Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
FiltrosBorrar todo

  • Su ubicación
  • Productos (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Adopción y administración de los cambios
      • Llamada para Microsoft Teams
      • Seguridad en la nube
      • Servicios de asesoría de cumplimiento
      • Implementación y administración de dispositivos
      • Trabajadores de primera línea
      • Administración de identidad y acceso
      • Information Protection y Gobernanza
      • Riesgo interno
      • Conocimiento e información
      • Salas de reuniones para Microsoft Teams
      • Reuniones para Microsoft Teams
      • Microsoft 365 Live Events
      • Administración de dispositivos móviles
      • Power Platform for Teams
      • Soluciones personalizadas de Teams
      • Implementación de trabajo en equipo
      • Protección contra amenazas
      • Workplace Analytics
    • Power Platform
  • Sectores
  • Tipo de servicio
  • Modelo de precios

Professional Services resultados

Mostrando resultados en professional services
Microsoft 365 Copilot Readiness Assessment - CRATechPlus Talent
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Through this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
1 out of 60
Nexer Data Governance - Get ready for AINexer Group AB
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
To get ready for AI you need to have control of your data. Effective data governance is crucial for ensuring compliance with data privacy regulations and maintaining data integrity.
2 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Professional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
3 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
4 out of 60
Security Assessment Microsoft 365: 2day assessmentProdware Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
A service for Office 365 and Microsoft 365 protection
5 out of 60
Microsoft 365 Secure Productivity WorkshopABTechnologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
Enable your team to work securely and productively using Microsoft 365 best practices.
6 out of 60
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
7 out of 60
Data Classification and labelling: 6-Months Impl.Toreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Data classification and labelling in Information Protection. We guide the creation of the classification policy and implement data labelling in Microsoft 365 based on discovered data types.
8 out of 60
Microsoft 365 Security: 2-Days AssessmentCloud Nexus
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our team will compare your Microsoft 365 tenant configuration against Best Practice security baseline
9 out of 60
Adopt FastTrack Microsoft 365: 1hr BriefingComms-care Group Ltd
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-cloud-security product iconCloud Security
FastTrack helps customers adopt Microsoft 365. Customers with eligible subscriptions to Microsoft 365 can use FastTrack at no additional cost for the life of their subscription.
10 out of 60
Office 365 Migration 3-Month ImplementationRKON TECHNOLOGIES
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Leverage RKON's consulting expertise for a smooth and seamless migration to Microsoft's Office 365 suite of products including SharePoint, OneDrive, and Teams
11 out of 60
Microsoft 365 Security Hardening: 3 Days ImplementationINFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
2-3 days of consultancy from a Microsoft Gold Partner to improve the security stance within your Microsoft 365 tenant, including Conditional Access, MAM, MFA, email filtering and alerts.
12 out of 60
cyber security threat analysis workshopU-BTech Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
the workshop is design to discover threats and risks
13 out of 60
Overwatch for Microsoft 365 Security: 12 Month ImplementationThreatscape
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Overwatch for Microsoft 365 Security is a security posture management service – providing customers with a near real-time strategy tailored for their business, to improve security of their environment
14 out of 60
365SecurityREADY for ISO 27001: 12-16 Weeks ImplementationThe Cloud Factory EMEA Ltd.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get ISO 27001 Ready with Microsoft 365
15 out of 60
PwC Business Aligned Zero Trust: 4-Wk AssessmentPricewaterhouseCoopers UK
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
PwC's Zero trust proposition aims to help organisations to understand their current security state and develop a prioritised set of activities to improve their cyber maturity and resilience.
16 out of 60
PwC UK: Governance and Risk: 4-Wk AssessmentPricewaterhouseCoopers UK
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
PwC's Governance and Risk solutions can help organisation to create comprehensive governance, risk and control frameworks that support their organisations wider security and operational goals.
17 out of 60
PwC Digital Identity: 4-Wk AssessmentPricewaterhouseCoopers UK
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
PwC provides leading class Identity and Access Management advisory, assurance and delivery services that offer distinctive value and enable clients to optimise their digital services and processes.
18 out of 60
PwC Portfolio RationalisationPricewaterhouseCoopers UK
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
The objective of PwC's portfolio rationalisation is to simplify your portfolio to reduce the cost and complexity of your environment. Many companies have redundant tools that cost them time and money.
