Invia feedback
Guida e supporto tecnico
Elementi salvati
Piani privati
Accesso in corso, attendi qualche istante...
FiltriCancella tutto

  • Località dell'utente
  • Prodotti (1)
    • Azzurro
    • Dynamics 365
    • Microsoft 365 (1)
      • Adozione e gestione del cambiamento
      • Sistema telefonico per Microsoft Teams
      • Sicurezza cloud
      • Servizi di consulenza per la conformità
      • Gestione e distribuzione dei dispositivi
      • Ruoli di lavoro in prima linea
      • Gestione delle identità e degli accessi
      • Information Protection e Governance
      • Rischio Insider
      • Conoscenza e informazioni dettagliate
      • Sale riunioni per Microsoft Teams
      • Riunioni per Microsoft Teams
      • Microsoft 365 Live Events
      • Gestione dei dispositivi mobili
      • Power Platform for Teams
      • Soluzioni personalizzate di Teams
      • Implementazione di soluzioni di collaborazione
      • Protezione dalle minacce
      • Workplace Analytics
    • Power Platform
  • Settori
  • Tipo di servizio
  • Modello di determinazione prezzi

Servizi di consulenza risultati

Visualizzazione di risultati in servizi di consulenza.
Identity and Access Control ImplementationSMART business LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Cybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
1 out of 49
Pently PentestPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Simulated cyber attacks to uncover real vulnerabilities in your entire IT landscape.
2 out of 49
Pently Microsoft 365 - AssessmentPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Structured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
3 out of 49
Pently SOCaaSPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Full Managed Security Service with a personal touch and individually build for each customer
4 out of 49
Zero Trust Model - 4h assessmentReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Zero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
5 out of 49
Secure Your Future: Cybersecurity PathwaysReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Discover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
6 out of 49
Managed Extended Detection & Response - Cybersecurity TelefónicaTelefonica Group
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Managed Extented Detection & Response 24x7 basada en plataforma Microsoft.
7 out of 49
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security Kft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and harden Microsoft Security configurations based on industry best practices
8 out of 49
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
9 out of 49
SYSTEX Data Security and Compliance Solution精诚(中国)企业管理有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
10 out of 49
ITE ZeroTrust360™Information Technology of Egypt Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
ITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
11 out of 49
Quadra BluForge Managed XDRQuadrasystems.net (India) P Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Discover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
12 out of 49
Microsoft Zero Trust Security ImplementationTC1 Labs
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Implement Microsoft Security capabilities to strengthen identity, endpoints, cloud, and threat protection with Zero Trust best practices
13 out of 49
Microsoft Security Copilot & Agents ImplementationTC1 Labs
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Enable Microsoft Security Copilot and implement one operational security agent or workflow to support AI-assisted investigations and response
14 out of 49
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
15 out of 49
Minsait Cyber SmartMDR SOC ServiceMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Servicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
16 out of 49
Minsait Threath Protection Engagement WorkshopMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Evaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
17 out of 49
TSG Security Risk AssessmentTechnology Service Group Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Our Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
18 out of 49
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
CMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
19 out of 49
AI Agents In CopilotINOVASYS FOR SYSTEMS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Inovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
20 out of 49
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Boost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
21 out of 49
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
22 out of 49
S4B_XDR_Recuperacion_Automatica_RecursosS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
23 out of 49
S4B Email Attack Simulation TrainingS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Attack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
24 out of 49
Threat Investigation and Analysis Service with Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
25 out of 49
Server Endpoint Protection Implementation Service using Microsoft Defender for EndpointS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Provides comprehensive protection for physical and virtual servers with Microsoft Defender for Server, combined with continuous security monitoring to detect, investigate, and respond to threats.
26 out of 49
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
27 out of 49
Credentials and access protection , unauthorized logins, and suspicious behavior with Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Cloud Identity Protection detects and mitigates credential and access risks using Microsoft Entra ID Protection. It leverages analytics, adaptive MFA, and condicional access to enhance security.
28 out of 49
