Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
FiltrosBorrar todo

  • Su ubicación
  • Productos (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Adopción y administración de los cambios
      • Llamada para Microsoft Teams
      • Seguridad en la nube
      • Servicios de asesoría de cumplimiento
      • Implementación y administración de dispositivos
      • Trabajadores de primera línea
      • Administración de identidad y acceso
      • Information Protection y Gobernanza
      • Riesgo interno
      • Conocimiento e información
      • Salas de reuniones para Microsoft Teams
      • Reuniones para Microsoft Teams
      • Microsoft 365 Live Events
      • Administración de dispositivos móviles
      • Power Platform for Teams
      • Soluciones personalizadas de Teams
      • Implementación de trabajo en equipo
      • Protección contra amenazas
      • Workplace Analytics
    • Power Platform
  • Sectores
  • Tipo de servicio
  • Modelo de precios

Professional Services resultados

Mostrando resultados en professional services
Vista resultados relacionados en nubes del sector.
Intune Implementation ServiceTHREATSCAPE SECURITY SOLUTIONS LIMITED
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Service is designed to accelerate the deployment and adoption of Microsoft Intune in alignment with Zero Trust principles, security best practice, and business productivity goals.
1 out of 55
Secure & Compliant Modern Workplace: 2 weeks ImpInsight Technology Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Based on your business goals and objectives, we assess the current situation and provide recommendations with a clear road map as to can enable your business to meet it's security objectives
2 out of 55
Cybersecurity Awareness: 12 month implementationProdware Group
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Cybersecurity Awareness is ongoing cybersecurity assessment and training service for employees that is flexible, engaging and fun to do.
3 out of 55
Intune Implementation ServiceTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Service is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
4 out of 55
NVISO Microsoft 365 Security AssessmentNVISO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
5 out of 55
Minsait Cyber SmartMDR SOC ServiceMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Servicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
6 out of 55
ITVT Modern Work Copilot ReadinesscheckITVT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Identifying the Opportunity for Customers within Microsoft 365 Copilot
7 out of 55
Secure Microsoft 365 Managed ServiceCWSI
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CWSI's Consulting, Professional and Support Services combine to Get You Secure & Keep You Secure
8 out of 55
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
9 out of 55
Threat Protection EngagementFUJITSU
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Identify and mitigate threats. Strengthen security, prioritize vulnerabilities, and improve your position.
10 out of 55
Modern Security Operations EngagementFUJITSU
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Detect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
11 out of 55
Managed Services: M(x)DR for Microsoft 365 DefenderCegeka NV
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Introducing Cegeka's cutting-edge M(x)DR managed service for Microsoft 365 Defender
12 out of 55
SecWise Assess for Workplace: 5-Day Security AssessmentSecWise
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
An assessment of your modern workplace set-up to make sure it matches cyber security standards and best-practices.
13 out of 55
Security Operations Center: 1-Months Implementationiteracon GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Das ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
14 out of 55
Microsoft 365 security: 3 days assessmentOrlox
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
3 day security assessment of the current Microsoft 365 environment
15 out of 55
Security Basics: 4-Days Implementation2source4 B.V.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Organisaties voorzien van een goede basis security
16 out of 55
Microsoft Defender for Office 365: 4 days implementationCentric Netherlands b.v.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deploy it to a group of users.
17 out of 55
Microsoft Defender for Endpoint: 4 days implementationCentric Netherlands b.v.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Endpoint and deploy it to a group of devices.
18 out of 55
Microsoft Defender for Identity: 4 days implementationCentric Netherlands b.v.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deployment of identity sensors.
19 out of 55
Microsoft Defender for Cloud Apps: 4 days implementationCentric Netherlands b.v.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Cloud Apps and discover Cloud Apps
20 out of 55
Managed Workspace Protection for Microsoft 365 Defender: 4 weeks implementationOrange Cyber Defense NL BV
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Implementation of Microsoft 365 Defender for optimizing threat protection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
21 out of 55
Managed Threat Detection [xdr] for Microsoft Sentinel: 4 weeks ImplementationOrange Cyber Defense NL BV
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Implementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
22 out of 55
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Cyber Defense NL BV
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Our workshop will help you designing and deploying Microsoft security technologies for your unique needs.
23 out of 55
Managed Microsoft Sentinel and Extended Detection and Response (XDR) implementation with CentricCentric Netherlands b.v.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The SOC team's goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes.
24 out of 55
DNV Cyber Extended Detection and Response (XDR) for MicrosoftNixu Oyj
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
XDR service including 24/7 Security Operations Center (SOC) powered with Defender XDR and Sentinel
25 out of 55
DTX | MDR-SOC for Microsoft DefenderDTX
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Expand and Establish your SMB's digital assets with Managed Defender, a specialized MDR-SOC service by Dutch Technology eXperts. Designed specifically for small-to-medium businesses (SMB's).
26 out of 55
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense Global
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you
27 out of 55
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense Global
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Understand your readiness for common security threats.
28 out of 55
Security Operation ServicesBarikat Internet guvenligi bilisim tic . A.s.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Expertly manage Microsoft 365 and Azure security features. Ensure periodic monitoring, reporting, and maximize benefits. Trust us for seamless operation; focus on your core business
29 out of 55
Managed Microsoft Defender XDRPROXIMUS NV/SA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Proximus NXT Orbit Managed XDR service manages the alerts generated by Microsoft Defender. Our Security Operations Center (SOC) analyses and responds to these alerts 24/7 in Brussels, Belgium.
