Sniegt atsauksmes
Help & support
Saglabātie vienumi
Privātie plāni
Brīdi uzgaidiet, notiek pieteikšanās...
FiltriNotīrīt visu

  • Jūsu atrašanās vieta
  • Produkti (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Apgūšana un izmaiņu pārvaldība
      • Microsoft Teams zvani
      • Mākoņa drošība
      • Atbilstības konsultatīvie pakalpojumi
      • Ierīču izvietošana un pārvaldība
      • Priekšlīnijas darbinieki
      • Identitāšu un piekļuves pārvaldība
      • Informācijas aizsardzība un pārvaldība
      • Iekšējais risks
      • Zināšanas un ieskati
      • Sapulču telpas darbvietai Microsoft Teams
      • Sapulces darbvietai Microsoft Teams
      • Microsoft 365 Live Events
      • Mobilo ierīču pārvaldība
      • Power Platform for Teams
      • Teams pielāgotie risinājumi
      • Grupas darba izvietošana
      • Pretdraudu aizsardzība
      • Workplace Analytics
    • Power Platform
  • Nozares
  • Pakalpojuma tips
  • Izcenojuma modelis

Professional Services rezultāti

Tiek rādīti rezultāti šeit: professional services.
Skats saistītie rezultāti šeit: nozares mākoņi.
Manage Compliance Obligations & Risks with Microsoft PurviewBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Enhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
1 out of 60
Security Assessment for Copilot Readiness: 3 Day WorkshopNetwoven
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Netwoven's security assessment for Copilot workshop will train you to better discover, secure, and govern your corporate data for usage with Copilot for Microsoft 365
2 out of 60
Unified Identity & Secure Edge Modernization with Entra Suite+BDO Digital, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Modernize Identity & Network Access to enable Zero Trust for employees, customers and partners in any cloud from anywhere, to any app, AI, or resource
3 out of 60
Threat Protection Engagement FY25The Partner Masters
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
4 out of 60
Endpoint Management with Security WorkshopThe Partner Masters
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
The Endpoint Management with Security Workshop enables partners to lead customer conversations around modernizing their endpoint management and security capabilities by leveraging Microsoft 365.
5 out of 60
Cybersecurity Assessment EngagementadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Get a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
6 out of 60
AvePoint Backup: 4 Weeks Proof Of ConceptSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Sentinel Technologies is proud to offer AvePoint’s Cloud Backup, a powerful cloud-to-cloud backup solution for Microsoft 365 and Azure.
7 out of 60
Zero Trust Model - 4h assessmentReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Zero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
8 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
9 out of 60
Microsoft 365 E5 NIST 800-171 -1 Week GAP AssessmtKAMIND IT, Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
This offer is for a NIST800-171 Gap Assessment for a single Host Unit, scoped to a single contract, single subnet using the Microsoft 365 E5 license
10 out of 60
UNITE: Secure Core_INFINITY TECHNOLOGY SOLUTIONS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
UNITE: Secure Core_ simplifies management of your security infrastructure, offering proactive monitoring, updates, and protection for your business identities, applications, devices, and data.
11 out of 60
Neudesic's Knowledge Governance WorkshopNeudesic
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
The Neudesic Knowledge Governance Workshop is a 4–6-week session that is designed to assist customers in safeguarding their sensitive information.
12 out of 60
Microsoft Defender for Endpoint QuickStartPresidio
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Presidio supports organizations in strategizing, implementing, and optimizing Microsoft Defender for Endpoint to achieve superior endpoint protection.
13 out of 60
Zones Intune Device Endpoint Management ImplementationZones Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Management
Elevate your mobile device and application management with Intune—a robust solution offering advanced security features like conditional access, multi-factor authentication, and data encryption.
14 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO Digital, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prove the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
15 out of 60
Microsoft 365 CMMC: 4-Wk WorkshopKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Provides expert guidance to help organizations in the Defense Industrial Base achieve CMMC compliance within Microsoft 365 and simplify the configuration of security features to meet DoD requirements.