Protección Identidades en ambiente Híbrido con Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Integra seguridad en nube y on-premise con Defender for Identity y Entra ID Protection, unificando detección, investigación y respuesta frente a amenazas.
29 out of 49
Advanced Hybrid Identity Security with Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Hybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
30 out of 49
Implementation of security for Endpoint with Microsoft EDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Advanced defense for on-premises devices with Microsoft Defender for Endpoint, automated detection and response.
31 out of 49
Entrenamiento de Phishing con Microsoft Office 365S4B
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Ofrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
32 out of 49
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Seguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
33 out of 49
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Investiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
34 out of 49
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
35 out of 49
Seguridad avanzada de identidad en la nube con Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protege credenciales y accesos en la nube con Microsoft Entra ID Protection, aplicando MFA adaptativo y acceso condicional para mitigar riesgos de identidad.
36 out of 49
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Defensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
37 out of 49
Enterprise Automated Endpoint Recovery with Microsoft Defender XDRS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
38 out of 49
RICOH Managed Cybersecurity ServicesORBID NV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We correlate signals at scale, combine analyst expertise with automation, and contain threats fast so your business can move with confidence.
39 out of 49
Microsoft 365 Security Assessment - 4 DaysMatrix3D Infocom Private Ltd.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This Assessment is a comprehensive evaluation of your Microsoft 365 environment, designed to identify misconfigurations, security gaps, compliance risks, and underutilized Microsoft security features.
40 out of 49
Microsoft Sentinel SOC Managed Service by H OneH One (Private) Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
H One’s Microsoft Sentinel–based MDR service combines certified expertise, continuous monitoring, and rapid response to protect and strengthen your cloud environment.
41 out of 49
Beyondsoft Segurança Ambiente CloudBeyondsoft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Oferecemos proteção contínua para ambientes Cloud e híbridos, garantindo visibilidade, detecção de ameaças e correções proativas para reduzir riscos e fortalecer a segurança do negócio.
42 out of 49
Netox MXDR / SOC 24/7Netox Oy
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Finnish-built 24/7 MXDR & SOC for Microsoft environments
43 out of 49
OPTI - Zero Standing Access ProgramOPTI
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Structured service to implement Zero Standing Access with Microsoft Entra ID Governance, eliminating permanent privileged access and automating identity lifecycle governance.
44 out of 49
Atos || Accessibility as a Service - ATVisor ConsoleAtos International SAS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-workplace-analytics product iconWorkplace Analytics
12-month Assistive Technology (AT) analytics add-on for Microsoft Intune. Analytics to provide actionable insights on AT / Accessibility feature availability, use, adoption & stability.
45 out of 49
Microsoft 365 Tenant Seguridad: 3 días assessmentODM Computers SRL
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Una evaluación de la seguridad requerida para crear entornos de colaboración seguros y preparados.
46 out of 49
Securing Identities Workshop 1 DaySEIDOR SA
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Are you aware of suspicious user and sign-in behavior in your environment? Are you threatened by ongoing suspicious requests?
47 out of 49
Microsoft 365: Implementación de 1 a 3 mesesHSI, S.L.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Comienza tu camino a la nube de Microsoft 365 con nuestros paquetes de adopción y uso. Incluye consultoría inicial, formación e implementación del paquete adecuado a tus necesidades
48 out of 49
Secure Remote Work WorkshopInsight Spain
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-firstline-workers product iconFrontline Workersm365-sa-insider-risk product iconInsider Risk
Remote Secure Work: Two sessions (1 day Workshop) offers best-in-class Office apps with new levels of device management and access control features to enable the remote workforce and the Best Identity
49 out of 49
  • Indietro
  • 1
  • 2
  • 3
  • 4
  • 5
Informazioni sul Marketplace
  • Perché scegliere Microsoft Marketplace
  • Blog
  • Storie dei clienti
Per i clienti
  • Orario d’ufficio
  • Guida introduttiva
  • Documentazione tecnica
  • Offerte private
  • Microsoft Azure Consumption Commitment
  • Fatturazione
Per i partner
  • Diventa un partner
  • Entra a far parte della directory
  • Ottieni supporto marketing
  • Documentazione tecnica
  • Istruzioni passo-passo per creare, pubblicare e vendere
  • Diventa idoneo al co-selling
  • Community del Marketplace per i partner
  • Vendite del Marketplace guidate dal canale
  • Offerte private di più parti per i partner di canale
Aziende
  • Intelligenza artificiale di Microsoft
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Piccole imprese
Azienda
  • Opportunità di carriera
  • Informazioni su Microsoft
  • Notizie aziendali
  • Privacy in Microsoft
  • Investitori
  • Accessibilità
  • Sostenibilità
Italiano (Italia) Icona di rifiuto esplicito delle scelte di privacy Le tue scelte sulla privacy Privacy per l'integrità dei consumer
  • Sitemap
  • Contact Us
  • Privacy e cookie
  • Termini d'uso
  • Marchi
  • Informazioni sugli annunci
  • Gestisci i cookie
  • © Microsoft 2026