Przekaż swoją opinię
Pomoc i obsługa techniczna
Zapisane elementy
Plany prywatne
Zaczekaj chwilę, trwa logowanie...
FiltryWyczyść wszystko

  • Twoja lokalizacja
  • Produkty (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Zarządzanie wdrażaniem i zmianami
      • Nawiązywanie połączeń z usługą Microsoft Teams
      • Zabezpieczenia chmury
      • Usługi doradcze w zakresie zgodności
      • Wdrażanie urządzeń i zarządzanie nimi
      • Pracownicy pierwszego kontaktu
      • Zarządzanie dostępem i tożsamościami
      • Ochrona informacji i ład
      • Ryzyko wewnętrzne
      • Wiedza i szczegółowe informacje
      • Sale konferencyjne w usłudze Microsoft Teams
      • Spotkania w usłudze Microsoft Teams
      • Microsoft 365 Live Events
      • Zarządzanie urządzeniami przenośnymi
      • Power Platform for Teams
      • Rozwiązania niestandardowe dla usługi Teams
      • Wdrażanie pracy zespołowej
      • Ochrona przed zagrożeniami
      • Workplace Analytics
    • Power Platform
  • Branże
  • Typ usługi
  • Model cen

Wyniki: Professional Services

Pokazywanie wyników w professional services.
Widok powiązane wyniki w: chmury branżowe.
Security Foundations Email: Assessment and ImplementationProServeIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
1 out of 60
Managed IT Services for DentalOlive + Goose
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Comprehensive managed IT services for dental offices, ensuring security, compliance, and continuity.
2 out of 60
Data Security & Threat Protection WorkshopITVT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Identify data security risks in your organizational data​ & discover vulnerabilities in your environment
3 out of 60
Threat Protection EngagementFIS Managed IT Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
4 out of 60
Threatscape Microsoft SME Professional ServicesTHREATSCAPE SECURITY SOLUTIONS LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Professional service days for SME to engage with client to deploy Microsoft 365 security solutions delivering compliant and best practice deployments
5 out of 60
Trustwave Accelerator for Microsoft Entra IDTrustwave Holdings, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Entra ID to unlock full value for your organization
6 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
7 out of 60
Managed Support for Microsoft Defender and Endpoint Detection and Response (EDR) ServiceOlive + Goose
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
A fully managed Microsoft Defender + EDR service designed to protect your organization from today’s most persistent cyber threats.
8 out of 60
Modern Endpoint Design and Planning WorkshopKraft Kennedy
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Kraft Kennedy will conduct a Modern Endpoint Design and Planning Workshop to review and discuss both your current management and deployment processes as well as plans for the future-state environment.
9 out of 60
Threat Protection EngagementTierPoint
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
10 out of 60
Microsoft 365 Copilot Readiness Assessment - CRATechPlus Talent
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Through this engagement customers will understand the gaps around security , governance and best practices in their Microsoft 365 environment before implementing Microsoft 365 Copilot
11 out of 60
Zero Trust Assessment: 3-Week WorkshopAccountabilIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Our Microsoft Zero Trust Assessment: 3-Week Workshop is designed to evaluate an organization's security posture and provide guidance on implementing a Zero Trust security model.
12 out of 60
Secure and Maximize Your Microsoft 365 Tenant with Manage & ProtectAll Covered, a division of Konica Minolta
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft 365 tenant management to provide you with continuous security & compliance, enhanced administration, and actionable insights.
13 out of 60
Centric Threat Protection EngagementCentric Consulting, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Learn how to put next-generation Microsoft Security tools to work for you
14 out of 60
Exchange Online MigrationDataVox
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Management
Migrating emails to Office 365 includes assessing the environment, choosing a method (Cutover, Staged, Hybrid, or IMAP), migrating data, updating DNS, configuring devices, and user training.
15 out of 60
Security Best Practices AssessmentTechNet UC LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Our assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
16 out of 60
Comprehensive Exchange Online Security ConfigurationTechNet UC LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Unmatched Security and Compliance for Your Exchange Online Environment
17 out of 60
Data Security implementation for generative AI: 8-Wk ImpConterra
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Help your organization to govern, monitor, and secure the use of generative AI tools like Copilot, ChatGPT, or custom GPT applications
18 out of 60
KK_Exchange_Migration Consulting ServicesKraft Kennedy
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Moving to Exchange Online significantly extends the use of Microsoft 365 by modernizing communication infrastructure, enhancing security, and unlocking integrated productivity features.
