Feedback geven
Help en ondersteuning
Opgeslagen items
Privéplannen
Een ogenblik geduld, u wordt aangemeld...
FiltersAlles wissen

  • Uw locatie
  • Producten (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Acceptatie- en wijzigingsbeheer
      • Bellen voor Microsoft teams
      • Cloudbeveiliging
      • Adviesservices voor naleving
      • Apparaatimplementatie en -beheer
      • Eerstelijnswerkers
      • Identiteits- en toegangsbeheer
      • Gegevensbescherming en -governance
      • Insiderrisico
      • Kennis en inzichten
      • Vergaderruimten voor Microsoft Teams
      • Vergaderingen voor Microsoft Teams
      • Microsoft 365 Live Events
      • Beheer van mobiele apparaten
      • Power Platform for Teams
      • Aangepaste oplossingen voor Teams
      • Implementatie van teamwerk
      • Bedreigingsbeveiliging
      • Workplace Analytics
    • Power Platform
  • Branches
  • Servicetype
  • Prijsmodel

Adviesdiensten resultaten

resultaten worden weergegeven in adviesdiensten.
Weergave gerelateerde resultaten weergeven in brancheclouds.
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
1 out of 60
Tenant to Tenant Migration for AAD, EXO and OD4B Services Only: 1-Week ImplementationIT Partner LLC
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Security
Microsoft 365 Tenant-to-Tenant Migration Including Azure AD, Exchange Online and OneDrive for Business services and data
2 out of 60
Microsoft Sentinel Workshop and PilotCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft Sentinel Workshop and Pilot engagement helps you experience the native scalable cloud-based SIEM and SOAR solution within your own production environment.
3 out of 60
Zero Trust Baseline Pilot 8-Week ImplementationInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
The Zero Trust Baseline Pilot offering is designed to put the customer on the journey to improve end user experiences and security for remote or on-site workers.
4 out of 60
Multifactor Authentication: 4-Day ImplementationFSI Strategies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Implementation of Azure Multi-factor Authentication for an organization to implement a more secure workplace.
5 out of 60
Microsoft Secure Cloud Business Applications (SCuBA) Workshop 2-Day WorkshopCDI LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
An assessment of your Microsoft 365 security in accordance with the Cybersecurity and Infrastructure Security Agency which could lead to appropriate adoption of your existing security licensing.
6 out of 60
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
7 out of 60
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
8 out of 60
Office 365 Tenant - Initial Setup: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
The goal is to efficiently and effectively set up your organization's Office 365 tenant, enabling seamless access to a suite of productivity tools and collaboration services.
9 out of 60
Security Modernization: 3 Day WorkshopNetwoven
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Safeguard your business with a three-step security modernization solution from Netwoven
10 out of 60
Adoption, Deployment & Success of Microsoft 365 CopilotIT Quest Solutions
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Security
Empower your team with Microsoft 365 Copilot—boost productivity, streamline workflows, and unlock AI-driven insights across Word, Excel, Teams & CopilotAgents
11 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Seamlessly transfer email data and mailboxes between Office 365 tenants during mergers or separations. Ensure continuity for users, minimize disruptions, and enables a smooth transition.
12 out of 60
Microsoft Sentinel - Monitor file access and permission changes in SharePoint Implementation: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Implement Microsoft Sentinel for monitoring file access and permission changes in SharePoint, ensuring prompt detection and notification of unauthorized or unwanted activities.
13 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
14 out of 60
Cloud Security Journey: 2 Hour Proof of Concept360 Visibility Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
See how Microsoft Azure Cloud Security tools (Azure Defender, Security Center) help you gain security visibility into threats with our Microsoft Security Proof of Concept.
15 out of 60
Microsoft Security Immersion: 1 Day BriefingSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Knowing that your time is valuable, we have developed a true to life, hands-on, interactive session designed to give you a deep understanding of the Microsoft 365 Security suite of products.
16 out of 60
Threat Protection EngagementNeway Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance your organization's security stance with a Neway Threat Protection Engagement.
17 out of 60
SMB Cloud Evaluation Program: 2-Wk AssessmentMaureen Data Systems
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Identifying ways to modernize & optimize IT assets, mitigate security risks, and reduce cost & complexity.​ See how the cloud can help, estimated costs, and what to do next. ​
18 out of 60
Identity WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
19 out of 60
Microsoft 365 Migration: 10-Wk Implementationabra
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-power-platform-for-teams product iconPower Platform for Teams
Successfully migrate your Microsoft 365 environment to a managed services model.
20 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Advanced endpoint security and threat protection: detect, investigate, and respond to attacks.
21 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prove the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
22 out of 60
Advanced Threat Analytics: 7-Day InstallationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Advanced Threat Analytics (ATA) is a complex system that allows you to protect your IT infrastructure from a variety of information threats and cyberattacks.
23 out of 60
Cyber Security Health Check: 4-Hr AssessmenteGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Cyber Security changes dramatically year over year. Ensure that your organization is meeting the latest Cyber Security requirements.
24 out of 60
ITE ZeroTrust360™Information Technology of Egypt Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
ITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
25 out of 60
Endpoint Security Advanced Quick Start 14-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats.
26 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Henson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
27 out of 60
Cyderes Managed Security Services for Microsoft SentinelCyderes
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Cyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
28 out of 60
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
29 out of 60
C1st Implementation of Microsoft Defender for Office 365C1st Technologies LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Enhance email security for businesses by implementing Defender for Office 365 with Exchange Online Protection (EOP). Our goal is to protect organizational email from spam, phishing, and sophisticated
30 out of 60
