Пікір қалдыру
Анықтама және қолдау
Сақталған элементтер
Жеке жоспарлар
Күте тұрыңыз, жүйеге кіру орындалуда...
СүзгілерБарлығын тазалау

  • Орныңыз
  • Өнімдер (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Ендіруді және өзгерістерді басқару
      • Microsoft Teams бағдарламасына арналған қоңырау шалу мүмкіндігі
      • Бұлттық қауіпсіздік
      • Талаптарға сәйкестік жөніндегі консультациялық қызметтер
      • Құрылғыны орналастыру және басқару
      • Алдыңғы қатардағы қызметкерлер
      • Идентификацияны және кіруді басқару
      • Ақпаратты қорғау және басқару
      • Ішкі ақпарат ағыны тәуекелдері
      • Білім және аналитика
      • Microsoft Teams үшін жиналыс бөлмелері
      • Microsoft Teams бағдарламасына арналған жиналыстар
      • Microsoft 365 Live Events
      • Мобильді құрылғыларды басқару
      • Power Platform for Teams
      • Teams теңшелетін шешімдері
      • Топтық орналастыру
      • Қауіптерге қарсы қорғаныс
      • Workplace Analytics
    • Power Platform
  • Салалар (1)
    • Қорғаныс және барлау
    • Тарату
    • Білім беру
    • Энергия және ресурстар
    • Қаржылық қызметтер
    • Үкімет
      • Мемлекеттік ұйымдардың операциялары және инфрақұрылымы
      • Мемлекеттік қаржы
      • Денсаулық сақтау және әлеуметтік қызметтер
      • Қоғамдық тәртіп және & әділеттілік
    • Денсаулық сақтау
    • Қонақүй бизнесі және туризм
    • Өндіріс және мобильділік
    • Коммерциялық емес
    • Professional Services
    • Бөлшек сауда және тұтынушы тауарлары
    • Тұрақтылық
    • Телекоммуникация және БАҚ
  • Қызмет түрі
  • Баға үлгісі

