Pateikti atsiliepimą
Žinynas ir palaikymas
Įrašyti elementai
Privatūs planai
Luktelėkite, prijungiame jus...
FiltraiValyti viską

  • Jūsų vieta
  • Produktai (1)
    • Azure
    • „Dynamics 365“
    • Microsoft 365 (1)
      • Priėmimas ir pakeitimų valdymas
      • Raginama „Microsoft Teams“
      • Debesies sauga
      • Konsultavimo atitikties klausimais paslaugos
      • Įrenginių diegimas ir valdymas
      • Tiesioginiai darbuotojai
      • Tapatybės ir prieigos valdymas
      • Informacijos apsauga ir valdymas
      • Vidinė rizika
      • Žinios ir įžvalgos
      • „Microsoft Teams“ susitikimų salės
      • „Microsoft Teams“ susitikimai
      • Microsoft 365 Live Events
      • Mobiliųjų įrenginių valdymas
      • Power Platform for Teams
      • Pasirinktiniai „Teams“ sprendimai
      • Komandinio darbo diegimas
      • Apsauga nuo grėsmių
      • Workplace Analytics
    • Power Platform
  • Pramonės šakos
  • Paslaugos tipas
  • Įkainių modelis

Rezultatų: Professional Services

Rodomi rezultatai professional services.
Rodyti susijusių rezultatų pramonės debesys.
Innofactor Copilot Data Readiness Kit, 3-week workshopInnofactor Finland
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Innofactor's Copilot Data Readiness Kit ensures secure and efficient use of Microsoft Copilot by mitigating risks and effectively protecting sensitive business information and data.
1 out of 49
Guest Lifecycle for Azure ADSwiss IT Security AG
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Guest Lifecycle for Azure AD (GL4AAD) handles maintenance and hygiene tasks for you.
2 out of 49
DNV Cyber Extended Detection and Response (XDR) for MicrosoftNixu Oyj
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
XDR service including 24/7 Security Operations Center (SOC) powered with Defender XDR and Sentinel
3 out of 49
NVISO Microsoft 365 Security AssessmentNVISO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
4 out of 49
Exobe Windows 365 PilotExobe AB
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
We are pleased to offer a Microsoft Windows 365 pilot that shows how to accomplish more with all the resources available in Windows 365.
5 out of 49
Microsoft 365 Copilot workshop: 1-week consulting servicesUni Systems S.M.S.A.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
6 out of 49
Intune Security Reviewmnemonic
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Management
Enhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
7 out of 49
Insight´s Microsoft Cloud Advisory ServiceInsight Technology Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Provides a 2 weeks assessment of our client’s estate across the following six areas: Microsoft 365, Azure, On-Premises, Business Critical Applications, Skills & Resourcing & Cost optimisation.
8 out of 49
Implementation of Copilot readiness assessmentDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
9 out of 49
Microsoft 365 Copilot Value Discovery: 2-Week AssessmentPrimend
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Security
Unlock the full potential of Microsoft Copilot. Discover high-value use cases, optimize your AI readiness, and build a robust business case for AI transformation
10 out of 49
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
11 out of 49
itm8 Managed Detection and Responseitm8 Sverige AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Implementation of itm8 Managed Detection and Response based on Defender for Business
12 out of 49
Modern Security Operations EngagementFUJITSU
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Detect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
13 out of 49
Get Value from Adoption of Microsoft CopilotNexer Group AB
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Get tools for how to measure and promote the adoption of AI tools like Microsoft 365 Copilot and agents in your organisation. Get usertrainings, champion programs etc in place with our help.
14 out of 49
Exobe DPIA ServiceExobe AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A Data Protection Impact Assessment (DPIA) is a structured process used to ensure GDPR compliance and responsible handling of personal data.
15 out of 49
Continuous Improvement Services for Microsoft 365SCIBER
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Sciber’s Continuous Improvement service keeps your Microsoft 365 environment aligned with updates and best practices, turning changes into tailored insights that maximize your investment.
16 out of 49
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security Kft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and harden Microsoft Security configurations based on industry best practices
17 out of 49
Nexer Data Governance - Get ready for AINexer Group AB
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
To get ready for AI you need to have control of your data. Effective data governance is crucial for ensuring compliance with data privacy regulations and maintaining data integrity.
18 out of 49
ITE ZeroTrust360™Information Technology of Egypt Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
ITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
19 out of 49
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
20 out of 49
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
21 out of 49
Innofactor Intune foundation: 2 wk implementationInnofactor Norway
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Microsoft 365 - Intune Foundation is an established framework for basic configuration and acceleration of Microsoft Endpoint Manager MEM based on best practises from Innofactor.
22 out of 49
Microsoft 365 Tenant Setup, 1-Day ImplementationTec Networks GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
We provide you a good-practice configured tenant for the best experience with Microsoft 365
23 out of 49
Zerotrust Starterkit with Onevinn, 2 days!Onevinn AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Introduction to Zerotrust with Passwordless and YubiKeys – Get an understanding of what the Passwordless technology is and what you can achieve with YubiKeys
24 out of 49
Zero-Trust: 3-Day AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
25 out of 49
Passwordless Starterkit 25 Yubikeys, 4h WorkshopOnevinn AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Introduction to Passwordless with 25 YubiKeys – get an understanding of what the Passwordless technology is and what you can achieve with Yubikeys
26 out of 49
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UK
