Envoyer des commentaires
Aide et support
Éléments enregistrés
Plans privés
Juste un moment, connexion en cours...
FiltresTout effacer

  • Votre position
  • Produits (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Gestion de l'adoption et des modifications
      • Appel pour Microsoft Teams
      • Cloud Security
      • Services de conseil pour la conformité
      • Déploiement et gestion de l’appareil
      • Employés de première ligne
      • Gestion des identités et des accès
      • Protection des informations et gouvernance
      • Risque d’initié
      • Connaissances et insights
      • Meeting Rooms pour Microsoft Teams
      • Meetings pour Microsoft Teams
      • Microsoft 365 Live Events
      • Gestion des périphériques mobiles
      • Power Platform for Teams
      • Solutions personnalisées Teams
      • Déploiement de travail d'équipe
      • Protection contre les menaces
      • Analyse du temps de travail
    • Power Platform
  • Secteurs d'activité
  • Type de service
  • Modèle de tarification

Professional Services résultats

Affichage des résultats dans professional services.
Microsoft Cloud Application for 3rd Party AppsAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
1 out of 60
Infosys Intelligent Security SolutionInfosys Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Infosys offers a comprehensive set of Management Consulting, Implementation, and Managed Services to secure a modern workplace using Microsoft 365 solutions like Purview, Entra, Defender, Priva.
2 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 WeeksWipro Ltd
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
3 out of 60
Endpoint Management Advisory Service: 6-Wk ImplementationWragby Business Solutions & Technologies Limited
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
This advisory service enables organizations efficiently manage end points leveraging Microsoft Intune & Configuration Manager through assessments, 1-day workshops and six weeks deployment
4 out of 60
Proof of Concept Solution Microsoft 365 CopilotKPCS CZ, s.r.o.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Embark on a transformative journey with KPCS's 4 weeks PoC for Microsoft 365 Copilot. Uncover tailored use-cases and maximize the value for your business. Revolutionize your approach to innovation.
5 out of 60
MDS - Microsoft Security Copilot WorkshopMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Discover how Microsoft Security Copilot can enhance your security operations, streamline incident response, and empower your security teams
6 out of 60
Insider Risk Management: 8-Wk implementationPwC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Enable organizations to rapidly build insider risk prevention, detection and response capabilities into your existing environment from the ground up or to complement existing capabilities.
7 out of 60
4-Day Security AssesmentHSO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
8 out of 60
Avanade Microsoft Copilot for SecurityAvanade, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
We have channeled our unique experience as the leading Microsoft Security services provider to develop this new to market approach to help clients successfully adopt Microsoft Security Copilot.
9 out of 60
Copilot for Microsoft 365: Security AcceleratorKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost security with KMicro's Copilot For Microsoft 365 Security Accelerator: Tailored insights and guided deployments.
10 out of 60
Modern Workplace Security 10-Wk ImplementationWipro Ltd
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
11 out of 60
CASB (MCAS) Advisory: 2-week Workshop SeriesNTT DATA Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
NTT DATA’s MCAS workshop series helps determine how a CASB can improve your security posture and protect your org from internal (shadow IT, UEBA. DLP) & external threats.
12 out of 60
Threat Protection - 2 Days WorkshopMayasoft Bilgi Sistemleri A.S.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
We can help you develop a strategic plan customized for your organization based on the recommendations of Microsoft experts in security
13 out of 60
Avanade Microsoft Security Service Edge Quick StartAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft’s new Security Service Edge (SSE) capability empowers organizations on their Zero Trust journey though unique in the market integration with Microsoft Entra.
14 out of 60
Enhanced Data Privacy with Microsoft PurviewAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in your data privacy with Microsoft Purview? We help secure sensitive data with encryption, access controls, and automated governance, ensuring compliance and peace of mind.
15 out of 60
SoftwareOne Cybersecurity MXDR Managed Services for MicrosoftSoftwareOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure your IT Environment with Microsoft Services and on-call Cyber-security Analysts with end-to-end MDR and optimise costs
16 out of 60
Microsoft 365 threat protection assessmentAVASOFT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Identify vulnerabilities and threats in Microsoft 365. Use advanced protection, intelligence, detection, and response to safeguard data. Enhance security with real-time insights and monitoring.
