’s enterprise-grade security software to monitor and respond to incidents as well as proactively hunt threats.
25 out of 47
Office 365 Security: 1-Day AssessmentNetrix Global
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Security assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
26 out of 47
Document Airlift-OneDrive ImplementationSynergy Technical, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our Document Airlift will enable and configure your organization’s environment to use OneDrive for Business services in your Office 365 tenant.
27 out of 47
1-Day Security & Identity WorkshopConvergeOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Tailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
28 out of 47
Ransomware Protection: 1 Day-WorkshopConvergeOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
29 out of 47
Windows 365 Quick Start: 4-Day Proof of ConceptSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-firstline-workers product iconFrontline Workers
The Windows 365 Quick Start engagement is designed to give you everything you need to deploy Windows 365. Included are a solution overview, planning services, as well as a proof of concept engagement
30 out of 47
Office 365 Protection: Design & Pilot 1-Wk POCManaged Solution
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protect Your Employees from External Email Threats with Defender for Office 365 Protection
31 out of 47
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It Security
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Enable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
32 out of 47
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
33 out of 47
discover-sensitive-data-workshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
34 out of 47
Securing Identities and Access: 3-day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
35 out of 47
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
36 out of 47
Security Assessment: 2 Week AssessmentTallan
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
37 out of 47
Windows 365 QuickStart : 4 Day PoC + Surface GoSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-firstline-workers product iconFrontline Workers
The Windows 365 Quick Start engagement is designed to show you how Windows 365 + SurfaceGo keeps you productive. Included are a Surface Go, planning services, as well as a proof of concept.engagement
38 out of 47
Security Solutions:2-Weeks ImplementationAlpine Health Technologies Corp
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
39 out of 47
Compliance Managed ServicesForsyte IT Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Organizations everywhere are experiencing the benefits of Compliance Managed Services. Work with our Microsoft Gold Partner team to establish governance and manage user access and data security.
40 out of 47
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
41 out of 47
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
42 out of 47
Microsoft Security Assessment: 3-Wk AssessmenteGroup Enabling Technologies, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Analyze your cross platform security posture, with evaluated vulnerabilities and risks identified with a Microsoft Security Assessment.
43 out of 47
SMB Cloud Evaluation Program: 2-Wk AssessmentMaureen Data Systems
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Identifying ways to modernize & optimize IT assets, mitigate security risks, and reduce cost & complexity.​ See how the cloud can help, estimated costs, and what to do next. ​
44 out of 47
Microsoft Information Protection Administrator: 3 Days WorkshopNETCOM LEARNING
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Information Protection Administrator course focuses on data governance and information protection within your organization.
45 out of 47
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
This hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
46 out of 47
Modern IT: 2 Hour AssessmentModern IT
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Identify areas for business process optimization through Modern IT
47 out of 47
  • Προηγούμενο
  • 9
  • 10
  • 11
  • 12
  • 13
Πληροφορίες για το Marketplace
  • Γιατί το Microsoft Marketplace
  • Ιστολόγια
  • Ιστορίες πελατών
Για πελάτες
  • Ώρες γραφείου
  • Οδηγός έναρξης
  • Τεχνική τεκμηρίωση
  • Ιδιωτικές προσφορές
  • Δέσμευση κατανάλωσης του Microsoft Azure
  • Χρέωση και τιμολόγηση
Για συνεργάτες
  • Γίνετε συνεργάτης
  • Καταχωρηθείτε
  • Λάβετε υποστήριξη μάρκετινγκ
  • Τεχνική τεκμηρίωση
  • Οδηγίες βήμα προς βήμα για τη δημιουργία, δημοσίευση και πώληση
  • Γίνετε επιλέξιμοι για συνεργατική πώληση
  • Κοινότητα Marketplace για Συνεργάτες
  • Πωλήσεις Marketplace με επικεφαλής το κανάλι
  • Ιδιωτικές προσφορές πολλών τμημάτων για συνεργάτες καναλιού
Επιχειρήσεις
  • Microsoft AI
  • Ασφάλεια Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Εταιρεία
  • Σταδιοδρομίες
  • Εταιρικά νέα
  • Προστασία προσωπικών δεδομένων στη Microsoft
  • Επενδυτές
  • Βιωσιμότητα
Ελληνικά (Ελλάδα) Εικονίδιο εξαίρεσης σχετικά με τις επιλογές προστασίας προσωπικών δεδομένων σας Οι επιλογές προστασίας προσωπικών δεδομένων σας Προστασία προσωπικών δεδομένων για την υγεία των καταναλωτών
  • Χάρτης τοποθεσίας
  • Επικοινωνήστε μαζί μας
  • Προστασία προσωπικών δεδομένων και cookies
  • Όροι χρήσης
  • Εμπορικά σήματα
  • Πληροφορίες σχετικά με τις διαφημίσεις μας
  • Διαχείριση cookie
  • © Microsoft 2026