Пікір қалдыру
Анықтама және қолдау
Сақталған элементтер
Жеке жоспарлар
Күте тұрыңыз, жүйеге кіру орындалуда...
СүзгілерБарлығын тазалау

  • Орныңыз
  • Өнімдер (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Ендіруді және өзгерістерді басқару
      • Microsoft Teams бағдарламасына арналған қоңырау шалу мүмкіндігі
      • Бұлттық қауіпсіздік
      • Талаптарға сәйкестік жөніндегі консультациялық қызметтер
      • Құрылғыны орналастыру және басқару
      • Алдыңғы қатардағы қызметкерлер
      • Идентификацияны және кіруді басқару
      • Ақпаратты қорғау және басқару
      • Ішкі ақпарат ағыны тәуекелдері
      • Білім және аналитика
      • Microsoft Teams үшін жиналыс бөлмелері
      • Microsoft Teams бағдарламасына арналған жиналыстар
      • Microsoft 365 Live Events
      • Мобильді құрылғыларды басқару
      • Power Platform for Teams
      • Teams теңшелетін шешімдері
      • Топтық орналастыру
      • Қауіптерге қарсы қорғаныс
      • Workplace Analytics
    • Power Platform
  • Салалар
  • Қызмет түрі
  • Баға үлгісі

Professional Services нәтиже

professional services ішіндегі нәтиже көрсетіліп тұр.
Қарап шығу салалық бұлттар ішінде қатысты нәтиже.
Defend Against Threats with SIEM Plus XDR: 3-Day Usage WorkshopCGI Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
1 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Conditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
2 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
3 out of 60
Microsoft 365 Copilot Workshop: 2daysInsight
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Take the first steps toward helping your organization unleash creativity, unlock productivity, and level up skills with Insight’s Microsoft 365 Copilot Workshop.
4 out of 60
Pently Microsoft 365 - AssessmentPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Structured Microsoft 365 security assessment customized, clear, and focused on your security infrastructure
5 out of 60
Security and Operations with Expert Microsoft 365 SupportAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-workplace-analytics product iconWorkplace Analytics
Maximize Microsoft 365 potential with our comprehensive managed services. From user management to security, governance, and backup, we ensure complete support.
6 out of 60
Copilot Value DiscoveryadaQuest
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Copilot Value Discovery is a three-phase process that helps customers grasp the benefits of AI reinvention, pinpoint key functional scenarios, create a business case, and develop a strategic plan.
7 out of 60
NEST ArenaNoibit
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Two-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
8 out of 60
Data Protection Impact Assessment: 8 WkLighthouse Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Empowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
9 out of 60
Threat Protection EngagementadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you, and improve your security posture with a Threat Protection Engagement!
10 out of 60
Windows 11 Pilot: 3 Weeks POCSteeves
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Windows 11 Pilot Deployment to deploy Windows 11 Enterprise in your organization.
11 out of 60
Cloud Security Operations CenterReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Verified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
12 out of 60
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Provide cross-domain threat protection and simplify breach prevention
13 out of 60
Microsoft 365 Managed ServiceRackspace Technology
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
On-demand access to a team of email and productivity application experts that work with you to drive outcomes and continuously evolve your environment.
14 out of 60
Microsoft 365 Email Threat Protection AssessmentAVASOFT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Microsoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
15 out of 60
Information Protection in Office 365: 4 weeks ImplementationAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in safeguarding your Office 365 data? Our service uses encryption, access controls, and data classification to ensure confidentiality, integrity, and compliance.
16 out of 60
Conditional Access Penetration Test: 4 Days AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Define the protection of your organization’s most valueable assets with our Conditional Access Penetration Test.
17 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
18 out of 60
Advania: Intune Get Started: 2 d training and PoCAdvania AB
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Understand the concept of mobile device management (MDM) and how to navigate and operate Microsoft Intune by implementing a Proof of Concept (PoC) in your own production environment.
19 out of 60
Modernize Endpoints Consulting Offer: 3 Days ImplementationAdaptive Business Communications Ltd t/a CloudAssist
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
With Hybrid work becoming prevalent and increasing threat trends, organizations need to proactively secure & modernize management of their endpoints across mobile, PCs and including virtual endpoints.
20 out of 60
Introducing Microsoft Purview: 2 Hour WorkshopSlalom Consulting
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Learn about how Microsoft Purview brings together comprehensive solutions from their compliance & data governance portfolios and Slalom's approach that provides security in harmony with your business.