16 out of 60
Security Maturity Assessment - 4 WeeksBDO Digital, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Roadmap to increase your security score with cost-effective security tools
17 out of 60
Cloud Security Operations CenterReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Verified MXDR Security Service Offering including 24/7 Security Monitoring, Threat Detection, Incident Response, Penetration Testing
18 out of 60
Microsoft 365 E5 CMMC L3 8 Week ImplementationKAMIND IT, Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
KAMIND's implementation for CMMC (Cybersecurity Maturity Model Certification) level 3 using Microsoft 365 security suite and Azure Sentinel SIEM.
19 out of 60
Data Security with Microsoft Purview SolutionsBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Enhance data security control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
20 out of 60
Data Security and Governance: 3 Day WorkshopNetwoven
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Netwoven Data Security and Governance workshop will get you started on the path to discover, protect, and govern your sensitive corporate data
21 out of 60
Microsoft 365 Backup Readiness AssessmentABTechnologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Evaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
22 out of 60
Microsoft Defender for Office 365: 1-hour briefingReply
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Free one-hour briefing highlighting the core capabilities and benefits provided by Microsoft Defender for Office 365
23 out of 60
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
24 out of 60
Zero Trust Security: 3-day WorkshopOxford Computer Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Leverage your Microsoft investment to create a strong Zero Trust security environment.
25 out of 60
Zones SOCaaS - MXDR with Threat ProtectionZones Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Zones SOCaaS powered by Microsoft Sentinel and Defender offers advanced MDR and XDR capabilities, reinforcing your business’s safety.
26 out of 60
Windows 365: 4 Week Readiness AssessmentNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Get an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
27 out of 60
Microsoft 365 Security BriefingCDI LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
28 out of 60
Data Protection and Compliance Quick StartSoftchoice
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
The Softchoice Data Protection and Compliance Quit is a 2 week engagement that educates customers on the importance of proper data Protection and Information Governance.
29 out of 60
Microsoft Secure Cloud Business Applications (SCuBA) Workshop 2-Day WorkshopCDI LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
An assessment of your Microsoft 365 security in accordance with the Cybersecurity and Infrastructure Security Agency which could lead to appropriate adoption of your existing security licensing.
30 out of 60
Microsoft Defender for Endpoint DeploymentCitrin Cooperman Advisors, LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Fortify your business with Microsoft Defender for Endpoint that seamlessly integrates into Microsoft 365, safeguarding all devices and strengthening your Zero Trust framework.
31 out of 60
Microsoft Defender for Cloud Apps JumpstartSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft Defender for Cloud Apps address security gaps in an organization's environment.
32 out of 60
BCN Intranet LiteBCN Group Ltd.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
We help businesses use SharePoint with our ready-made templates. You don’t need any SharePoint skills to get started. We’ll guide you through the process.
33 out of 60
Microsoft 365 HIPAA/HITECH 20 Hour ImplementationNew Charter Technologies, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Implementation of Microsoft 365 to include compliance policies and templates for health care.
34 out of 60
Data Security: Free WorkshopLong View Systems
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Enhance your data security with Microsoft Purview by beginning with a complimentary workshop.
35 out of 60
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom Consulting
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
36 out of 60
Incident Response RetainerSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
37 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prove the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
38 out of 60
Varonis JumpstartSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
39 out of 60
Copilot Readiness AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
40 out of 60
Zero Trust as a Service (ZTaaS)Aegis Innovators
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Digital transformation and adopting AI starts with building a secure foundation.
41 out of 60
Microsoft 365 Implementation for Financial ServiceNew Charter Technologies, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Paid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
42 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Professional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
43 out of 60
Microsoft 365 Secure Productivity WorkshopABTechnologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
Enable your team to work securely and productively using Microsoft 365 best practices.
44 out of 60
BCN Cloud Readiness Assessment and ReportBCN Group Ltd.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-meetings-for-microsoft-teams product iconMeetings for Microsoft Teams
This assessment will help you decide whether you are ready to migrate IT systems and services to the cloud.
