Пікір қалдыру
Анықтама және қолдау
Сақталған элементтер
Жеке жоспарлар
Күте тұрыңыз, жүйеге кіру орындалуда...
СүзгілерБарлығын тазалау

  • Орныңыз
  • Өнімдер (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Ендіруді және өзгерістерді басқару
      • Microsoft Teams бағдарламасына арналған қоңырау шалу мүмкіндігі
      • Бұлттық қауіпсіздік
      • Талаптарға сәйкестік жөніндегі консультациялық қызметтер
      • Құрылғыны орналастыру және басқару
      • Алдыңғы қатардағы қызметкерлер
      • Идентификацияны және кіруді басқару
      • Ақпаратты қорғау және басқару
      • Ішкі ақпарат ағыны тәуекелдері
      • Білім және аналитика
      • Microsoft Teams үшін жиналыс бөлмелері
      • Microsoft Teams бағдарламасына арналған жиналыстар
      • Microsoft 365 Live Events
      • Мобильді құрылғыларды басқару
      • Power Platform for Teams
      • Teams теңшелетін шешімдері
      • Топтық орналастыру
      • Қауіптерге қарсы қорғаныс
      • Workplace Analytics
    • Power Platform
  • Салалар
  • Қызмет түрі
  • Баға үлгісі

Professional Services нәтиже

professional services ішіндегі нәтиже көрсетіліп тұр.
Қарап шығу салалық бұлттар ішінде қатысты нәтиже.
Microsoft Intune Jumpstart for Endpoints - Mobile & Workstations: 2-Wk ImplementationProServeIT
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Enable organization-wide management & security for your mobile devices & workstations with a Microsoft Intune jumpstart pilot.
1 out of 60
Managed Endpoint AssessmentFSI Strategies
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This four-week engagement will determine the level of effort required for a migration to a fully modern desktop using Microsoft 365 services.
2 out of 60
Zero Trust Security AssessmentConcurrency, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Assess and advance your Zero Trust security posture—and accelerate or expand your Microsoft 365 security strategy with expert-led guidance.
3 out of 60
Windows Intune: 1-Wk Accelerated ImplementionITC Secure Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Accelerated Deployment of Microsoft Intune for Windows including demonstration and best practice
4 out of 60
Threat Protection: 2-Week WorkshopForsyte IT Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
5 out of 60
Microsoft 365 Migration Services上海诺未网络科技有限公司
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
NovaTech offers Microsoft 365 migration services to help enterprises achieve efficient collaboration, ensure data security, and save costs.
6 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
7 out of 60
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
8 out of 60
Conditional Access Framework: Ihr digitaler Türsteher für jeden noch so kleinen EingangAppSphere AG
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Perfekte Kontrolle: Der Zugangsschutz für Ihre Microsoft Cloud Infrastruktur
9 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
10 out of 60
Security Outcomes SprintAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Understand the Business Value of Your Cybersecurity Investments
11 out of 60
Microsoft 365 Defender: 2-Wk AssessmentAlithya Fullscope Solutions, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Alithya will assess your organization's current security posture across your digital estate to harden, and secure your organization against emerging threats.
12 out of 60
Fortis IR Table Top ExercisesSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
13 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
The Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
14 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Advanced endpoint security and threat protection: detect, investigate, and respond to attacks.
15 out of 60
Lightstream Microsoft 365 Comprehensive Security AssessmentLightstream
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Lightstream will provide you a comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
16 out of 60
Cloud Security Journey: 2 Hour Proof of Concept360 Visibility Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
17 out of 60
MFA JumpstartSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan.
18 out of 60
Mergers and Acquisitions PlaybookIvision, Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
ivision leverages an approach and methodology designed to help clients successfully plan and design for a M/A&D migrations to achieve successful mergers, consolidation or a separation outcome.
19 out of 60
Incident Response RetainerSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
20 out of 60
CMMC Assessment Ready SolutionPlanet Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Based off the Planet secure collaboration enclave, this provides customers with CMMC Assessment Ready artifacts.
