प्रतिक्रिया दें
मदद और सहायता
सहेजे गए आइटम्स
निजी योजनाएँ
बस एक क्षण, आप लॉगिन हो रहे हैं...
फ़िल्टरसभी साफ़ करें

  • आपका स्थान
  • उत्पाद (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • अपनाना और प्रबंधन परिवर्तन
      • Microsoft Teams के लिए कॉलिंग
      • क्लाउड सुरक्षा
      • अनुपालन सलाहकार सेवाएँ
      • डिवाइस परिनियोजन और प्रबंधन
      • फ़्रंटलाइन कार्यकर्ता
      • पहचान और पहुँच प्रबंधन
      • जानकारी सुरक्षा और प्रशासन
      • इनसाइडर जोखिम
      • ज्ञान और इनसाइट्स
      • Microsoft Teams के लिए मीटिंग रूम
      • Microsoft Teams के लिए मीटिंग
      • Microsoft 365 Live Events
      • मोबाइल डिवाइस प्रबंधन
      • Power Platform for Teams
      • Teams कस्टम समाधान
      • टीमवर्क परिनियोजन
      • थ्रेट से सुरक्षा
      • कार्यस्थल विश्लेषण
    • Power Platform
  • उद्योग
  • सेवा प्रकार
  • मूल्य मॉडल

Professional Services परिणाम

professional services में परिणाम दिखाना/दिखा रहे हैं.
Spyglass-MXDR Managed Detection & Response: 2-week ImplementationQuisitive
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Spyglass-MXDR is the next generation in Security Operations Center services coupled with the latest in AI, advanced threat research and hunting, and experts providing 24x7x365 monitoring and response.
1 out of 60
Email Security Threat AssessmentAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
2 out of 60
Secure & Manage Devices using the Microsoft Intune Suite with AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Seamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
3 out of 60
Microsoft Cloud App Security Data Access Control Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Are you informed about your endpoint's and cloud app's security? Integrate Microsoft Defender for Endpoints and Cloud App Security to protect data, mitigate risks, and ensure compliance.
4 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
5 out of 60
Ransomware & Supply Chain Incident Management: 12 Hour AssessmentMaureen Data Systems
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Identify vulnerabilities within your organization, including those who pose a threat to your supply chain, provide & mature a tailored incident response & management program.
6 out of 60
Microsoft Copilot for Security: 2-Day WorkshopPlanet Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
This 2-day workshop covers the essential aspects you need to effectively and efficiently leverage Microsoft Copilot for Security for your organization's security operations and needs.
7 out of 60
Microsoft Intune Quickstart ImplementationTechNet UC LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The purpose of TechNet UC’s Microsoft Intune Quick Start offer is to provide organizations with expert guidance and support for the efficient deployment and management of Intune.
8 out of 60
Microsoft 365 Risk 5-Days AssessmentKPCS CZ, s.r.o.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 Risk Assessment provides preventive and comprehensive check of the Customer's Microsoft 365 Environment.
9 out of 60
Microsoft 365 Security Support Service BriefingTHREATSCAPE LIMITED
+2
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Threatscape’s Microsoft 365 Security Support Service helps organisations resolve security related technical issues experienced with the suite of Microsoft security products.
10 out of 60
Microsoft Purview Insider Risk Management and Compliance: ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement delivers setup and enablement for Microsoft Purview’s Insider Risk Management and Communication Compliance capabilities, supporting proactive risk mitigation.
11 out of 60
G Suite to Office 365 migration: 1-Hour Assessmenttrue org cloud
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Assessment of your current G Suite environment to plan migration to Office 365
12 out of 60
Microsoft Defender for Business Managed Service: Monthly MDRe2e-assure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Maximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
13 out of 60
Data Protection and Governance with Microsoft PurviewAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
14 out of 60
MDS - Threat Protection EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
15 out of 60
Softchoice Security Platformization Assessment and DesignSoftchoice
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Security Platform Assessment aims to reduce a customers tool sprawl when it comes to security, and alignment to Zero Trust principals
16 out of 60
Microsoft 365 Threat Protection Workshop + 5 DayCyberwise Siber Güvenlik TIC. AS.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Is your Microsoft 365 environment secure? Do you wonder about your current security maturity? We will assist you with a full-fledged workshop on how to deploy and implement Microsoft 365 Security.
