Pasar al contenido principal
Marketplace
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Productos
Categorías
Sectores
Asociados
Filtros
Borrar todo
Su ubicación
Su ubicación
Productos (1)
Productos (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adopción y administración de los cambios
Adopción y administración de los cambios
Llamada para Microsoft Teams
Llamada para Microsoft Teams
Seguridad en la nube
Seguridad en la nube
Servicios de asesoría de cumplimiento
Servicios de asesoría de cumplimiento
Implementación y administración de dispositivos
Implementación y administración de dispositivos
Trabajadores de primera línea
Trabajadores de primera línea
Administración de identidad y acceso
Administración de identidad y acceso
Information Protection y Gobernanza
Information Protection y Gobernanza
Riesgo interno
Riesgo interno
Conocimiento e información
Conocimiento e información
Salas de reuniones para Microsoft Teams
Salas de reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Administración de dispositivos móviles
Administración de dispositivos móviles
Power Platform for Teams
Power Platform for Teams
Soluciones personalizadas de Teams
Soluciones personalizadas de Teams
Implementación de trabajo en equipo
Implementación de trabajo en equipo
Protección contra amenazas
Protección contra amenazas
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Sectores
Sectores
Tipo de servicio
Tipo de servicio
Modelo de precios
Modelo de precios
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Vista
resultados relacionados en nubes del sector
.
Microsoft 365 Security Assessment
TechPlus Talent
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
This Microsoft 365 Security Assessment evaluates your entire Microsoft 365 environment to identify security gaps and misconfigurations, delivering risk-rated findings and prioritized recommendations.
1 out of 60
Inspira Microsoft Threat Protection Envisioning Workshop
Inspira Enterprise Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
2 out of 60
Inspira Microsoft Data Security Envisioning Workshop
Inspira Enterprise Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Identify data security risks in your organizational data
3 out of 60
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCG
ISCG so. z o.o.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
4 out of 60
CBTS Microsoft 365 Managed Service
CBTS Technology Solutions LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Partner with CBTS for ongoing management and support of Microsoft 365
5 out of 60
Cybersecurity Incident Response Retainer with Microsoft Defender
CBTS Technology Solutions LLC
+2
Applicable to:
Cloud Security
Threat Protection
Partner with CBTS to ensure assistance when you need it most during a significant security event.
6 out of 60
Data Security Envisioning Workshop
PSM Partners
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
Identify hidden data risks, assess insider threats, and gain clear, actionable guidance to strengthen security, compliance, and governance with a Microsoft Purview–driven workshop.
7 out of 60
HubSpot and OneDrive for Business Integration
IT Partner LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Automatically sync HubSpot with OneDrive for Business to embed secure, always-up-to-date marketing assets and eliminate manual file uploads.
8 out of 60
Data Security Workshop
Emergent Software
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Security workshop leveraging Microsoft's security products such as Purview to uncover data risks across Microsoft 365, assess exposure, and deliver actionable recommendations for IT leaders.
9 out of 60
S4B_XDR_Recuperacion_Automatica_Recursos
S4B
+2
Applicable to:
Cloud Security
Threat Protection
SILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
10 out of 60
S4B Email Attack Simulation Training
S4B
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Attack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
11 out of 60
Threat Investigation and Analysis Service with Microsoft Defender XDR
S4B
+2
Applicable to:
Cloud Security
Threat Protection
SILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
12 out of 60
Server Endpoint Protection Implementation Service using Microsoft Defender for Endpoint
S4B
+2
Applicable to:
Cloud Security
Threat Protection
Provides comprehensive protection for physical and virtual servers with Microsoft Defender for Server, combined with continuous security monitoring to detect, investigate, and respond to threats.
13 out of 60
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDR
S4B
+2
Applicable to:
Cloud Security
Threat Protection
Protección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
14 out of 60
Credentials and access protection , unauthorized logins, and suspicious behavior with Microsoft Identity
S4B
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Cloud Identity Protection detects and mitigates credential and access risks using Microsoft Entra ID Protection. It leverages analytics, adaptive MFA, and condicional access to enhance security.
15 out of 60
Protección Identidades en ambiente Híbrido con Microsoft Identity
S4B
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Integra seguridad en nube y on-premise con Defender for Identity y Entra ID Protection, unificando detección, investigación y respuesta frente a amenazas.
16 out of 60
Advanced Hybrid Identity Security with Microsoft Identity
S4B
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Hybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
17 out of 60
Implementation of security for Endpoint with Microsoft EDR
S4B
+2
Applicable to:
Cloud Security
Threat Protection
Advanced defense for on-premises devices with Microsoft Defender for Endpoint, automated detection and response.
