Fornecer comentarios
Axuda e asistencia técnica
Elementos gardados
Plans privados
Agarde un momento, estamos iniciando a sesión...
FiltrosBorrar todo

  • A súa localización
  • Produtos (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Xestión de modificacións e adopcións
      • Chamada a Microsoft Teams
      • Seguranza na nube
      • Servizos de consultoría de cumprimento
      • Xestión e despregamento de dispositivos
      • Traballadores de primeira liña
      • Xestión de acceso e identidades
      • Protección da información e regulación
      • Risco interno
      • Información e conclusións
      • Salas de reunións para Microsoft Teams
      • Reunións para Microsoft Teams
      • Microsoft 365 Live Events
      • Xestión de dispositivos móbiles
      • Power Platform for Teams
      • Solucións personalizadas para equipos
      • Despregamento do traballo en equipo
      • Protección contra ameazas
      • Workplace Analytics
    • Power Platform
  • Sectores
  • Tipo de servizo
  • Modelo de prezos

Professional Services resultados

Mostrando resultados de professional services.
Ver resultados relacionados en nubes sectoriais.
AI Agents In CopilotINOVASYS FOR SYSTEMS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Inovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
1 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
2 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
3 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
4 out of 60
Zero Trust Model - 4h assessmentReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Zero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
5 out of 60
Microsoft Priva Assessment: 2 WkLighthouse Global
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Empowering organizations to understand how the Microsoft Priva tool can be leveraged to reduce risk
6 out of 60
Minsait Threath Protection Engagement WorkshopMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Evaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
7 out of 60
Data Security & Protection: 8 weeks - ImplementationMazzy Technologies Corp.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
8 out of 60
Identity & Access Management: 1-Mth ImplementationOfficeline SA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Microsoft 365 Identity & Access Management to improve and streamline security on cloud and applications
9 out of 60
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
CMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
10 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Boost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
11 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
12 out of 60
Pently SOCaaSPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Full Managed Security Service with a personal touch and individually build for each customer
13 out of 60
Purview Information Protection: setup and adoptionDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
14 out of 60
Identity and Access Control ImplementationSMART business LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Cybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
15 out of 60
Quadra BluForge Managed XDRQuadrasystems.net (India) P Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Discover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
16 out of 60
Data Protection Impact Assessment: 8 WkLighthouse Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Empowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
17 out of 60
NEST ArenaNoibit
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Two-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
18 out of 60
SVA Microsoft Copilot for Security Readiness Workshop 1dSVA System Vertrieb Alexander GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
In zwei Sitzungen zu jeweils vier Stunden geben wir Ihnen eine umfassende Einführung in Copilot for Security.
19 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
20 out of 60
Cloud Workplace: 8-Months ImplementationRapid Circle
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
The implementation of a cloud workplace gives an organization the opportunity to offer employees a workplace that can be used independently of place and time and with the most modern Microsoft tools.
21 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
22 out of 60
Threat Protection: 2-Month ImplementationOfficeline SA
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Threat protection with Microsoft Defender products. We deliver a solution that improves and streamlines threat protection for every organization.
23 out of 60
base-IT PentestingBaseIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Mit base-IT Pentesting stärken wir Ihre IT-Sicherheit und decken Schwachstellen auf. Durch die Integration von Microsoft 365 (Cloud Security, etc.) entsteht eine umfassende Sicherheitsarchitektur.
24 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
25 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Servicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
26 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
27 out of 60
Managed Security Operations Center: 1 Month ImplementationnovaCapta GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Wir bieten einen professionellen 24/7-Sicherheitsbetrieb Ihrer Umgebung mit unserem zertifizierten deutschen SOC-Team
28 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies Services
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Readiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
29 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Get started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
30 out of 60
Insight Microsoft 365 Strategy Planning ServiceInsight Technology Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
Microsoft 365 strategy planning service is a consulting service supporting clients to gain understanding of current and future strategies around the adoption of Microsoft 365
31 out of 60
DIGITALL Cyber Security: 7-Day AssessmentDIGITALL Nature Germany GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
UNCOVER AND MITIGATE SECURITY RISKS WITH OUR COMPREHENSIVE CYBER SECURITY ASSESSMENT
32 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Environment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
33 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
34 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
35 out of 60
M365 Security Audit: 1-Wk AuditJoker IT AG
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Nachhaltig das Bewusstsein für die Cloud-Sicherheit verbessern
36 out of 60
Microsoft 365 Copilot for Executives WorkshopSMART business LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Join our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
37 out of 60
Tenant to Tenant Migration for AAD, EXO and OD4B Services Only: 1-Week ImplementationIT Partner LLC