19 out of 60
CMMC Secure Enclave with User TrainingPlanet Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A secure collaboration enclave for CMMC L2 requirements built on Microsoft 365 GCCH and Azure Gov and including User Training.
20 out of 60
impelSecure Modern SecOps Engagement: Free 4-week workshopimpeltec Pty Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Gain visibility into threats to your Microsoft 365 and Azure clouds and on-premises environments across email, identity, endpoints, and third-party data
21 out of 60
Managed Services ProviderSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
SkyTerra delivers seamless integration with your existing Microsoft ecosystem, from Azure infrastructure to Microsoft 365 productivity suites.
22 out of 60
THInc.Ops Managed ServiceTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Premium managed IT service solution that provides a higher quality of service supporting your staff and stronger protection against cyberattacks.
23 out of 60
THInc Secure Managed Security Service for MicrosoftTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
24 out of 60
Google Workspace to Microsoft 365 MigrationDataVox
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
DataVox offers migration services for your company from Google Workspace to Microsoft 365
25 out of 60
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
SkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
26 out of 60
Modern SecOps Envisioning WorkshopPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This engagement is for security teams and IT leaders seeking to boost threat detection with experience in Microsoft Sentinel and Defender XDR, automating operations and mitigating cyber risks.
27 out of 60
DSPM for AI - Free 2-Hour AssessmentNetwoven Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To help enterprises identify blind spots in Microsoft 365's AI data security, assess DSPM maturity, and establish a governance-first approach to safely accelerate AI innovation with Microsoft Purview.
28 out of 60
Data Security with Microsoft Purview SolutionsBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Enhance data security control and accountability by discovering, classifying, and preventing data loss using Microsoft Purview Solutions for both structured cloud and unstructured workplace data
29 out of 60
SkyTerra's Cloud Security AssessmentSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Strengthen Microsoft cloud security with a structured assessment, an actionable roadmap, and enablement your team can run with
30 out of 60
InTune AssessmentSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
SkyTerra helps you configure and align Intune to meet your real business needs, across platforms, policies, and people.
31 out of 60
Unified Identity & Secure Edge Modernization with Entra SuiteBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Modernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
32 out of 60
Okta to Microsoft Entra ID ConversionSkyTerra Technologies LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Consolidate identity on Microsoft Entra ID, reduce cost and complexity, and raise your security baseline without disrupting your users.
33 out of 60
Redapt Data Security EngagementRedapt, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Safeguard Your Enterprise Data with Confidence
34 out of 60
Threat Protection Envisioning Engagement SentinelSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Organizations today are managing a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Get help achieving your broader security objectives.
35 out of 60
Modern SecOps Envisioning WorkshopTierPoint
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Unlock unmatched security with TierPoint’s Microsoft cloud-native security solutions with our Modern SecOps Envisioning Workshop
36 out of 60
Secure Your Future: Cybersecurity PathwaysReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Discover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
37 out of 60
Microsoft Security AssessmentDataVox
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This assessment provides a comprehensive review of the Microsoft 365 environment, focusing on configuration, security posture, identity management, and data governance.
38 out of 60
Microsoft Security ImplementationDataVox
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Implement the best Microsoft security practices throughout the customer environment by implementing Defender for Office 365 to Entra ID P1, Entra ID P2, and Entra ID Suite feature deployments.
39 out of 60
Microsoft 365 Modern Endpoint Service Powered by IntuneAll Covered, a division of Konica Minolta
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Microsoft 365 Modern Endpoint is a cloud-native, fully managed service powered by Microsoft Intune. It is designed to simplify endpoint hardening, configuration, and application management.
40 out of 60
Zero Trust Deployment and Optimization ServiceSoftchoice
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Deploy zero trust with confidence, optimize it to deliver lasting outcomes.
41 out of 60
Security AssessmentSoteria, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Gain deep insights into your Secure Score, user and device health, application vulnerabilities, and data security with our security assessment.
42 out of 60
Copilot and AI Readiness AssessmentCloudServus
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Run an AI Readiness Assessment to pinpoint gaps using Copilot adoption; align next steps to Copilot & Agents at Work.
43 out of 60
Microsoft Purview QuickStart: ImplementationKraft Kennedy
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Kraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
44 out of 60
Mergers & Acquisitions Integration Services in 90: Three (3) Month TransitionLong View Systems
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Support a seamless user experience and align business operations from Day One of any merger, acquisition, or system migration.
