Оставить отзыв
Справка и поддержка
Сохраненные элементы
Частные планы
Подождите, выполняется вход в систему…
ФильтрыОчистить все

  • Ваше местоположение
  • Продукты (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Управление внедрением и изменениями
      • Звонки в Microsoft Teams
      • Защита облака
      • Консультационные услуги по соответствию требованиям
      • Развертывание устройств и управление ими
      • Сотрудники первой линии
      • Управление идентификацией и доступом
      • Контроль и защита информации
      • Внутренний риск
      • Знания и аналитика
      • Конференц-залы в Microsoft Teams
      • Собрания в Microsoft Teams
      • Microsoft 365 Live Events
      • Управление мобильным устройством
      • Power Platform for Teams
      • Пользовательские решения в Teams
      • Развертывание для совместной работы
      • Защита от угроз
      • Рабочая аналитика
    • Power Platform
  • Отрасли
  • Тип службы
  • Ценовая модель

Результаты: Professional Services

Отображение результатов в professional services.
Просмотреть связанных результата в отраслевые облака.
Implementation of Microsoft Defender for EndpointCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW helps you to enhance your security with Implementation of Microsoft Defender for endpoint and working closely with you to successfully create and deploy a complete solution that meets your needs.
1 out of 60
Get AI Ready: 5-Day AssessmentPSM Partners
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
AI brings innovation to your business and ensures a competitive edge in the market. Start your AI journey with governance in Microsoft 365.
2 out of 60
Additional Spam and Email Protection: 3-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Additional protection for organizations experiencing problems with emails.
3 out of 60
Endpoint Security Foundations 50 users: 1-YrRed River Technology LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Endpoint Security Foundations (ESF) combines multiple strategies to secure the Users, Endpoints, and Network Connectivity used to access resources for commercial, government and DoD customers
4 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Establish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
5 out of 60
Microsoft 365 Information Protection 1-day WorkshopGrant Thornton LLP
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Review your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
6 out of 60
Office 365 Encrypted Email - Initial Setup: 1-Day Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost Microsoft 365 security with default encryption. Elevate messaging protection and implement email encryption and rights protection for sensitive data.
7 out of 60
Securing and Hardening Your On-Premises IT Environment: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Enhance on-premises and Microsoft 365 IT security with tailored best practices, leveraging our varied workload expertise for a safer, robust infrastructure.
8 out of 60
Fortis Assessment SOC2Sentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Fortis SOC 2 Assessment focuses on several key areas: Security, Availability, Processing Integrity, Confidentiality, Privacy, IT Security Regulations, and Trust Service Principle Policies
9 out of 60
Fortis IR Active RecoverySentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Reactive IR provides identification, response, and recovery on demand during all phases of an active security incident.
10 out of 60
Fortis IR Readiness AssessmentSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
An in-depth look at your technology platforms to determine if they are capable of withstanding and recovering from a cybersecurity breach.
11 out of 60
Fortis Activerecovery Incident Readiness WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
According to multiple studies, breaches and ransomware have more than doubled in the past year.
12 out of 60
Microsoft Cybersecurity: 1 Month AssessmentBig Cloud Consultants
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Our expert team will work with you to assess your current security posture and develop recommendations for appropriate improvements.
13 out of 60
Defender Implementation, Tuning, and TestingSecurity Risk Advisors Intl, LLC
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Implement Windows Defender for Endpoint on Windows OS.
14 out of 60
Sentinel Readiness WorkshopSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Sentinel offers a concise Health Workshop assessing your investments. This Q&A-style session, taking under an hour, explores optimization and consolidation to boost productivity and cut costs.
15 out of 60
Windows 365 PilotCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With the Windows 365 Pilot helps organizations' IT to scale their end-user's access to data, settings and applications, increasing overall work performance.
16 out of 60
Intune for Endpoint Management - Discovery ConsultationCBTS Technology Solutions LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Learn from CBTS how to utilize Microsoft Intune for Endpoint Management & Security in this free discovery consultation.
17 out of 60
MXDR ConsultationCBTS Technology Solutions LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CBTS Threat Protection with MXDR combines the advanced power of Extended Detection and Response (XDR) technology with our proactive management & advanced AIOps capabilities to counter cyber threats.
18 out of 60
Copilot for Security: 3-week Proof of ConceptInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prepare to defend your environment at the speed and scale of AI with Microsoft's Copilot for Security
19 out of 60
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense Global
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you
20 out of 60
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense Global
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Understand your readiness for common security threats.