17 out of 60
Zero Trust Assessment - 3 WeeksArmis, Sistemas de Informação, Lda
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Set Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Assessment
18 out of 60
Defend, Protect, Secure with Microsoft Defender XDRComtrade System Integration
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
19 out of 60
AVASecure 360 Next-Gen MXDR Managed ServicesAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
At AVASOFT, we are committed to securing your digital environment through a holistic Managed Extended Detection and Response (MXDR) solution.
20 out of 60
Microsoft Defender for Server:5-day ImplementationDelphi Consulting
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Delphi Consulting will help you onboard pilot set of servers to Microsoft Defender ATP demonstrating the advanced attack detection and investigation capabilities through Microsoft Defender Security.
21 out of 60
Microsoft 365 Security Assurance Service: AssessmentPerformanta
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Security Assurance Service focuses on validating that your Microsoft 365 controls are effectively and appropriately deployed, and that nothing has been missed.
22 out of 60
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, Lda
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
The engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
23 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
24 out of 60
Microsoft Teams Meetings: 2-Hour Proof of Concepttrue org cloud
+3
Applicable to:
m365-sa-meetings-for-microsoft-teams product iconMeetings for Microsoft Teamsm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
A customized and detailed proof of concept of the incredible Microsoft Teams Meetings for your organization
25 out of 60
Microsoft 365 Security AssessmentSii Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
26 out of 60
Bulletproof 365 Enterprise: MXDR ServiceBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Bulletproof Managed Security Elite is a Microsoft-native MXDR service that transforms Microsoft Sentinel and Defender XDR into a 24×7 cyber defense fabric.
27 out of 60
Managed Extended Detection & Response (MXDR) for Workplace - ImplementationDXC
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Secure your business with Managed XDR for Workplace
28 out of 60
Endpoint Management WorkshopYork Telecom Corp
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
29 out of 60
Microsoft 365 - Threat Protection: 2-week workshopFortevento
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Workshop aimed to identify threats, such as susceptibility to phishing attacks and risks of Shadow IT
30 out of 60
Microsoft Cloud App Security (MCAS) Solutions for Native Apps by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance Microsoft 365 security with Microsoft Cloud App Security. Control access, detect threats, and ensure compliance to protect sensitive data.
31 out of 60
DORA act assessment and implementationSii Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
32 out of 60
Hyperbolt Secure DeployDelphi Consulting
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Hyperbolt Secure Deploy offers automated Microsoft 365 Security implementation, delivering enterprise-grade protection in weeks using industry-standard policies.
33 out of 60
4security: Backup as a Service for Microsoft 3654Sight Holdings
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Protect your data with 4Security's Microsoft 365 Backup as a Service. Seamless integration, automated backups, and reliable data recovery for businesses of all sizes.
34 out of 60
4security: Microsoft 365 Communication Protect4Sight Holdings
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
4security: Microsoft 365 Communication Protect, a solution to safeguard your organisation’s communications
35 out of 60
Microsoft Security Deployment: 5-day WorkshopCampana & Schott GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Understand your Microsoft security posture and minimize risks with the right experts
36 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Entra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
37 out of 60
Barracuda Office 365 email-based securityCrayon
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defense, API-based inbox defense, incident response, data protection, and compliance capabilities.
38 out of 60
Data Classification and Protection 3Weeks WorkshopNTT DATA Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
NTT DATA’s Data Classification and Protection workshop series determines how a strong data classification and labeling structure can protect your critical data from internal and external threats.
39 out of 60
Active Directory Security on DemandComtrade System Integration
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
40 out of 60
True Managed Security Service- 3 day Workshoptrue org cloud
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
You have a vision. We can help you secure it...
