Przekaż swoją opinię
Pomoc i obsługa techniczna
Zapisane elementy
Plany prywatne
Zaczekaj chwilę, trwa logowanie...
FiltryWyczyść wszystko

  • Twoja lokalizacja
  • Produkty (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Zarządzanie wdrażaniem i zmianami
      • Nawiązywanie połączeń z usługą Microsoft Teams
      • Zabezpieczenia chmury
      • Usługi doradcze w zakresie zgodności
      • Wdrażanie urządzeń i zarządzanie nimi
      • Pracownicy pierwszego kontaktu
      • Zarządzanie dostępem i tożsamościami
      • Ochrona informacji i ład
      • Ryzyko wewnętrzne
      • Wiedza i szczegółowe informacje
      • Sale konferencyjne w usłudze Microsoft Teams
      • Spotkania w usłudze Microsoft Teams
      • Microsoft 365 Live Events
      • Zarządzanie urządzeniami przenośnymi
      • Power Platform for Teams
      • Rozwiązania niestandardowe dla usługi Teams
      • Wdrażanie pracy zespołowej
      • Ochrona przed zagrożeniami
      • Workplace Analytics
    • Power Platform
  • Branże
  • Typ usługi
  • Model cen

Wyniki: Professional Services

Pokazywanie wyników w professional services.
Data Security Engagement with Microsoft PurviewInviso Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our Data Security engagement will look over your data estate and establish areas of Security Risk. We will show you the benefits to Microsoft Purview to help protect your environment from risks.
1 out of 60
Microsoft 365 Secure Score AssessmentDaymark Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Improve your environment’s security posture using Microsoft Secure Score.
2 out of 60
Licensing Optimization: 1-Wk WorkshopeGroup Enabling Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-cloud-security product iconCloud Security
Gain confidence in your level of control with your Microsoft 365 licensing.
3 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Servicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
4 out of 60
Avanade Cybersecurity Services Global offerings FY23Avanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our security services provide a holistic approach through advisory,implementation & managed services
5 out of 60
Enable Data Leak Prevention: 5-Day Configure and Enable DLP PoliciesIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protect your organization from data leaks, block the transfer of confidential information, use our tool for monitoring your daily work of employees to find security weaknesses before the incident.
6 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
7 out of 60
Cybersecurity: Protect Your Operations with Henson GroupThe Henson Group
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Henson Group’s cybersecurity ensures comprehensive protection with advanced threat detection, tailored strategies, and rapid response, keeping your enterprise secure and resilient.
8 out of 60
Zero Trust as a Service (ZTaaS)Aegis Innovators
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Digital transformation and adopting AI starts with building a secure foundation.
9 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Service used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
10 out of 60
XENSHIELD365 - Managed Detection and Response (MDR)Xencia Technology Solutions Pvt Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
24x7 Managed Security Operations SoC through shared team of Security experts Defender XDR
11 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeksPlain Concepts
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
The objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
12 out of 60
Cloud App Security Information and Threat Protection: 3-Wk Professional serviceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
13 out of 60
Tenant to Tenant Migration for AAD, EXO and OD4B Services Only: 1-Week ImplementationIT Partner LLC
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Security
Microsoft 365 Tenant-to-Tenant Migration Including Azure AD, Exchange Online and OneDrive for Business services and data
14 out of 60
Microsoft 365 Backup Readiness AssessmentABTechnologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Evaluate your Microsoft 365 backup posture and uncover risks to your critical business data.
15 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Establish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
16 out of 60
Cloud-Native Migration Service: 4-Month ImplementationCyclotron Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
17 out of 60
Threat Protection Engagement FY25The Tech Mavericks
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
18 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
19 out of 60
Communication Security Quick Start 12-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft Defender for Office production pilot, which provides solutions for the detection, investigation, and mitigation of risks associated with messaging and collaboration behavior in Office.
20 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
21 out of 60
MicroAge ManageWise Microsoft 365 Assessment & ServicesMicroAge
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
Comprehensive assessment of our clients Microsoft 365 tenant providing an Executive summary detailed report to reduce vulnerabilities improving Secure Score with 40 hours of Engineer time
22 out of 60
Dynapt Advisory Services for Microsoft 365 Copilot 3 Week WorkshopDynapt Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
Unleash the potential of AI to transform your business operations with Microsoft 365 Copilot.
