Invia feedback
Guida e supporto tecnico
Elementi salvati
Piani privati
Accesso in corso, attendi qualche istante...
FiltriCancella tutto

  • Località dell'utente
  • Prodotti (1)
    • Azzurro
    • Dynamics 365
    • Microsoft 365 (1)
      • Adozione e gestione del cambiamento
      • Sistema telefonico per Microsoft Teams
      • Sicurezza cloud
      • Servizi di consulenza per la conformità
      • Gestione e distribuzione dei dispositivi
      • Ruoli di lavoro in prima linea
      • Gestione delle identità e degli accessi
      • Information Protection e Governance
      • Rischio Insider
      • Conoscenza e informazioni dettagliate
      • Sale riunioni per Microsoft Teams
      • Riunioni per Microsoft Teams
      • Microsoft 365 Live Events
      • Gestione dei dispositivi mobili
      • Power Platform for Teams
      • Soluzioni personalizzate di Teams
      • Implementazione di soluzioni di collaborazione
      • Protezione dalle minacce
      • Workplace Analytics
    • Power Platform
  • Settori
  • Tipo di servizio
  • Modello di determinazione prezzi

Servizi di consulenza risultati

Visualizzazione di risultati in servizi di consulenza.
Visualizza risultati correlati in cloud di settore.
Security - Managed Defender - One-Pager - CanadaCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
1 out of 60
Intune for Endpoint Management - Discovery ConsultationCBTS Technology Solutions LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Learn from CBTS how to utilize Microsoft Intune for Endpoint Management & Security in this free discovery consultation.
2 out of 60
Microsoft Defender XDR AcceleratorThe Tech Mavericks
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
We empower your security team to detect and respond to cyberthreats with expanded visibility, incident-level investigation tools, and built-in automation
3 out of 60
Microsoft Managed Extended Detection & Response (MXDR)ISA Cybersecurity Inc.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Our Managed XDR service provides your environment with the ultimate protection against cyber attacks.
4 out of 60
Threat Protection EngagementONEFACTORY
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
The Threat Protection Engagement helps customers assess their security landscape and address their most pressing security goals and challenges and provides an immersive experience that brings the Micr
5 out of 60
Compugen Threat Protection WorkshopCompugen
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Empower Your Security Journey: Assess, Mitigate, and Accelerate with Microsoft’s Comprehensive Threat Protection
6 out of 60
Security Foundations Data: Assessment and ImplementationProServeIT
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Data security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
7 out of 60
Threat Protection EngagementISA Cybersecurity Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you
8 out of 60
Security Foundations Email: Assessment and ImplementationProServeIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
9 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
10 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
11 out of 60
Threat Landscape AssessmentProServeIT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get critical cybersecurity insights with a global visualization of login attempts, dark web scan, & expert recommendations. We help secure your Microsoft 365 environment to protect your business.
12 out of 60
Global Secure Access DeploymentSoftlanding Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Global Secure Access (GSA) provides a comprehensive security framework that protects against modern threats while ensuring seamless and secure connectivity.
13 out of 60
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITED
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
14 out of 60
Security Best Practices AssessmentTechNet UC LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Our assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
15 out of 60
Compugen Security Posture AssessmentCompugen
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The assessment is designed to evaluate and strengthen your organization's security posture by leveraging the robust tools available in Microsoft Defender.
16 out of 60
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
SkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
17 out of 60
SkyTerra's Cloud Security AssessmentSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Strengthen Microsoft cloud security with a structured assessment, an actionable roadmap, and enablement your team can run with
18 out of 60
Unified Identity & Secure Edge Modernization with Entra SuiteBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Modernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
19 out of 60
Microsoft Exchange Best Practices RemediationTechNet UC LLC
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure and optimize your Microsoft Exchange Online environment with expert remediation, ensuring compliance, reliability, and protection against email threats.
20 out of 60
Zero Trust Deployment and Optimization ServiceSoftchoice
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Deploy zero trust with confidence, optimize it to deliver lasting outcomes.
21 out of 60
Microsoft 365 Defender Deployment from BellBell Canada
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Keep your organization protected against cyber threats with a comprehensive security audit and risk assessment by Bell, backed by the threat detection capabilities of Microsoft Defender.
22 out of 60
Microsoft 365 Intune Deployment From BellBell Canada
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Enable Microsoft’s best-in-class compliance and identity management solution with start-to-finish support from Bell.
23 out of 60
Privileged Identity Management Configuration - AppSourceTechNet UC LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Configure Microsoft Entra PIM to enforce least privilege, enable just-in-time access, and reduce risk with real-time auditing, approval workflows, and Conditional Access integration.
24 out of 60
Microsoft 365 Best Practices RemediationTechNet UC LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure, optimize, and align your Microsoft 365 environment with Microsoft’s latest standards—improving collaboration, compliance, and protection across Exchange, Teams, SharePoint, and OneDrive.
25 out of 60
Microsoft Purview QuickStart: ImplementationKraft Kennedy
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Kraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
26 out of 60
Assessment and Remediation on Microsoft 365 by CompugenCompugen
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The Security Assessment and Remediation evaluates your Microsoft 365 tenant's security posture, aligned with the best practices outlined by the Center for Information Security (CIS) benchmark.
27 out of 60
Microsoft 365 Security Best PracticesTechNet UC LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure your Microsoft 365 environment by aligning with Microsoft’s latest security standards—enhancing threat protection, data governance, and compliance across Exchange, Teams, and SharePoint.
28 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
29 out of 60
