Poskytnúť pripomienky
Pomocník a podpora
Uložené položky
Súkromné plány
Moment, prihlasujeme vás...
FiltreVymazať všetko

  • Vaša poloha
  • Produkty (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Spravovanie úprav a zmien
      • Volania v aplikácii Microsoft Teams
      • Cloudové zabezpečenie
      • Poradenské služby pre súlad
      • Nasadenie a správa zariadení
      • Pracovníci prvého kontaktu
      • Správa identít a prístupu
      • Ochrana informácií a riadenie
      • Riziko zvnútra
      • Vedomosti a prehľady
      • Zasadacie miestnosti pre Microsoft Teams
      • Schôdze v aplikácii Microsoft Teams
      • Microsoft 365 Live Events
      • Správa mobilných zariadení
      • Power Platform for Teams
      • Vlastné riešenia pre Teams
      • Tímové nasadenie
      • Ochrana pred bezpečnostnými hrozbami
      • Workplace Analytics
    • Power Platform
  • Odvetvia
  • Typ služby
  • Model oceňovania

Počet výsledkov: Professional Services

Zobrazujú sa výsledky (počet: ) v professional services
Zobraziť Počet súvisiacich príspevkov v priemyselné cloudy: .
Microsoft 365 security: 3 days assessmentOrlox
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
3 day security assessment of the current Microsoft 365 environment
1 out of 54
Proximus Sensitive Data AssessmentPROXIMUS NV/SA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Proximus Sensitive Data Assessment will help you understand how to mitigate and protect against privacy and regulatory risks discovered in your Microsoft 365 environment during the engagement.
2 out of 54
Microsoft Defender for Office 365: 4 days implementationCentric Netherlands b.v.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deploy it to a group of users.
3 out of 54
Microsoft Defender for Endpoint: 4 days implementationCentric Netherlands b.v.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Endpoint and deploy it to a group of devices.
4 out of 54
Microsoft Defender for Identity: 4 days implementationCentric Netherlands b.v.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Office 365 Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Office 365 and deployment of identity sensors.
5 out of 54
Microsoft Defender for Cloud Apps: 4 days implementationCentric Netherlands b.v.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Endpoint Check-up and implementation helps you accelerate the adoption of Microsoft Defender for Cloud Apps and discover Cloud Apps
6 out of 54
Managed Microsoft Sentinel and Extended Detection and Response (XDR) implementation with CentricCentric Netherlands b.v.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The SOC team's goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes.
7 out of 54
Copilot for Microsoft 365 : 7 days Consulting ServicePROXIMUS NV/SA
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
In close collaboration with Microsoft 365 experts, we assist in preparing your business for Copilot, with a focus on compliance, governance and data management.
8 out of 54
SMB Security ServicesSavaco
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
In an era where cyber threats continue to evolve, securing your digital landscape is paramount. Our services are designed to address the multifaceted challenges of IT security.
9 out of 54
Microsoft 365 Copilot Workshop - 2 days WorkshopDEEP by POST Telecom S.A.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Microsoft 365 Copilot Workshop is designed to help organizations adopt Microsoft 365 Copilot
10 out of 54
Accompagnement à la mise en œuvre de Microsoft 365 Copilot 1-Week AssessmentEXAKIS NELITE (Test)
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Un accompagnement sur mesure pour faciliter le déploiement et l’adoption de Microsoft 365 Copilot pour votre entreprise.
11 out of 54
Olinko Cybersecurity Awareness Program for End Users - 5 Steps/DaysOlinko
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
A 5 steps cybersecurity awareness program for end users, in which we put people at the centre, use the Microsoft 365 Attack Simulation Training and integrate the approach of change management.
12 out of 54
eVri/Olinko Cybersecurity Awareness Program for End Users - 5 Steps/DayseVri
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
A 5 steps cybersecurity awareness program for end users, in which we put people at the centre, use the Microsoft 365 Attack Simulation Training and integrate the approach of change management.
13 out of 54
Audit de sécurité : 5 joursEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Evaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
14 out of 54
POC Securité IT : 2 semainesEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Validation des capacités des solutions de sécurité Microsoft dans votre environnement
15 out of 54
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Implémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
16 out of 54
Managed Microsoft Defender XDRPROXIMUS NV/SA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Proximus NXT Orbit Managed XDR service manages the alerts generated by Microsoft Defender. Our Security Operations Center (SOC) analyses and responds to these alerts 24/7 in Brussels, Belgium.