21 out of 60
Modern Work Services Proof of ConceptCrayon US
+3
Applicable to:
m365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-meetings-for-microsoft-teams product iconMeetings for Microsoft Teams
Crayon Modern Work Services PoC will help you pilot a subset of users with the best of Microsoft 365 prior to implementation. This will allow us to ensure a smooth transition for all users.
22 out of 60
Merger & Acquisition Microsoft 365 & Azure Migration Service: Consulting Service – 10 Wk ImplementationNeway Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Streamline the process of migrating and integrating Microsoft 365 and Azure-based environments to enhance security and optimize business following a merger or acquisition (M&A).
23 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Environment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
24 out of 60
Modern Workplace Strategy: 12-Day AssessmentPerficient Inc
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-workplace-analytics product iconWorkplace Analytics
Together we assess your current environment and business goals, to provide best practices and recommendations that maximize your investment in Microsoft 365.
25 out of 60
Risk/Compliance/SecurityR3 LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Provide Compliance as a service (CaaS) to assist our customers with obtaining certification in the frameworks they are targeting such as CMMC, ISO, NIST, CMMI, HIPAA, SOC 2
26 out of 60
Modernize Your Workplace with a Standardized Windows PilotadaQuest
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Protect, Simplify, Power better experience with Windows 11, Windows 365 and Intune. Unlock hybrid work scenarios!
27 out of 60
Multifactor Authentication: 4-Day ImplementationFSI Strategies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Implementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
28 out of 60
Modern Management for EndpointsIvision, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Modern Management leverages “cloud-first” tooling and technologies to provide secure, controlled and up-to-date devices to today’s distributed workforce.
29 out of 60
Varonis JumpstartSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
30 out of 60
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
CMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
31 out of 60
Office 365 Managment: 1 Day AssessmentEze Castle Integration
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
ECI will review your Office 365 Tennant Configuration and suggest on-going managment needs
32 out of 60
Merge and Acquisitions-Discovery, Planning AssessmentNew Era Technology
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
M&A, adoption, Acquisition Assessment to ensure the migration during a merger and acquisition goes smoothly end to end.
33 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
34 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
If you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
35 out of 60
Microsoft Windows Autopilot Services: 5-Day Proof of ConcepteGroup Enabling Technologies
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Reduce IT complexity and eliminate time-consuming corporate re-imaging by shipping and deploying straight to users with Microsoft Windows Autopilot.
36 out of 60
Microsoft Cloud PC - 4 Day Proof of Concept EngagementSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Our Microsoft Cloud PC offering is designed to help organizations simplify desktop management, increase security, streamline application delivery and increase end user satisfaction.
37 out of 60
Life Science 1 Day Compliance AssessmentXantrion
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
A scalable and auditable modern workplace environment for life science companies managed by experts.
38 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SAS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
39 out of 60
Windows 365 Cloud PC 10-Days PoCSonata Information Technology Limited
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Paid Assessment and PoC to deploy and use Windows 365 Cloud PC
40 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
41 out of 60
CSE CMMC L1 & L2 Assessment & ImplementationComputer Solutions East
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Achieve CMMC 1 & 2 Compliance, Secure Your Cloud with Microsoft 365 & Expert Guidance.
42 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Boost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
43 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prove the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
44 out of 60
Okta to Entra Migration: Roadmap ArchitectAscent Global, Inc.
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Roadmap and architect the shift from Okta to Microsoft Entra’s enhanced data security
45 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
46 out of 60
Threat Protection Engagement FY25The Tech Mavericks
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
47 out of 60
Microsoft 365 Tenant-to-Tenant MigrationOlive + Goose
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
This offering provides assessment, migration, and post-migration support for transitioning Microsoft 365 workloads and endpoint management from a source Microsoft 365 tenant to a target tenant.