Minsait Threath Protection Engagement WorkshopMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Evaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
30 out of 60
Compugen's Threat Protection EngagementCompugen
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Discover and gain visibility into threats to your Microsoft 365 cloud and on-premises environments. Get a better understanding, prioritize, and mitigate potential cyberattack vectors.
31 out of 60
TSG Security Risk AssessmentTechnology Service Group Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Our Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
32 out of 60
Intune Implementation ServiceTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Service is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
33 out of 60
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
34 out of 60
CBTS Microsoft 365 Managed ServiceCBTS Technology Solutions LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Partner with CBTS for ongoing management and support of Microsoft 365
35 out of 60
Cybersecurity Incident Response Retainer with Microsoft DefenderCBTS Technology Solutions LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Partner with CBTS to ensure assistance when you need it most during a significant security event.
36 out of 60
S4B_XDR_Recuperacion_Automatica_RecursosS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
37 out of 60
S4B Email Attack Simulation TrainingS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Attack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
38 out of 60
Threat Investigation and Analysis Service with Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
39 out of 60
Server Endpoint Protection Implementation Service using Microsoft Defender for EndpointS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Provides comprehensive protection for physical and virtual servers with Microsoft Defender for Server, combined with continuous security monitoring to detect, investigate, and respond to threats.
40 out of 60
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
41 out of 60
Advanced Hybrid Identity Security with Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Hybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
42 out of 60
Implementation of security for Endpoint with Microsoft EDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Advanced defense for on-premises devices with Microsoft Defender for Endpoint, automated detection and response.
43 out of 60
Entrenamiento de Phishing con Microsoft Office 365S4B
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Ofrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
44 out of 60
On-premise enviroment Identity Protection service with Microsoft IdentityS4B
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
On-Premises Identity Protection service detects and mitigates threats in Active Directory using Microsoft Defender for Identity.
45 out of 60
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Seguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
46 out of 60
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Investiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
47 out of 60
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
48 out of 60
Servicio de Implementación de Protección de Identidades Locales con Microsoft Defender for IdentityS4B
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Refuerza Active Directory local con Microsoft Defender for Identity, detectando ataques, credenciales comprometidas y movimientos laterales en controladores de dominio.
49 out of 60
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Defensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
50 out of 60
Enterprise Automated Endpoint Recovery with Microsoft Defender XDRS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
51 out of 60
Implementation on Defender for Office 365Mobile Mentor
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Our Defender for Office 365 service provides end-to-end protection against email-based threats
52 out of 60
The Threat Protection Envisioning WorkshopRackspace Technology
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
A collaborative workshop that identifies real threats, prioritizes risk, and delivers a clear Microsoft-aligned security roadmap to focus investments and reduce cyber risk confidently enterprise-wide.
53 out of 60
Microsoft Sentinel SOC Managed Service by H OneH One (Private) Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
As a Microsoft-certified partner with deep Sentinel expertise, our Managed SOC gives you round-the-clock monitoring, rapid threat response, and complete visibility across your cloud environment.
54 out of 60
Bulletproof Managed IT CompleteBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
24/7 IT Monitoring & Support for Resilient, Secure (AI-Ready) Operations. Built on Governed Identity Endpoints, and Microsoft 365 Controls
55 out of 60
Beyondsoft Segurança Ambiente CloudBeyondsoft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Oferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
56 out of 60
Netox MDR / SOC 24/7Netox Oy
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Finnish-built 24/7 MDR & SOC for Microsoft environments
57 out of 60
Threat Protection - 1 Day BriefingAvaleris
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Avaleris has developed a Capability Maturity Model to help organizations quickly assess their current state of Threat Protection policies, procedures and technology against best practices.
58 out of 60
microsoft365_security_identity_protection_1 Day_Workshop_CanadaCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Identity is the cornerstone of limiting access to data, apps and resources. It is becomingly increasingly important to be able to manage your access quickly and accurately
59 out of 60
Microsoft 365 Security Device Protection 1 Day Workshop - CanadaCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
As more and more users become mobile and are using a wider variety of devices, applications and documents need to keep up.
60 out of 60
  • Indietro
  • 2
  • 3
  • 4
  • 5
  • 6
  • Avanti
Informazioni sul Marketplace
  • Perché scegliere Microsoft Marketplace
  • Blog
  • Storie dei clienti
Per i clienti
  • Orario d’ufficio
  • Guida introduttiva
  • Documentazione tecnica
  • Offerte private
  • Microsoft Azure Consumption Commitment
  • Fatturazione
Per i partner
  • Diventa un partner
  • Entra a far parte della directory
  • Ottieni supporto marketing
  • Documentazione tecnica
  • Istruzioni passo-passo per creare, pubblicare e vendere
  • Diventa idoneo al co-selling
  • Community del Marketplace per i partner
  • Vendite del Marketplace guidate dal canale
  • Offerte private di più parti per i partner di canale
Aziende
  • Intelligenza artificiale di Microsoft
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Piccole imprese
Azienda
  • Opportunità di carriera
  • Informazioni su Microsoft
  • Notizie aziendali
  • Privacy in Microsoft
  • Investitori
  • Accessibilità
  • Sostenibilità
Italiano (Italia) Icona di rifiuto esplicito delle scelte di privacy Le tue scelte sulla privacy Privacy per l'integrità dei consumer
  • Sitemap
  • Contact Us
  • Privacy e cookie
  • Termini d'uso
  • Marchi
  • Informazioni sugli annunci
  • Gestisci i cookie
  • © Microsoft 2026