Оставить отзыв
Справка и поддержка
Сохраненные элементы
Частные планы
Подождите, выполняется вход в систему…
ФильтрыОчистить все

  • Ваше местоположение
  • Продукты (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Управление внедрением и изменениями
      • Звонки в Microsoft Teams
      • Защита облака
      • Консультационные услуги по соответствию требованиям
      • Развертывание устройств и управление ими
      • Сотрудники первой линии
      • Управление идентификацией и доступом
      • Контроль и защита информации
      • Внутренний риск
      • Знания и аналитика
      • Конференц-залы в Microsoft Teams
      • Собрания в Microsoft Teams
      • Microsoft 365 Live Events
      • Управление мобильным устройством
      • Power Platform for Teams
      • Пользовательские решения в Teams
      • Развертывание для совместной работы
      • Защита от угроз
      • Рабочая аналитика
    • Power Platform
  • Отрасли
  • Тип службы
  • Ценовая модель

Результаты: Professional Services

Отображение результатов в professional services.
Просмотреть связанных результата в отраслевые облака.
Microsoft OT/IOT Security : 2-Wks AssessmentWipro Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Identify and assess the risks posture of the IoT/OT environment by performing risk assessment leveraging Azure Defender for IoT service.
1 out of 54
Implementation of Microsoft Security CopilotAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
2 out of 54
Teams & SharePoint Security HardeningAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teams-custom-solutions product iconTeams Custom Solutionsm365-sa-threat-protection product iconThreat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
3 out of 54
AVAProtect 360 - Device Protection and Management Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Leverage Microsoft Intune for tailored security measures, advanced threat detection, and real-time monitoring to safeguard sensitive data, mitigate risks, and ensure compliance.
4 out of 54
IT Infrastructure OptimizationAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
IT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
5 out of 54
Microsoft 365 complete security HardneningAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance. ​
6 out of 54
Microsoft Cloud App Security Threat Detection by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Integrate Microsoft Cloud App Security for tailored threat detection, adaptable protocols, and continuous monitoring. Protect data, mitigate risks, and ensure compliance across your IT infrastructure.
7 out of 54
Threatscape CSI EngagementsTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
8 out of 54
Microsoft 365 Defender Enterprise Deployment: 6-Week ImplementationBlueVoyant
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Manage and Investigate Risk and Threat Protection
9 out of 54
Defender for Office 365 Deployment: 6-Week ImplementationBlueVoyant
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The accelerator eases the transition from traditional email gateway services to fully integrated threat detection email services from Microsoft.
10 out of 54
Implementing Defender for Endpoint & Cloud App SecurityAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure your endpoints and apps with Microsoft Defender for Endpoints and Cloud App Security. Customize policies, detect threats, and monitor in real-time to ensure data safety and compliance. ​
11 out of 54
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
12 out of 54
Microsoft Defender for Endpoints Pilot: ImplementationAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Evaluate Microsoft Defender for Endpoints rapid onboarding, vulnerability insights, expert configuration and SOC-ready playbooks.
13 out of 54
Implementation of Microsoft Defender for Business | Defender for EndpointITX360 (Pvt) Ltd.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Comprehensive endpoint security solution designed to protect devices across multiple platforms from malware, ransomware, phishing, and advanced cyber threats.
14 out of 54
Zero Trust Model - 4h assessmentReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Zero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
15 out of 54
Security Copilot Value AcceleratorAvanade, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Designed to help organizations modernize their security operations and administration by leveraging Gen AI.
16 out of 54
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Get started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
17 out of 54
Microsoft Security Solutions - 4 Week AssessmentProtiviti
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
18 out of 54
Security Architecture Design and Implementation Service上海诺未网络科技有限公司
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
NovaTech security architecture, based on the Zero Trust concept, helps enterprises build information security solutions on Microsoft 365.
19 out of 54
Cyber Security Services 9 days AssessmentAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
20 out of 54
Intelligent Endpoint Protection: 2-week WorkshopNTT DATA Inc.
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
NTT DATA’s Intelligent Endpoint Protection a 2-week workshop series helps determine how Intelligent Endpoint Protection can improve your security posture and protect your org from advance threats.
