प्रतिक्रिया दें
मदद और सहायता
सहेजे गए आइटम्स
निजी योजनाएँ
बस एक क्षण, आप लॉगिन हो रहे हैं...
फ़िल्टरसभी साफ़ करें

  • आपका स्थान
  • उत्पाद (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • अपनाना और प्रबंधन परिवर्तन
      • Microsoft Teams के लिए कॉलिंग
      • क्लाउड सुरक्षा
      • अनुपालन सलाहकार सेवाएँ
      • डिवाइस परिनियोजन और प्रबंधन
      • फ़्रंटलाइन कार्यकर्ता
      • पहचान और पहुँच प्रबंधन
      • जानकारी सुरक्षा और प्रशासन
      • इनसाइडर जोखिम
      • ज्ञान और इनसाइट्स
      • Microsoft Teams के लिए मीटिंग रूम
      • Microsoft Teams के लिए मीटिंग
      • Microsoft 365 Live Events
      • मोबाइल डिवाइस प्रबंधन
      • Power Platform for Teams
      • Teams कस्टम समाधान
      • टीमवर्क परिनियोजन
      • थ्रेट से सुरक्षा
      • कार्यस्थल विश्लेषण
    • Power Platform
  • उद्योग
  • सेवा प्रकार
  • मूल्य मॉडल