21 out of 60
Threat Protection Engagement - 4 weeksGrant Thornton LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Improve your Security Posture with Grant Thornton's Threat Protection Engagement
22 out of 60
Microsoft 365 GCC High Migration for CMMC ComplianceSysArc Inc
+2
Applicable to:
m365-sa-teamwork-deployment product iconTeamwork Deploymentm365-sa-threat-protection product iconThreat Protection
We provide a seamless migration to a secure, and compliant Microsoft 365 GCC High environment.
23 out of 60
Managed XDR Service for Microsoft 365 Government Commercial Cloud (GCC) High environmentsSysArc Inc
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Our Managed XDR Service ensures regulatory compliance, and security for your organization’s needs.
24 out of 60
Microsoft Defender XDR AcceleratorThe Tech Mavericks
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
We empower your security team to detect and respond to cyberthreats with expanded visibility, incident-level investigation tools, and built-in automation
25 out of 60
Microsoft Defender XDR AcceleratorAkins IT
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
We empower your security team to detect and respond to cyberthreats with expanded visibility, incident-level investigation tools, and built-in automation.
26 out of 60
Implementation of Microsoft Defender for Cloud AppsCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW's Implementation of Microsoft Defender for Cloud Apps professional services help organizations protect their cloud-based applications and data.
27 out of 60
Implementation of Microsoft Defender for Office 365CDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Implementation of Microsoft Defender for Office 365 addresses the challenge of increasing cybersecurity threats by providing robust security measures to safeguard against phishing and data attacks
28 out of 60
Workshop for Microsoft 365 Threat ProtectionCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Workshop for Microsoft 365 Threat Protection provides the following objectives to ensure thorough enablement of crucial Microsoft products for a more secure environment.
29 out of 60
Intune Design and Deployment ServicesTrusted Tech Team
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Modernize deployment, configuration and management of your Windows devices while improving your security posture.
30 out of 60
Fixing vulnerabilities based on Defender with ASR Module: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This service provides a comprehensive approach to identifying and fixing vulnerabilities in organization's devices, helping mitigate the risks of cyber-attacks.
31 out of 60
Microsoft Managed Extended Detection & Response (MXDR)ISA Cybersecurity Inc.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Our Managed XDR service provides your environment with the ultimate protection against cyber attacks.
32 out of 60
Threat Protection EngagementONEFACTORY
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
The Threat Protection Engagement helps customers assess their security landscape and address their most pressing security goals and challenges and provides an immersive experience that brings the Micr
33 out of 60
Microsoft 365 Secure Score AssessmentDaymark Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Improve your environment’s security posture using Microsoft Secure Score.
34 out of 60
Microsoft 365 Tenant Security AssessmentDaymark Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Strengthen the Security of Your Microsoft 365 Environment.
35 out of 60
C1st Implementation of Microsoft Defender for EndpointC1st Technologies LLC
+2
Applicable to:
m365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The C1st Microsoft Defender for Endpoint Implementation enhances security by deploying advanced threat protection across all endpoints, configuring licenses, setting up connections, and assigning role
36 out of 60
Security Foundations Data: Assessment and ImplementationProServeIT
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Data security is a foundation protection. We will help you discover your data at risk and place a “geotag” on your valuables.
37 out of 60
Threat Protection EngagementISA Cybersecurity Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you
38 out of 60
Security Foundations Email: Assessment and ImplementationProServeIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect your email credentials. Evaluate your email risks and deploy security controls to mitigate against the most common email-based vulnerabilities and attacks.
39 out of 60
Fortis Business Email Compromise Incident Response JumpstartSentinel Technologies Inc.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Fortis by Sentinel’s Incident Response team will use best efforts, as specified in the Service Level Agreement below, to address a Business Email Compromise incident within your organization.
40 out of 60
Threat Protection EngagementFIS Managed IT Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
41 out of 60
Zero Trust: Microsoft Security BriefingRavanty Tech Consulting, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Learn and Embrace Modern Work Zero Trust Pillars across Identity, Devices, Apps, and Data
42 out of 60
Trustwave Accelerator for Microsoft Defender XDRTrustwave Holdings, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Defender XDR to unlock full value for your organization
43 out of 60
Trustwave Accelerator for Microsoft PurviewTrustwave Holdings, Inc.
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Trustwave experts will help you accelerate adoption, deployment, or optimization of Microsoft Purview to unlock full value for your organization
44 out of 60
Threat Landscape AssessmentProServeIT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Get critical cybersecurity insights with a global visualization of login attempts, dark web scan, & expert recommendations. We help secure your Microsoft 365 environment to protect your business.