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Manage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
27 out of 49
Microsoft Endpoint Manager PoC - 4 weeksXenit AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Xenit’s Proof-of-Concept (PoC) includes both a configuration in Microsoft Endpoint Manager and a strategy workshop.
28 out of 49
Xenit Workspace - 4 weeks implementationXenit AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With the workplace as a service, you give your employees a secure and managed client computer, filled with applications in Microsoft's user-friendly and familiar interfaces.
29 out of 49
Cyber Security Lifecycle: 12 Months ImplementationExobe AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The goal and objective of the service is that your company should always have the best possible security posture for your Microsoft 365 environment.
30 out of 49
Onevinn Information Protection: 5 day WorkshopOnevinn AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Onevinn Information Protection workshop that helps the customer utilize their investment in Microsoft 365.
31 out of 49
Onevinn Threat Protection: 5 day WorkshopOnevinn AB
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Onevinn Threat Protection workshop that helps the customer utilize their investment in Microsoft 365.
32 out of 49
Microsoft 365 Security: 1-Wk AssessmentInnofactor Norway
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Innofactor’s Microsoft 365 Security assessment secures organizations business operation by providing insights and recommendations to help minimizing security risks.
33 out of 49
Microsoft 365 Strategic Security Workshop (1day)Edgeguide AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
To establish an organization specific plan and in addition a better understanding of actual customer needs as it relates to the security, identity, and compliance portfolio in Microsoft 365.
34 out of 49
Microsoft 365 Backup: 3 wks implementationXenit AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
A complete backup plan with unlimited storage, unlimited rentention, GDPR modul and protection for malware and ransomware.
35 out of 49
Microsoft 365 Security: 2-WK Assessment EssentialsDustin AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
An executive assessment into essential security capabilities, map against normal/high risk scenario and security hygiene
36 out of 49
Compliance Manager Training: 1/2 day WorkshopCloud Essentials
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Compliance Manager Training - a 1/2 day training session about Microsoft 365 Compliance Manager facilitated by an experienced member of our team
37 out of 49
Manage and Investigate Risk: 2 weeks WorkshopCloud Essentials
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
A risk check followed by advisory workshop to build a sustainable strategy around insider risk within Microsoft 365 and further accelerate your compliance journey.
38 out of 49
Discover Sensitive Data: 2 weeks WorkshopCloud Essentials
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Discover Sensitive Data Workshop - an automated data risk check to uncover dark data risks with analysis and recommendations
39 out of 49
Microsoft 365 Defender: 10-Day AssessmentVenzo A/S
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Let VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
40 out of 49
Microsoft 365 Security Assessment and Roadmap: 1 Day WorkshopCloud Essentials
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Accelerating your Zero Trust strategy through a readiness assessment, workshop and roadmap
41 out of 49
Tietoevry endpoint security 2h workshopTietoevry
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The purpose of the endpoint security workshop for Microsoft Defender is to help Customers understand the full potential security benefits within each of the Microsoft Defender solutions.
42 out of 49
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
43 out of 49
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
This hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
44 out of 49
Microsoft 365 Governance: 1 month AssessmentCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Crayon Microsoft 365 Governance Assessment will assess your configuration and build recommendation report
45 out of 49
Modernize Endpoints (Microsoft Intune): 1 Day WorkshopCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Endpoint Management Workshop is a one-day engagement that will help you showcase the value of Microsoft Endpoint Manager and how to manage users’ devices and apps from anywhere.
46 out of 49
Road to Microsoft 365: 1 month ImplementationCrayon
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Crayon Microsoft 365 migration services brings best practices and expertise to assure seamless migration.
47 out of 49
Cybersecurity Fitness Roadmap: 6-Wk AssessmentHiQ Stockholm AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Plan, create and implement a strategy for improving your organizational Cyber Hygiene using Microsoft Security Technologies.
48 out of 49
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
49 out of 49
  • Atgal
  • 1
  • 2
  • 3
  • 4
  • 5
Apie parduotuvę
  • Kodėl verta naudoti „Microsoft“ parduotuvę
  • Tinklaraščiai
  • Klientų istorijos
Klientams
  • Darbo valandos
  • Darbo pradžios vadovas
  • Techninė dokumentacija
  • Privatūs pasiūlymai
  • „Microsoft Azure“ vartojimo įsipareigojimas
  • Atsiskaitymas ir SF išrašymas
Partneriams
  • Tapkite partneriu
  • Būkite įtraukti
  • Gaukite rinkodaros palaikymą
  • Techninė dokumentacija
  • Nuoseklūs nurodymai, kaip kurti, publikuoti ir parduoti
  • Atitikite bendro pardavimo reikalavimus
  • Parduotuvės bendruomenė partneriams
  • Kanalo valdomas parduotuvės pardavimas
  • Kelių dalių privatūs pasiūlymai kanalo partneriams
Verslas
  • „Microsoft“ dirbtinis intelektas
  • „Microsoft“ sauga
  • „Azure”
  • „Dynamics 365“
  • „Microsoft 365“
  • „Microsoft Advertising“
  • Microsoft 365 Copilot
  • „Microsoft Teams“
Įmonė
  • Karjera
  • Apie „Microsoft“
  • „Microsoft“ privatumas
  • Investuotojai
  • Tvarumas
Lietuvių (Lietuva) Jūsų privatumo pasirinkimų atsisakymo piktograma Jūsų privatumo pasirinkimai Vartotojų sveikatos privatumas
  • Svetainės struktūra
  • Susisiekite su mumis
  • Privatumas ir slapukai
  • Naudojimo sąlygos
  • Prekių ženklai
  • Apie mūsų skelbimus
  • Valdyti slapukus
  • © Microsoft 2026