Professional Services परिणाम

professional services में परिणाम दिखाना/दिखा रहे हैं.
Windows as a Service: 4-Wk ImplementationAMTRA Solutions Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure your data and devices, identities and your business with Windows 10/11.
1 out of 60
Microsoft Defender Secure Score Optimization + Licensing & Skills Review - 1-Week AssessmentBlue Cycle LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Maximize your Secure Score and ROI with a 1-week audit of config, licensing, and security team readiness
2 out of 60
Interlink Cloud Proactive Enhanced Security Monitoring & Response: Monthly Managed ServiceInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Interlink's managed services for Microsoft 365 combines 24x7 automated incidence response and 12x5 Security Operations Center for alert visibility, investigation, and optimization
3 out of 60
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyant
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
4 out of 60
KMicro Rapid Incident Response & Readiness ServiceKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
KMicro's Rapid Incident Response & Readiness Service helps organizations prepare for, respond to, and recover from cyberattacks, minimizing impact while enhancing resilience, security, and compliance.
5 out of 60
Microsoft 365 Fundamentals: 1 Day WorkshopNETCOM LEARNING
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-teams-custom-solutions product iconTeams Custom Solutionsm365-sa-threat-protection product iconThreat Protection
Introduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
6 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Assess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
7 out of 60
Managed Support for Microsoft Defender and Endpoint Detection and Response (EDR) ServiceOlive + Goose
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
A fully managed Microsoft Defender + EDR service designed to protect your organization from today’s most persistent cyber threats.
8 out of 60
UNITE: Cyber Security Assessment_INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost security, understand threats, and plan strategically with the UNITE: Cyber Security Assessment_.
9 out of 60
Microsoft Sentinel Workshop and PilotCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
10 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Service used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
11 out of 60
Microsoft 365 E5 Shield Deployment: 8 Week Imp.KAMIND IT, Inc
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack
12 out of 60
End to End Managed Security with Microsoft Defender XDR and Sentinel: 6-week implementationInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how Microsoft Defender and Microsoft Sentinel can keep your business and customer data safe
13 out of 60
Data Security and Compliance Assessment for Microsoft 365abra
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get more out of compliance using your orgnaizations data and behaviors to drive policy. Ensuring you maintain productivity while ensuring your business is safe and secure.
14 out of 60
Microsoft Defender for Endpoint Professional Services: 1-Wk ImplementationOptiv Security Inc.
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Provide comprehensive, powerful protection at your organization's endpoints from Optiv utilizing the Microsoft Defender for Endpoint solution.
15 out of 60
Lightstream Copilot for Microsoft 365 Readiness EngagementLightstream
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Lightstream Copilot Readiness Engagement helps clients to rapidly identify critical remediation steps needed in order to implement Copilot for Microsoft 365 successfully.
16 out of 60
Microsoft 365 Security WorkshopCollective Insights
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Equip your organization with insights, strategies, and tools to fortify defenses, mitigate threats, and enhance overall security readiness across your digital estate.
17 out of 60
Lightstream Threat Protection Assessment and Deployment RoadmapLightstream
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Leveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
18 out of 60
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
19 out of 60
Microsoft Intune Suite Pilot ImplementationTechNet UC LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
TechNet UC is proud to present our comprehensive Microsoft Intune Suite Pilot, designed to help enterprises explore and evaluate the extensive capabilities of Intune Suite tools.
20 out of 60
Microsoft 365 Secure Score AssessmentDaymark Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Improve your environment’s security posture using Microsoft Secure Score.
21 out of 60
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Cyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
22 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Henson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
23 out of 60
Microsoft 365 Tenant Security AssessmentDaymark Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Strengthen the Security of Your Microsoft 365 Environment.
24 out of 60
Intune Design and Deployment ServicesTrusted Tech Team
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Modernize deployment, configuration and management of your Windows devices while improving your security posture.
25 out of 60
Microsoft 365 Defender Threat Check: 4-wk assessInterlink Cloud Advisors, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
26 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prove the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
27 out of 60
Comprehensive Microsoft 365 Security Assessment: 1-Week ProgramWindows Management Experts, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Secure your business with WME's comprehensive security assessment for Microsoft 365. Safeguard your valuable data, mitigate risks, and ensure complete compliance with regulations and standards today!
28 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
29 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Environment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
30 out of 60
Microsoft Copilot for Security: 4-hr - Workshop & Custom DemoMazzy Technologies Corp.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This Microsoft Copilot for Security Workshop & Demo showcases how this cutting-edge AI-driven tool can transform your security operations, enhance threat detection, and streamline incident response.
31 out of 60
Unifying Microsoft Sentinel with Cloud ServicesAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance security by integrating Microsoft Sentinel with cloud services. Proactive support simplifies compliance. Focus on business goals while we manage cloud security.
32 out of 60
Cyber Security AssessmentAegis Innovators
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
33 out of 60
Microsoft 365 complete security HardneningAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance. ​
34 out of 60
Threat Protection WorkshopMobile Mentor
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
During this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
35 out of 60
Neway Security proposition: 3-WK implementationNeWay Technologies Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
36 out of 60
Implementation of Microsoft Defender for EndpointCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
37 out of 60
Microsoft Purview Data Security Basic Quick Start 10-week ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Drive Data Protection Sustainability with Edgile's Data Protection Methodology
38 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
39 out of 60
Zero Trust - Securing Identities: 3-Day WorkshopMSCloudExpert Kft.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Deep dive into foundational identity strategy tailored to your customers’ organization as well as recommendations of how to improve your infrastructure.
40 out of 60
C1st Office 365 Tenant Migration AssessmentC1st Technologies LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Ensure a smooth Office 365 tenant-to-tenant migration for businesses. We provide comprehensive consulting services to facilitate seamless transitions during mergers, acquisitions, and other scenarios.
41 out of 60
impelSecure Threat Protection Engagement: Free 4-week workshopimpeltec Pty Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Discover threats and vulnerabilities to your Microsoft cloud and on-premises environments
42 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
43 out of 60
License Advisory ServicesSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deploymentm365-sa-threat-protection product iconThreat Protection
Whether you’ve been approached by Microsoft for an audit or simply want to conduct a self-assessment, our License Advisory Services is a great solution for understanding your real licensing needs.
44 out of 60
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
45 out of 60
Modern SecOps Engagement (Security Operations)Performanta
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Get an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft SecOps Engagement
46 out of 60
Security Baseline Integrity ManagerAegis Innovators
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Single pane of glass for unified configuration, governance, and lifecycle management of security workloads across Microsoft 365.
47 out of 60
Zero Trust as a Service (ZTaaS)Aegis Innovators
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Digital transformation and adopting AI starts with building a secure foundation.
48 out of 60
Zero Trust Model - 4h assessmentReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Zero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
49 out of 60
Threat Protection and Cloud Security: 3 Day WorkshopNetwoven
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Improve your security posture with a Microsoft Threat Protection Assessment Workshop
50 out of 60
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
51 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
52 out of 60
Cyderes Managed Security Services for Microsoft SentinelCyderes
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Cyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
53 out of 60
NEST ArenaNoibit
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Two-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
54 out of 60
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyant
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Manage and Investigate Risk and Threat Protection
55 out of 60
Workshop for Microsoft 365 Threat ProtectionCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Workshop for Microsoft 365 Threat Protection provides the following objectives to ensure thorough enablement of crucial Microsoft products for a more secure environment.
56 out of 60
Endpoint Management : 1 Day Endpoint Management Workshop with Automation ToolsCloudEdge
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Endpoint Management Workshop will help you quickly perform and accelerate the capabilities of managing your Endpoint Devices efficiently and with little work input combined with technical tools
57 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day WorkshopeGroup Enabling Technologies, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
With Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
58 out of 60
Secure and Maximize Your Microsoft 365 Tenant with Manage & ProtectAll Covered, a division of Konica Minolta
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft 365 tenant management to provide you with continuous security & compliance, enhanced administration, and actionable insights.
59 out of 60
MXDR Shield: 4-Wk ImplementationLong View Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
60 out of 60
  • पिछला
  • 4
  • 5
  • 6
  • 7
  • 8
  • अगला
मार्केटप्लेस के बारे में
  • Why Microsoft Marketplace
  • ब्लॉग्स
  • ग्राहक की कहानियाँ
ग्राहकों के लिए
  • Office के घंटे
  • शुरू करने के लिए मार्गदर्शिका
  • तकनीकी दस्तावेज़ीकरण
  • निजी ऑफ़र
  • Microsoft Azure कंज़म्प्शन कमिटमेंट
  • बिलिंग और इनवॉइसिंग
भागीदारों के लिए
  • भागीदार बनें
  • सूचीबद्ध हो जाएँ
  • विपणन समर्थन प्राप्त करें
  • तकनीकी दस्तावेज़ीकरण
  • बनाने, प्रकाशित करने और बेचने के लिए चरण-दर-चरण मार्गदर्शन
  • सह-विक्रय के योग्य बनें
  • भागीदारों के लिए मार्केटप्लेस समुदाय
  • चैनल-आधारित मार्केटप्लेस बिक्री
  • चैनल भागीदारों के लिए मल्टीपार्टी का निजी ऑफ़र
व्यवसाय
  • Microsoft क्लाउड
  • Microsoft सुरक्षा
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft विज्ञापन
  • Microsoft 365 Copilot
  • Microsoft Teams
कंपनी
  • करियर
  • गोपनीयता
  • स्थिरता
हिन्दी (भारत) आपके गोपनीयता विकल्प का Opt-Out आइकन आपके गोपनीयता विकल्प उपभोक्ता की स्वास्थ्य गोपनीयता
  • साइटमैप
  • हमसे संपर्क करें
  • गोपनीयता & कुकीज़
  • उपयोग की शर्तें
  • ट्रेडमार्क
  • हमारे विज्ञापनों के बारे में
  • कुकीज़ प्रबंधित करें
  • © Microsoft 2025