피드백 제공
Help & support
저장 항목
프라이빗 플랜
잠시 기다려 주세요. 로그인 중입니다...
필터모두 지우기

  • 사용자의 위치
  • 제품 (1)
    • Azure (1)
      • AI & Machine Learning
      • 분석
      • App Modernization
      • Archive
      • Backup
      • Big Data
      • Data Platform
      • DevOps
      • Disaster Recovery
      • Identity
      • Internet of Things
      • Migration
      • Networking
      • Security
      • Storage
    • Dynamics 365
    • Microsoft 365
    • Power Platform
  • 산업 (1)
    • 방위 및 인텔리전스
    • 유통
    • 교육
    • 에너지 및 리소스
    • 금융 서비스
    • 정부
      • 정부 운영 및 인프라
      • 공공 재무
      • 공중 보건 및 소셜 서비스
      • 공공 안전 및 사법
    • 의료 서비스
    • 숙박 및 여행
    • 제조 및 이동성
    • 비영리
    • 전문 서비스
    • 소매 및 소비재
    • 지속 가능성
    • 통신 및 미디어
  • 서비스 종류
  • 가격 책정 모델

결과 Professional Services개

의 결과 professional services개를 표시하는 중
Cloud Security Approach: 2-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Through the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
1 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Evolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
2 out of 60
Cloud Security Posture: 2-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
3 out of 60
Cloud Security Deployment: 4-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Implementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
4 out of 60
Cloud Security Compliance: 4-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
5 out of 60
Cloud Security Services: 12-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
We audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
6 out of 60
Microsoft Sentinel Consulting Services: 12-Months ImplementationForsyte IT Solutions
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Microsoft Sentinel consulting services are designed to get you up and running quickly to maximize your return on investment in Microsoft's advanced security technologies.
7 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield Ltd
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Spartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
8 out of 60
SC-100T00: Microsoft Cybersecurity Architect: 4 Days WorkshopNETCOM LEARNING
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
SC-100T00: Microsoft Cybersecurity Architect course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance
9 out of 60
Managed Desktop - 12 Month - Managed Service ImplementationCoretek Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Comprehensive Managed Desktop Solution Leveraging Microsoft AVD & Windows 365
10 out of 60
CoreDefend Managed XDR Microsoft Security SolutionCoretek Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
A Comprehensive Managed XDR Security Solution Using Microsoft Security Tools to Improve Security Posture
11 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Delivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
12 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.ai
+1
Applicable to:
identity product iconIdentity
Implementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
13 out of 60
Purple Team Assessment: 1 Week AssessmentBridewell Consulting Limited
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Test your organisation's defensive capabilities by conducting a purple team assessment in collaboration with Bridewell
14 out of 60
Accelerating Cloud Virtual Desktops: 2-Hour WorkshopSlalom Consulting
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationnetworking product iconNetworking
This Free Workshop will introduce you to how Azure Virtual Desktops help you embrace a remote workforce while maintaining control through secure workstation experiences on any device.
15 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Our offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
16 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Get a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
17 out of 60
Azure Virtual Desktop: 2-Wk ImplementationPetabytz Inc
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Start experiencing the best kind of virtualization with Azure Virtual Desktop in minutes to enable remote work. Provides employees the same experience they would have on a local desktop.
18 out of 60
Defend Against Threats with SIEM Plus XDRBJSS Limited
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Improve your security posture and uncover risks that might be harmful to your organisation with BJSS' cyber security workshop: Defend Against Threats with SIEM Plus XDR.
19 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitynetworking product iconNetworking
Secure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
20 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Implementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
21 out of 60
ACE AVD: 4-Wk ImplementationDevoteam France
+2
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentity
Azure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
22 out of 60
SAP SuccessFactors and Microsoft Entra ID Integration: 6-wk ImplementationOxford Computer Group LLC
+1
Applicable to:
identity product iconIdentity
Enable User Lifecycle Management by integrating SAP SuccessFactors and Microsoft Entra ID.
23 out of 60
Microsoft Security License Utilisation & Commercial Assessment: 2-Week AssessmentBridewell Consulting Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Provide an overview of organisations current licensing position, identify what security Microsoft products could be utilised & build an adoption framework