17 out of 60
Microsoft Platform Support ImplementationManaged Solution
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protectionm365-sa-workplace-analytics product iconWorkplace Analytics
Microsoft Platform Support Services provides comprehensive support that optimizes performance, enhances security and drives adoption across your Microsoft ecosystem.
18 out of 60
Unified Endpoint Mgmt. - 6 Weeks - ImplementationTCS - Digital Workplace
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
TCS Unified Endpoint Management combines Microsoft Intune, Microsoft Defender for Endpoint and Configuration Manager solutions to provide modern management of endpoints with a Zero Trust strategy.
19 out of 60
CCPA CPRA: 6 - Wk AssessmentHappiest Minds Technologies Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Enable enterprises achieve CCPA & CPRA compliance through phased set of services ranging from in-depth gap assessment, technical remediation and continuous compliance services upgradation.
20 out of 60
Cyber Security AssessmentELEVATE Solutions Limited
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
The Cybersecurity Assessment helps customers assess their security posture and risk to insider threats.
21 out of 60
Security Operations Center with Microsoft SentinelAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Monitor systems, detect threats, and respond swiftly. Gain insights into security status and stay ahead of emerging threats with Microsoft Sentinel. Shield your business from cyber threats.
22 out of 60
Microsoft Defender for Endpoint: Rapid DeploymentAscent Global, Inc.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Modernize endpoint security and reduce cost with Microsoft Defender for Endpoint
23 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
24 out of 60
Microsoft 365 Security: 3-Day Workshopdelaware
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 security analysis and advisory. We will analyse how secure your environment is and guide you on how to improve it. Analysis, advice for Microsoft 365 security controls.
25 out of 60
Microsoft Sentinel Migration and ModernizeCollective Insights
+2
Applicable to:
m365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Migrate from legacy SIEM to Microsoft Sentinel; a cloud native SIEM + SOAR​
26 out of 60
Threat Protection Engagement for Microsoft 365CompuNet
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Improve your security posture with our Threat Protection Engagement based on Microsoft 365.
27 out of 60
Implementation of Microsoft Security CopilotAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
28 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
29 out of 60
Copilot for Security Accelerator: 2-week Implementationabra
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Neway’s Microsoft Copilot for Security Accelerator empowers security teams with enhanced protection and streamlined operations through eight key steps.
30 out of 60
Darktrace Managed Network SensorSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
31 out of 60
Microsoft Copilot for Security: 2 x 4h Workshopwater IT Security GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Get ready for Microsoft’s Copilot for Security and learn how generative AI can strengthen your organization’s IT. We cover everything you need to know – from the implementation to proper prompting.
32 out of 60
Microsoft Copilot for Security: 6-Wk EnablementCyclotron Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Copilot for Security empowers security teams investigations and operations, harnessing real-time data across digital security estates to improve response time, intelligence, and investigation quality.
33 out of 60
Managed Workspace Protection for Microsoft 365 DefenderOrange Business Services - Global
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Implementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
34 out of 60
Vulnerability ManagementBlack Cell Magyarország Korlatolt Felelossegu Tarsasag
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Rapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
35 out of 60
AVASecure 360 - Microsoft 365 Security & Governance Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Aware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
36 out of 60
Microsoft 365 E5 Zero Trust Security AssessmentSHI International Corp
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Explore how SHI can help your organization solve what’s next in your cybersecurity journey through a meticulous assessment and strategic roadmap to Zero Trust.
37 out of 60
Mobile Endpoint Mgt: 1-Wk Accelerated Implement'nITC Secure Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Accelerated Deployment of Microsoft Endpoint Manager for Corporate Mobile Devices (iOS, Android and macOS)
38 out of 60
Microsoft Multi-Cloud Security Engagement: 2-Wk POCLong View Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure and manage your cloud environments by fortifying your infrastructure against emerging threats.
39 out of 60
Copilot for Microsoft 365 WorkshopCloudGate LLC
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Copilot for Microsoft 365 Workshop, delivered by Cloud Gate LLC, is a comprehensive three-phase engagement.
