Envoyer des commentaires
Aide et support
Éléments enregistrés
Plans privés
Juste un moment, connexion en cours...
FiltresTout effacer

  • Votre position
  • Produits (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Gestion de l'adoption et des modifications
      • Appel pour Microsoft Teams
      • Cloud Security
      • Services de conseil pour la conformité
      • Déploiement et gestion de l’appareil
      • Employés de première ligne
      • Gestion des identités et des accès
      • Protection des informations et gouvernance
      • Risque d’initié
      • Connaissances et insights
      • Meeting Rooms pour Microsoft Teams
      • Meetings pour Microsoft Teams
      • Microsoft 365 Live Events
      • Gestion des périphériques mobiles
      • Power Platform for Teams
      • Solutions personnalisées Teams
      • Déploiement de travail d'équipe
      • Protection contre les menaces
      • Analyse du temps de travail
    • Power Platform
  • Secteurs d'activité
  • Type de service
  • Modèle de tarification

Services de conseil résultats

Affichage des résultats dans services de conseil.
Vue résultats associés dans clouds du secteur d’activité.
Microsoft 365 Security Readiness: 4-Wk AssessmentQuadrasystems.net (India) P Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Identify vulnerabilities and threats within Microsoft 365. Utilize advanced protection, intelligence, detection & response mechanisms to safeguard your data. Amplify security with real-time insights.
1 out of 60
Okta Migration to Azure AD: 3-Week AssessmentInvoke
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
The Okta Migration to Azure AD Assessment offering is designed to assess & plan your migration efforts to your existing investments in Azure AD.
2 out of 60
Mentoring ServiceMobile Mentor
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Our mentoring service helps customers leverage Microsoft 365 to improve endpoint security & user experience. We help accelerate the learning curve & reduce risk by deploying Microsoft 365 optimally.
3 out of 60
Data Security: 2-Weeks WorkshopConterra
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Identify data security risks in your organizational data​
4 out of 60
Copilot for Microsoft 365: 1-Day Data and Security WorkshopAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Unlock the full potential of Copilot for Microsoft 365 while fortifying your data and security with intensive, one-day workshop by Awara IT's experts.
5 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
The OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
6 out of 60
Microsoft 365 Security Assessment: 2 Week AssessmentKontex Security Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Microsoft 365 Security Assessment will review your organization’s security posture across identity, devices, information, apps, and infrastructure.
7 out of 60
Microsoft 365 Security AssessmentCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW’s Microsoft 365 Security Assessment allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
8 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
9 out of 60
Data Security as a Service | Assure 365CyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Fully Managed Data Security, governance and compliance with 24x7 monitoring—Powered by Microsoft Purview.
10 out of 60
CMMC Implementation for Microsoft 365 (8 Wk Proj)Summit 7 Systems, Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Summit 7 implements all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) technical control practices associated with Level 2 for Microsoft 365, as well as Azure and AAD
11 out of 60
Protect 365 App - 1 hour implementationCloud Life
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
12 out of 60
Copilot for Microsoft 365: La Evaluación De Preparación De Datos Y SeguridadAwara IT
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Awara IT puede apoyar tu negocio con Copilot for Microsoft 365, aprovechando un equipo de más de 200 profesionales dedicados con más de 16 años de experiencia en la optimización de entornos de Microso
13 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
14 out of 60
Secure Data Management with Microsoft PurviewAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
15 out of 60
Copilot for Security Accelerator: 2-week Implementationabra
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Neway’s Microsoft Copilot for Security Accelerator empowers security teams with enhanced protection and streamlined operations through eight key steps.
16 out of 60
Microsoft Defender for Cloud Apps JumpstartSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft Defender for Cloud Apps address security gaps in an organization's environment.