21 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
22 out of 60
Identity Health CheckMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Mobile Mentor’s Identity Health Check gives you the visibility you need to modernize your identity infrastructure via a comprehensive review of your Microsoft 365 environment.
23 out of 60
Neway Security proposition: 3-WK implementationNeWay Technologies Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft Security services offered will enable our customer to install and configure best of bread security applications, allowing them to have a cloud based solution to manage devices & identity
24 out of 60
CGI - Managed Services for Microsoft 365 FY25CGI Inc.
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Leave the end-to-end Microsoft 365 support services to CGI so that your IT support team can focus on value-added tasks.
25 out of 60
Avanade Cyber Portfolio EvaluationAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
The Cyber Portfolio Evaluation maps your tools with Microsoft solutions, cutting costs and enhancing efficiency.
26 out of 60
Microsoft 365 consultancyOnex Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Get Microsoft 365 consultations with ONEX.GROUP Experts - expert guidance to optimize your productivity, collaboration, and security. Unlock the full potential of Microsoft's suite of tools.
27 out of 60
Microsoft 365 Copilot Risk Assessment: 1-Week Strategic WorkshopAtmosera
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Uncover data risks and prepare for secure Copilot adoption with a Microsoft 365 risk assessment.
28 out of 60
Pently SOCaaSPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Full Managed Security Service with a personal touch and individually build for each customer
29 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies Services
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Dell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
30 out of 60
Microsoft Cloud App Security (MCAS) for Custom Apps by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Know your custom app's cloud environment with Microsoft Cloud App Security. Customize policies, detect threats, and monitor in real-time to secure data and ensure compliance confidently.
31 out of 60
Microsoft 365 Security: 2-Week ImplementationTelelink Business Services EAD
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Create and maintain a tightly secured Microsoft 365 environment, efficiently leveraging all its sophisticated built-in security features and deriving more value from your investments.
32 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
33 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
34 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
35 out of 60
ADFS to Entra ID Migration ServiceMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Mobile Mentor’s ADFS to Entra ID Migration Service offers a secure, cloud-first Single Sign-On experience that eliminates outdated infrastructure and unlocks the full potential of Microsoft Entra ID.
36 out of 60
Entra ID Governance and Guest AccessMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Empower your business with Mobile Mentor’s Microsoft Entra ID Governance and Guest Access service, built on Microsoft’s cutting-edge Entra Identity Governance platform.
37 out of 60
Office 365 Migration from Exchange: 15-Day ImplementationProServeIT
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Migrate on-premise Microsoft Exchange email infrastructure to Office 365 in Microsoft's cloud infrastructure
38 out of 60
Manage Corporate Data on Devices with IntuneAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Can you protect corporate data on personal devices with Intune? Use its customizable security policies, advanced threat detection, and real-time monitoring to safeguard sensitive data effectively.
39 out of 60
MDS - Threat Protection EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
40 out of 60
AVASecure 360 - Microsoft Cloud App Security Assessment by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Uncover cloud security gaps with Microsoft Cloud App Security Assessment. Identify vulnerabilities, data risks, and compliance issues. Gain insights to enhance security and embrace the cloud.
41 out of 60
Unified Access & Protection with Microsoft Entra Global Secure AccessMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Step confidently into a Zero Trust future with Microsoft Entra Global Secure Access, accelerate your organization's deployment and boost value with Mobile Mentor's implementation services.
42 out of 60
Journey to Microsoft 365 Copilot: 4-hours WorkshopPROJECT INFORMATICA SRL
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Microsoft 365 Copilot workshop bring to you the opportunity to create awareness about holistic to Microsoft 365 Copilot
43 out of 60
Hybrid Infrastructure Overview WorkshopAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Rapid hybrid‑cloud design workshop — learn best practices, pitfalls, and licensing tips for Microsoft on‑prem + Azure/Microsoft 365.
44 out of 60
Microsoft Defender for Endpoint - Vulnerability Assessment by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance endpoint security and compliance. Expert support includes proactive troubleshooting, optimization, and ongoing assistance. Focus on business goals while we manage device vulnerabilities.
45 out of 60
SmartStart for IntuneMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
46 out of 60
Microsoft 365 Security 4 Weeks AssessmentAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Microsoft 365 Security 4 Weeks Assessment evaluates security, identifies vulnerabilities, and ensures cyber protection, focusing on identity, data protection, and compliance.