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Security
Microsoft 365 Tenant-to-Tenant Migration Including Azure AD, Exchange Online and OneDrive for Business services and data
38 out of 60
Information Protection - 1Month ImplementationOfficeline SA
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
An offering of Microsoft Information Protection implementation to improve and streamline compliance across all environments.
39 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
40 out of 60
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security Kft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and harden Microsoft Security configurations based on industry best practices
41 out of 60
Modern Endpoint Protection as a Service Bereitstellung - 2 Daysmsg systems ag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Modern Endpoint Protection as a Service - Vollständige EDR/XDR/MDR Services aus einer Hand powered by Microsoft 365 Defender
42 out of 60
ITE ZeroTrust360™Information Technology of Egypt Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
ITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
43 out of 60
Security Operations Center: 1-Months Implementationiteracon GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Das ITRCN SOC sichert die komplette IT-Infrastruktur Ihres Unternehmens als zentralisiertes Sicherheitsmanagement vollumfänglich ab. Dabei arbeiten wir mit modernsten Microsoft Technologien.
44 out of 60
Microsoft Security and Rapid Cyberattack Assessment: 3-tägiges AssessmentnovaCapta GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Das Microsoft Security Assessment hilft Ihrem Unternehmen zu verstehen, wie Sie Bedrohungen durch den Einsatz von Microsoft 365-Security-Lösungen gezielt reduzieren und sich vor Angriffen schützen.
45 out of 60
Microsoft 365 Tenant Security Workshop: 3tägiger WorkshopnovaCapta GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Erfahren Sie wie Sie die Microsoft Security Tools bestmöglich nutzen um Ihren Tenant zu schützen
46 out of 60
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/S
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
We can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
47 out of 60
Microsoft Purview Information Protection - Starter Workshop Duration 3 daysNTT DATA Deutschland GmbH
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Purview Information Protection with Azure Rights Management provides an effective technology that is already integrated with Office 365 / Azure
48 out of 60
Microsoft 365 Review: 2-Day AssessmentCANCOM Austria AG
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Get the most out of your Microsoft 365 Tenant with our custom-tailored cloud review to improve your workloads, strengthen the security, and point out unused potentials.
49 out of 60
ADVIA Service Implementierung & MigrationADVIA GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Die Cloud ist das Ziel, der Weg ist klar, doch was ist mit Ihren Daten?
50 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/S
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Conscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
51 out of 60
Quick Security Assessment für die Microsoft Cloud: 2 WochenIT-Improvement Deutschland GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Standortbestimmung im Security Bereich der Microsoft Cloud Umgebung und Entwicklung von Handlungsempfehlungen.
52 out of 60
Base-IT Managed Service Security & SOCBaseIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Base-IT Managed Service Security & SOC bietet Ihnen eine PROAKTIVE und PROFESSIONELLE Betreuung, sehr gerne auf Wunsch Rund-um-die-Uhr. Wir garantieren Ihnen vollumfassenden IT-Security Schutz.
53 out of 60
Windows 365 Cloud PC Workshop - 2 DayaConTech GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
Die teccle group begleitet Ihre Reise in die Virtualisierungswelt mit dem Windwos 365 Cloud PC Workshop.
54 out of 60
PRW® Compliance Set: Microsoft 365Orange Networks GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Mit dem PRW® Compliance Set: Microsoft 365 liefern wir das perfekte Instrument, um Microsoft 365 datenschutzkonform absichern und nutzen zu können.
55 out of 60
Magenta Security Services for Microsoft DACH:3 months ImplementationTelekom Deutschland GmbH Main Account
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Magenta Security for Microsoft provides the management and the integration in as well as the continuous monitoring of your Microsoft Security by the SOC of Deutsche Telekom
56 out of 60
Intune Mobile Device Management: 7-tägige ImplementierungnovaCapta GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Mobile Geräte mit Microsoft Intune und den Security Best Practices der novaCapta einrichten, verwalten und schützen
57 out of 60
CANCOM Microsoft Defender Lifecycle Services - Monthly recurringCANCOM GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Die CANCOM Microsoft Defender Lifecycle Services beinhalten Leistungen zur Unterstützung im Betrieb der Microsoft Defender Lösungen.
58 out of 60
Microsoft 365 Copilot-Ready: 2 Wochen Assessment | Arvato SystemsArvato Systems
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Innovative Best Practices für Fachbreiche und Führungskräfte auf dem Weg zur effizienten Organisation mit Microsoft 365 sowie dem neuen Copilot
59 out of 60
Modern Work Security: 1 Tag Briefing | Arvato SystemsArvato Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Kreieren Sie mit dem Microsoft 365 Toolstack den geschützten Arbeitsplatz der Zukunft!
60 out of 60
  • Anterior
  • 1
  • 2
  • 3
  • 4
  • 5
  • Seguinte
Acerca de Marketplace
  • Por que Microsoft Marketplace
  • Blogs
  • Historias de clientes
Para clientes
  • Horario de oficina
  • Guía de inicio
  • Documentación técnica
  • Ofertas privadas
  • Compromiso de consumo de Microsoft Azure
  • Facturación
Para os socios
  • Convértete en socio
  • Obter a lista
  • Obter soporte de mercadotecnia
  • Documentación técnica
  • Guía paso a paso para construír, publicar e vender
  • Convértete en elixible para a venda conxunta
  • Comunidade de mercados para socios
  • Vendas de mercado dirixidas por canles
  • Ofertas privadas multipartida para socios de canle
Negocio
  • Microsoft AI
  • Seguranza de Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Empresa
  • Profesións
  • Acerca de Microsoft
  • Noticias da empresa
  • Privacidade en Microsoft
  • Investidores
  • Accesibilidade
  • Sostibilidade
Galego (galego) Icona de rexeitamento das opcións de privacidade A súas opcións de privacidade Privacidade da saúde do consumidor
  • Mapa do sitio
  • Contactar connosco
  • Privacidade e cookies
  • Condicións de uso
  • Marcas comerciais
  • Acerca dos nosos anuncios
  • Xestionar cookies
  • © Microsoft 2026