Andke tagasisidet
Spikker ja tugi
Salvestatud üksused
Privaatsed lepingud
Oodake hetk, logime teid sisse...
FiltridTühjenda kõik

  • Teie asukoht
  • Tooted (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Kasutuselevõtt ja muutuste haldus
      • Microsoft Teamsi kõned
      • Pilvteenuste turve
      • Nõuetelevastavuse nõustamisteenused
      • Seadme juurutamine ja haldus
      • Eesliinitöötajad
      • Kasutaja- ja juurdepääsuhaldussuhaldus
      • Teabekaitse ja -haldus
      • Siserisk
      • Teadmised ja ülevaated
      • Microsoft Teamsi koosolekuruumid
      • Microsoft Teamsi koosolekud
      • Microsoft 365 Live Events
      • Mobiilsideseadmete haldus
      • Power Platform for Teams
      • Teamsi kohandatud lahendused
      • Meeskonnatöö juurutus
      • Ohutõrje
      • Workplace Analytics
    • Power Platform
  • Valdkonnad
  • Teenuse tüüp
  • Hinnakujunduse mudel

Professional Services tulemust

Kuvatud on tulemust asukohas professional services.
Microsoft 365 Security BriefingCDI LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
1 out of 60
Cyber Security AssessmentAegis Innovators
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
2 out of 60
EMS Energize: 1-month proof of conceptInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Interlink Cloud Advisors’ EMS Energize engagement provides you with security experts who can help guide your business into a secure, productive cloud platform.
3 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Get a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
4 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prove the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
5 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Enhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
6 out of 60
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
7 out of 60
Defend Against Threats with SIEM Plus XDRNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
8 out of 60
Defend Against Threats with SIEM Plus XDR WorkshopThe Tech Mavericks
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The Defend Against Threats with SIEM Plus XDR Workshop will help you achieve broader security objectives—and identify current and real threats.
9 out of 60
Pently SOCaaSPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Full Managed Security Service with a personal touch and individually build for each customer
10 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
11 out of 60
Microsoft 365 Tenant Security AssessmentDaymark Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Strengthen the Security of Your Microsoft 365 Environment.
12 out of 60
Defender for Office365Suri Services SC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Suri Services y Office 365: La alianza impenetrable en ciberseguridad.
13 out of 60
Microsoft 365/Azure Cloud Secure 5 Day AssessmentDynTek Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
DynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
14 out of 60
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
15 out of 60
Microsoft Cybersecurity AssessmentAkins IT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
16 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Two-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
17 out of 60
Threat Protection EngagementONEFACTORY
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
The Threat Protection Engagement helps customers assess their security landscape and address their most pressing security goals and challenges and provides an immersive experience that brings the Micr
18 out of 60
Secure Productivity with Microsoft 365 Proof of Value & ImplementationBDO
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-teamwork-deployment product iconTeamwork Deploymentm365-sa-threat-protection product iconThreat Protection
Secure AI and protect your cloud AI platform by fully activating Microsoft 365 features with robust organizational security
19 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
20 out of 60
Microsoft Intune Custom DeploymentTechNet UC LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Our custom Microsoft Intune Deployment is designed to streamline your organization's device management with precision and personalization.
21 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Multi-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
22 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyant
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Manage and Investigate Risk and Threat Protection
23 out of 60
Teams & SharePoint Security HardeningAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teams-custom-solutions product iconTeams Custom Solutionsm365-sa-threat-protection product iconThreat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
24 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
25 out of 60
Office 365 Encrypted Email - Initial Setup: 1-Day Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost Microsoft 365 security with default encryption. Elevate messaging protection and implement email encryption and rights protection for sensitive data.
26 out of 60
Secure Productive Workplace: Implement 4-WkNetsurit
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Netsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
27 out of 60
Cloud App Security Information and Threat Protection: 3-Wk Professional serviceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
28 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Professional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
29 out of 60
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
30 out of 60
Microsoft Defender for End Points JumpstartSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
