Envoyer des commentaires
Aide et support
Éléments enregistrés
Plans privés
Juste un moment, connexion en cours...
FiltresTout effacer

  • Votre position
  • Produits (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Gestion de l'adoption et des modifications
      • Appel pour Microsoft Teams
      • Cloud Security
      • Services de conseil pour la conformité
      • Déploiement et gestion de l’appareil
      • Employés de première ligne
      • Gestion des identités et des accès
      • Protection des informations et gouvernance
      • Risque d’initié
      • Connaissances et insights
      • Meeting Rooms pour Microsoft Teams
      • Meetings pour Microsoft Teams
      • Microsoft 365 Live Events
      • Gestion des périphériques mobiles
      • Power Platform for Teams
      • Solutions personnalisées Teams
      • Déploiement de travail d'équipe
      • Protection contre les menaces
      • Analyse du temps de travail
    • Power Platform
  • Secteurs d'activité
  • Type de service
  • Modèle de tarification

Professional Services résultats

Affichage des résultats dans professional services.
Vue résultats associés dans clouds du secteur d’activité.
Microsoft 365 Defender Attack Simulation: 4 Weeks DeploymentSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 attack simulation training works to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack.
1 out of 48
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
2 out of 48
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
3 out of 48
Microsoft 365 Defender for Endpoints Deployment: 2 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect your organization's devices against advanced threats such as malware, ransomware, phishing and zero-day attacks.
4 out of 48
Dell Implementation Services for Copilot SecurityDell Technologies Services
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Readiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
5 out of 48
Ctelecoms Protect and Govern Sensitive Data WorkshopConsolidated Telecoms (Ctelecoms)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The Protect & Govern Sensitive Data Workshop gives you the insights you need to better discover, protect, and govern your corporate data.
6 out of 48
Ctelecoms Secure Identities and Access WorkshopConsolidated Telecoms (Ctelecoms)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure Identities and Access Workshop helps you find and mitigate identity risks and safeguard their organizations with a seamless identity solution.
7 out of 48
Defend Against Threats with SIEM Plus XDR Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The goal of the workshop is to show how Microsoft's security solutions can help organizations protect themselves from cyberthreats
8 out of 48
Ctelecoms Defend Against Threats with SIEM Plus XDR WorkshopConsolidated Telecoms (Ctelecoms)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Defend Against Threats with SIEM Plus XDR Workshop Learn how to put next-generation Microsoft security tools to work for you.
9 out of 48
Secure Multicloud Environment Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The workshop aims to present best practices and tools for designing, implementing and managing a secure multi-cloud environment, leveraging the capabilities of Microsoft Azure, Microsoft 365, etc.
10 out of 48
SEIDOR Modern Workplace with Microsoft 365 1-Month ImplementationSEIDOR SA
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
We promote and respond to the current needs of companies in terms of mobility, security, productivity, communication and collaboration through the evolution of their workstations
11 out of 48
Mitigate Compliance & Privacy Risk Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Risk
Designed to help organizations identify and reduce compliance and privacy risks associated with the use of the cloud.
12 out of 48
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security Kft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and harden Microsoft Security configurations based on industry best practices
13 out of 48
Protect & Govern Sensitive Data Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
It is an intensive workshop that teaches you how to protect and govern your organization's sensitive data with Microsoft solutions.
14 out of 48
Secure Identities & Access Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
The objective of the workshop is to help customers find and mitigate identity risks and protect your organization with a seamless identity solution.
15 out of 48
AI Agents In CopilotINOVASYS FOR SYSTEMS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Inovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
16 out of 48
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
17 out of 48
Endpoint Management: 4 Wk of Workshop ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
4 weeks of workshop implementation to learn how to manage and protect your devices, applications and users
18 out of 48
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
CMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
19 out of 48
Quadra BluForge Managed XDRQuadrasystems.net (India) P Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Discover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
20 out of 48
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
21 out of 48
Cybersecurity Assessment EngagementadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Get a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
22 out of 48
ITE ZeroTrust360™Information Technology of Egypt Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
ITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
23 out of 48
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Boost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
24 out of 48
Purview Information Protection: setup and adoptionDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
25 out of 48
Identity Governance Lifecycle: 4 Weeks of AssessmentSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
