Przekaż swoją opinię
Pomoc i obsługa techniczna
Zapisane elementy
Plany prywatne
Zaczekaj chwilę, trwa logowanie...
FiltryWyczyść wszystko

  • Twoja lokalizacja
  • Produkty (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Zarządzanie wdrażaniem i zmianami
      • Nawiązywanie połączeń z usługą Microsoft Teams
      • Zabezpieczenia chmury
      • Usługi doradcze w zakresie zgodności
      • Wdrażanie urządzeń i zarządzanie nimi
      • Pracownicy pierwszego kontaktu
      • Zarządzanie dostępem i tożsamościami
      • Ochrona informacji i ład
      • Ryzyko wewnętrzne
      • Wiedza i szczegółowe informacje
      • Sale konferencyjne w usłudze Microsoft Teams
      • Spotkania w usłudze Microsoft Teams
      • Microsoft 365 Live Events
      • Zarządzanie urządzeniami przenośnymi
      • Power Platform for Teams
      • Rozwiązania niestandardowe dla usługi Teams
      • Wdrażanie pracy zespołowej
      • Ochrona przed zagrożeniami
      • Workplace Analytics
    • Power Platform
  • Branże
  • Typ usługi
  • Model cen

Wyniki: Professional Services

Pokazywanie wyników w professional services.
Widok powiązane wyniki w: chmury branżowe.
CBTS Microsoft 365 Managed ServiceCBTS Technology Solutions LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Partner with CBTS for ongoing management and support of Microsoft 365
1 out of 47
Cybersecurity Incident Response Retainer with Microsoft DefenderCBTS Technology Solutions LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Partner with CBTS to ensure assistance when you need it most during a significant security event.
2 out of 47
Data Security Envisioning WorkshopPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
Identify hidden data risks, assess insider threats, and gain clear, actionable guidance to strengthen security, compliance, and governance with a Microsoft Purview–driven workshop.
3 out of 47
HubSpot and OneDrive for Business IntegrationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
Automatically sync HubSpot with OneDrive for Business to embed secure, always-up-to-date marketing assets and eliminate manual file uploads.
4 out of 47
Data Security WorkshopEmergent Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Security workshop leveraging Microsoft's security products such as Purview to uncover data risks across Microsoft 365, assess exposure, and deliver actionable recommendations for IT leaders.
5 out of 47
S4B_XDR_Recuperacion_Automatica_RecursosS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
6 out of 47
Microsoft 365: 2-Week AssessmentApex Digital Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Establish a clear roadmap and change management plan for your journey to a modern workplace.
7 out of 47
Endpoint Management: 3-Day WorkshopApex Digital Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Begin the steps to manage and protect your devices, your apps, and your users
8 out of 47
Microsoft 365 Identity & Security: 2-Wk AssessmentPSM Partners
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Customized identity and security assessment focused on the Microsoft 365 platform
9 out of 47
Security Assessment: 2-Wk AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
10 out of 47
Threat Protection: 3-Wk POCFPT/Intellinet
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Identify security threats and begin to respond and mitigate.
11 out of 47
Hybrid Identity and Security Expert Consulting ImpRavenswood Technology Group, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Ravenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
12 out of 47
Big Green IT Security Assessment: 3-WeekBig Green IT - Dev
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
13 out of 47
Managed Security for Compliance: 1 yr Mgd ServiceInsight
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
Discover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
14 out of 47
Microsoft 365 License Optimization:1-hr AssessmentFrontier Technology, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Review current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
15 out of 47
Office 365 Security: 1-Day AssessmentNetrix Global
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Security assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
16 out of 47
Defend Against Threats with SIEM Plus XDRNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
17 out of 47
Secure Workspace: 1 Day WorkshopWatserv Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
18 out of 47
Mail Airlift: Exchange Online ImplementationSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our Mail Airlift engagement will get you up and running with Microsoft Exchange online in the fastest, most secure manner.
19 out of 47
Document Airlift-OneDrive ImplementationSynergy Technical, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our Document Airlift will enable and configure your organization’s environment to use OneDrive for Business services in your Office 365 tenant.
20 out of 47
1-Day Security & Identity WorkshopConvergeOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Tailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
21 out of 47
Ransomware Protection: 1 Day-WorkshopConvergeOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
22 out of 47
Windows 365 Quick Start: 4-Day Proof of ConceptSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-firstline-workers product iconFrontline Workers
The Windows 365 Quick Start engagement is designed to give you everything you need to deploy Windows 365. Included are a solution overview, planning services, as well as a proof of concept engagement
23 out of 47
Microsoft 365 Defender Threat Check: 4-wk assessInterlink Cloud Advisors, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
24 out of 47
Office 365 Protection: Design & Pilot 1-Wk POCManaged Solution