17 out of 54
eVri/Orlox 3 day Microsoft 365 Security AuditeVri
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
3 day Security Assessment of the current Microsoft 365 environment
18 out of 54
Security Assessment2source4 B.V.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Volledig Microsoft 365 Security Assessment waarbij pijnpunten in de beveiliging worden blootgelegd en adviezen worden opgesteld om pijnpunten af te dekken.
19 out of 54
Orlox Microsoft Entra Identity and Access Management (IAM) 3-Day Review and AssessmentOrlox
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Our Microsoft Entra IAM Review and Assessment (3 days) offers a comprehensive analysis of your organization's Microsoft 365 identity hygiene to maintain a secure identity posture.
20 out of 54
Orlox Microsoft XDR Accelerator ProgramOrlox
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Our Accelerator program helps you plan, design, deploy, and configure a pilot of Microsoft Defender XDR, with the option for a full production deployment.
21 out of 54
Orlox Data Security Engagement - 4 daysOrlox
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Our Data Security Engagement provides you with the insights needed to identify risks related to data security, privacy, and compliance.
22 out of 54
Intune Security Reviewmnemonic
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Management
Enhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
23 out of 54
Implementation of Copilot readiness assessmentDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
24 out of 54
Watchguard Managed ServiceCWSI
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
WatchGuard helps customers understand, implement and fully utilise Microsoft Defender and Microsoft Sentinel's capabilities to deliver secure operations, all watched over by our 24x7 CSOC service.
25 out of 54
Modern Security Operations EngagementFUJITSU
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Detect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
26 out of 54
Microsoft Threat Protection Engagement – Risiken sichtbar machen, Angriffe verhindernPHAT CONSULTING GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Erkennen und beheben Sie Bedrohungen und Schwachstellen mit Microsoft Defender & Sentinel.
27 out of 54
Get Value from Adoption of Microsoft CopilotNexer Group AB
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Get tools for how to measure and promote the adoption of AI tools like Microsoft 365 Copilot and agents in your organisation. Get usertrainings, champion programs etc in place with our help.
28 out of 54
Microsoft 365 Tenant Review – Datenschutz & Sicherheit im FokusPHAT CONSULTING GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Identifizieren und bewerten Sie Schwachstellen in Ihrer Microsoft 365 Umgebung – mit klarem Fokus auf Datenschutz, Zugriffskontrolle und Compliance.
29 out of 54
Modern Work Audit – 1 Week Consulting EngagementConnectworks | IT Professionals
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
1-week Microsoft 365 audit: continuity, security & license optimization by certified experts
30 out of 54
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
31 out of 54
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
32 out of 54
Modern WorkPlace PME:15 days ImplementationAurera
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Mise en place d’un environnement de travail collaboratif à l’état de l’art pour les PME, comprenant une plate-forme digitale et des outils permettant une facilité de gestion et de déploiement.
33 out of 54
Microsoft 365 Level Up: 1-Year WorkshopWAKERS
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Pour être toujours au top des dernières nouveautés de votre environnement Microsoft 365 pendant 1 an !
34 out of 54
Microsoft 365 Security Scan: 3d AssessmentOrdina
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The result of the multi-day assessment will be a risk-based advise focusing on recommendations and a roadmap to increase the security posture of your Modern Workplace.
35 out of 54
Secure Digital Workplace: 4 Day WorkshopDevoteam NV/SA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
An assessment to quickly have an overview of your security posture.
36 out of 54
Modern Identity Kickstarter Workshop (3 days)The Collective Consulting BV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
This workshop helps you to address and modernize your identity and access management strategy, using Microsoft 365 and Azure AD capabilities.
37 out of 54
5 Day Information Security AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
An information protection assessment to guide you towards improving your data management in Microsoft 365 and Azure AD.
38 out of 54
Security Priority Assessment : 2 day assessmentInetum-Realdolmen - Modern Work & Security
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
2 day assessment to list and prioritization of your security needs resulting in step-by-step overview to tackle security projects
39 out of 54
Get Started with SharePoint 1/2-Day WorkshopConXioN BV
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
After this 1/2 day-workshop you know whatSharePoint is and how it could help improve your document structure and teamwork within your SMB or enterprise organization.