45 out of 60
Microsoft 365 Copilot Readiness Assessment (Security, Data, Governance)BlueAlly Technology Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Assess your Microsoft 365 environment for secure Copilot adoption. Identify risks from oversharing, legacy auth, and data gaps, and get a roadmap to strengthen security and compliance readiness.
46 out of 60
Data Pros AMG - Copilot Readiness AssessmentData Pros
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Empowering SMBs to confidently begin their AI journey with a tailored Microsoft Copilot readiness assessment.
47 out of 60
Microsoft 365 Security Best PracticesTechNet UC LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure your Microsoft 365 environment by aligning with Microsoft’s latest security standards—enhancing threat protection, data governance, and compliance across Exchange, Teams, and SharePoint.
48 out of 60
AI-Powered Zero Trust Identity Workshop for Microsoft 365Netwoven Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Strengthen Zero Trust security by optimizing Microsoft 365 identity and access controls.
49 out of 60
Free Data Security & Threat Protection Immersion BriefingIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Discover how to strengthen your Microsoft 365 environment with real-time insights, proactive threat detection, and intelligent data protection — guided by certified experts from IT Partner LLC.
50 out of 60
Microsoft 365 Health & Security DiagnosticPSM Partners
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Achieve stronger security, reduce costs, and simplify management with a targeted assessment built on best practices to maximize your Microsoft 365 investment.
51 out of 60
Secure AI Quickstart: 3-week Assessment and Proof of ConceptQuisitive
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Secure AI Quick Start is a fundable, Microsoft-aligned security engagement that rapidly analyzes organizational AI readiness and identifies critical security & governance improvements
52 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
53 out of 60
神州数码安全解决方案神州数码(中国)有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Empower organizations with end-to-end cloud security, zero trust architecture, and compliance using Microsoft technologies for robust protection and management.
54 out of 60
Zoho CRM and OneDrive for Business IntegrationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
Securely link OneDrive documents to Zoho CRM records to ensure sales teams always access the latest approved assets with automated version control and alerts.
55 out of 60
T-Mobile USA Implementation of Microsoft 365T-Mobile USA, Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-cloud-security product iconCloud Security
Certified Cloud Professional Services from T-Mobile offers an extension of your IT capabilities that provides technical support from end-to-end
56 out of 60
Microsoft 365 Security AssessmentTechPlus Talent
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
This Microsoft 365 Security Assessment evaluates your entire Microsoft 365 environment to identify security gaps and misconfigurations, delivering risk-rated findings and prioritized recommendations.
57 out of 60
Inspira Microsoft Threat Protection Envisioning WorkshopInspira Enterprise Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
58 out of 60
Inspira Microsoft Data Security Envisioning WorkshopInspira Enterprise Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Identify data security risks in your organizational data
59 out of 60
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
60 out of 60
  • Wstecz
  • 8
  • 9
  • 10
  • 11
  • 12
  • Dalej
Informacje o witrynie Marketplace
  • Dlaczego witryna Microsoft Marketplace
  • Blogi
  • Historie klientów
Dla klientów
  • Godziny pracy
  • Przewodnik Wprowadzenie
  • Dokumentacja techniczna
  • Oferty prywatne
  • Microsoft Azure Consumption Commitment
  • Rozliczenia i fakturowanie
Dla partnerów
  • Zostań partnerem
  • Umieść swoją firmę na liście
  • Uzyskaj pomoc techniczną w zakresie marketingu
  • Dokumentacja techniczna
  • Wskazówki krok po kroku dotyczące tworzenia, publikowania i sprzedawania
  • Zostań uprawnionym do wspólnej sprzedaży
  • Społeczność witryny Marketplace dla partnerów
  • Sprzedaż w witrynie Marketplace kierowana przez kanał
  • Wielopartyjne oferty prywatne dla partnerów kanałów
Dla firm
  • Microsoft AI
  • Rozwiązania zabezpieczające firmy Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Firma
  • Praca
  • Informacje o firmie Microsoft
  • Aktualności
  • Ochrona prywatności
  • Inwestorzy
  • Zrównoważony rozwój
Polski (Polska) Ikona rezygnacji z opcji prywatności Twoje opcje wyboru dotyczące prywatności Zasady prywatności dotyczące zdrowia użytkowników
  • Mapa witryny
  • Skontaktuj się z nami
  • Prywatność & Pliki cookie
  • Warunki użytkowania
  • Znaki towarowe
  • Informacje o naszych reklamach
  • Zarządzaj plikami cookie
  • © Microsoft 2026