24 out of 60
Managed Services for Microsoft EntraDXC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Advisory and Managed Services for Microsoft Entra
25 out of 60
Microsoft Certification Exam Preparation: 8 Hours WorkshopNETCOM LEARNING
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationstorage product iconStorage
This session helps prepare your teams to pass the Microsoft Certification exams.
26 out of 60
Security Discovery: 4-Wk AssessmentProServeIT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
A security discovery & assessment will provide a new understanding of cyber threat trends & let you know where to start. Ensure your business continuity, protect your reputation & instill trust.
27 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARS
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitymigration product iconMigration
ALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
28 out of 60
Security Level Up: 4-Wk ImplementationProServeIT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Build your security baseline environment and level it up with the appropriate Microsoft cybersecurity technologies. Ensure your business continuity even after a cyberattack & protect your reputation.
29 out of 60
Spyglass Cloud Security: 6-week AssessmentQuisitive
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
The Spyglass Cloud Security Assessment is a complete evaluation of your organization’s cloud security posture centered around identity, data, devices, applications, and access.
30 out of 60
Security Managed Services Consulting: 12-Month ImplementationProServeIT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Enhance your cybersecurity baseline & take it to a higher standard with appropriate Microsoft cybersecurity technologies. Proactive measures & regular audits will ensure business continuity.
31 out of 60
Azure Security: 3-week AssessmentQuisitive
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitysecurity product iconSecurity
A Quisitive Azure Security Assessment offers actionable insight about your cloud security posture, with peace of mind for how your Azure deployment can be made more safe and secure.
32 out of 60
Bulletproof 365 Enterprise: MXDR Service (Sentinel and Defender for Cloud)Bulletproof Solutions Inc.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
With the combination of SIEM+DfC, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
33 out of 60
Microsoft Sentinel Quick Start: 6-week ImplementationQuisitive
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Get ahead with the next generation solution for Security Information and Event Management (SIEM) and Security Orchestration and Automated Remediation (SOAR) with our Microsoft Sentinel Quick Start.
34 out of 60
8 wks - Implementacion de Sistemas de Pruebas de vida con reconocimiento facial para Onboarding de clientes o Deteccion de fraude54cuatro Mexico
+3
Applicable to:
analytics product iconAnalyticsai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentity
Implemente servicios cognitivos de Azure para evitar el fraude relacionado con la identificación de sus clientes
35 out of 60
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITED
+3
Applicable to:
analytics product iconAnalyticsdata-platform product iconData Platformidentity product iconIdentity
Provide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
36 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. Israel
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Accelerate your digital transformation with Cloud and Collaboration tools
37 out of 60
Azure Security Essentials: 3-Wk ImplementationAgile IT
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Onboarding Azure for Security and Compliance (Essentials) seeks to reduce the mean time to detection by consolidating logging, analytics, detection, and response into a single cohesive solution
38 out of 60
Azure Penetration TestMazzy Technologies Corp.
+3
Applicable to:
data-platform product iconData Platformidentity product iconIdentitysecurity product iconSecurity
This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
39 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Azure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
40 out of 60
Microsoft Intune - Initial Setup for Windows devices: 2-Wk Consulting ServiceIT Partner LLC
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Comprehensive support to customers in their journey of leveraging Microsoft Azure, particularly in getting started with or expanding their utilization of the platform.
41 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
42 out of 60
Modern workplace Active DirectorySii Sp. z o.o.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Modern workplace Active Directory implementation, migration and support
43 out of 60
AD Domain Consolidation for Migration to Microsoft Entra ID: 6 wk ImpOxford Computer Group LLC
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Get started on your journey towards zero trust by consolidating your organization’s Active Directories for better visibility, efficiency, and security.
44 out of 60
Verifiable Credentials with Microsoft Entra Verified ID: full architecture design with initial deploymentFormula5
