Fornecer comentarios
Axuda e asistencia técnica
Elementos gardados
Plans privados
Agarde un momento, estamos iniciando a sesión...
FiltrosBorrar todo

  • A súa localización
  • Produtos (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Xestión de modificacións e adopcións
      • Chamada a Microsoft Teams
      • Seguranza na nube
      • Servizos de consultoría de cumprimento
      • Xestión e despregamento de dispositivos
      • Traballadores de primeira liña
      • Xestión de acceso e identidades
      • Protección da información e regulación
      • Risco interno
      • Información e conclusións
      • Salas de reunións para Microsoft Teams
      • Reunións para Microsoft Teams
      • Microsoft 365 Live Events
      • Xestión de dispositivos móbiles
      • Power Platform for Teams
      • Solucións personalizadas para equipos
      • Despregamento do traballo en equipo
      • Protección contra ameazas
      • Workplace Analytics
    • Power Platform
  • Sectores
  • Tipo de servizo
  • Modelo de prezos

Servizos de consultoría resultados

Mostrando resultados de servizos de consultoría.
Ver resultados relacionados en nubes sectoriais.
Secure AI Quickstart: 3-week Assessment and Proof of ConceptQuisitive
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Secure AI Quick Start is a fundable, Microsoft-aligned security engagement that rapidly analyzes organizational AI readiness and identifies critical security & governance improvements
1 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
2 out of 60
Minsait Threath Protection Engagement WorkshopMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Evaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
3 out of 60
TSG Security Risk AssessmentTechnology Service Group Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Our Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
4 out of 60
神州数码安全解决方案神州数码(中国)有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Empower organizations with end-to-end cloud security, zero trust architecture, and compliance using Microsoft technologies for robust protection and management.
5 out of 60
Zoho CRM and OneDrive for Business IntegrationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
Securely link OneDrive documents to Zoho CRM records to ensure sales teams always access the latest approved assets with automated version control and alerts.
6 out of 60
AI Agents In CopilotINOVASYS FOR SYSTEMS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Inovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
7 out of 60
Microsoft 365 Security AssessmentTechPlus Talent
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This Microsoft 365 Security Assessment evaluates your entire Microsoft 365 environment to identify security gaps and misconfigurations, delivering risk-rated findings and prioritized recommendations.
8 out of 60
Inspira Microsoft Threat Protection Envisioning WorkshopInspira Enterprise Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
9 out of 60
Inspira Microsoft Data Security Envisioning WorkshopInspira Enterprise Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Identify data security risks in your organizational data
10 out of 60
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
11 out of 60
CBTS Microsoft 365 Managed ServiceCBTS Technology Solutions LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Partner with CBTS for ongoing management and support of Microsoft 365
12 out of 60
Cybersecurity Incident Response Retainer with Microsoft DefenderCBTS Technology Solutions LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Partner with CBTS to ensure assistance when you need it most during a significant security event.
13 out of 60
Data Security Envisioning WorkshopPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
Identify hidden data risks, assess insider threats, and gain clear, actionable guidance to strengthen security, compliance, and governance with a Microsoft Purview–driven workshop.
14 out of 60
HubSpot and OneDrive for Business IntegrationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
Automatically sync HubSpot with OneDrive for Business to embed secure, always-up-to-date marketing assets and eliminate manual file uploads.
15 out of 60
Data Security WorkshopEmergent Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Security workshop leveraging Microsoft's security products such as Purview to uncover data risks across Microsoft 365, assess exposure, and deliver actionable recommendations for IT leaders.
16 out of 60
S4B_XDR_Recuperacion_Automatica_RecursosS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
17 out of 60
S4B Email Attack Simulation TrainingS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Attack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
18 out of 60
Threat Investigation and Analysis Service with Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
19 out of 60
Server Endpoint Protection Implementation Service using Microsoft Defender for EndpointS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Provides comprehensive protection for physical and virtual servers with Microsoft Defender for Server, combined with continuous security monitoring to detect, investigate, and respond to threats.
20 out of 60
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
21 out of 60
Credentials and access protection , unauthorized logins, and suspicious behavior with Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Cloud Identity Protection detects and mitigates credential and access risks using Microsoft Entra ID Protection. It leverages analytics, adaptive MFA, and condicional access to enhance security.