19 out of 60
Endpoint management with security: 4-day workshope-Plenish Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Demonstrating the value of Microsoft Intune, Microsoft Defender for Endpoint and the Azure AD Premium P1 features that come with Microsoft 365 E3 licensing
20 out of 60
Security Posture Assessment ServiceKocho
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Security Posture Service, assesses an organisation’s cloud environment against recognised security benchmarks and makes recommendations to uplift security posture.
21 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTD
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
22 out of 60
Protect & Govern Sensitive Data WorkshopAtech Support
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
The Protect & Govern Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
23 out of 60
Defend Against Threats with SIEM Plus XDR WorkshopAtech Support
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Improve your security posture with a Defend Against Threats with SIEM Plus XDR Workshop
24 out of 60
Secure Multi-Cloud Environments WorkshopAtech Support
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
This delivers visibility to threats and vulnerabilities across Microsoft Azure, on-premises and multi-cloud environments. Support on how to improve your security posture for the long term
25 out of 60
Microsoft Defender for Endpoint ImplementationSIX DEGREES TECHNOLOGY GROUP LTD
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Strengthen cyber security defences through advanced endpoint detection and response.
26 out of 60
SCC Digital Workforce WorkshopSCC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
The Microsoft 365 Digital Workforce Workshop is designed to introduce and expand the value of Microsoft 365 to customers who are starting their cloud transformation to a secure hybrid work environment
27 out of 60
Sentinel WorkshopAtech Support
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Get an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop delivered by Atech.
28 out of 60
Mitigate Compliance and Privacy Risks WorkshopAtech Support
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
The Mitigate Compliance and Privacy Risks Workshop gives you the insights you need to understand insider and privacy risks in your organisation, delivered by the Atech Certified Microsoft PS team
29 out of 60
Microsoft 365 Security Assessment: 5-Day assessment and reviewCISILION LTD
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our Security Assessment provides a holistic review of your organisations security posture and maps it against CISA baselines and recommendation to help take informed steps to secure your environment.
30 out of 60
Microsoft 365 Health Check and Tenant Review - 2 day - Consultancy offeringIntelogy
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Microsoft 365 tenant review will help strengthen the security of your tenant against cyber threats, promote secure collaboration within and outside the company
31 out of 60
Cybersecurity AssessmentCDI LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
32 out of 60
Microsoft Copilot Data Security Workshop: 5 day WorkshopBytes Software Services
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Work with Bytes to build a security and trust framework to ensure correct access to all of your data
33 out of 60
Microsoft Copilot Zero Trust Workshop: 3 Day WorkshopBytes Software Services
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Bytes will help customers deploy Copilot in the most secure manner
34 out of 60
Microsoft Copilot Data Structure Workshop: 5 day workshopBytes Software Services
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Work with Bytes to ensure that your business critical information stays protected.
35 out of 60
Atech Microsoft 365 Security AssessmentAtech Support
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
With 10 years+ experience Atech have developed an assessment which provides us with a benchmark to design and deliver your secure journey to maximising the potential of Microsoft 365
36 out of 60
Atech Cybersecurity AssessmentAtech Support
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This assessment is designed to help you understand the importance of security and how to protect your organization from potential threats. Get to know your secure score and future-proof your posture.
37 out of 60
Atech Microsoft Sentinel EngagementAtech Support
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Get an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on premises environments with an Atech delivered, Microsoft Sentinel Workshop.
38 out of 60
Atech Microsoft Data Security EngagementAtech Support
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Data Security Engagement, delivered by Atech, gives you the insights you need to understand data security, privacy and compliance risks in your organization.
39 out of 60
Atech Microsoft Threat Protection EngagementAtech Support
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This engagement will provide the help organisations need to achieve achieve security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR workshop
40 out of 60
Managed XDR Services (1- Day Readiness Assessment)Kocho
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Combine Microsoft Sentinel and Defender Managed Services for comprehensive coverage, cutting-edge security, and complete peace of mind.