18 out of 60
Entrenamiento de Phishing con Microsoft Office 365
S4B
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
Ofrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
19 out of 60
Implementación de seguridad avanzada para Servidores con Microsoft EDR
S4B
+2
Applicable to:
Cloud Security
Threat Protection
Seguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
20 out of 60
Investigación y Análisis de Amenazas con Microsoft Defender XDR
S4B
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Investiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
21 out of 60
Extended Detection and Response Service for Endpoints with Microsoft Defender XDR
S4B
+2
Applicable to:
Cloud Security
Threat Protection
Protects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
22 out of 60
CYBERWELL Microsoft Security Audit
CYBERWELL Canada Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Identify risks and misconfigurations with prioritized remediation guidance across Microsoft 365 environments.
23 out of 60
Seguridad avanzada de identidad en la nube con Microsoft Identity
S4B
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Protege credenciales y accesos en la nube con Microsoft Entra ID Protection, aplicando MFA adaptativo y acceso condicional para mitigar riesgos de identidad.
24 out of 60
Servicio de implementación de protección de endpoints con Microsoft Defender for Endpoint
S4B
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Defensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
25 out of 60
Enterprise Automated Endpoint Recovery with Microsoft Defender XDR
S4B
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
SILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
26 out of 60
Zero Trust Identity Security Implementation with EntraID by Reply
Reply
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Reply’s security approach with Microsoft Entra ID helps organizations reduce identity-driven risk, support compliance requirements, and accelerate secure adoption of Microsoft cloud services.
27 out of 60
Zones Microsoft Threat Protection Workshop
Zones Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Detect real threats, assess vulnerabilities, and get a tailored Microsoft security roadmap, delivered by Zones’ certified cybersecurity experts.
28 out of 60
Microsoft 365 Security Assessment - 4 Days
Matrix3D Infocom Private Ltd.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
This Assessment is a comprehensive evaluation of your Microsoft 365 environment, designed to identify misconfigurations, security gaps, compliance risks, and underutilized Microsoft security features.
29 out of 60
Microsoft 365 Migration and Deployment Services
Improving
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Assess, migrate, and optimize Microsoft 365 to boost collaboration, strengthen security, reduce redundant tools, and prepare your environment for AI‑driven productivity with Microsoft 365 Copilot.
30 out of 60
The Threat Protection Envisioning Workshop
Rackspace Technology
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
A collaborative workshop that identifies real threats, prioritizes risk, and delivers a clear Microsoft-aligned security roadmap to focus investments and reduce cyber risk confidently enterprise-wide.
31 out of 60
AllyCare Guardian for Microsoft 365
BlueAlly Technology Solutions
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Audit and secure Microsoft 365 with expert-led configuration reviews, guided implementation, and ongoing support.
32 out of 60
Microsoft Sentinel SOC Managed Service by H One
H One (Private) Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
H One’s Microsoft Sentinel–based MDR service combines certified expertise, continuous monitoring, and rapid response to protect and strengthen your cloud environment.
33 out of 60
Beyondsoft Segurança Ambiente Cloud
Beyondsoft
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Oferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
34 out of 60
SkyNorth - Microsoft 365 Zero Trust Security & Governance Assessment
SkyNorth Software
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Uncover risks and optimize Microsoft 365 with a Zero Trust security roadmap
35 out of 60
SkyNorth – CJI Data Protection for Microsoft 365 (CJIS‑Aligned)
SkyNorth Software
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Safeguard CJI in Microsoft 365 - SkyNorth helps local governments identify, protect, and govern sensitive criminal justice data in Microsoft 365 to support compliance and secure AI adoption
36 out of 60
Netox MXDR / SOC 24/7
Netox Oy
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Finnish-built 24/7 MXDR & SOC for Microsoft environments
37 out of 60
Microsoft Defender XDR Implementation & Enablement
Daymark Solutions
+2
Applicable to:
Cloud Security
Threat Protection
Accelerate your Extended Detection & Response (XDR) capabilities leveraging Microsoft Defender.
38 out of 60
Microsoft Defender for Cloud Deployment & Multi-Cloud Security Implementation: 4-8 Weeks Engagement
Celebal Technologies Private Limited
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Threat Protection
Strengthen Azure and multi-cloud security through CSPM, CWPP, and CNAPP capabilities with compliance alignment and AI-driven remediation.
39 out of 60
Microsoft Defender XDR and Zero Trust Security Implementation: 4-8 Weeks Engagement
Celebal Technologies Private Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Unify endpoint, identity, email, and cloud security to improve visibility, automate SOC response, and enable Zero Trust enforcement.
40 out of 60
Unified SOC with Microsoft Defender XDR and Sentinel (SIEM & SOAR): 4-8 Weeks Engagement
Celebal Technologies Private Limited
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Modernize security operations using Microsoft Sentinel and Defender XDR to centralize threat monitoring, automate response, strengthen hybrid and multi cloud protection, and improve SOC outcomes fast.