45 out of 60
Defender for Office 365: 3-Day ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
46 out of 60
Data Security Engagement with Microsoft PurviewInviso Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our Data Security engagement will look over your data estate and establish areas of Security Risk. We will show you the benefits to Microsoft Purview to help protect your environment from risks.
47 out of 60
Fortis IR Table Top ExercisesSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Exercises designed to evaluate your organization’s capabilities when responding to a cybersecurity incident from both a tactical and strategic perspective.
48 out of 60
Microsoft Security Copilot Readiness AssessmentSoftchoice
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Aims to ensure organizations can securely utilize Microsoft’s Copilot for Security and identifying gaps in signal data from core Microsoft security products
49 out of 60
MFA JumpstartSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan.
50 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Seamlessly transfer email data and mailboxes between Office 365 tenants during mergers or separations. Ensure continuity for users, minimize disruptions, and enables a smooth transition.
51 out of 60
Data Security & Threat Protection WorkshopITVT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Identify data security risks in your organizational data​ & discover vulnerabilities in your environment
52 out of 60
Secure Remote Workplace: 1-Wk WorkshopFSI Strategies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
5-day hands-on workshop covering the key components in Microsoft 365 to enable secure remote access, mobile device and workstation management, and cloud security.
53 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
If you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
54 out of 60
Microsoft 365 E5 KAM-Fort Deployment: 8 Week Imp.KAMIND IT, Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
KAMIND Security infrastructure deployment of Microsoft 365 E5 and full Azure Security Stack, CMMC pre-assessment option and the optional addition of Into The Breach Project Ares Cyber Range training.
55 out of 60
Cyber Security AssessmentAegis Innovators
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
56 out of 60
Mergers and Acquisitions- Identity and Migration to Microsoft 365: 8-Wk Assessment and PlanningAgile IT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Shorten the time to value from an M&A activity and reduce the risk in organizational costs and frustrations by starting with an assessment and plan to rationalize identities, tenants, and costs.
57 out of 60
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
58 out of 60
impelSecure Data Security Engagement: Free 4-week workshopimpeltec Pty Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Identify data risks and evaluate user behavior for risky activities
59 out of 60
Microsoft 365 Copilot Accelerator: 12Wk ImplementationBDO Canada
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Leveraging BDO’s Microsoft 365 Copilot Framework, we'll quickly help you assess your readiness and then accelerate your deployment of Microsoft 365 Copilot in just 12 weeks.
60 out of 60
  • Atpakaļ
  • 4
  • 5
  • 6
  • 7
  • 8
  • Tālāk
Par Marketplace
  • Kāpēc Microsoft Marketplace
  • Emuāri
  • Klientu stāsti
Klientiem
  • Darba laiks
  • Darba sākšanas ceļvedis
  • Tehniskā dokumentācija
  • Privātie piedāvājumi
  • Microsoft Azure patēriņa saistības
  • Norēķini un rēķinu izrakstīšana
Partneriem
  • Kļūstiet par partneri
  • Tieciet iekļauts sarakstā
  • Saņemt mārketinga atbalstu
  • Tehniskā dokumentācija
  • Detalizēti norādījumi par to, kā veidot, publicēt un pārdot
  • Kļūstiet par koppārdošanas prasībām atbilstošu
  • Marketplace kopiena partneriem
  • Kanāla vadīta Marketplace pārdošana
  • Vairāku pušu privātie piedāvājumi kanāla partneriem
Uzņēmējdarbība
  • Microsoft mākonis
  • Microsoft drošība
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Uzņēmējsabiedrība
  • Karjera
  • Microsoft privātums
  • Investori
  • Ilgtspējība
Latviešu (Latvija) Jūsu konfidencialitātes izvēles iespējas — atteikšanās ikona Jūsu konfidencialitātes izvēles iespējas Patērētāju veselības konfidencialitāte
  • Vietnes karte
  • Sazināties ar mums
  • Konfidencialitāte un sīkfaili
  • Lietošanas nosacījumi
  • Preču zīmes
  • Par mūsu reklāmām
  • Pārvaldīt sīkfailus
  • © Microsoft 2025