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protect Your Employees from External Email Threats with Defender for Office 365 Protection
25 out of 47
Modern Identity Workshop | 4 Weeks | WorkshopEnterprise It Security
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Enable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
26 out of 47
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
27 out of 47
discover-sensitive-data-workshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
28 out of 47
ECF Data Threat Protection: 3-Day WorkshopECF Data LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
29 out of 47
Securing Identities and Access: 3-day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
30 out of 47
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
31 out of 47
Security Assessment: 2 Week AssessmentTallan
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
32 out of 47
Threat Protection and Cloud Security: 3 Day WorkshopNetwoven
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Improve your security posture with a Microsoft Threat Protection Assessment Workshop
33 out of 47
Windows 365 QuickStart : 4 Day PoC + Surface GoSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-firstline-workers product iconFrontline Workers
The Windows 365 Quick Start engagement is designed to show you how Windows 365 + SurfaceGo keeps you productive. Included are a Surface Go, planning services, as well as a proof of concept.engagement
34 out of 47
Security Solutions:2-Weeks ImplementationAlpine Health Technologies Corp
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
35 out of 47
CMMC Compliance: 4 week WorkshopSirius Computer Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The U.S. Department of Defense (DoD) is implementing the Cybersecurity Maturity Model Certification (CMMC) to verify the cybersecurity of its supply chain, our Workshop will help you ensure compliance
36 out of 47
Digital Workplace Foundations: 4-wk AssessmentCatapult Systems, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Catapult’s Digital Workplace Foundations helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tools.
37 out of 47
Microsoft 365 Implementation for Financial ServiceNew Charter Technologies, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Paid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
38 out of 47
Defend Against Threats with SIEM Plus XDR: 8H WorkshopadaQuest
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get help achieving your broader security objectives and identify current and real threats by scheduling a Defend Against Threats with SIEM Plus XDR Workshop.
39 out of 47
Microsoft 365 HIPAA/HITECH 20 Hour ImplementationNew Charter Technologies, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Implementation of Microsoft 365 to include compliance policies and templates for health care.
40 out of 47
Compliance Managed ServicesForsyte IT Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Organizations everywhere are experiencing the benefits of Compliance Managed Services. Work with our Microsoft Gold Partner team to establish governance and manage user access and data security.
41 out of 47
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
42 out of 47
Microsoft Security Assessment: 3-Wk AssessmenteGroup Enabling Technologies, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Analyze your cross platform security posture, with evaluated vulnerabilities and risks identified with a Microsoft Security Assessment.
43 out of 47
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week ImplementationQuisitive
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Quisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
44 out of 47
SMB Cloud Evaluation Program: 2-Wk AssessmentMaureen Data Systems
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Identifying ways to modernize & optimize IT assets, mitigate security risks, and reduce cost & complexity.​ See how the cloud can help, estimated costs, and what to do next. ​
45 out of 47
Microsoft Information Protection Administrator: 3 Days WorkshopNETCOM LEARNING
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Information Protection Administrator course focuses on data governance and information protection within your organization.
46 out of 47
Modern IT: 2 Hour AssessmentModern IT
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Identify areas for business process optimization through Modern IT
47 out of 47
  • Wstecz
  • 8
  • 9
  • 10
  • 11
  • 12
Informacje o witrynie Marketplace
  • Dlaczego witryna Microsoft Marketplace
  • Blogi
  • Historie klientów
Dla klientów
  • Godziny pracy
  • Przewodnik Wprowadzenie
  • Dokumentacja techniczna
  • Oferty prywatne
  • Microsoft Azure Consumption Commitment
  • Rozliczenia i fakturowanie
Dla partnerów
  • Zostań partnerem
  • Umieść swoją firmę na liście
  • Uzyskaj pomoc techniczną w zakresie marketingu
  • Dokumentacja techniczna
  • Wskazówki krok po kroku dotyczące tworzenia, publikowania i sprzedawania
  • Zostań uprawnionym do wspólnej sprzedaży
  • Społeczność witryny Marketplace dla partnerów
  • Sprzedaż w witrynie Marketplace kierowana przez kanał
  • Wielopartyjne oferty prywatne dla partnerów kanałów
Dla firm
  • Microsoft AI
  • Rozwiązania zabezpieczające firmy Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Firma
  • Praca
  • Informacje o firmie Microsoft
  • Aktualności
  • Ochrona prywatności
  • Inwestorzy
  • Zrównoważony rozwój
Polski (Polska) Ikona rezygnacji z opcji prywatności Twoje opcje wyboru dotyczące prywatności Zasady prywatności dotyczące zdrowia użytkowników
  • Mapa witryny
  • Skontaktuj się z nami
  • Prywatność & Pliki cookie
  • Warunki użytkowania
  • Znaki towarowe
  • Informacje o naszych reklamach
  • Zarządzaj plikami cookie
  • © Microsoft 2026