22 out of 60
Protección Identidades en ambiente Híbrido con Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Integra seguridad en nube y on-premise con Defender for Identity y Entra ID Protection, unificando detección, investigación y respuesta frente a amenazas.
23 out of 60
Advanced Hybrid Identity Security with Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Hybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
24 out of 60
Entrenamiento de Phishing con Microsoft Office 365S4B
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Ofrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
25 out of 60
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Seguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
26 out of 60
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Investiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
27 out of 60
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
28 out of 60
CYBERWELL Microsoft Security AuditCYBERWELL Canada Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Identify risks and misconfigurations with prioritized remediation guidance across Microsoft 365 environments.
29 out of 60
Seguridad avanzada de identidad en la nube con Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protege credenciales y accesos en la nube con Microsoft Entra ID Protection, aplicando MFA adaptativo y acceso condicional para mitigar riesgos de identidad.
30 out of 60
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Defensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
31 out of 60
Enterprise Automated Endpoint Recovery with Microsoft Defender XDRS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
32 out of 60
Zero Trust Identity Security Implementation with EntraID by ReplyReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Reply’s security approach with Microsoft Entra ID helps organizations reduce identity-driven risk, support compliance requirements, and accelerate secure adoption of Microsoft cloud services.
33 out of 60
Zones Microsoft Threat Protection WorkshopZones Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Detect real threats, assess vulnerabilities, and get a tailored Microsoft security roadmap, delivered by Zones’ certified cybersecurity experts.
34 out of 60
Microsoft 365 Security Assessment - 4 DaysMatrix3D Infocom Private Ltd.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This Assessment is a comprehensive evaluation of your Microsoft 365 environment, designed to identify misconfigurations, security gaps, compliance risks, and underutilized Microsoft security features.
35 out of 60
Microsoft 365 Migration and Deployment ServicesImproving
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Assess, migrate, and optimize Microsoft 365 to boost collaboration, strengthen security, reduce redundant tools, and prepare your environment for AI‑driven productivity with Microsoft 365 Copilot.
36 out of 60
The Threat Protection Envisioning WorkshopRackspace Technology
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
A collaborative workshop that identifies real threats, prioritizes risk, and delivers a clear Microsoft-aligned security roadmap to focus investments and reduce cyber risk confidently enterprise-wide.
37 out of 60
AllyCare Guardian for Microsoft 365BlueAlly Technology Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Audit and secure Microsoft 365 with expert-led configuration reviews, guided implementation, and ongoing support.
38 out of 60
Microsoft Sentinel SOC Managed Service by H OneH One (Private) Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
H One’s Microsoft Sentinel–based MDR service combines certified expertise, continuous monitoring, and rapid response to protect and strengthen your cloud environment.
39 out of 60
Beyondsoft Segurança Ambiente CloudBeyondsoft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Oferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
40 out of 60
SkyNorth - Microsoft 365 Zero Trust Security & Governance AssessmentSkyNorth Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
Uncover risks and optimize Microsoft 365 with a Zero Trust security roadmap
41 out of 60
SkyNorth – CJI Data Protection for Microsoft 365 (CJIS‑Aligned)SkyNorth Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Safeguard CJI in Microsoft 365 - SkyNorth helps local governments identify, protect, and govern sensitive criminal justice data in Microsoft 365 to support compliance and secure AI adoption
42 out of 60
Quisitive Agentic AI Security FoundationQuisitive
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Agentic AI Security Foundation & Readiness offering is a focused, execution‑led engagement designed to help enterprises establish early control and visibility across agentic AI systems.
43 out of 60
Netox MXDR / SOC 24/7Netox Oy
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Finnish-built 24/7 MXDR & SOC for Microsoft environments
44 out of 60
Microsoft Defender XDR Implementation & EnablementDaymark Solutions
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Accelerate your Extended Detection & Response (XDR) capabilities leveraging Microsoft Defender.
