Przekaż swoją opinię
Pomoc i obsługa techniczna
Zapisane elementy
Plany prywatne
Zaczekaj chwilę, trwa logowanie...
FiltryWyczyść wszystko

  • Twoja lokalizacja
  • Produkty (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Zarządzanie wdrażaniem i zmianami
      • Nawiązywanie połączeń z usługą Microsoft Teams
      • Zabezpieczenia chmury
      • Usługi doradcze w zakresie zgodności
      • Wdrażanie urządzeń i zarządzanie nimi
      • Pracownicy pierwszego kontaktu
      • Zarządzanie dostępem i tożsamościami
      • Ochrona informacji i ład
      • Ryzyko wewnętrzne
      • Wiedza i szczegółowe informacje
      • Sale konferencyjne w usłudze Microsoft Teams
      • Spotkania w usłudze Microsoft Teams
      • Microsoft 365 Live Events
      • Zarządzanie urządzeniami przenośnymi
      • Power Platform for Teams
      • Rozwiązania niestandardowe dla usługi Teams
      • Wdrażanie pracy zespołowej
      • Ochrona przed zagrożeniami
      • Workplace Analytics
    • Power Platform
  • Branże
  • Typ usługi
  • Model cen

Wyniki: Professional Services

Pokazywanie wyników w professional services.
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
1 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
2 out of 60
Backups and DR Office 365 in KazakhstanAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Office 365 disaster recovery & backup in Kazakhstan: local backups, automated DR workflows, and data‑sovereignty compliance
3 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Get started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
4 out of 60
Defender for Office 365: 3-Day ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Accelerated Deployment of Microsoft Defender for Office 365 including demonstration and best practice
5 out of 60
Zero Trust Model - 4h assessmentReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Zero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
6 out of 60
Security Architecture Design and Implementation Service上海诺未网络科技有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
7 out of 60
Microsoft 365 Copilot for Executives WorkshopSMART business LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Join our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
8 out of 60
SYSTEX Data Security and Compliance Solution精诚(中国)企业管理有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
通过Microsoft Purview,全面守护企业数据安全/Protect your critical business data with an intelligent, end-to-end solution that combines SYSTEX’s expertise with Microsoft Purview’s advanced security capabilities.
9 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
You may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
10 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
11 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies Services
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Readiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
12 out of 60
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
13 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
14 out of 60
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom Consulting
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
15 out of 60
TSG Security Risk AssessmentTechnology Service Group Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Our Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
16 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
17 out of 60
GDPR Assessment: 6-Week AssessmentHappiest Minds Technologies Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Enable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
18 out of 60
Microsoft 365 Governance: 1 month AssessmentCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Crayon Microsoft 365 Governance Assessment will assess your configuration and build recommendation report
19 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Seamlessly transfer email data and mailboxes between Office 365 tenants during mergers or separations. Ensure continuity for users, minimize disruptions, and enables a smooth transition.
20 out of 60
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security Kft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and harden Microsoft Security configurations based on industry best practices
21 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Advanced endpoint security and threat protection: detect, investigate, and respond to attacks.
22 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
23 out of 60
MIM to Entra: 6-Wk Implementation PlanUNIFY Solutions Pty. Ltd.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
UNIFY Solutions specialises in transitioning MIM solutions to Microsoft Entra.
24 out of 60
ITE ZeroTrust360™Information Technology of Egypt Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
ITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
25 out of 60
Quadra BluForge Managed XDRQuadrasystems.net (India) P Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Discover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
26 out of 60
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
CMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
27 out of 60
Microsoft 365 Migration 12 Hour Proof-of-ConceptNew Charter Technologies, Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Migration of existing files and email to Microsoft 365, including configuration of security and collaboration using Teams and SharePoint
28 out of 60
Cloud Workplace: 8-Months ImplementationRapid Circle
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
The implementation of a cloud workplace gives an organization the opportunity to offer employees a workplace that can be used independently of place and time and with the most modern Microsoft tools.
29 out of 60
AI Agents In CopilotINOVASYS FOR SYSTEMS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Inovasys specialized in digital transformation and Microsoft 365 solutions, presents this comprehensive overview of AI Agents in Copilot.
30 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Boost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
31 out of 60
impelSecure Threat Protection Engagement: Free 4-week workshopimpeltec Pty Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Discover threats and vulnerabilities to your Microsoft cloud and on-premises environments
32 out of 60
Managed Microsoft 365 for Financial Services - Free Consultation: 2-Week ImplementationOptions Technology Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Speak to our experts on how we can elevate your Microsoft 365 deployment with our industry-leading services.
33 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Environment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
34 out of 60
Purview Information Protection: setup and adoptionDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