17 out of 60
Microsoft Copilot Readiness AssessmentInviso Corporation
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Get ready for Microsoft Copilot, by identifying best-in-class Microsoft 365 security solutions that will protect data and users by establishing a secure foundation, control content
18 out of 60
Copilot for Microsoft 365: Data Governance WorkshopReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Secure and Enhance Your Microsoft 365 Experience with WM Reply's One-Day Copilot Data Governance Workshop
19 out of 60
Microsoft 365 Copilot Adoption: 2-3 Week AssessmentCoretek Services
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
Evaluate the current customer Microsoft investments adoption of Microsoft Cloud Services and overall Security posture in an effort to develop a "Art of the Possible" to Adopt Microsoft 365 Copilot.
20 out of 60
Windows 365: 4 Week Readiness AssessmentNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Get an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
21 out of 60
Incident Response RetainerSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
22 out of 60
Avanade Security Risk AssessmentAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Avanade's 5-day Risk Assessment offers security leaders a comprehensive view of risk posture across their enterprise and proactive ways to protect their organizations from growing cyber threats.
23 out of 60
MDR for Microsoft DefenderADEO BILISIM DANISMANLIK HIZMETLERI SAN. VE TIC. A.S.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Adeo MDR Services provide detection and response capabilities via Microsoft 365 threat protection including Defender for Identity, Defender for Endpoint, Defender for Cloud and Office 365 Security.
24 out of 60
Zones SOCaaS - MXDR with Threat ProtectionZones Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Zones SOCaaS powered by Microsoft Sentinel and Defender offers advanced MDR and XDR capabilities, reinforcing your business’s safety.
25 out of 60
KI Adoption: 1 Tag Workshop plus Vorbereitung und AusarbeitungAppSphere AG
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Vom Wissen zur Anwendung: Wie Sie KI-Kompetenzen entwickeln und Ihre Belegschaft für den Einsatz von KI befähigen. Schlagen Sie die Brücke zwischen technologischem Potenzial und menschlicher Expertise
26 out of 60
Darktrace Managed Network SensorSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
27 out of 60
Modern Frontline Work Acceleration 2 days WorkshopLiveRoute FZ-LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-firstline-workers product iconFrontline Workers
LiveRoute's team of analyst and expert architects will deliver this workshop to understand the challenges around your frontline workers and develop/deliver a modernization roadmap.
28 out of 60
Microsoft 365 Security: 3-Day Workshopdelaware
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
29 out of 60
DLP Implementation and Tuning ServicesINFOTECHTION
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Reduce alert volume by 70% and achieve greater granularity in DLP alert to prioritise key risks.
30 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Inspect events in your network to locate threat indicators and entities
31 out of 60
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyant
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
32 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
33 out of 60
AvePoint Backup: 4 Weeks Proof Of ConceptSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Sentinel Technologies is proud to offer AvePoint’s Cloud Backup, a powerful cloud-to-cloud backup solution for Microsoft 365 and Azure.
34 out of 60
Cybersecurity Advisory Microsoft 365 1-wk WorkshopNTT Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Cybersecurity Advisory for Microsoft 365 is an asset-based consulting engagement that uses workshops and interviews to assess maturity across Microsoft 365 technologies and related people & processes.
35 out of 60
Microsoft 365 Copilot Risk Assessment: 1-Week Strategic WorkshopAtmosera
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Uncover data risks and prepare for secure Copilot adoption with a Microsoft 365 risk assessment.