41 out of 60
SoftwareOne Managed Detection and Response Service for Microsoft SentinelSoftwareOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protectionm365-sa-workplace-analytics product iconWorkplace Analytics
Future-proof your cyber security with Managed Detection and Response (MDR)
42 out of 60
HCLTech Business Email Protection: 10-Days ImplementationHCL America Inc_HCLT
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
HCLTech Business Email Protection (BEP) Powered By Microsoft EOP and MDO, Enable real time Business Email Protection alerting and automated remediation for email service hosted on Microsoft platform
43 out of 60
Copilot - 2 Days Adoption WorkshopINSOMEA COMPUTER SOLUTIONS TUNISIE SARL
+2
Applicable to:
m365-sa-firstline-workers product iconFrontline Workersm365-sa-threat-protection product iconThreat Protection
INSOMEA will help users in adopting copilot within companies from different sectors and sizes
44 out of 60
KMicro MXDR for SMBKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
KMicro MXDR for SMB helps businesses reduce operational complexity and strengthen cybersecurity defenses by managing their Microsoft Defender XDR environment.
45 out of 60
Cloud Security Operations CenterReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Verified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
46 out of 60
Microsoft OT/IOT Security : 2-Wks AssessmentWipro Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Identify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
47 out of 60
Microsoft 365 Rapid Security Assessment: 1-Wk AssessmentAwara IT
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft 365 Rapid Security Assessment is a quick yet comprehensive evaluation to enhance Microsoft 365 security against evolving cyber threats
48 out of 60
4security - Microsoft In-Depth Threat Protection Engagement4Sight Holdings
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Strengthen Your Defense, Uncover Vulnerabilities, and Stay Ahead of Cyber Threats
49 out of 60
Entra ID Identity and Application Governance Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Our solution fortifies Azure AD security by analyzing accounts, applications, and access policies to identify and mitigate risks, ensuring compliance.
50 out of 60
Security Anywhere:6Hour WorkshopIntegrated Solutions Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Workshop is dedicated for security stakeholders to help develop a comprehensive strategic plan based on Microsoft's most effective practices for for protecting IT environments
51 out of 60
Intelligent Shield: 1d AssessmentCorporate Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
An Audit for your Microsoft 365 tenant based on Best Practices
52 out of 60
Defender for Endpoint Managed Servicee2e-assure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
53 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Conditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
54 out of 60
SecureBlu MDR Service for Microsoft 365 DefenderNew Era Technology
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
55 out of 60
Microsoft 365 Security Health Check Assessment 3-WkBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
56 out of 60
Copilot for Security Readiness AssessmentPerformanta
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Futureproof your Business Security with Microsoft Security Copilot and Performanta
57 out of 60
KMicro's Sentinel360 MXDR with Microsoft Copilot for Security: 4-Wk POC/POVKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance threat hunting & accelerated MXDR for Microsoft Sentinel with Copilot for Security integration
58 out of 60
Security Copilot Value AcceleratorAvanade, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Designed to help organizations modernize their security operations and administration by leveraging Gen AI.
59 out of 60
Avanade Modern Sec OpsAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To deal with today’s cyber threats we develop a modern based soc approach on Microsoft Sentinel delivering a robust solution to allow early detection of attacks, advanced analysis of security incident
60 out of 60
  • 1
  • 2
  • 3
  • 4
  • Suivant
À propos de la Place de marché
  • Pourquoi Place de marché Microsoft
  • Blogs
  • Témoignages clients
Pour les clients
  • Heures de bureau
  • Guide de démarrage
  • Documentation technique
  • Offres privées
  • Engagement de consommation Microsoft Azure
  • Facturation et facturation
Pour les partenaires
  • Devenir un partenaire
  • Figurer dans l'annuaire
  • Obtenez un support marketing
  • Documentation technique
  • Conseils étape par étape pour créer, publier et vendre
  • Devenir éligible à la co-vente
  • Communauté de la Place de marché pour les partenaires
  • Ventes de la Place de marché dirigées par les canaux
  • Offres privées multipartites pour les partenaires de canal
Entreprises
  • Microsoft Cloud
  • Sécurité Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • TPE & PME
Société
  • Emploi
  • Actualités de la société
  • Confidentialité chez Microsoft
  • Investisseurs
  • Durabilité
Français (France) Vos choix en matière de confidentialité – Icône Désactiver Vos choix de confidentialité Confidentialité de l’intégrité des consommateurs
  • Plan du site
  • Contact Us
  • Confidentialité & cookies
  • Conditions d’utilisation
  • Marques
  • À propos de nos publicités
  • Gérer les cookies
  • © Microsoft 2025