21 out of 54
Microsoft Cybersecurity Assessment Workshop: 4-WeeksKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Cybersecurity Assessment Workshop: Understand your readiness for common security threats
22 out of 54
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security Kft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and harden Microsoft Security configurations based on industry best practices
23 out of 54
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
24 out of 54
Microsoft Defender for Cloud Apps: 2-Hr WorkshopSlalom Consulting
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
This FREE 2 Hour Workshop will help you learn how Microsoft Defender for Cloud Apps shows the full picture of risks to your environment from SaaS app usage and resources, and gives you control.
25 out of 54
TSG Security Risk AssessmentTechnology Service Group Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Our Security Risk Assessment gives you clarity on your vulnerabilities and practical steps to address them - aligned with your business goals, not security theatre.
26 out of 54
Microsoft Intune: 4-8 Week ImplementationWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our expert team will help you deploy and configure Microsoft Intune, ensuring seamless integration and optimal performance for your organization's needs
27 out of 54
Quadra BluForge Managed XDRQuadrasystems.net (India) P Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Discover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
28 out of 54
Intune Implementation ServiceTHREATSCAPE SECURITY SOLUTIONS LIMITED
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Service is designed to accelerate the deployment and adoption of Microsoft Intune in alignment with Zero Trust principles, security best practice, and business productivity goals.
29 out of 54
Minsait Threath Protection Engagement WorkshopMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Evaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
30 out of 54
Intune Implementation ServiceTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Service is designed to accelerate the deployment/adoption of Intune in alignment with Zero Trust principles, security best practice, and business productivity goals
31 out of 54
Minsait Cyber SmartMDR SOC ServiceMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Servicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
32 out of 54
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
33 out of 54
スマートスタート for Microsoft 365 E5 Security:1ヵ月間での 実装Japan Business Systems, Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft 365 を利用するために必要な ”ID”、”デバイス”、”アプリケーション” を、各種サイバー攻撃から守るセキュリティ製品の実装・運用を短期間で実現する構築サービスです。
34 out of 54
マイクロソフト EDRマネージドサービスPSC Inc.
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-threat-protection product iconThreat Protection
Defender及びDefender for Endpointの運用、監視、調査をサービス化しました。構築から運用までワンストップで提供します。
35 out of 54
SCCloud 365:3ヶ月の実装SOFTCREATE CORP.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
「安心安全の最新セキュリティ」と「生産性を劇的に高めるコミュニケーション」をAll in Oneで実現するサービスです。
36 out of 54
リスクアセスメントサービス:3ヶ月 評価Japan Business Systems, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
セキュリティリスクを網羅的にチェックし、サイバー攻撃や内部不正などにより攻撃されるリスクポイントを洗い出します。 洗い出されたリスクを解決するために、最新のセキュリティ事情を踏まえながらお客さまのシステム環境を考慮した最適なMicrosoftソリューション等の実行対策案を提示します。
37 out of 54
Managed SOAR:最短12か月の実装NTTコミュニケーションズ(株)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Microsoft 365のセキュリティ機能を活用したNTTCommnicationsのセキュリティ対策・運用サービスに関連する共同販売機会を獲得する。 お客様のセキュリティ運用に関する双方の販売機会にて共同提案を実施する。
38 out of 54
Microsoft Defender for Endpoint導入支援JBサービス株式会社
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint導入支援サービスは、セキュリティの向上とエンドポイントデバイスの保護を強化の実現を支援致します。
39 out of 54
マネージドバックアップ for Microsoft 365:2週間の実装Japan Business Systems, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
大切な業務データを手軽に保管!Microsoft 365 テナント内に保存したデータのバックアップ、リストア設定や日常のバックアップ運用、問い合わせサポートを行います。
40 out of 54
ActSecure クラウドメールセキュリティサービス: 12-Months 実装日本電気株式会社
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
ActSecure クラウドメールセキュリティサービスは、お客様がご利用中のMicrosoft 365などのクラウドメールサービスのセキュリティ強化対策として、標的型メール攻撃検知、メール誤送信防止、添付ファイル自動暗号化などのセキュリティ機能を一元的にクラウドサービスとして提供し、お客様メール環境のセキュリティ対策と運用リソース不足の解消を実現します。
41 out of 54
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense Global
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you
42 out of 54
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense Global
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Understand your readiness for common security threats.