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Formula5's Microsoft Entra Verified ID Workshop & POC helps organizations to understand decentralized identity concepts and implement secure identity solutions using Verifiable Credentials.
45 out of 60
Azure Single Sign-On: 3-Day Azure Single Sign-On (SSO) with a third-party applicationIT Partner LLC
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitysecurity product iconSecurity
Single sign-on (SSO) means that users do not need to sign in to every , they log into Azure AD once, and these credentials are used for other applications such as Sales Force, Slack, Zendesk, etc.
46 out of 60
FinOps Adoption ServicesSoftchoice
+2
Applicable to:
analytics product iconAnalyticsidentity product iconIdentity
Attain financial control over your Azure environment to realize your investment in cloud workloads
47 out of 60
Microsoft Copilot Readiness AssessmentGC Brokers Inc.
+3
Applicable to:
analytics product iconAnalyticsai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentity
Ensure organizational readiness for the release of Microsoft Co-Pilot. Ensure your organization is ready for the adoption of this groundbreaking new technology.
48 out of 60
Microsoft Entra Verified ID: 6-week Proof of ConceptOxford Computer Group LLC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Oxford Computer Group's Microsoft Entra Verified ID Proof of Concept can help you discover the power and benefits of authentic verifiable credentials.
49 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta Analytics
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
This solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
50 out of 60
Azure Virtual Desktop Secure Platform designed by CloudAstro - Revolutionize Your Workplace (4 Days - Workshop)CloudAstro GmbH
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
Embrace the future with AVD Secure Platform, where mobility meets cutting-edge security for all industries.
51 out of 60
Rapid Cyberattack Assessment Workshop (Full - On-site)IT Partner LLC
+3
Applicable to:
backup product iconBackupidentity product iconIdentitysecurity product iconSecurity
The goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
52 out of 60
Microsoft Intune setup: 4-Wk ImplementationExodus Integrity Services, Inc.
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Effortlessly implement Microsoft Intune: Seamless MDM, MAM, app deployment & security settings. Tailored setup for streamlined device management.
53 out of 60
Azure Virtual Desktop Assessment: 2 Week AssessmentBig Green IT - Dev
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Azure Virtual Desktop Assessment begins with a comprehensive assessment, during which our team evaluates the existing environment & provides recommendations for performance, scalability & resilience.
54 out of 60
SOC Compliance readiness check: 1-Month Professional ServiceIT Partner LLC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Assess your organization's readiness for SOC compliance, helping identify and address potential control and policy issues to prepare for an official SOC audit effectively.
55 out of 60
Azure Security Assessment: 2 Week AssessmentBig Green IT - Dev
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Every Defender project starts with a thorough assessment where our team evaluates the current setup. Based on this, we offer suggestions to enhance security, performance, and scalability.
56 out of 60
Eviden's Application Strategy WorkshopEviden International France - SAS
+3
Applicable to:
app-modernization product iconApp Modernizationdata-platform product iconData Platformidentity product iconIdentity
Eviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
57 out of 60
Security Warrior: Managed ServiceTechConnect
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
Our Security Warrior, will give you the visibility and remediation into your Azure security posture to manage the risk through an affordable single pane of glass solution.
58 out of 60
Azure Security Assessment (3 Weeks)Bulletproof Solutions Inc.
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
The offer provides a comprehensive report of security gaps and recommendations for an Azure Environment.
59 out of 60
Security and Compliance AssessmentNOVENTIQ
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Gain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
60 out of 60
  • 1
  • 2
  • 3
  • 4
  • 5
  • 다음
마켓플레이스 정보
  • Microsoft Marketplace를 선택해야 하는 이유
  • 블로그
  • 고객 사례
고객용
  • 근무 시간
  • 시작 가이드
  • 기술 설명서
  • 비공개 제안
  • Microsoft Azure Consumption Commitment
  • 청구 및 송장 작성
파트너의 경우
  • 파트너 되기
  • 등록하기
  • 마케팅 지원 받기
  • 기술 설명서
  • 빌드, 게시 및 판매를 위한 단계별 지침
  • 공동 판매 자격 얻기
  • 파트너를 위한 마켓플레이스 커뮤니티
  • 채널 주도 마켓플레이스 판매
  • 채널 파트너를 위한 다자간 프라이빗 오퍼
기업 고객
  • Microsoft Cloud
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
회사
  • 채용 정보
  • Microsoft 정보
  • 회사 뉴스
  • Microsoft 개인 정보 보호
  • 투자자
  • 지속 가능성
한국어(대한민국) 개인정보처리방침 선택 옵트아웃 아이콘 개인 정보 선택 사항 소비자 상태 개인정보처리방침
  • 사이트맵
  • Contact Us
  • 개인정보처리방침
  • 사용 약관
  • 상표
  • 광고 정보
  • 쿠키 관리
  • © Microsoft 2025

한국마이크로소프트(유)

대표이사: 조원우

주소: (우)110-150 서울 종로구 종로1길 50 더 케이트윈타워 A동 12층

전화번호: 02-531-4500, 메일: ms-korea@microsoft.com

사업자등록번호: 120-81-05948 사업자정보확인

호스팅서비스 제공자: Microsoft Corporation

통신판매신고: 제2013-서울종로-1009호

사이버몰의 이용약관: Microsoft Store 판매 약관