30 out of 55
Microsoft Threat Protection EngagementRawWorks
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Leer snel met de nieuwste Microsoft technologieën om te gaan zoals Defender, Purview en Sentinel
31 out of 55
Watchguard Managed ServiceCWSI
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
WatchGuard helps customers understand, implement and fully utilise Microsoft Defender and Microsoft Sentinel's capabilities to deliver secure operations, all watched over by our 24x7 CSOC service.
32 out of 55
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITED
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
33 out of 55
yellowSECUREyellow arrow
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Through powerful 24/7 monitoring of the Microsoft 365 environment, its solutions, and the information contained within, we detect (potential) threats and, when necessary, isolate them.
34 out of 55
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
35 out of 55
Microsoft 365 Copilot Security Readiness AssessmentCWSI
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure Microsoft 365 Copilot Adoption - making Copilot adoption safe, scalable and trusted
36 out of 55
Accelerate your Microsoft 365 Copilot adoptionColumbus Global
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Copilot Jumpstart Program is designed for business and IT leaders who want to move beyond experimentation and unlock real productivity gains from AI.
37 out of 55
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
38 out of 55
Microsoft 365 Copilot Readiness assessment - 5 days - assessmentInetum Belgium
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
During this assessment, we will check whether your environment is technically ready for Microsoft 365 Copilot. We will focus on infrastructure, licenses, and your data.
39 out of 55
SecWise Protect (XDR): Microsoft 365 Defender ActivationSecWise
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Identify your Microsoft Threat Protection jump-start configuration based on our security maturity predefined Microsoft 365 Defender best-practice configurations.
40 out of 55
Threat Protection - 4 Week Security ImplementationOBVUS
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Accelerate your implementation of Threat Protection with the Microsoft 365 Security Accelerator onboarding Services that are designed to get you up and running fast to maximize your investment.
41 out of 55
Microsoft 365 Security Scan: 3d AssessmentOrdina
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The result of the multi-day assessment will be a risk-based advise focusing on recommendations and a roadmap to increase the security posture of your Modern Workplace.
42 out of 55
Defend against threats with SIEM plus XDR Workshop including FastTrack guidanceXylos
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Our 3-day Security workshop is meant to get an overview of the Security landscape, we use the Microsoft 365 security products and features to gain visibility into threats to your Microsoft 365.
43 out of 55
Cloud Security Assessment in 3 daysSCCT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Cloud Security Assessment in 3 days. Door middel van dit assessment wordt inzicht verschaft over de huidige security staat van uw Microsoft 365 omgeving.
44 out of 55
Managed service : EDR with Defender for EndpointCegeka NV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
45 out of 55
Secure Remote Work 365: 1-Wo. ImplementierungArvato Systems
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Unlock the potential of your workplace by Arvato Systems. Azure Virtual Desktop als Managed Service mit Full Service Management nach definierten SLAs
46 out of 55
Defend against threats with SIEM + XDR Expert-as-a-service 1 y, Mgd svcXylos
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Xylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your Threat Protection environment based on Microsoft 365 technology.
47 out of 55
Secure Identities and Access Assessment, 3 daysXylos
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our Identity Security Assessment is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
48 out of 55
Data Classification: 7-Day ImplementationInSpark BV
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Information Protection is the solution in Microsoft 365 to classify organizational data and, if necessary, encrypt data at the document level, so that only authorized people can access data.
49 out of 55
Data Classification: 13-Day ImplementationInSpark BV
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Information Protection is the solution in Microsoft 365 to classify organizational data and, if necessary, encrypt data at the document level, so that only authorized people can access data.
50 out of 55
Data Classification: 5-Day ImplementationInSpark BV
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Information Protection is the solution in Microsoft 365 to classify organizational data and, if necessary, encrypt data at the document level, so that only authorized people can access data.
51 out of 55
Data Classification: 10-Day ImplementationInSpark BV
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Information Protection is the solution in Microsoft 365 to classify organizational data and, if necessary, encrypt data at the document level, so that only authorized people have access.
52 out of 55
Workplace Security Maturity: 6-day assessmentResilient Security
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Workplace security maturity assessment to get the most out of your Microsoft 365 security platform
53 out of 55
[Threat Management: 5-Days Assessment]Computacenter Plc
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Customer security assessment in regards of Threat management: 5 day offer
54 out of 55
Microsoft 365 Security Assessment: 6-day AssessmentPerformanta
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Performanta's Microsoft 365 Security Assessment identifies key vulnerabilities and provides a roadmap of improvements to help secure the tenant
55 out of 55
  • Anterior
  • 1
  • 2
  • 3
  • 4
About Marketplace
  • Why Microsoft Marketplace
  • Blogs
  • Customer stories
For customers
  • Office hours
  • Get started guide
  • Technical documentation
  • Private offers
  • Microsoft Azure consumption commitment
  • Billing and invoicing
For partners
  • Become a partner
  • Get listed
  • Get marketing support
  • Technical documentation
  • Step-by-step guidance to build, publish, and sell
  • Become co-sell eligible
  • Marketplace Community for Partners
  • Channel-led Marketplace sales
  • Multiparty private offers for channel partners
Empresa
  • Microsoft AI
  • Seguridad de Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Compañía
  • Trabajos
  • Acerca de Microsoft
  • Inversionistas
  • Sustentabilidad
Español (Nicaragua) Icono de exclusión de opciones de privacidad Tus opciones de privacidad Privacidad de la salud del consumidor
  • Sitemap
  • Contact Us
  • Privacy & Cookies
  • Terms of Use
  • Trademarks
  • About our ads
  • Manage cookies
  • © Microsoft 2026