43 out of 54
ランサムウェア対応支援サービス - ランサムウェア診断 -:2ヶ月 評価Japan Business Systems, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
「ランサムウェア診断」は、ランサムウェア攻撃で狙われやすいマイクロソフトの Active Directory サーバーや各種端末を対象に、攻撃に使われるブルートフォースの観点を加え、攻撃を受けた痕跡や脆弱性になりうる設定の不備などがないかを診断し、攻撃の被害を最小限に抑えることを目的とします。
44 out of 54
ランサムウェア対応支援サービス - ランサムウェア監視 -:2ヶ月 実装Japan Business Systems, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
「ランサムウェア監視」は、 JBS とセキュリティ専門ベンダーであるS&J株式会社(以下、S&J)との協業により提供するランサムウェアに特化したセキュリ ティ監視です。攻撃者はクライアント端末と Active Directory を中心に狙ってくるため、セキュリティアナリストがランサムウェア攻撃に繋がる不審なロ グを監視し、被害を未然に防ぐための対処および、最小限に抑えるための支援を行います。
45 out of 54
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITED
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
46 out of 54
中堅企業向け‗セキュリティ4_エンドポイントセキュリティJapan Business Systems, Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
JBS は中堅企業のお客さま固有のニーズに対応した、包括的なソリューション群を用意しました。 デジタル活用や変革が停滞してしまっている方、ご相談をお待ちしています。
47 out of 54
中堅企業向け‗生産性向上3_Microsoft 365 データ保管Japan Business Systems, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
JBS は中堅企業のお客さま固有のニーズに対応した、包括的なソリューション群を用意しました。 デジタル活用や変革が停滞してしまっている方、ご相談をお待ちしています。
48 out of 54
Skysecure Realize Zero Trust BlueprintSkysecure Technologies Pvt. Ltd.
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Accelerate Microsoft Zero Trust adoption with Skysecure’s AI-driven framework that unifies identity, data, device, and threat protection across Microsoft 365 and Microsoft Azure.
49 out of 54
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
50 out of 54
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
51 out of 54
Microsoft 365 セキュリティ: 3週間のアセスメントPERSOL CROSS TECHNOLOGY CO., LTD.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
お客様がご利用中の Office 365 または Microsoft 365 環境のセキュリティリスクを可視化し、脅威の状況説明とその対策をレポートします。
52 out of 54
Microsoft Defender for Endpoint 監視サービス:1ヶ月間での実装SOFTCREATE CORP.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpointで可視化された脅威に対して、24 時間 365 日、専門家によってサイバー攻撃を監視、脅威を特定し、影響度の高い脅威に対して端末の隔離 (対処) を行うことで、被害の拡大を防止します。
53 out of 54
Defender for Endpoint 運用サービス:4週間の実装日商エレクトロニクス
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
お客様のDefender for Endpointのテナントを弊社セキュリティエンジニアが代行して24時間365日体制で監視・運用するマネージドサービスです。インシデント発生時にはエンドポイントの隔離から脅威除去、回復の支援を行い、セキュアなエンドポイント環境を実現します。カスタムルールなど4週間で実装し、その後運用代行します。最低利用期間は12ヶ月です。
54 out of 54
  • Назад
  • 1
  • 2
  • 3
О Marketplace
  • Причины использования Microsoft Marketplace
  • Блоги
  • Истории клиентов
Для клиентов
  • Рабочее время
  • Руководство по началу работы
  • Техническая документация
  • Частные предложения
  • Обязательство потребления Microsoft Azure
  • Выставление счетов и счетов-фактур
Для партнеров
  • Станьте партнером
  • Включение в список
  • Получить маркетинговую поддержку
  • Техническая документация
  • Пошаговое руководство по созданию, публикации и продаже
  • Получение права на совместную продажу
  • Сообщество Marketplace для партнеров
  • Продажи Marketplace под управлением канала
  • Многосторонние частные предложения для партнеров по сбыту
Для бизнеса
  • ИИ от Майкрософт
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Компания
  • Вакансии
  • О корпорации Майкрософт
  • Новости компании
  • Политика конфиденциальности Майкрософт
  • Инвесторы
  • Экологическая устойчивость
Русский (Россия) Значок отказа для ваших вариантов выбора параметров конфиденциальности Ваши варианты выбора параметров конфиденциальности Конфиденциальность медицинских сведений потребителей
  • Карта сайта
  • Contact Us
  • Конфиденциальность и файлы cookie
  • Условия использования
  • Товарные знаки
  • О нашей рекламе
  • Управление файлами cookie
  • © Microsoft 2026