23 out of 60
Security Audit and Recommendations: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Goal: help organizations review their security settings, configurations, and policies to identify any potential vulnerabilities and ensure that the tenant is properly secured against external threats.
24 out of 60
Cyderes Managed Security Services for Microsoft SentinelCyderes
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Cyderes designed our industry-leading MDR for Sentinel/E5 to be deployed quickly and effectively, immediately impacting your overall security posture by improving your overall SOC maturity.
25 out of 60
TS As a Services (TSaaS): 5-day ImplementationE-Level Cloud Services S.A. de C.V.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Manage and minimize the compromise risks of modern threat information, devices, and users, having a specialist area that gives business peace of mind.
26 out of 60
CSE Security Baseline 3 days implementationComputer Solutions East
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
3 day security baseline implementation program is designed to improve your cyber security posture, Secure your user devices and application & identify risks by industry leading partner, trainer, and t
27 out of 60
Hybrid Office 365 Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Hybrid migration integrates on-premises Exchange with Microsoft 365, facilitating migration or serving as a permanent state for both organizations.
28 out of 60
MDR WorkshopGrant Thornton LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Maximize Your Security Posture with Grant Thornton's MDR Program Assessment
29 out of 60
Manage Compliance Obligations & Risks with Microsoft PurviewBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Enhance data security by streamlining compliance operations and managing regulatory requirements across your organization and third-party services with Microsoft Purview
30 out of 60
Deploy Microsoft Intune for Mobile Device ManagementDaymark Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Optimize Mobile Device Management and Security with Microsoft Intune.
31 out of 60
Cybersecurity AssessmentCDI LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
32 out of 60
Defend Against Threats with SIEM Plus XDR WorkshopThe Tech Mavericks
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The Defend Against Threats with SIEM Plus XDR Workshop will help you achieve broader security objectives—and identify current and real threats.
33 out of 60
Management Services: 3-month AssessmentQuisitive
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Quisitive Management Services is a range of expert-led cloud subscription services to monitor, remediate and deliver strategic recommendations to optimize your environment across Microsoft platforms.
34 out of 60
Advanced Threat Analytics: 7-Day InstallationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Advanced Threat Analytics (ATA) is a complex system that allows you to protect your IT infrastructure from a variety of information threats and cyberattacks.
35 out of 60
Identity WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Leave passwords in the past with Sentinel's Identity Workshop. Modern authentication technologies easily remove the risk of passwords.
36 out of 60
Microsoft 365: 2-Week ImplementationTechnologent
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Expert 365 migration services for every size business. Take advantage of everything 365 has to offer quickly and with guidance from seasoned professionals.
37 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day WorkshopeGroup Enabling Technologies, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
With Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
38 out of 60
Cloud Security Assessment - 2 Week Assessment and RoadmapCloudServus
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Gain insight into your current cloud security posture leveraging Microsoft and proprietary tools to provide a roadmap to improvement.
39 out of 60
Office 365 Migration 3-Month ImplementationRKON TECHNOLOGIES
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-teamwork-deployment product iconTeamwork Deployment
Leverage RKON's consulting expertise for a smooth and seamless migration to Microsoft's Office 365 suite of products including SharePoint, OneDrive, and Teams
40 out of 60
Microsoft 365 Security CrashCouse with Zero Trust Assessment - 2 Week ProjectVirteva LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Get a deep dive into the security features within Microsoft 365, along with a comprehensive assessment of your Zero Trust attainment level, including recommendations to get to an optimal state.
41 out of 60
Office 365/Azure Cloud Foundation Assessment: 4-Wk EngagementCloudScale International
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
This assessment will provide guidance and pricing regarding migration/consolidation of Office 365 and Azure Cloud environments
42 out of 60
cyber security threat analysis workshopU-BTech Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
the workshop is design to discover threats and risks
43 out of 60
Microsoft Sentinel Quick StartEdgile, Inc.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Production pilot, which is expected to provide centralized log collection, detection of previously undetected threats, investigation with artificial intelligence, and Rapid Response to incidents.