36 out of 60
Microsoft Cybersecurity AssessmentThe Tech Mavericks
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
37 out of 60
Copilot Readiness AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
38 out of 60
ANECT Security Monitoring and Response 3 Months PoCANECT a.s.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protectionm365-sa-workplace-analytics product iconWorkplace Analytics
Paid 3 Months Proof of Concept PoC on how to implement and use Microsoft Sentinel or Security Monitoring and Response or SIEM
39 out of 60
Information Protection Solutions using Microsoft Purview by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our approach using Microsoft Purview: Define goals, design, develop, and deploy security solutions covering data loss prevention and risk monitoring
40 out of 60
Cyber Insurer Readiness WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Uncover gaps and strengthen your position when applying for cyber insurance
41 out of 60
impelSecure Threat Protection Engagement: Free 4-week workshopimpeltec Pty Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Discover threats and vulnerabilities to your Microsoft cloud and on-premises environments
42 out of 60
Management Services: 10-Week AssessmentCatapult Systems, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Catapult Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
43 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
44 out of 60
Threat Protection Envisioning WorkshopTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
45 out of 60
myCloudDoor Microsoft 365 Cybersecurity Assessment 3-WeeksmyCloudDoor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Assess and deliver a comprehensive report on the security measures and controls implemented in the Microsoft 365 environment.
46 out of 60
Microsoft 365 Copilot - Technical ReadinessCrayon
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Jumpstart your journey with the Crayon Microsoft 365 Copilot Technical Readiness - your cornerstone for secure and efficient AI adoption within your organization.
47 out of 60
Zones Implementation of Microsoft DefenderZones Inc.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Enhance cybersecurity with Zones' Microsoft Defender suite, offering expert implementation, comprehensive coverage, and continuous support.
48 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk ImplementationNeway Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Streamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
49 out of 60
cubesys Microsoft 365 Managed ServiceCubesys Pty Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Microsoft 365 has a bewildering array of capabilities, which just keep expanding. Leveraging the best options for business is never ending journey.
50 out of 60
Data Security EngagementadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Data Security Engagement gives you the insights you need to understand data security, privacy and compliance risks in your organization.
51 out of 60
Microsoft Cloud Accelerator Workshops 2-DaysSoftwareOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Improve NEW WORK experiences with Microsoft Cloud Accelerator Workshops for Microsoft 365 by SoftwareOne
52 out of 60
CCPA CPRA: 6 - Wk AssessmentHappiest Minds Technologies Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Enable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
53 out of 60
Cloud Endpoints AssessmentInviso Corporation
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Maximize your Endpoints! Find out how a Cloud PC could potentially save you money!
54 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Identify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
55 out of 60
Office 365 Tenant-to-Tenant Cutover Email Migration without downtime and bounced email: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Seamless Microsoft 365 tenant-to-tenant mailbox migration, essential for mergers, acquisitions, or relocations, ensuring no bounced emails, NDR, or downtime.
56 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Assess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
57 out of 60
AvePoint Policies & Insights: 10-Days AssesmentsIT-Dev sp. z o.o.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Assesment's outcomes: • Enable centralized reporting on Microsoft 365 security. • Discover potential risks and exposed content. • Enforce policies and automatically remediate security breaches!
58 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5Collective Insights
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Upgrade to Microsoft 365 E5 for Advanced Productivity and Security
59 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
60 out of 60
  • Précédent
  • 2
  • 3
  • 4
  • 5
  • 6
  • Suivant
About Marketplace
  • Why Microsoft Marketplace
  • Blogs
  • Customer stories
For customers
  • Office hours
  • Get started guide
  • Technical documentation
  • Private offers
  • Microsoft Azure consumption commitment
  • Billing and invoicing
For partners
  • Become a partner
  • Get listed
  • Get marketing support
  • Technical documentation
  • Step-by-step guidance to build, publish, and sell
  • Become co-sell eligible
  • Marketplace Community for Partners
  • Channel-led Marketplace sales
  • Multiparty private offers for channel partners
Entreprises
  • Microsoft AI
  • Sécurité Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Société
  • Emploi
  • Actualités de la société
  • Confidentialité chez Microsoft
  • Investisseurs
  • Durabilité
Français (Suisse) Vos choix en matière de confidentialité – Icône Désactiver Vos choix de confidentialité Confidentialité de l’intégrité des consommateurs
  • Sitemap
  • Contact Us
  • Privacy & Cookies
  • Terms of Use
  • Trademarks
  • About our ads
  • Manage cookies
  • © Microsoft 2026