Poskytnúť pripomienky
Pomocník a podpora
Uložené položky
Súkromné plány
Moment, prihlasujeme vás...
FiltreVymazať všetko

  • Vaša poloha
  • Produkty (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • Spravovanie úprav a zmien
      • Volania v aplikácii Microsoft Teams
      • Cloudové zabezpečenie
      • Poradenské služby pre súlad
      • Nasadenie a správa zariadení
      • Pracovníci prvého kontaktu
      • Správa identít a prístupu
      • Ochrana informácií a riadenie
      • Riziko zvnútra
      • Vedomosti a prehľady
      • Zasadacie miestnosti pre Microsoft Teams
      • Schôdze v aplikácii Microsoft Teams
      • Microsoft 365 Live Events
      • Správa mobilných zariadení
      • Power Platform for Teams
      • Vlastné riešenia pre Teams
      • Tímové nasadenie
      • Ochrana pred bezpečnostnými hrozbami
      • Workplace Analytics
    • Power Platform
  • Odvetvia
  • Typ služby
  • Model oceňovania

Počet výsledkov: Professional Services

Zobrazujú sa výsledky (počet: ) v professional services
Frontier Firm Transformation - Free 2 Hour AI Security Risk AssessmentNetwoven Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To help businesses securely adopt AI within Microsoft 365, enabling confident use of Copilots and other AI solutions while protecting sensitive data.
1 out of 60
Redapt Threat Protection EngagementRedapt, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Proactive Cybersecurity for Resilient Enterprises
2 out of 60
Threat Protection Envisioning Engagement SentinelSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Organizations today are managing a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Get help achieving your broader security objectives.
3 out of 60
NuHarbor's Quick Start for PurviewNuharbor Security Inc.
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Activate Purview quickly with expert guidance to improve visibility, reduce risk, and support compliance.
4 out of 60
Secure Your Future: Cybersecurity PathwaysReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Discover how to protect your Enterprise with Microsoft solutions: gain full visibility into threats, advanced data protection, and tailored strategies to strengthen your digital security.
5 out of 60
NuHarbor’s Defender Health CheckNuharbor Security Inc.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Uncover gaps and optimize Microsoft Defender for stronger threat protection.
6 out of 60
Microsoft Exchange Best Practices RemediationTechNet UC LLC
+2
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure and optimize your Microsoft Exchange Online environment with expert remediation, ensuring compliance, reliability, and protection against email threats.
7 out of 60
Zero Trust Deployment and Optimization ServiceSoftchoice
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Deploy zero trust with confidence, optimize it to deliver lasting outcomes.
8 out of 60
Copilot and AI Readiness AssessmentCloudServus
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Run an AI Readiness Assessment to pinpoint gaps using Copilot adoption; align next steps to Copilot & Agents at Work.
9 out of 60
Privileged Identity Management Configuration - AppSourceTechNet UC LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Configure Microsoft Entra PIM to enforce least privilege, enable just-in-time access, and reduce risk with real-time auditing, approval workflows, and Conditional Access integration.
10 out of 60
Microsoft 365 Best Practices RemediationTechNet UC LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure, optimize, and align your Microsoft 365 environment with Microsoft’s latest standards—improving collaboration, compliance, and protection across Exchange, Teams, SharePoint, and OneDrive.
11 out of 60
Microsoft Purview QuickStart: ImplementationKraft Kennedy
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Kraft Kennedy offers a Microsoft Purview Quick Start engagement that is designed to deliver customers immediate value by establishing foundational data governance capabilities.
12 out of 60
Veeam Backup for Microsoft 365 HealthcheckSentinel Technologies Inc.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
This tailored assessment consolidates system configuration details into a concise, easy-to-digest format that highlights system health, performance, and opportunities for improvement.
13 out of 60
Microsoft 365 Security Best PracticesTechNet UC LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure your Microsoft 365 environment by aligning with Microsoft’s latest security standards—enhancing threat protection, data governance, and compliance across Exchange, Teams, and SharePoint.
14 out of 60
Microsoft 365 Health & Security DiagnosticPSM Partners
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Achieve stronger security, reduce costs, and simplify management with a targeted assessment built on best practices to maximize your Microsoft 365 investment.