41 out of 60
Modern Workplace Maturity: 10-day AssessmentReply
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Understand and evolve your approach to collaboration, communication, security, and productivity with our Modern Work Maturity Assessment
42 out of 60
Microsoft Security Copilot: Half-Day Readiness AssessmentTransparity Solutions Ltd
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Get ready to adopt AI powered security with our Microsoft Security Copilot Readiness Assessment
43 out of 60
Atech Copilot for Microsoft 365 Zero Trust EssentialsAtech Support
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Atech Zero Trust Essentials Service provides a tailored approach to security and data readiness. We help organisations navigate data and security considerations to optimise Copilot possibilities
44 out of 60
Atech Copilot for Microsoft 365 Discovery WorkshopAtech Support
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Designed as an initial engagement, the Microsoft 365 Copilot Discovery Workshop will provide high - level visibility regarding your technical and people readiness to maximise the potential of Copilot
45 out of 60
Atech Copilot for Microsoft 365 Adoption Accelerator AssessmentAtech Support
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Atech’s adoption accelerator for Copilot for Microsoft 365 is designed to empower organizations to deliver the new way of working that Copilot promises whilst accelerating your business goals
46 out of 60
Logicalis Cyber Security InitiativeLogicalis Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The Logicalis Cyber Security Initiative (CSI) helps customer adopt and deploy Microsoft security technologies and solutions.
47 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk AssessmentErgoServices
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Ergo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
48 out of 60
Audit de sécurité : 5 joursEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Evaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
49 out of 60
POC Securité IT : 2 semainesEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Validation des capacités des solutions de sécurité Microsoft dans votre environnement
50 out of 60
Fitzrovia IT - Defender for EndpointFitzrovia I.T. Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Fitzrovia IT will consult and configure and Defender for Endpoint for your business
51 out of 60
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Implémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
52 out of 60
Google Workspace to Microsoft 365 Discovery and Design Service - 4-Wk EngagementCISILION LTD
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
This 3-wk engagement helps prepare any organisation looking to migrate from Google Workspace to Microsoft 365. This includes analysis and review of existing environment, and migration planning.
53 out of 60
Microsoft 365 Attack SimulationWanstor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft’s cyber-security solution provides users with information on the most common and dangerous types of cyber-attacks, such as phishing, ransomware, malware, etc..
54 out of 60
Windows 365 Proof of ConceptWanstor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Wanstor’s Windows 365 solution is designed to meet the standard requirements for building out a robust, secure, and efficient digital workspace for our customers.
55 out of 60
Microsoft Defender for Endpoints - Proof of ConceptWanstor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Businesses may decide to use Managed Defender to help keep them more secure from cyber threats, but they won’t all have the necessary resource to make optimum use out of this valuable tool.
56 out of 60
Microsoft Intune & Autopilot POCWanstor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Wanstor implements its management infrastructure based on Microsoft’s Intune, which provides IT services, apps, protection, and configuration, combining these services and tools in one location
57 out of 60
Copilot for Microsoft 365 - Readiness Engagement: 2 Week-ImplementationHTG
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
After assessing data availability and quality, we will provide and implement a robust set of recommendations for enhancing your security posture ahead of a Copilot deployment.
58 out of 60
Secure AILogicalis Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive security for generative AI applications, ensuring safe usage and protection of sensitive data
59 out of 60
HTG Overwatch - Security Managed ServiceHTG
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A Security Managed Service that aligns with the industry recognised zero trust security model
60 out of 60
  • Anterior
  • 4
  • 5
  • 6
  • 7
  • 8
  • Siguiente
Acerca de Marketplace
  • ¿Por qué Microsoft Marketplace?
  • Blogs
  • Casos de clientes
Para clientes
  • Horario de las oficinas
  • Guía de introducción
  • Documentación técnica
  • Ofertas privadas
  • Compromiso de consumo de Microsoft Azure
  • Facturación
Para partners
  • Convertirse en partner
  • Anúnciate
  • Obtener soporte de marketing
  • Documentación técnica
  • Instrucciones paso a paso para crear, publicar y vender
  • Conviértete en apto para la venta conjunta
  • Comunidad de Marketplace para partners
  • Ventas de Marketplace dirigidas por canales
  • Ofertas privadas multiparte para partners del canal
Empresa
  • Microsoft AI
  • Seguridad de Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Compañía
  • Trabajos
  • Acerca de Microsoft
  • Privacidad en Microsoft
  • Inversionistas
  • Sustentabilidad
Español (México) Icono de exclusión de opciones de privacidad Tus opciones de privacidad Privacidad de la salud del consumidor
  • Mapa del sitio
  • Ponte en contacto con nosotros
  • Privacidad y cookies
  • Términos de uso
  • Marcas comerciales
  • Acerca de nuestros anuncios
  • Administrar cookies
  • © Microsoft 2026