41 out of 60
Microsoft Entra Identity & Access Management Implementation: 4-8 Weeks Engagement
Celebal Technologies Private Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Strengthen hybrid identity security with Microsoft Entra ID, Conditional Access, MFA, Identity Governance, and PIM to establish adaptive access control and a Zero Trust IAM foundation.
42 out of 60
EPAM Intune Endpoint Management Implementation
EPAM Systems, Inc.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Enable secure, automated, and compliant device management by modernizing endpoint operations with Microsoft Intune to streamline deployment, policy control, and ongoing lifecycle management.
43 out of 60
Improving's Cloud Solution Provider (CSP) Licensing Program for Modern Work
Improving
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
Improving’s CSP program maximizes Microsoft 365, Azure, and Dynamics value through optimized licensing, proactive security, expert advisory, and senior‑level support across your full cloud lifecycle.
44 out of 60
Data Security Maturity Uplift
Engage Squared
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Assess and uplift your data security posture with Microsoft Purview and Microsoft 365 to reduce risk, improve visibility, strengthen governance, and support secure collaboration and AI readiness.
45 out of 60
Threat Protection Envisioning Workshop
Heartland Business Systems, LLC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Identify active threats and security gaps across Microsoft 365 and on‑prem environments through expert-led analysis, mapping risks to Microsoft Security solutions and defining a priority action plan.
46 out of 60
Data Security Envisioning Workshop
Heartland Business Systems, LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Insider Risk
Work with HBS security experts to uncover hidden data risks in Microsoft 365. Powered by Microsoft Purview, this workshop delivers actionable insights to protect sensitive data and improve compliance.
47 out of 60
Microsoft 365 Security Posturing
Square10 Solutions LLC
+1
Applicable to:
Cloud Security
A comprehensive Microsoft 365 Security Posturing engagement, focused on strengthening access control and Mobile Device Management (MDM) for your organization.
48 out of 60
Microsoft Agent 365 Planning and Deployment
Sulava Oy
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
lan and deploy Microsoft Agent 365 with enterprise-grade security, governance controls, and agent lifecycle management fully configured in your environment.
49 out of 60
Microsoft Agent 365 Governance Model Design
Sulava Oy
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Design an enterprise-grade governance model for AI agents leveraging Microsoft Agent 365, Entra Agent ID, Defender, and Purview capabilities.
50 out of 60
SECURE from Infinity Group
INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
SECURE simplifies management of your security infrastructure, offering proactive monitoring, updates and protection for your business identities, applications, devices and data.
51 out of 60
Microsoft Cloud Security Maturity Assessment
Synoptek
+2
Applicable to:
Cloud Security
Threat Protection
To assess your Microsoft security posture, identify key risks, and provide a prioritized roadmap to strengthen security and accelerate Zero Trust maturity.
52 out of 60
Microsoft CloudOps Evolution Workshop
Improving
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
A structured, hands-on workshop that helps organizations align business goals with Microsoft 365 capabilities and define a clear cloud adoption and operating model.
53 out of 60
Microsoft 365 Security Enhancement: Expert-Led Security Assessment
Pently GmbH
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Unprotected endpoints, misconfigured policies, ungoverned identities — we assesses your Microsoft 365 security posture across Defender XDR, Sentinel, Intune, and Entra ID, and tells you what to fix.
54 out of 60
AI Agent Launchpad
KiZAN Technologies
+3
Applicable to:
Cloud Security
Information Protection & Governance
Knowledge & Insights
A 6-week implementation to enable the roll out of AI agents responsibly, with clear guardrails, measurable oversight, and a repeatable path to scale.
55 out of 60
Erste Schritte zur NIS-2-Readiness: AppSphere NIS-2 Readiness Engagement
AppSphere AG
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
Das Engagement umfasst einen NIS‑2 Compliance Check zur Bewertung des aktuellen Compliance‑Stands sowie ein Microsoft 365-Tenant Assessment, das sicherheitsrelevante Schwachstellen sichtbar macht.
56 out of 60
Enabling Secure AI Adoption with Agent 365
PwC (Global)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
PwC will help enhance visibility across the agent estate, define critical governance and security controls, and deliver an Agent 365 roadmap ready for action
57 out of 60
Microsoft 365 E7 Frontier Transformation Service
Exquitech
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Accelerate your AI journey with a secure, governed, and scalable solution—combining Microsoft 365 E7, Copilot, and Agent 365 with expert-led deployment and adoption services.
58 out of 60
Threat Protection Envisioning Workshop Marketplace Offer
Olive + Goose
+1
Applicable to:
Cloud Security
A guided security envisioning workshop that helps organizations assess current threat protection capabilities and define a practical roadmap using Microsoft security solutions.
59 out of 60
Microsoft 365 Security Confidence Accelerator
Reliance Infosystems
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
A structured Microsoft 365 security posture accelerator that identifies and reduces security risk across identity, devices, applications, and data — delivering clear outcomes.
60 out of 60
Anterior
9
10
11
12
13
Siguiente