40 out of 54
Defend against threats with SIEM plus XDR Workshop including FastTrack guidanceXylos
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Our 3-day Security workshop is meant to get an overview of the Security landscape, we use the Microsoft 365 security products and features to gain visibility into threats to your Microsoft 365.
41 out of 54
SharePoint Governance 4-Hour WorkshopConXioN BV
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
After this 4-hour workshop you can optimize your SharePoint governance to further improve your security within your SMB or enterprise organization.
42 out of 54
Endpoint Rollout Management 4-Hour ImplementationConXioN BV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
During this 4-hour implementation we will implement Microsoft Intune within your SMB or enterprise organization.
43 out of 54
Adoptez Microsoft Edge : 2-Wk ImplementationProjetlys
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Notre approche pour la mise en place et l'adoption de Microsoft Edge.
44 out of 54
Identity Security 1-Day ImplementationConXioN BV
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
During this 1-day implementation we will implement Identity Security within you SMB or enterprise organization.
45 out of 54
Move to Microsoft 365: 4-Weeks ImplementationDevoteam NV/SA
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
An implementation and migration offer for Microsoft 365.
46 out of 54
Defender for Endpoint: 5-Day WorkshopDevoteam NV/SA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
A 5-day engagement to improve your security posture of your endpoints with Microsoft 365 Defender.
47 out of 54
NextGen Windows Experiences Expert-as-a-service, 1y Mgd ServiceXylos
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Management
Xylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your modern endpoint management.
48 out of 54
Managed service : EDR with Defender for EndpointCegeka NV
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our EDR service detects threats on a broad spectrum of endpoints and takes place close to where the danger is and ensures a fast and effective response restricting adversary access and further damage.
49 out of 54
Secure Identities and Access Expert-as-a-service, 1 y, Mgd serviceXylos
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Xylos can offer you Expert as a service: an advisory and hands on role that helps you maintain and improve your cloud or hybrid Identity environment based on Microsoft 365 technology.
50 out of 54
Secure Identities and Access Assessment, 3 daysXylos
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our Identity Security Assessment is meant to get an overview of the Identity Security landscape, gain insights in your identity posture and create an improvement roadmap using Microsoft 365.
51 out of 54
Protection de l'identité : Implémentation 1 moisROXYS
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Vous souhaitez obtenir des informations sur l’origine des messages envoyés depuis votre messagerie ?
52 out of 54
ModernIdentity: 3-Months ImplementationEconocom Workplace infra Innovation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Unifier la gestion des identités et des accès grâce à Microsoft 365
53 out of 54
Smart Services - Security - 12 months ImplementationElgon S.A.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Smart Services, mise en place des bonne pratique sécurité pour vos service Microsoft 365 et Azure
54 out of 54
  • Predchádzajúce
  • 1
  • 2
  • 3
  • 4
  • 5
Informácie o službe Marketplace
  • Prečo Microsoft Marketplace
  • Blogy
  • Príbehy zákazníkov
Pre zákazníkov
  • Úradné hodiny
  • Príručka Začíname
  • Technická dokumentácia
  • Súkromné ponuky
  • Záväzok spotreby služby Microsoft Azure
  • Fakturácia a účtovanie
Pre partnerov
  • Staňte sa partnerom
  • Načítať do zoznamu
  • Získanie marketingovej podpory
  • Technická dokumentácia
  • Podrobné pokyny na vytváranie, publikovanie a predaj
  • Získanie nároku na spoločný predaj
  • Komunita lokality Marketplace pre partnerov
  • Predaj na Lokalite Marketplace pod vedením kanála
  • Súkromné ponuky multiparty pre partnerov kanála
Pracovné
  • Microsoft AI
  • Zabezpečenie od spoločnosti Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Spoločnosť
  • Zamestnanie
  • Správy spoločnosti
  • Ochrana osobných údajov v spoločnosti Microsoft
  • Investori
  • Udržateľnosť
Slovenčina (Slovensko) Ikona nesúhlasu s možnosťami ochrany osobných údajov Vaše možnosti ochrany osobných údajov Ochrana osobných údajov spotrebiteľa v zdravotníctve
  • Mapa lokality
  • Kontaktujte nás
  • Ochrana osobných údajov a súbory cookie
  • Podmienky používania
  • Ochranné známky
  • Informácie o našich reklamách
  • Spravovať súbory cookie
  • © Microsoft 2026