45 out of 60
Microsoft Defender for Cloud Deployment & Multi-Cloud Security Implementation: 4-8 Weeks EngagementCelebal Technologies Private Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Strengthen Azure and multi-cloud security through CSPM, CWPP, and CNAPP capabilities with compliance alignment and AI-driven remediation.
46 out of 60
Microsoft Defender XDR and Zero Trust Security Implementation: 4-8 Weeks EngagementCelebal Technologies Private Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Unify endpoint, identity, email, and cloud security to improve visibility, automate SOC response, and enable Zero Trust enforcement.
47 out of 60
Unified SOC with Microsoft Defender XDR and Sentinel (SIEM & SOAR): 4-8 Weeks EngagementCelebal Technologies Private Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Modernize security operations using Microsoft Sentinel and Defender XDR to centralize threat monitoring, automate response, strengthen hybrid and multi cloud protection, and improve SOC outcomes fast.
48 out of 60
Microsoft Entra Identity & Access Management Implementation: 4-8 Weeks EngagementCelebal Technologies Private Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Strengthen hybrid identity security with Microsoft Entra ID, Conditional Access, MFA, Identity Governance, and PIM to establish adaptive access control and a Zero Trust IAM foundation.
49 out of 60
EPAM Intune Endpoint Management ImplementationEPAM Systems, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Enable secure, automated, and compliant device management by modernizing endpoint operations with Microsoft Intune to streamline deployment, policy control, and ongoing lifecycle management.
50 out of 60
HCLTech Frontline Worker Digital Experience – Assessment & Implementation support for Empowering Frontline WorkersHCL America Inc_HCLT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-firstline-workers product iconFrontline Workers
HCLTech’s solution streamlines frontline communication, digital workflows, and secure device management, powered by HCLTech, Microsoft, and Zebra for a modern, sustainable frontline workplace.
51 out of 60
Microsoft 365: 2-Week AssessmentApex Digital Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Establish a clear roadmap and change management plan for your journey to a modern workplace.
52 out of 60
Endpoint Management: 3-Day WorkshopApex Digital Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Begin the steps to manage and protect your devices, your apps, and your users
53 out of 60
Microsoft 365 Identity & Security: 2-Wk AssessmentPSM Partners
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Customized identity and security assessment focused on the Microsoft 365 platform
54 out of 60
Security Assessment: 2-Wk AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
55 out of 60
Threat Protection: 3-Wk POCFPT/Intellinet
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Identify security threats and begin to respond and mitigate.
56 out of 60
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Ravenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
57 out of 60
Big Green IT Security Assessment: 3-WeekBig Green IT - Dev
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
58 out of 60
CMMC Data Enclave Dplymt: 4-Wk ImplementationC3 Integrated Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Deploy Microsoft 365 to meet CMMC Requirements
59 out of 60
Managed Security for Compliance: 1 yr Mgd ServiceInsight
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
Discover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
60 out of 60
  • Anterior
  • 9
  • 10
  • 11
  • 12
  • 13
  • Seguinte
Acerca de Marketplace
  • Por que Microsoft Marketplace
  • Blogs
  • Historias de clientes
Para clientes
  • Horario de oficina
  • Guía de inicio
  • Documentación técnica
  • Ofertas privadas
  • Compromiso de consumo de Microsoft Azure
  • Facturación
Para os socios
  • Convértete en socio
  • Obter a lista
  • Obter soporte de mercadotecnia
  • Documentación técnica
  • Guía paso a paso para construír, publicar e vender
  • Convértete en elixible para a venda conxunta
  • Comunidade de mercados para socios
  • Vendas de mercado dirixidas por canles
  • Ofertas privadas multipartida para socios de canle
Negocio
  • Microsoft AI
  • Seguranza de Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Empresa
  • Profesións
  • Acerca de Microsoft
  • Noticias da empresa
  • Privacidade en Microsoft
  • Investidores
  • Accesibilidade
  • Sostibilidade
Galego (galego) Icona de rexeitamento das opcións de privacidade A súas opcións de privacidade Privacidade da saúde do consumidor
  • Mapa do sitio
  • Contactar connosco
  • Privacidade e cookies
  • Condicións de uso
  • Marcas comerciais
  • Acerca dos nosos anuncios
  • Xestionar cookies
  • © Microsoft 2026