47 out of 60
Microsoft Sentinel Integration with 3rd Party EDR Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Enhance security, streamline device management, ensure compliance, and mitigate threats with proactive monitoring, troubleshooting, and ongoing support. ​
48 out of 60
AVASecure 360 - Microsoft Cloud App Security Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost cloud safety with Microsoft Cloud App Security. Manage apps, detect threats, and uphold compliance with advanced controls, ensuring data security and productivity. Stay ahead of threats.
49 out of 60
Cyber Evolution: Security WorkshopAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Two-day, Microsoft-driven cybersecurity workshop — upskill your SOC analysts with real breach scenarios and Microsoft Security tools.
50 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
51 out of 60
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
凭借超过 45 年的行业经验和 20 年的项目交付能力,SYSTEX 中国携手微软等全球顶尖技术厂商,提供全面的数字化解决方案。SYSTEX China delivers robust Microsoft-powered security services designed to protect enterprise environments across cloud .
52 out of 60
Teams & SharePoint Security HardeningAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teams-custom-solutions product iconTeams Custom Solutionsm365-sa-threat-protection product iconThreat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
53 out of 60
Beyondsoft Advanced Cloud Protection with Microsoft XDR and Zero Trust Deployment: 8-Week ImplementationBeyondsoft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Beyondsoft will deploy a collection of best of breed solutions from Microsoft Security to address challenges regarding XDR, SIEM, Identity and Access Management and Device Management.
54 out of 60
Sogeti SmartWorkspace: 4 Week ImplementationCapgemini Group
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Sogeti provides a one-stop shop set of offerings around the SharePoint solutions. Our offer comprises consultancy, discovery of the existing landscape, Solution Architecture, SharePoint migration etc.
55 out of 60
Implementation of Microsoft Copilot and AgentsStoneridge Software LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
A structured enablement journey that helps organizations strategically align, technically prepare, and culturally adopt Microsoft Copilot
56 out of 60
Microsoft 365 Security Health Check Assessment 3-WkBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and Provide a full comprehensive assessment report on Microsoft 365 security and controls enabled across the environment
57 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
58 out of 60
Microsoft Funded Workshop for Copilot for Microsoft 365 Adoption Acceleration: 2-Wk ImplementationProServeIT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
If your company is eligible, we can deliver a Microsoft funded adoption accelerator engagement for Copilot for Microsoft 365 to you free of charge ($10,000 USD value).
59 out of 60
Microsoft 365 Security Hardening ServicesProArch Technologies, Inc
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
60 out of 60
  • Алдыңғы
  • 1
  • 2
  • 3
  • 4
  • 5
  • Келесі
Marketplace туралы
  • Неліктен Microsoft Marketplace
  • Блогтар
  • Тұтынушылардың әңгімелері
Тұтынушылар үшін
  • Office сағаттары
  • Жұмысты бастау нұсқаулығы
  • Техникалық құжаттама
  • Жеке ұсыныстар
  • Microsoft Azure тұтыну міндеттемесі
  • Есеп-шот ұсыну және шот-фактура жіберу
Серіктестер үшін
  • Серіктес болу
  • Тізім алу
  • Маркетинг қолдауын алу
  • Техникалық құжаттама
  • Құруға, жариялауға және сатуға арналған қадамдық нұсқау
  • Бірлесіп сату құқығын алу
  • Серіктестерге арналған Marketplace қауымдастығы
  • Арна басқаратын Marketplace сатылымдары
  • Арна серіктестеріне арналған көп тарапты жеке ұсыныстар
Бизнес
  • Microsoft AI
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Компания
  • Мансап
  • Microsoft туралы
  • Компания жаңалықтары
  • Microsoft құпиялылығы
  • Инвесторлар
  • Арнайы мүмкіндіктер
  • Тұрақтылық
Қазақ тілі (Қазақстан) Құпиялылық таңдауларынан бас тарту белгішеңіз Құпиялылық таңдаулары Тұтынушы денсаулығының құпиялылығы
  • Сайт картасы
  • Бізге хабарласу
  • Құпиялылық және "cookie" файлдары
  • Пайдалану шарттары
  • Сауда белгілері
  • Жарнамаларымыз туралы
  • "Cookie" файлдарын басқару
  • © Microsoft 2026