Enviar comentários
Ajuda e suporte
Itens salvos
Planos privados
Aguarde um momento, fazendo login...
FiltrosDesmarcar tudo

  • Seu local
  • Produtos (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Gerenciamento de Alterações e Adoção
      • Chamada via Microsoft Teams
      • Segurança de Nuvem
      • Serviços de Consultoria de Conformidade
      • Implantação e Gerenciamento de Dispositivos
      • Trabalhadores da Linha de Frente
      • Gerenciamento de Identidades e Acesso
      • Governança e Proteção de Informações
      • Risco Interno
      • Conhecimento e Insights
      • Salas de Reuniões no Microsoft Teams
      • Reuniões via Microsoft Teams
      • Microsoft 365 Live Events
      • Gerenciamento de Dispositivo Móvel
      • Power Platform for Teams
      • Soluções Personalizadas do Teams
      • Implantação de Trabalho em Equipe
      • Proteção contra Ameaças
      • Workplace Analytics
    • Power Platform
  • Setores
  • Tipo de serviço
  • Modelo de Preços

Professional Services resultados

Mostrando resultados no professional services
Exibir resultados relacionados em nuvens do setor.
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyant
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
1 out of 23
Implementing Defender for Endpoint & Cloud App SecurityAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance. ​
2 out of 23
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
3 out of 23
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Evaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
4 out of 23
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
5 out of 23
Zero Trust Model - 4h assessmentReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Zero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
6 out of 23
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Get started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
7 out of 23
Security Architecture Design and Implementation Service上海诺未网络科技有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
8 out of 23
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
9 out of 23
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security Kft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and harden Microsoft Security configurations based on industry best practices
10 out of 23
TSG Security Risk AssessmentTechnology Service Group Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Our Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
11 out of 23
Quadra BluForge Managed XDRQuadrasystems.net (India) P Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Discover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
12 out of 23
Intune Implementation ServiceTHREATSCAPE SECURITY SOLUTIONS LIMITED
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Service is designed to accelerate the deployment and adoption of Microsoft Intune in alignment with Zero Trust principles, security best practice, and business productivity goals.
13 out of 23
Minsait Threath Protection Engagement WorkshopMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Evaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
14 out of 23
Intune Implementation ServiceTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Service is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
15 out of 23
Minsait Cyber SmartMDR SOC ServiceMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Servicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
16 out of 23
Microsoft Defender for Endpoint: 2-Wks Proof of ConceptLotus Beta Analytics
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Experience Threat identification, Triage and Automatic Remediation
17 out of 23
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITED
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
18 out of 23
Liquid C2 SECaaS Bundles for SMBsLiquid Telecommunications South Africa (PTY) LTD
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Trusted Cyber Defense for Growing Businesses. Powered by Microsoft Business Premium + Defender & Purview Suites Add-ons
19 out of 23
Liquid C2 Secure360 MDR & MXDRLiquid Telecommunications South Africa (PTY) LTD
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Proactive Threat Detection and Rapid Response—Simplified. Powered by Microsoft Sentinel & Defender
20 out of 23
Cloudmania Security Posture AssessmentsLiquid Telecommunications South Africa (PTY) LTD
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Gain complete visibility and eliminate cloud security blind spots with Cloudmania’s Microsoft Security Posture Assessment
21 out of 23
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
22 out of 23
Liquid C2 Secure360 SOCMonAlertLiquid Telecommunications South Africa (PTY) LTD
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Stay Ahead of Threats with Real-Time SOC Alerts. Powered by Microsoft Sentinel
23 out of 23
  • Anterior
  • 1
  • 2
  • 3
Sobre o Marketplace
  • Por que Microsoft Marketplace
  • Blogs
  • Histórias de clientes
Para clientes
  • Horário comercial
  • Guia de introdução
  • Documentação técnica
  • Ofertas privadas
  • Compromisso de consumo do Microsoft Azure
  • Cobrança e faturamento
Para parceiros
  • Torne-se um parceiro
  • Se inscrever
  • Obter suporte de marketing
  • Documentação técnica
  • Orientação passo a passo para criar, publicar e vender
  • Tornar-se elegível para co-venda
  • Comunidade do Marketplace para Parceiros
  • Vendas do Marketplace lideradas pelo canal
  • Ofertas privadas multiparte para parceiros de canal
Negócios
  • IA da Microsoft
  • Segurança da Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Empresa
  • Carreiras
  • Sobre a Microsoft
  • Notícias da empresa
  • Privacidade na Microsoft
  • Investidores
  • Diversidade e inclusão
  • Acessibilidade
  • Sustentabilidade
Português (Brasil) Ícone de recusa de opções de privacidade Suas opções de privacidade Privacidade dos Dados de Saúde do Consumidor
  • Mapa do site
  • Contact Us
  • Privacidade & Cookies
  • Termos de Uso
  • Marcas comerciais
  • Sobre nossos anúncios
  • Gerenciar cookies
  • © Microsoft 2026

Microsoft do Brasil Importação e Comércio de Software e Vídeo Games Ltda., com sede na cidade de São Paulo, Estado de São Paulo, na Avenida Presidente Juscelino Kubitschek, nº 1.909, conjunto 181, localizado no 18º andar da Torre Sul SP Corporate Towers, Vila Nova Conceição, CEP 04543-907, inscrita no CNPJ sob o nº 04.712.500/0001-07.