35 out of 60
impelSecure Data Security Engagement: Free 4-week workshopimpeltec Pty Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Identify data risks and evaluate user behavior for risky activities
36 out of 60
Security - CIS - Microsoft 365Linktech Australia
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Existing Microsoft 365 tenants to assess against CIS Benchmarks and remediate any findings identified within the context of the customers business or business looking at a starting point for ISO 27001
37 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Establish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
38 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prove the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
39 out of 60
Microsoft 365 Backup Readiness AssessmentABTechnologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Evaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
40 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeksPlain Concepts
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
The objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
41 out of 60
Minsait Threath Protection Engagement WorkshopMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Evaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
42 out of 60
"Threat Protection: 3 Day Workshop"Insentra Pty Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
43 out of 60
Microsoft 365 Security Posture 10-days AssessmentFUJITSU
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Secure Microsoft 365 and maximise your investment
44 out of 60
Microsoft Purview Data Loss Prevention: 4-Wk Implementation ServiceUNIFY Solutions Pty. Ltd.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
UNIFY Solutions will implement Microsoft Purview Data Loss Prevention (DLP) to protect your organisation's sensitive information
45 out of 60
Manage Compliance Obligations & Risks with Microsoft PurviewBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Enhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
46 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Servicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
47 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
48 out of 60
M365-Digital Workspace Consulting-2wk AssessmentOrange Business Services - Global
+3
Applicable to:
m365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-cloud-security product iconCloud Securitym365-sa-teams-custom-solutions product iconTeams Custom Solutions
To enhance collaboration work through a complete offer with Microsoft 365 with complete voice capabilities for today's workforce collaboration across multiple locations.
49 out of 60
Cloud Safeguard - 12 Month ImplementationRapid Circle
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our Cloud Safeguard managed security service enables customers to focus on core business and innovation while we keep your Microsoft 365 platforms safe & secure.
50 out of 60
Security - Essential 8 - Microsoft 365Linktech Australia
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Existing Microsoft 365 tenants to assess against Essential 8 and remediate any findings identified within the context of the customers business or business looking at a starting point for ISO 27001
51 out of 60
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
52 out of 60
Copilot Preparation Workshop 1Generation-e Productivity Solutions Pty Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Copilot Preparation Workshop is a crucial step in ensuring your organisation is ready to utilise the full potential of Microsoft 365 Copilot
53 out of 60
Microsoft 365 Secure Score: 2 Week AssessmentInsight
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Align your security priorities with best practice management and protection of your devices, apps and users.
54 out of 60
Identity and Access Management: 4-Wk AssessmentZetta Pty Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Zetta’s Assessment and Optimisation engagement will assess your current identity posture and advise you how to manage and secure your users and access to all your apps.
55 out of 60
Security - Defender for EndpointLinktech Australia
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
A cloud centric approach that symbiotically targets architectural building blocks to alleviate issues and enhance the overall Defender for Endpoint experience for Endpoints being managed remotely
56 out of 60
Zero Trust: 3-Day AssessmentQUORUM SYSTEMS PTY LTD
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The assessment has been designed and scoped to focus on Microsoft 365 or Azure security elements as these relate to inform a robust zero trust strategy.
57 out of 60
Identity - Entra - Azure iDPLinktech Australia
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Consolidate all third party and on-premises applications to use Azure AD as the main identity provider for authentication and access.
58 out of 60
Office 365 Assessment ServiceWaterstons Limited
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Plan, design and implement Office 365 or evaluate and optimise your existing Office 365 investment.
59 out of 60
Windows 365 Hybrid Work Proof of ConceptZetta Pty Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-firstline-workers product iconFrontline Workers
Zetta’s Windows 365 Hybrid Work Proof of Concept will help you identify how Windows 365 can meet your organisation's hybrid work needs.
60 out of 60
  • Wstecz
  • 1
  • 2
  • 3
  • 4
  • 5
  • Dalej
Informacje o witrynie Marketplace
  • Dlaczego witryna Microsoft Marketplace
  • Blogi
  • Historie klientów
Dla klientów
  • Godziny pracy
  • Przewodnik Wprowadzenie
  • Dokumentacja techniczna
  • Oferty prywatne
  • Microsoft Azure Consumption Commitment
  • Rozliczenia i fakturowanie
Dla partnerów
  • Zostań partnerem
  • Umieść swoją firmę na liście
  • Uzyskaj pomoc techniczną w zakresie marketingu
  • Dokumentacja techniczna
  • Wskazówki krok po kroku dotyczące tworzenia, publikowania i sprzedawania
  • Zostań uprawnionym do wspólnej sprzedaży
  • Społeczność witryny Marketplace dla partnerów
  • Sprzedaż w witrynie Marketplace kierowana przez kanał
  • Wielopartyjne oferty prywatne dla partnerów kanałów
Dla firm
  • Microsoft AI
  • Rozwiązania zabezpieczające firmy Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Firma
  • Praca
  • Informacje o firmie Microsoft
  • Aktualności
  • Ochrona prywatności
  • Inwestorzy
  • Zrównoważony rozwój
Polski (Polska) Ikona rezygnacji z opcji prywatności Twoje opcje wyboru dotyczące prywatności Zasady prywatności dotyczące zdrowia użytkowników
  • Mapa witryny
  • Skontaktuj się z nami
  • Prywatność & Pliki cookie
  • Warunki użytkowania
  • Znaki towarowe
  • Informacje o naszych reklamach
  • Zarządzaj plikami cookie
  • © Microsoft 2026