40 out of 60
Cyber Insurer Readiness WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Uncover gaps and strengthen your position when applying for cyber insurance
41 out of 60
S.A.F.E - Start Anywhere, Finish Everything E5Collective Insights
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Upgrade to Microsoft 365 E5 for Advanced Productivity and Security
42 out of 60
Threat Protection: 2-Week WorkshopForsyte IT Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
43 out of 60
Microsoft Purview Sensitivity Labelling & DLP Protection: ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Apply sensitivity labels and DLP policies to protect critical data across the Microsoft 365 environment using Microsoft Purview, Information Protection, and related tools.
44 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
45 out of 60
Secure Data Management with Microsoft PurviewAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
46 out of 60
GDPR Assessment: 6-Week AssessmentHappiest Minds Technologies Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Enable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
47 out of 60
Secure Hybrid Identity - Defender for Identity: 6 week ImplementationPerformanta
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
48 out of 60
Rapid Risk Assessment: 4-Wk AssessmentAscent Global, Inc.
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Immediate and long-term Microsoft security strategy assessment utilizing security tools such as Defender, Sentinel, and Cloud App Security.
49 out of 60
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Business Services - Global
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Our workshop will help you designing and deploying Microsoft security technologies for your unique needs.
50 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
51 out of 60
Microsoft 365 Azure AD 3-wk Implementation RoadmapCyclotron Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Many enterprises are wasting hundreds of thousands of dollars per year on licensing costs for identity management solutions they don't need once they understand the full capabilities of Azure AD
52 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
53 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Advanced endpoint security and threat protection: detect, investigate, and respond to attacks.
54 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
55 out of 60
C1st End-user Device Security Zero TrustC1st Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
C1st Technologies enhances security with Zero Trust-based endpoint protection, leveraging Microsoft Intune, Defender, and Azure AD to safeguard devices, applications, and data.
56 out of 60
Endpoint Management WorkshopCitrin Cooperman Advisors, LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Empower secure endpoint management with Microsoft Intune through streamlined operations.
57 out of 60
24x7 Microsoft 365 Security MDR: 4-Wk AssessmentApex Digital Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Achieve better security with Microsoft 365 while receiving focused expertise where it matters most, real-time 24x7 Managed Detection & Response, and improving your security maturity over time.
58 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies Services
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Dell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
59 out of 60
Implementing Defender for Endpoint & Cloud App SecurityAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance. ​
60 out of 60
  • पिछला
  • 2
  • 3
  • 4
  • 5
  • 6
  • अगला
मार्केटप्लेस के बारे में
  • Why Microsoft Marketplace
  • ब्लॉग्स
  • ग्राहक की कहानियाँ
ग्राहकों के लिए
  • Office के घंटे
  • शुरू करने के लिए मार्गदर्शिका
  • तकनीकी दस्तावेज़ीकरण
  • निजी ऑफ़र
  • Microsoft Azure कंज़म्प्शन कमिटमेंट
  • बिलिंग और इनवॉइसिंग
भागीदारों के लिए
  • भागीदार बनें
  • सूचीबद्ध हो जाएँ
  • विपणन समर्थन प्राप्त करें
  • तकनीकी दस्तावेज़ीकरण
  • बनाने, प्रकाशित करने और बेचने के लिए चरण-दर-चरण मार्गदर्शन
  • सह-विक्रय के योग्य बनें
  • भागीदारों के लिए मार्केटप्लेस समुदाय
  • चैनल-आधारित मार्केटप्लेस बिक्री
  • चैनल भागीदारों के लिए मल्टीपार्टी का निजी ऑफ़र
व्यवसाय
  • Microsoft क्लाउड
  • Microsoft सुरक्षा
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft विज्ञापन
  • Microsoft 365 Copilot
  • Microsoft Teams
कंपनी
  • करियर
  • गोपनीयता
  • स्थिरता
हिन्दी (भारत) आपके गोपनीयता विकल्प का Opt-Out आइकन आपके गोपनीयता विकल्प उपभोक्ता की स्वास्थ्य गोपनीयता
  • साइटमैप
  • हमसे संपर्क करें
  • गोपनीयता & कुकीज़
  • उपयोग की शर्तें
  • ट्रेडमार्क
  • हमारे विज्ञापनों के बारे में
  • कुकीज़ प्रबंधित करें
  • © Microsoft 2025