Professional Services нәтиже

professional services ішіндегі нәтиже көрсетіліп тұр.
Microsoft Entra - Securing Identities and AccessSignal Alliance Technology Holding
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Our goal is to provide you with tools to protect your authorized users’ identities so you can authenticate credentials and manage file access while still giving users the freedom to collaborate.
1 out of 27
Atos || Accessibility as a Service - ATVisor ConsoleAtos International SAS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-workplace-analytics product iconWorkplace Analytics
12-month Assistive Technology (AT) analytics add-on for Microsoft Intune. Analytics to provide actionable insights on AT / Accessibility feature availability, use, adoption & stability.
2 out of 27
MDS - Modern Security Operations EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
A 2-day engagement to demonstrate how intelligent security analytics and threat intelligence can detect and stop active threats, encouraging organizations to deploy and adopt Modern SecOps solutions.
3 out of 27
System Center Endpoint Manager 40 hour Quick Start Proof of Concept with Co-Management with Endpoint Manager in Office 365York Telecom Corp
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
System Center Endpoint Manager 40-Hour Quick Start Proof-of-Concept. Design, deploy and learn SCEM in 40-hour proof-of-concept with Co-Management with Endpoint Manager Office 365
4 out of 27
Defend, Protect, Secure with Microsoft Defender XDRComtrade System Integration
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
5 out of 27
4-Day Security AssesmentHSO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
From firewall to zero trust. HSO Security Assessment identifies risks and advises recommendations.
6 out of 27
Threat Protection Engagement - Security Assessment & Strategy: 4-week assessmentArmis, Sistemas de Informação, Lda
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
The engagement will help customers assess their organization's security landscape and address your most pressing security goals and challenges
7 out of 27
Intune Health Check (All OS): 2-week AssessmentMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Our certified engineers audit your mobile device management (MDM) platform and provide you recommendations on best practice.
8 out of 27
Microsoft Sentinel Security Consulting ServiceComtrade System Integration
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
9 out of 27
E-Suite Discovery Offerings - 2Wk Assessments EDOSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Introducing Synergy Advisors E-Suite - Microsoft E5 Better Together Quick Assessment -> Impactful Quick Results [Cybersecurity - Data Protection, Compliance and Secure Collaboration]
10 out of 27
Crayon Cloud Security Assessment: 3-Wk AssessmentCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Evaluate and strengthen the security posture of your Microsoft365 and Microsoft Azure environments
11 out of 27
MDS - Threat Protection EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
12 out of 27
Threatscape CSI EngagementsTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
13 out of 27
Microsoft 365 Defender for Cloud Apps Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Provides integral protection for SaaS applications, helping you monitor and protect application data in the cloud.
14 out of 27
Microsoft 365 Defender Attack Simulation: 4 Weeks DeploymentSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 attack simulation training works to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack.
15 out of 27
Microsoft 365 Defender for Endpoints Deployment: 2 Weeks ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect your organization's devices against advanced threats such as malware, ransomware, phishing and zero-day attacks.
16 out of 27
Secure Multicloud Environment Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The workshop aims to present best practices and tools for designing, implementing and managing a secure multi-cloud environment, leveraging the capabilities of Microsoft Azure, Microsoft 365, etc.
17 out of 27
Defend Against Threats with SIEM Plus XDR Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The goal of the workshop is to show how Microsoft's security solutions can help organizations protect themselves from cyberthreats
18 out of 27
Mitigate Compliance & Privacy Risk Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Risk
Designed to help organizations identify and reduce compliance and privacy risks associated with the use of the cloud.
19 out of 27
Protect & Govern Sensitive Data Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
It is an intensive workshop that teaches you how to protect and govern your organization's sensitive data with Microsoft solutions.
20 out of 27
Secure Identities & Access Workshop: 4 Weeks of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
The objective of the workshop is to help customers find and mitigate identity risks and protect your organization with a seamless identity solution.
21 out of 27
Identity Governance Lifecycle: 4 Weeks of AssessmentSoluciones Tecnológicas Overcast S.A.P.I. de CV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
The objective of the assessment is to identify areas for improvement and potential risks in the identity environment, based on the maturity level of the organization's identity governance model.
22 out of 27
Endpoint Management: 4 Wk of Workshop ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
4 weeks of workshop implementation to learn how to manage and protect your devices, applications and users
23 out of 27
NextGen Windows: 4 Wk of ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
4 weeks implementation on how to leverage Microsoft cloud solutions in your organization.
24 out of 27
Habilitación segura y optimizada de Microsoft 365 con DATCODATCO SA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Configuración, Soporte, Capacitación e Implementación de seguridad en Microsoft 365
25 out of 27
Transformación Segura y Optimizada con Copilot for Microsoft 365DATCO Chile
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Garantizamos una implementación segura y eficaz de Copilot for Microsoft 365, integrando medidas de seguridad en cada etapa del proceso para mejorar la productividad en tu organización.
26 out of 27
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
27 out of 27
Marketplace туралы
  • Неліктен Microsoft Marketplace
  • Блогтар
  • Тұтынушылардың әңгімелері
Тұтынушылар үшін
  • Office сағаттары
  • Жұмысты бастау нұсқаулығы
  • Техникалық құжаттама
  • Жеке ұсыныстар
  • Microsoft Azure тұтыну міндеттемесі
  • Есеп-шот ұсыну және шот-фактура жіберу
Серіктестер үшін
  • Серіктес болу
  • Тізім алу
  • Маркетинг қолдауын алу
  • Техникалық құжаттама
  • Құруға, жариялауға және сатуға арналған қадамдық нұсқау
  • Бірлесіп сату құқығын алу
  • Серіктестерге арналған Marketplace қауымдастығы
  • Арна басқаратын Marketplace сатылымдары
  • Арна серіктестеріне арналған көп тарапты жеке ұсыныстар
Бизнес
  • Microsoft AI
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Компания
  • Мансап
  • Microsoft туралы
  • Компания жаңалықтары
  • Microsoft құпиялылығы
  • Инвесторлар
  • Арнайы мүмкіндіктер
  • Тұрақтылық
Қазақ тілі (Қазақстан) Құпиялылық таңдауларынан бас тарту белгішеңіз Құпиялылық таңдаулары Тұтынушы денсаулығының құпиялылығы
  • Сайт картасы
  • Бізге хабарласу
  • Құпиялылық және "cookie" файлдары
  • Пайдалану шарттары
  • Сауда белгілері
  • Жарнамаларымыз туралы
  • "Cookie" файлдарын басқару
  • © Microsoft 2026