Cloud-Native Migration Service: 4-Month ImplementationCyclotron Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
31 out of 60
Lightstream Threat Protection Assessment and Deployment RoadmapLightstream
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Leveraging Microsoft Defender and Microsoft Cloud Security Benchmark (MCSB)
32 out of 60
Manage Compliance Obligations & Risks with Microsoft PurviewBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Enhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
33 out of 60
Data Security with Microsoft Purview SolutionsBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Enhance data security control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
34 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Boost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
35 out of 60
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
This hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
36 out of 60
Implementation of Microsoft Defender for EndpointCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
37 out of 60
Lightstream Complimentary Microsoft 365 Core Security AssessmentLightstream
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Lightstream will provide a complimentary comprehensive understanding of your Microsoft 365 security landscape with actionable recommendations.
38 out of 60
Threat Protection Engagement FY25The Tech Mavericks
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
39 out of 60
Digital Workplace Foundations: 4-wk AssessmentCatapult Systems, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Catapult’s Digital Workplace Foundations helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tools.
40 out of 60
Exchange Online Migration: 6-Week DeploymentCyclotron Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Exchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
41 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Get a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
42 out of 60
Cloud Security Assessment - 3 Day WorkshopSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Security Assessment Workshop is designed to provide organizations with guidance on successfully implementing Microsoft 365 security features.
43 out of 60
Virtual Desktop - Health and Configuration 1 Week AssessmentCDI LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
CDI provides a review of a customer's Virtual Desktop environment and identify opportunities to improve the performance, stability, security and manageability.
44 out of 60
Cyber Insurer Readiness WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Uncover gaps and strengthen your position when applying for cyber insurance
45 out of 60
Microsoft Cybersecurity AssessmentAkins IT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
46 out of 60
Microsoft 365: 3 Week Solution AssessmentFirst National Technology Solutions, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-meetings-for-microsoft-teams product iconMeetings for Microsoft Teamsm365-sa-teamwork-deployment product iconTeamwork Deployment
Partner with FNTS to conduct a 3 week workplace modernization solution assessment to build a TOC analysis & evaluate current purchasing structure to make recommendations for adoption of Microsoft 365.
47 out of 60
Dynapt Advisory Services for Microsoft 365 Copilot 3 Week WorkshopDynapt Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
Unleash the potential of AI to transform your business operations with Microsoft 365 Copilot.
48 out of 60
Microsoft 365 Security BriefingCDI LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A Briefing of available Microsoft 365 security products and how they help organizations Identify and Mitigate Security risk. While increasing the adoption of a Zero zero-trust security Framework.
49 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
The goal of the service is to securely remove your previous Exchange Server, ensuring it doesn't disrupt your operations and enabling a smooth transition to Exchange Online.
50 out of 60
BCN Cloud Readiness Assessment and ReportBCN Group Ltd.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-meetings-for-microsoft-teams product iconMeetings for Microsoft Teams
This assessment will help you decide whether you are ready to migrate IT systems and services to the cloud.
51 out of 60
Microsoft 365 Backup Readiness AssessmentABTechnologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Evaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
52 out of 60
Microsoft 365 Fundamentals: 1 Day WorkshopNETCOM LEARNING
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-teams-custom-solutions product iconTeams Custom Solutionsm365-sa-threat-protection product iconThreat Protection
Introduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
53 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
54 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Service used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
55 out of 60
Cybersecurity Assessment EngagementadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Get a jump start on improving your security posture with Microsoft Security solutions. Gain awareness of the current state of your security, and support on how to remediate vulnerabilities.
56 out of 60
Hybrid Office 365 Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Hybrid migration integrates on-premises Exchange with Microsoft 365, facilitating migration or serving as a permanent state for both organizations.
57 out of 60
Threat Protection and Cloud Security: 3 Day WorkshopNetwoven
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Improve your security posture with a Microsoft Threat Protection Assessment Workshop
58 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Enhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
59 out of 60
Microsoft 365/Azure Cloud Secure 5 Day AssessmentDynTek Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
DynTek’s Cloud Secure Program helps you protect your Microsoft 365 and Azure infrastructure.
60 out of 60
  • Vorige
  • 6
  • 7
  • 8
  • 9
  • 10
  • Volgende
Over Marketplace
  • Waarom Microsoft Marketplace
  • Blogs
  • Verhalen van klanten
Voor klanten
  • Kantooruren
  • Handleiding `Aan de slag´
  • Technische documentatie
  • Persoonlijke aanbiedingen
  • Microsoft Azure-verbruikstoezegging
  • Facturering en rekeningen
Voor partners
  • Een partner worden
  • Geef u op
  • Marketingondersteuning krijgen
  • Technische documentatie
  • Stapsgewijze instructies om te bouwen, publiceren en verkopen
  • In aanmerking komen voor collectieve verkoop
  • Marketplace-community voor partners
  • Door kanalen geleide Marketplace-verkoop
  • Privéaanbiedingen voor meerdere partijen voor kanaalpartners
Zakelijk
  • Microsoft AI
  • Microsoft Beveiliging
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Midden- en kleinbedrijf
Bedrijf
  • Vacatures
  • Over Microsoft
  • Bedrijfsnieuws
  • Privacy bij Microsoft
  • Investeerders
  • Duurzaamheid
Nederlands (België) Pictogram Uw privacykeuzes afmelden Uw Californië privacykeuzes Privacy van consumentenstatus
  • Siteoverzicht
  • Contact opnemen
  • Privacy en cookies
  • Gebruiksvoorwaarden
  • Handelsmerken
  • Over onze advertenties
  • Cookies beheren
  • © Microsoft 2026