Feedback geven
Help en ondersteuning
Opgeslagen items
Privéplannen
Een ogenblik geduld, u wordt aangemeld...
FiltersAlles wissen

  • Uw locatie
  • Producten (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Acceptatie- en wijzigingsbeheer
      • Bellen voor Microsoft teams
      • Cloudbeveiliging
      • Adviesservices voor naleving
      • Apparaatimplementatie en -beheer
      • Eerstelijnswerkers
      • Identiteits- en toegangsbeheer
      • Gegevensbescherming en -governance
      • Insiderrisico
      • Kennis en inzichten
      • Vergaderruimten voor Microsoft Teams
      • Vergaderingen voor Microsoft Teams
      • Microsoft 365 Live Events
      • Beheer van mobiele apparaten
      • Power Platform for Teams
      • Aangepaste oplossingen voor Teams
      • Implementatie van teamwerk
      • Bedreigingsbeveiliging
      • Workplace Analytics
    • Power Platform
  • Branches
  • Servicetype
  • Prijsmodel

Adviesdiensten resultaten

resultaten worden weergegeven in adviesdiensten.
Licensing Optimization: 1-Wk WorkshopeGroup Enabling Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-cloud-security product iconCloud Security
Gain confidence in your level of control with your Microsoft 365 licensing.
1 out of 60
Microsoft 365 Implementation for Financial ServiceNew Charter Technologies, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Paid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
2 out of 60
XENMDM - Monthly SoC Support for Mobile DevicesXencia Technology Solutions Pvt Ltd
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Microsoft Intune platform based Managed Services covering device management, control and compliance along with monitoring and remediation of issues, policies, users, devices and threats.
3 out of 60
Compliance Managed ServicesForsyte IT Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Organizations everywhere are experiencing the benefits of Compliance Managed Services. Work with our Microsoft Gold Partner team to establish governance and manage user access and data security.
4 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Servicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
5 out of 60
Defend Against Threats with SIEM Plus XDRNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
6 out of 60
Office 365 Encrypted Email - Initial Setup: 1-Day Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost Microsoft 365 security with default encryption. Elevate messaging protection and implement email encryption and rights protection for sensitive data.
7 out of 60
Modern Managed Services: 2-tägiges AssessmentnovaCapta GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Ihre Optionen für Managed Services rund um Endpunkte, Microsoft Azure, Microsoft 365 und Security am Modern Workplace entdecken
8 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
9 out of 60
Modernize Identities with Entra ID PremiumDaymark Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Strengthen User Security with Advanced Identity Management.
10 out of 60
Defender for Office 365: 5-Day AssessmenteGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Office 365 solutions safeguard your organization against malicious threats posed by email messages, links, and collaboration tools.
11 out of 60
cyber security threat analysis workshopU-BTech Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
the workshop is design to discover threats and risks
12 out of 60
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
13 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Enhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
14 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk EngagementCloudScale International
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
This assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
15 out of 60
Digital Workplace Program: 4-week AssessmentQuisitive
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
The Digital Workplace Foundations Assessment helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tool
16 out of 60
"Threat Protection: 3 Day Workshop"Insentra Pty Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
17 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day WorkshopeGroup Enabling Technologies, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
With Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
18 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServus
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Gain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
19 out of 60
Office 365 Migration 3-Month ImplementationRKON TECHNOLOGIES
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Leverage RKON's consulting expertise for a smooth and seamless migration to Microsoft's Office 365 suite of products including SharePoint, OneDrive, and Teams
20 out of 60
Microsoft Sentinel Quick StartEdgile, Inc.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Production pilot, which is expected to provide centralized log collection, detection of previously undetected threats, investigation with artificial intelligence, and Rapid Response to incidents.
21 out of 60
Endpoint Security Basic Quick Start 12-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Achieve a Microsoft pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats
22 out of 60
Management Services: 3-month AssessmentQuisitive
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Quisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
23 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTD
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
24 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
25 out of 60
MXDR Shield: 4-Wk ImplementationLong View Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
26 out of 60
Microsoft Defender for End Points JumpstartSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
27 out of 60
Microsoft Defender for Office JumpstartSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
28 out of 60
Cloud Protection for AIKiZAN Technologies
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Protect Cloud Environments leveraging Microsoft Secure Scores and other Microsoft Products to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigat
29 out of 60
Defender PilotLevacloud LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
30 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Shadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
31 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
The primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
32 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Configure and customize transport rules in Microsoft Exchange Online, ensuring efficient email routing, improved security, and compliance for your organization.
33 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
This service moves key server tasks to a new one for upgrades or system changes.
34 out of 60
Automatic In-Place Upgrade to Windows 10 or 11: 3-Wk Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Seamlessly upgrade PCs from Windows 7, 8, or 8.1 to Windows 10 or 11, ensuring compatibility and minimal user disruption, particularly suited for organizations with more than 25 PCs.
35 out of 60
Assessment and Roadmap: Microsoft Security (Azure, Microsoft 365, Active Directory, Entra ID) 6-Week EngagementKudelski Security
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
This assessment defines and recommends steps to achieve your desired security state using your existing security solutions and capabilities.
36 out of 60
Securing Identities WorkshopSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
37 out of 60
Multi-Factor Authentication - Initial Setup: 3-Professional serviceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
The goal of the service is to make Microsoft 365 accounts safer by adding an extra layer of security, so only authorized users can access them.
38 out of 60
Get AI Ready: 5-Day AssessmentPSM Partners
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
AI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
39 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
40 out of 60
Digital Transformation Calls: 1-Day Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Qualified assistance in resolving any issues after migration to the Microsoft 365 cloud services.
41 out of 60
Company Document Migration to SharePoint Online or Teams: 7-Days Consulting ServiceIT Partner LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Migration of file shares, folders and documents from your file server or a third-party service like Box, Dropbox, or Google Drive to SharePoint Online or Teams.
42 out of 60
Endpoint Security Foundations 50 users: 1-YrRed River Technology LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Endpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
43 out of 60
Cybersecurity AssessmentCDI LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
44 out of 60
Microsoft 365 Security: 30-Days ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Establish a foundational, secure environment for clients by configuring their Microsoft 365 tenant with core security features.
45 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Establish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
46 out of 60
Foundational Identity AnalysisJourneyTEAM
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Ensure a Secure Foundation for Microsoft Cloud Services using our Foundational Identity Analysis.
47 out of 60
Cybersecurity Assessment: 5-Wk AssessmentPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
This assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
48 out of 60
Cutover Exchange Online migration from any IMAP email system: 7-Days Professional serviceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Migrate users, email data, and email folders from any IMAP system to Microsoft 365 / Exchange Online.
49 out of 60
MDR WorkshopGrant Thornton LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
50 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
51 out of 60
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
According to multiple studies, breaches and ransomware have more than doubled in the past year.
52 out of 60
Microsoft Cybersecurity: 1 Month AssessmentBig Cloud Consultants
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Our expert team will work with you to assess your current security posture and develop recommendations for appropriate improvements.
53 out of 60
Copilot Preparedness and Planning WorkshopCDI LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Copilot workshop will prepare your organization to utilize copilot by identifying key scenarios and gaps in current configuration to improve ROI of using Copilot.
54 out of 60
Power Apps - 4 Week EngagementSynergy Technical, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
The one thing that can make or break the process is how well the IT integration project goes. M&A transactions have a defined transition services agreement that says how long the new company can use t
55 out of 60
Windows 365 PilotCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
56 out of 60
MXDR ConsultationCBTS Technology Solutions LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
57 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
58 out of 60
Cybersecurity Assessment Engagement - 4 weeksGrant Thornton LLP
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Enhance Your Cloud Security Posture with Grant Thornton’s Cybersecurity Assessment
59 out of 60
Threat Protection Engagement - 4 weeksGrant Thornton LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Improve your Security Posture with Grant Thornton's Threat Protection Engagement
60 out of 60
  • Vorige
  • 8
  • 9
  • 10
  • 11
  • 12
  • Volgende
Over Marketplace
  • Waarom Microsoft Marketplace
  • Blogs
  • Verhalen van klanten
Voor klanten
  • Kantooruren
  • Handleiding `Aan de slag´
  • Technische documentatie
  • Persoonlijke aanbiedingen
  • Microsoft Azure-verbruikstoezegging
  • Facturering en rekeningen
Voor partners
  • Een partner worden
  • Geef u op
  • Marketingondersteuning krijgen
  • Technische documentatie
  • Stapsgewijze instructies om te bouwen, publiceren en verkopen
  • In aanmerking komen voor collectieve verkoop
  • Marketplace-community voor partners
  • Door kanalen geleide Marketplace-verkoop
  • Privéaanbiedingen voor meerdere partijen voor kanaalpartners
Zakelijk
  • Microsoft AI
  • Microsoft Beveiliging
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Midden- en kleinbedrijf
Bedrijf
  • Vacatures
  • Over Microsoft
  • Bedrijfsnieuws
  • Privacy bij Microsoft
  • Investeerders
  • Duurzaamheid
Nederlands (België) Pictogram Uw privacykeuzes afmelden Uw Californië privacykeuzes Privacy van consumentenstatus
  • Siteoverzicht
  • Contact opnemen
  • Privacy en cookies
  • Gebruiksvoorwaarden
  • Handelsmerken
  • Over onze advertenties
  • Cookies beheren
  • © Microsoft 2026