44 out of 60
Endpoint Security Basic Quick Start 12-wk ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Achieve a Microsoft pilot and production rollout of Microsoft’s enterprise endpoint security platform that is designed to help enterprises prevent, detect, investigate, and respond to advanced threats
45 out of 60
Hybrid Identity Security Quick Start 12-wk ImplementationEdgile, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
This offering achieves an MDI non-production pilot to illuminate the identity threat environment within the enterprise and joins the response capabilities with the Azure security cloud.
46 out of 60
Virteva Microsoft 365 Defender Ready DeployVirteva LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get immediate value and significant security enhancement at your organization through Virteva's Ready Deploy, which enables hands-on deployment of the Defender suite's primary services.
47 out of 60
Protect and Govern Sensitive Data: 3 Day WorkshopCGI Inc.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Help customers understand, manage, and mitigate hidden privacy and regulatory risks within their own environment.
48 out of 60
Defender for Endpoint and Defender for Server DeploymentCISILION LTD
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint - Design, proof of concept and wider deployment inclusive of configuration, testing and handover.
49 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
50 out of 60
MXDR Shield: 4-Wk ImplementationLong View Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive and straight-forward security services leveraging leading Partners and Technologies
51 out of 60
Microsoft Defender for End Points JumpstartSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
52 out of 60
Microsoft Defender for Office JumpstartSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Office 365 safeguards your organization against malicious threats posed by email messages, links (URLs), and collaboration tools.
53 out of 60
Cloud Protection for AIKiZAN Technologies
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Protect Cloud Environments leveraging Microsoft Secure Scores and other Microsoft Products to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigat
54 out of 60
Exchange Online Migration: 6-Week DeploymentCyclotron Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Exchange Online connects email and calendar clients like, Outlook desktop, Outlook on the web and Outlook mobile app to access email and collaboration functionality.
55 out of 60
Defender PilotLevacloud LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Defender Suite Pilot is designed to give you a clear understanding of the suite's capabilities and how to enhance your security posture.
56 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Shadow IT refers to applications and infrastructure that are managed and utilized without the knowledge of the enterprise's IT department. The assessment uses Microsoft Cloud App Security.
57 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
The primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
58 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Configure and customize transport rules in Microsoft Exchange Online, ensuring efficient email routing, improved security, and compliance for your organization.
59 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
This service moves key server tasks to a new one for upgrades or system changes.
60 out of 60
  • Wstecz
  • 7
  • 8
  • 9
  • 10
  • 11
  • Dalej
Informacje o witrynie Marketplace
  • Dlaczego witryna Microsoft Marketplace
  • Blogi
  • Historie klientów
Dla klientów
  • Godziny pracy
  • Przewodnik Wprowadzenie
  • Dokumentacja techniczna
  • Oferty prywatne
  • Microsoft Azure Consumption Commitment
  • Rozliczenia i fakturowanie
Dla partnerów
  • Zostań partnerem
  • Umieść swoją firmę na liście
  • Uzyskaj pomoc techniczną w zakresie marketingu
  • Dokumentacja techniczna
  • Wskazówki krok po kroku dotyczące tworzenia, publikowania i sprzedawania
  • Zostań uprawnionym do wspólnej sprzedaży
  • Społeczność witryny Marketplace dla partnerów
  • Sprzedaż w witrynie Marketplace kierowana przez kanał
  • Wielopartyjne oferty prywatne dla partnerów kanałów
Dla firm
  • Microsoft AI
  • Rozwiązania zabezpieczające firmy Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Firma
  • Praca
  • Informacje o firmie Microsoft
  • Aktualności
  • Ochrona prywatności
  • Inwestorzy
  • Zrównoważony rozwój
Polski (Polska) Ikona rezygnacji z opcji prywatności Twoje opcje wyboru dotyczące prywatności Zasady prywatności dotyczące zdrowia użytkowników
  • Mapa witryny
  • Skontaktuj się z nami
  • Prywatność & Pliki cookie
  • Warunki użytkowania
  • Znaki towarowe
  • Informacje o naszych reklamach
  • Zarządzaj plikami cookie
  • © Microsoft 2026