ให้คำติชม
ความช่วยเหลือและการสนับสนุน
รายการที่บันทึกไว้
แผนส่วนตัว
รอสักครู่ กําลังนําคุณเข้าสู่ระบบ...
ตัวกรองล้างทั้งหมด

  • ตำแหน่งที่ตั้งของคุณ
  • ผลิตภัณฑ์ (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • การจัดการการเปลี่ยนแปลงและการเริ่มนำไปใช้
      • การโทรสำหรับ Microsoft Teams
      • การรักษาความปลอดภัยในคลาวด์
      • บริการให้คําปรึกษาด้านการปฏิบัติตามข้อบังคับ
      • การจัดการและการปรับใช้งานอุปกรณ์
      • พนักงานแนวหน้า
      • ระบบบริหารจัดการตัวตนและการเข้าถึงทรัพยากร
      • นโยบายการกำกับดูแลและการป้องกันข้อมูล
      • ความเสี่ยงภายใน
      • ความรู้และข้อมูลเชิงลึก
      • ห้องประชุมสำหรับ Microsoft Teams
      • การประชุมสำหรับ Microsoft Teams
      • Microsoft 365 Live Events
      • การจัดการอุปกรณ์เคลื่อนที่
      • Power Platform for Teams
      • โซลูชันแบบกำหนดเองของ Teams
      • การปรับใช้ทีมเวิร์ก
      • การป้องกันภัยคุกคาม
      • Workplace Analytics
    • Power Platform
  • อุตสาหกรรม
  • ประเภทของบริการ
  • แบบจำลองราคา