45 out of 60
Microsoft Threat Protection EngagementRavanty Tech Consulting, Inc.
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Threat Protection Engagement helps you assess your security landscape, address most pressing security goals and challenges, and provide an immersive experience around Microsoft security capabilities.
46 out of 60
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITED
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
47 out of 60
Threat Protection EngagementTierPoint
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
48 out of 60
Zero Trust Assessment: 3-Week WorkshopAccountabilIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Our Microsoft Zero Trust Assessment: 3-Week Workshop is designed to evaluate an organization's security posture and provide guidance on implementing a Zero Trust security model.
49 out of 60
Secure and Maximize Your Microsoft 365 Tenant with Manage & ProtectAll Covered, a division of Konica Minolta
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft 365 tenant management to provide you with continuous security & compliance, enhanced administration, and actionable insights.
50 out of 60
Security Foundations for Microsoft 365Cyclotron Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure and govern Microsoft 365 with best practices for thread detection, compliance & data protection, identity access, device & app management with Microsoft’s security and governance framework.
51 out of 60
Security Best Practices AssessmentTechNet UC LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Our assessment provides a comprehensive evaluation of your Microsoft security environment, measuring its configuration, compliance, and effectiveness against Microsoft’s latest best practices.
52 out of 60
Armor Defender XDR Foundational AssessmentArmor
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Tailored consulting engagement designed to evaluate your current security environment and establish a baseline for implementing Microsoft Defender XDR.
53 out of 60
THInc.Ops Managed ServiceTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Premium managed IT service solution that provides a higher quality of service supporting your staff and stronger protection against cyberattacks.
54 out of 60
THInc Secure Managed Security Service for MicrosoftTECH HEADS INC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Comprehensive managed security services to protect your business from cyber threats and maximize the value of your Microsoft Investments.
55 out of 60
Microsoft Entra ID Assessment and ImplementationSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
SkyTerra will partner with you to secure, simplify, and scale your identity environment with Microsoft Entra ID (formerly Azure Active Directory)
56 out of 60
DSPM for AI - Free 2-Hour AssessmentNetwoven Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To help enterprises identify blind spots in Microsoft 365's AI data security, assess DSPM maturity, and establish a governance-first approach to safely accelerate AI innovation with Microsoft Purview.
57 out of 60
SkyTerra's Cloud Security AssessmentSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Strengthen Microsoft cloud security with a structured assessment, an actionable roadmap, and enablement your team can run with
58 out of 60
Unified Identity & Secure Edge Modernization with Entra SuiteBDO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Modernize identity and network access with Modern SecOps on a unified platform to enable Zero Trust for employees, customers, and partners across any cloud, app, AI, or resource, from anywhere
59 out of 60
Frontier Firm Transformation - Free 2 Hour AI Security Risk AssessmentNetwoven Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To help businesses securely adopt AI within Microsoft 365, enabling confident use of Copilots and other AI solutions while protecting sensitive data.
60 out of 60
  • Назад
  • 6
  • 7
  • 8
  • 9
  • 10
  • Далее
О Marketplace
  • Причины использования Microsoft Marketplace
  • Блоги
  • Истории клиентов
Для клиентов
  • Рабочее время
  • Руководство по началу работы
  • Техническая документация
  • Частные предложения
  • Обязательство потребления Microsoft Azure
  • Выставление счетов и счетов-фактур
Для партнеров
  • Станьте партнером
  • Включение в список
  • Получить маркетинговую поддержку
  • Техническая документация
  • Пошаговое руководство по созданию, публикации и продаже
  • Получение права на совместную продажу
  • Сообщество Marketplace для партнеров
  • Продажи Marketplace под управлением канала
  • Многосторонние частные предложения для партнеров по сбыту
Для бизнеса
  • ИИ от Майкрософт
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Компания
  • Вакансии
  • О корпорации Майкрософт
  • Новости компании
  • Политика конфиденциальности Майкрософт
  • Инвесторы
  • Экологическая устойчивость
Русский (Россия) Значок отказа для ваших вариантов выбора параметров конфиденциальности Ваши варианты выбора параметров конфиденциальности Конфиденциальность медицинских сведений потребителей
  • Карта сайта
  • Contact Us
  • Конфиденциальность и файлы cookie
  • Условия использования
  • Товарные знаки
  • О нашей рекламе
  • Управление файлами cookie
  • © Microsoft 2026