31 out of 60
Microsoft Defender for Endpoint Professional Services: 1-Wk ImplementationOptiv Security Inc.
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Provide comprehensive, powerful protection at your organization's endpoints from Optiv utilizing the Microsoft Defender for Endpoint solution.
32 out of 60
Cyderes Managed Security Services for Microsoft SentinelCyderes
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Cyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
33 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
34 out of 60
Microsoft Funded Workshop for Threat Protection envisioning WorkshopVM GLOBAL SOLUTIONS(PTY)LTD
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Microsoft Funded Workshop for Threat Protection envisioning Workshop for Microsoft 365 will upskill your team, provide knowledge Microsoft Security
35 out of 60
iT1's Security AssessmentIt1 Source LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Improve your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
36 out of 60
Microsoft 365 Roadmap: 1-Wk WorkshopeGroup Enabling Technologies, LLC
+3
Applicable to:
m365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Enable a Secure and Productive Workforce with a Modern Workplace Roadmap powered by Microsoft 365 solutions.
37 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Get started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
38 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
39 out of 60
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Integrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
40 out of 60
Implementation of Microsoft Defender for Office 365CDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
41 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Enhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
42 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
43 out of 60
MXDR Shield: 4-Wk ImplementationLong View Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
44 out of 60
Data Leak DetectionAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Rapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
45 out of 60
Data Governance - Threat Protection - AssessmentSkyTerra Technologies LLC
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
The goal is to assess your existing data governance posture as well as unearthing your organization's priorities and associated business needs.
46 out of 60
"Threat Protection: 3 Day Workshop"Insentra Pty Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
47 out of 60
Microsoft Purview Data Security Basic Quick Start 10-week ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Drive Data Protection Sustainability with Edgile's Data Protection Methodology
48 out of 60
TS As a Services (TSaaS): 5-day ImplementationE-Level Cloud Services S.A. de C.V.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
49 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day WorkshopeGroup Enabling Technologies, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
With Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
50 out of 60
cyber security threat analysis workshopU-BTech Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
the workshop is design to discover threats and risks
51 out of 60
Virteva Microsoft 365 Defender Ready DeployVirteva LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
52 out of 60
Gestion del Endpoint: Servicio GestionadoRAN INGENIERÍA DE SISTEMAS SRL
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
El servicio está diseñado para gestionar la seguridad de las plataformas endpoint de las organizaciones en la protección de los datos y dispositivos tanto corporativos como personales.
53 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
54 out of 60
Critical Start Digital Forensics, Incident Response and Incident Response Monitoring for Microsoft: 30 Day ImplementationCritical Start
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Rapidly identify, contain, and remediate a breach.
55 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTD
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
56 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
57 out of 60
Microsoft Defender for Office JumpstartSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
58 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week ProgramWindows Management Experts, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
59 out of 60
Defender PilotLevacloud LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
60 out of 60
  • Eelmine
  • 5
  • 6
  • 7
  • 8
  • 9
  • Järgmine
About Marketplace
  • Why Microsoft Marketplace
  • Blogs
  • Customer stories
For customers
  • Office hours
  • Get started guide
  • Technical documentation
  • Private offers
  • Microsoft Azure consumption commitment
  • Billing and invoicing
For partners
  • Become a partner
  • Get listed
  • Get marketing support
  • Technical documentation
  • Step-by-step guidance to build, publish, and sell
  • Become co-sell eligible
  • Marketplace Community for Partners
  • Channel-led Marketplace sales
  • Multiparty private offers for channel partners
Business
  • Microsoft Cloud
  • Microsoft Security
  • Dynamics 365
  • Microsoft 365
  • Microsoft Power Platform
  • Microsoft Teams
  • Microsoft 365 Copilot
  • Small Business
Company
  • Careers
  • About Microsoft
  • Company news
  • Privacy at Microsoft
  • Investors
  • Diversity and inclusion
  • Accessibility
  • Sustainability
English (United States) Your Privacy Choices Opt-Out Icon Your Privacy Choices Consumer Health Privacy
  • Sitemap
  • Contact Us
  • Privacy & Cookies
  • Terms of Use
  • Trademarks
  • About our ads
  • Manage cookies
  • © Microsoft 2025