15 out of 60
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
16 out of 60
Accelerate your Microsoft 365 Copilot adoptionColumbus Global
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Copilot Jumpstart Program is designed for business and IT leaders who want to move beyond experimentation and unlock real productivity gains from AI.
17 out of 60
Proteccion de correo electronicoWolk LAB SC
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
PROTECCIÓN DE CORREO ELECTRÓNICO Y HERRAMIENTAS DE COLABORACIÓN
18 out of 60
Threat Protection Envisioning Workshop: Stop Advanced Threats Across Microsoft 365evoila GmbH
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
🛡️ Discover real threats targeting your organization. 2-week Threat Protection workshop with threat analysis, Defender XDR guidance, remediation recommendations
19 out of 60
Data Security Envisioning Workshop: Identify Risks in Your Organizational Dataevoila GmbH
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
🔍 Uncover data security risks in Microsoft 365. 2-week automated Data Security Check with findings, Purview roadmap, and hands-on recommendations. Expert analysis. No guesswork.
20 out of 60
Inspira Microsoft Threat Protection Envisioning WorkshopInspira Enterprise Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you.
21 out of 60
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
22 out of 60
CBTS Microsoft 365 Managed ServiceCBTS Technology Solutions LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Partner with CBTS for ongoing management and support of Microsoft 365
23 out of 60
Cybersecurity Incident Response Retainer with Microsoft DefenderCBTS Technology Solutions LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Partner with CBTS to ensure assistance when you need it most during a significant security event.
24 out of 60
Data Security WorkshopEmergent Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Security workshop leveraging Microsoft's security products such as Purview to uncover data risks across Microsoft 365, assess exposure, and deliver actionable recommendations for IT leaders.
25 out of 60
Threat Protection Envisioning WorkshopCitrin Cooperman Advisors, LLC
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Uncover real security threats in your environment and build a roadmap for stronger protection leveraging Microsoft Defender’s unified security incident platform powered by AI.
26 out of 60
S4B_XDR_Recuperacion_Automatica_RecursosS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
27 out of 60
Microsoft 365 Security Assessment and License RationalizationRavanty Tech Consulting, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Provide assessment and strategic guidance to strengthen security across Microsoft 365 environment and optimize Microsoft 365 licensing.
28 out of 60
S4B Email Attack Simulation TrainingS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Attack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
29 out of 60
Threat Investigation and Analysis Service with Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
30 out of 60
Server Endpoint Protection Implementation Service using Microsoft Defender for EndpointS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Provides comprehensive protection for physical and virtual servers with Microsoft Defender for Server, combined with continuous security monitoring to detect, investigate, and respond to threats.
31 out of 60
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
32 out of 60
Advanced Hybrid Identity Security with Microsoft IdentityS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Hybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
33 out of 60
Implementation of security for Endpoint with Microsoft EDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Advanced defense for on-premises devices with Microsoft Defender for Endpoint, automated detection and response.
34 out of 60
Entrenamiento de Phishing con Microsoft Office 365S4B
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Ofrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
35 out of 60
On-premise enviroment Identity Protection service with Microsoft IdentityS4B
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
On-Premises Identity Protection service detects and mitigates threats in Active Directory using Microsoft Defender for Identity.
36 out of 60
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Seguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
37 out of 60
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Investiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
38 out of 60
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4B
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
39 out of 60
Servicio de Implementación de Protección de Identidades Locales con Microsoft Defender for IdentityS4B
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Refuerza Active Directory local con Microsoft Defender for Identity, detectando ataques, credenciales comprometidas y movimientos laterales en controladores de dominio.
40 out of 60
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Defensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
41 out of 60
Enterprise Automated Endpoint Recovery with Microsoft Defender XDRS4B
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
SILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
42 out of 60
Secure Productive Workplace: Implement 4-WkNetsurit
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Netsurit’s Secure Productive Workplace is an all-encompassing solution based on Microsoft 365 that ensures security, fosters collaboration and drives improved productivity all while reducing IT costs.