48 out of 60
AgileDefend Microsoft 365 GCC and GCC High: 1 Hour AssessmentAgile IT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 60 minute advisory review on types of CUI and Microsoft tools required to protect them under CMMC
49 out of 60
Cloud Identity Foundation Workshop (5-day)DexMach
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Get knowledge transfer from our experts and hands-on experience with running Azure workloads using identity zero-trust principles and security best practices from regulatory frameworks (CIS, ISO,...).
50 out of 60
Zero Trust Security 10-Hour AssessmentJourneyTEAM
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
JourneyTeam’s Zero Trust Security Assessment is designed to provide a clear, actionable strategy for strengthening your organization’s Microsoft 365 security posture.
51 out of 60
FastTrack for Microsoft 365Olive + Goose
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Our offer provides expert guidance as a FastTrack Ready Partner to help businesses deploy, secure, and optimize Microsoft 365 solutions seamlessly—ensuring a smooth transition with no extra cost.
52 out of 60
CMMC Secure EnclavePlanet Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov.
53 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
2-week assessment of Microsoft 365 security posture and compliance gaps (HIPAA, GDPR, PCI-DSS, SOC2), with remediation roadmap and license alignment (Microsoft 365 E3/E5/Business Premium).
54 out of 60
Microsoft Entra - Global Secure Access | Pilot DeploymentITC Secure Ltd
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Entra Global Secure Access pilot deployment for improved security posture, streamlined access management & regulatory compliance.
55 out of 60
Copilot For Microsoft 365 - ImplementationITQAN GLOBAL FOR CLOUD AND DIGITAL COMPUTING SYSTEMS L.L.C.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-teamwork-deployment product iconTeamwork Deployment
Guided Setup and Customization of Copilot and Copilot Studio for Microsoft 365- Training, Data Selection, Workflow Design Development
56 out of 60
Teams Collab Rapid DeployIvision, Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
ivision’s Teams Collab Rapid Deploy service leverages a speed-to-market methodology designed to help clients successfully plan and deploy a Microsoft Teams collaboration environment.
57 out of 60
Threat Protection Envisioning WorkshopTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
58 out of 60
Microsoft 365 Security BriefingCDI LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
59 out of 60
Windows 365: 1-month Proof of ConceptSoftline Trade
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Access your data anywhere, anytime from any device with Windows 365. Softline is providing you with three different offerings for your organization to kick start Windows 365.
60 out of 60
  • Алдыңғы
  • 4
  • 5
  • 6
  • 7
  • 8
  • Келесі
Marketplace туралы
  • Неліктен Microsoft Marketplace
  • Блогтар
  • Тұтынушылардың әңгімелері
Тұтынушылар үшін
  • Office сағаттары
  • Жұмысты бастау нұсқаулығы
  • Техникалық құжаттама
  • Жеке ұсыныстар
  • Microsoft Azure тұтыну міндеттемесі
  • Есеп-шот ұсыну және шот-фактура жіберу
Серіктестер үшін
  • Серіктес болу
  • Тізім алу
  • Маркетинг қолдауын алу
  • Техникалық құжаттама
  • Құруға, жариялауға және сатуға арналған қадамдық нұсқау
  • Бірлесіп сату құқығын алу
  • Серіктестерге арналған Marketplace қауымдастығы
  • Арна басқаратын Marketplace сатылымдары
  • Арна серіктестеріне арналған көп тарапты жеке ұсыныстар
Бизнес
  • Microsoft AI
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Компания
  • Мансап
  • Microsoft туралы
  • Компания жаңалықтары
  • Microsoft құпиялылығы
  • Инвесторлар
  • Арнайы мүмкіндіктер
  • Тұрақтылық
Қазақ тілі (Қазақстан) Құпиялылық таңдауларынан бас тарту белгішеңіз Құпиялылық таңдаулары Тұтынушы денсаулығының құпиялылығы
  • Сайт картасы
  • Бізге хабарласу
  • Құпиялылық және "cookie" файлдары
  • Пайдалану шарттары
  • Сауда белгілері
  • Жарнамаларымыз туралы
  • "Cookie" файлдарын басқару
  • © Microsoft 2026