The objective of the assessment is to identify areas for improvement and potential risks in the identity environment, based on the maturity level of the organization's identity governance model.
26 out of 48
Minsait Threath Protection Engagement WorkshopMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Evaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
27 out of 48
Minsait Cyber SmartMDR SOC ServiceMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Servicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
28 out of 48
Copilot WorkshopSuri Services SC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Microsoft Copilot 365: Potencia tu organización con el poder de la Colaboración Inteligente.
29 out of 48
HSBS Cloud Modern Work Assessment Microsoft 365HSBS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
Solução de Assessment da plataforma Microsoft 365 para otimização de custos, adoção e segurança
30 out of 48
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
31 out of 48
Consulting: Cloud Security 6-Months ImplementationRedbelt Security
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Consultoria em Segurança Azure: Deploy, Implantação, Monitoramento e Serviços Gerenciados/MSS
32 out of 48
Dedalus Compliance Management Implementation - 4 weeksDedalus
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
This four weeks solution guide enterprises to expand their data governance and compliance management through Microsoft Purview Compliance Solutions implementation.
33 out of 48
Microsoft EPP and EDRBrasoftware Informatica Ltda
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Implementação e setup inicial das principais funcionalidades do Microsoft Endpoint Protection
34 out of 48
AntiSpam e AntiPhishingRedbelt Security
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Implementação, assessment de melhores práticas e acompanhamento e apoio na adoção, remediação e resposta a incidentes
35 out of 48
MSS com Soluções MicrosoftRedbelt Security
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Serviços de gerenciamento e operação de segurança em soluções Microsoft.
36 out of 48
Dedalus Implementation and Adoption of Copilot for Microsoft 365Dedalus
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Dedalus provides a Microsoft 365 Copilot implementation and adoption solution for your business.
37 out of 48
Implementação de Segurança Avançada (XDR)SGA Tecnologia Inteligente
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Planejamento e execução da implementação da suíte de XDR do Microsoft Defender, incluindo produtos de proteção de ameaças do Microsoft 365 e segurança em nuvem do Microsoft Defender for Cloud.
38 out of 48
Zero Trust AcceleratorTELTEC SOLUTIONS LTDA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Transforme a segurança da sua organização com o Zero Trust Accelerator da Teltec. Adote uma abordagem proativa e abrangente que protege seus dados e recursos contra ameaças internas e externas.
39 out of 48
Implementation of Copilot readiness assessmentDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
40 out of 48
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
41 out of 48
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
42 out of 48
Microsoft 365: Migração e Implementação de 2 horasMundo365 Serviços
+3
Applicable to:
m365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-cloud-security product iconCloud Securitym365-sa-teams-custom-solutions product iconTeams Custom Solutions
Migração de ambiente para Microsoft 365, com apps do Office 365, Microsoft Teams, Outlook, OneDrive, Sharepoint, tornando o ambiente de sua equipe mais produtiva e inovadora, treinamento de 2 horas.
43 out of 48
E-mail Migration to Microsoft 365: 12 M - ImpNexer
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Email migration to Microsoft 365 and enablement of key cloud collaboration tools such as Teams, OneDrive and SharePoint. Free workshop for users of up to 6 hours duration.
44 out of 48
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
45 out of 48
Endpoint Management: 6-Week WorkshopVENHA PRA NUVEM
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Aprenda e descubra como gerenciar e proteger seus dispositivos, aplicativos e usuários no Microsoft 365
46 out of 48
Serviços de Segurança: Implementação 1WeekFUNCTION 1 TECNOLOGIA CORPORATIVA LTDA - ME
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Em tempos de tantos tipos de Cyber-ataques no mercado, garantir a proteção das informações que entram e saem da empresa é fundamental. Com essa implementação, será possível garantir a segurança dos e-
47 out of 48
"Solo Microsoft 365 Discovery": 1-Wk AssessmentSolo Network Brasil S/A
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Tenha visão de GAPS de segurança em seu ambiente e como protege-lo de forma efetiva utilizando a suíte Microsoft 365
48 out of 48
  • Précédent
  • 1
  • 2
  • 3
  • 4
À propos de la Place de marché
  • Pourquoi Place de marché Microsoft
  • Blogs
  • Témoignages clients
Pour les clients
  • Heures de bureau
  • Guide de démarrage
  • Documentation technique
  • Offres privées
  • Engagement de consommation Microsoft Azure
  • Facturation et facturation
Pour les partenaires
  • Devenir un partenaire
  • Figurer dans l'annuaire
  • Obtenez un support marketing
  • Documentation technique
  • Conseils étape par étape pour créer, publier et vendre
  • Devenir éligible à la co-vente
  • Communauté de la Place de marché pour les partenaires
  • Ventes de la Place de marché dirigées par les canaux
  • Offres privées multipartites pour les partenaires de canal
Entreprises
  • Microsoft AI
  • Sécurité Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • TPE & PME
Société
  • Emploi
  • Actualités de la société
  • Confidentialité chez Microsoft
  • Investisseurs
  • Durabilité
Français (France) Vos choix en matière de confidentialité – Icône Désactiver Vos choix de confidentialité Confidentialité de l’intégrité des consommateurs
  • Plan du site
  • Contact Us
  • Confidentialité & cookies
  • Conditions d’utilisation
  • Marques
  • À propos de nos publicités
  • Gérer les cookies
  • © Microsoft 2026