43 out of 60
Security Assessment: 2-Wk AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent will evaluate your security capabilities across Strategy and Governance, Identity, Infrastructure Protection, Data Protection, and Operations, and shape a long-term Microsoft security strategy
44 out of 60
Threat Protection: 3-Wk POCFPT/Intellinet
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Identify security threats and begin to respond and mitigate.
45 out of 60
Microsoft365 E5 Security Briefing: 1 hour briefingPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 Security Briefing: 60 minute briefing to highlight specific security threats customers face in their unique environment
46 out of 60
EMS Energize: 1-month proof of conceptInterlink Cloud Advisors, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Interlink Cloud Advisors’ EMS Energize engagement provides you with security experts who can help guide your business into a secure, productive cloud platform.
47 out of 60
Big Green IT Security Assessment: 3-WeekBig Green IT - Dev
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
48 out of 60
Microsoft 365 Secure Score: 4 Week ImplementationRazor Technology, LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Audit, review, and improve security posture of Microsoft 365 Estate through Secure Score methodology. Receive expert advice for identity, compliance, and threat protection improvements.
49 out of 60
Defend Against Threats with SIEM Plus XDRNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
An immersive experience designed for security leaders to assess and improve their approach to identities, data, applications, devices, and infrastructure using Microsoft 365 security features.
50 out of 60
Microsoft Purview Data Security Basic Quick Start 10-week ImplementationEdgile, Inc.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Drive Data Protection Sustainability with Edgile's Data Protection Methodology
51 out of 60
1-Day Security & Identity WorkshopConvergeOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Tailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
52 out of 60
Microsoft 365 Defender Threat Check: 4-wk assessInterlink Cloud Advisors, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
53 out of 60
Office 365 Protection: Design & Pilot 1-Wk POCManaged Solution
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Protect Your Employees from External Email Threats with Defender for Office 365 Protection
54 out of 60
Microsoft 365 Security Alignment Workshop: 10 DaysSirius Computer Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
55 out of 60
discover-sensitive-data-workshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
ECF Data's Protect and Govern Sensitive Data workshops provide you with insights that detect privacy and regulatory risks in dark data and processes to mitigate them.
56 out of 60
ECF Data Threat Protection: 3-Day WorkshopECF Data LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
The Threat Protection Workshop is designed to create customer intent for purchasing and/or deploying advanced Microsoft Security products.
57 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
58 out of 60
Managing and Identifying Risk: 3-Day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
59 out of 60
Security Assessment: 2 Week AssessmentTallan
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
60 out of 60
  • Predchádzajúce
  • 6
  • 7
  • 8
  • 9
  • 10
  • Ďalej
Informácie o službe Marketplace
  • Prečo Microsoft Marketplace
  • Blogy
  • Príbehy zákazníkov
Pre zákazníkov
  • Úradné hodiny
  • Príručka Začíname
  • Technická dokumentácia
  • Súkromné ponuky
  • Záväzok spotreby služby Microsoft Azure
  • Fakturácia a účtovanie
Pre partnerov
  • Staňte sa partnerom
  • Načítať do zoznamu
  • Získanie marketingovej podpory
  • Technická dokumentácia
  • Podrobné pokyny na vytváranie, publikovanie a predaj
  • Získanie nároku na spoločný predaj
  • Komunita lokality Marketplace pre partnerov
  • Predaj na Lokalite Marketplace pod vedením kanála
  • Súkromné ponuky multiparty pre partnerov kanála
Pracovné
  • Microsoft AI
  • Zabezpečenie od spoločnosti Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Spoločnosť
  • Zamestnanie
  • Správy spoločnosti
  • Ochrana osobných údajov v spoločnosti Microsoft
  • Investori
  • Udržateľnosť
Slovenčina (Slovensko) Ikona nesúhlasu s možnosťami ochrany osobných údajov Vaše možnosti ochrany osobných údajov Ochrana osobných údajov spotrebiteľa v zdravotníctve
  • Mapa lokality
  • Kontaktujte nás
  • Ochrana osobných údajov a súbory cookie
  • Podmienky používania
  • Ochranné známky
  • Informácie o našich reklamách
  • Spravovať súbory cookie
  • © Microsoft 2026