ผลลัพธ์ Professional Services รายการ

กำลังแสดงผลลัพธ์ รายการใน professional services
ดู ผลลัพธ์ ที่เกี่ยวข้องใน ระบบคลาวด์ในอุตสาหกรรม.
Identity & Access Management: 1-Mth ImplementationOfficeline SA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Microsoft 365 Identity & Access Management to improve and streamline security on cloud and applications
1 out of 60
CMMC Level 1 Readiness AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
CMMC Level 1 Readiness Assessment for Microsoft 365. We review your security configuration, map it to all 17 CMMC L1 practices, identify gaps, and deliver a clear remediation roadmap.
2 out of 60
Data Protection Impact Assessment: 8 WkLighthouse Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Empowering teams to understand, map, and mitigate data privacy risk with Microsoft 365.
3 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
4 out of 60
Data Security & Protection: 8 weeks - ImplementationMazzy Technologies Corp.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Mazzy Technologies provides a comprehensive end to end data security solution using Microsoft Purview to discover, classify, and protect sensitive data, ensuring compliance and reducing risk.
5 out of 60
NEST ArenaNoibit
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Two-day hands-on training, specifically designed for blue team professionals, offering a unique and immersive experience in defensive cybersecurity through live attack simulations.
6 out of 60
Zero Trust Model - 4h assessmentReply
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Zero Trust 4h assessment to secure, align, and empower your organization with Microsoft’s security framework
7 out of 60
utilitas Cloud Security & Compliance Action Plan: 1-Month Assessmentutilitas GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Mit dem utilitas Cloud Security & Compliance Action Plan erhalten Sie konkrete Empfehlungen zur Umsetzung von risikominimierenden Maßnahmen in Ihrer Microsoft 365 Umgebung.
8 out of 60
Threat Protection: 2-Month ImplementationOfficeline SA
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Threat protection with Microsoft Defender products. We deliver a solution that improves and streamlines threat protection for every organization.
9 out of 60
Minsait Threath Protection Engagement WorkshopMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Evaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
10 out of 60
Microsoft 365 Security & Compliance AssessmentPLEXHOSTED LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Boost your Microsoft 365 security posture with a tailored assessment that identifies risks, improves compliance, and enables strong protection for your organization.
11 out of 60
Pently SOCaaSPently GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Full Managed Security Service with a personal touch and individually build for each customer
12 out of 60
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
13 out of 60
Information Protection - 1Month ImplementationOfficeline SA
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
An offering of Microsoft Information Protection implementation to improve and streamline compliance across all environments.
14 out of 60
Identity and Access Control ImplementationSMART business LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Cybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
15 out of 60
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Discover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
16 out of 60
ionder Cyber Security Navigator - 12-Month-AssessmentTec Networks GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Stetig steigende IT-Sicherheit, aufmerksame Mitarbeiter und deutlich weniger Cybercrime-Überraschungen mit Hilfe von Microsoft 365 durch unseren begleitenden Cyber Security Navigator
17 out of 60
Insight Microsoft 365 Strategy Planning ServiceInsight Technology Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
Microsoft 365 strategy planning service is a consulting service supporting clients to gain understanding of current and future strategies around the adoption of Microsoft 365
18 out of 60
[Managed Service] NR Automate Security: 12-Months Implementationネクストリード株式会社
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 テナントのセキュリティ状況を可視化し、対策を並走支援するクラウド型セキュリティ支援サービスです。 アラート監視から得られた知見をもとに、Microsoft 365 のセキュリティ機能の実装をアドバイスします。 Microsoft 365 Defender の導入をご検討中のお客様や、導入後のアラート監視支援をご要望のお客様に最適です。
19 out of 60
Purview Information Protection: setup and adoptionDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
20 out of 60
Microsoft 365 Copilot for Executives WorkshopSMART business LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Join our SMART business workshop to explore how Microsoft 365 Copilot helps Executives to streamline strategies, generate compelling reports, and gain valuable insights from company data.
21 out of 60
base-IT PentestingBaseIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Mit base-IT Pentesting stärken wir Ihre IT-Sicherheit und decken Schwachstellen auf. Durch die Integration von Microsoft 365 (Cloud Security, etc.) entsteht eine umfassende Sicherheitsarchitektur.
22 out of 60
Dell Implementation Services for Copilot SecurityDell Technologies Services
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Readiness, implementation of Microsoft Security Copilot to empower security teams with AI-driven insights, automation, and decision support capabilities in detecting and responding to security threats
23 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Environment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
24 out of 60
Lenovo Cyber Resiliency as a Service RemediationLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Incident Response Service enhances your organization's ability to detect, respond to, and recover from cybersecurity incidents within the Microsoft 365 environment leveraging CRaaS platform.
25 out of 60
Security Accelerator: 3-Day ImplementationUnifyTech Bilgi Sistemleri
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Perfect for small businesses looking to go live quickly with a full-featured Microsoft 365 security system for up to 150 users.
26 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
27 out of 60
Minsait Cyber SmartMDR SOC ServiceMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Servicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
28 out of 60
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Get started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
29 out of 60
Lenovo Cyber Resiliency as a Service TuningLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CRaaS Custom Tuning Service will implement and configure Required Software within Customer's Production IT Environment according to custom requirements agreed by Lenovo and Customer.
30 out of 60
Data Protection, Privacy and Compliance Assessment - 4 weeksPlain Concepts
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
The objective of this assessment is to ensure legal compliance of your data and gain control of your information. Starting with a review of current situation, we’ll not only ensure that you are comply
31 out of 60
Conscia Security Assessment: 1-2 Weeks Infra AssessmentConscia A/S
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
We can Assess your IT environment Security Posture, give you current Status and help you implement Security Settings across your IT environment.
32 out of 60
Implementazione Microsoft Endpoint ManagerInside Technologies
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Implementazione della piattaforma MDM per gestire gli endpoint aziendali e personali
33 out of 60
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationConscia A/S
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Conscia offers a suite of services to help secure your applications, Microsoft 365 workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
34 out of 60
Microsoft 365 Cybersecurity: 4-days implementationPROJECT INFORMATICA SRL
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 cybersecurity assessment. We will analyze how secure your on-premises and cloud environment is and guide you on how to improve it.
35 out of 60
Identity Access Hardening: 5-days implementationPROJECT INFORMATICA SRL
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With Identity Access Services Hardening the goal is to prepare your most mission-critical workloads by configuring either your identity management service through best practices
36 out of 60
Defender for Office 365: 5-days implementationPROJECT INFORMATICA SRL
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Office 365 protects your organization from threats that can come through Microsoft 365 collaboration solutions
37 out of 60
Microsoft Defender for Business: 6-days implementationPROJECT INFORMATICA SRL
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Business is an enterprise-grade device security solution, designed to protect businesses with up to 300 employees against sophisticated cyber threats
38 out of 60
Move to Microsoft Business Premium: 5-days implementationPROJECT INFORMATICA SRL
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Microsoft 365 Business Premium is a subscription service that lets you manage your organization in the cloud while Microsoft takes care of IT for you
39 out of 60
Azure Active Directory Premium: 8-days implementationPROJECT INFORMATICA SRL
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Increase Microsoft 365 security by implementing Azure MFA and Conditional Access solutions available on the Microsoft 365 platform
40 out of 60
Microsoft 365 MFA-Conditional Access: 4-days implementationPROJECT INFORMATICA SRL
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The goal is to increase security by implementing Azure MFA and Conditional Access solutions available on the Microsoft 365 platform
41 out of 60
Microsoft 365 E5 - AssessmentAgic Cloud Srl
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Microsoft 365 E5 - 3 Weeks Assessment (Security, Compliance, Analytics)
42 out of 60
Security Assessment JourneyAgic Cloud Srl
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Cloud Security - 10 days Assessment
43 out of 60
Compliance Assessment JourneyAgic Cloud Srl
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Compliance - 10 Days Assessment (Microsoft 365 Compliance)
44 out of 60
4ward srl - Assessment Microsoft 365 Copilot4WARD S.R.L.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Are you ready for Microsoft 365 Copilot? Let’s check if all the technical and business prerequisites are set up at their best!
45 out of 60
4wardPRO - IA generativa in Microsoft 3654WARD S.R.L.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
IA generativa in Microsoft 365 - Bing Chat Enterprise e Microsoft 365 Copilot
46 out of 60
4ward srl - Classificazione dati per Microsoft 365 Copilot4WARD S.R.L.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Strumenti e strategie per la classificazione e protezione dei dati non strutturati
47 out of 60
4ward srl - Preparazione files per Microsoft 365 Copilot4WARD S.R.L.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Migrazione dei file su Microsoft Onedrive e Microsoft Sharepoint per essere utilizzabili e fruibili da Microsoft Copilot per massimizzarne il valore
48 out of 60
4ward srl - Copilot Extension Proof of Concept4WARD S.R.L.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Microsoft 365 Copilot Extensibility Proof of Concept - plugin personalizzati ed estensioni Microsoft Graph per l'integrazione con applicativi aziendali
49 out of 60
4ward srl - Deployment Microsoft 365 Copilot4WARD S.R.L.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Attivazione e Implementazione di Microsoft 365 Copilot, configurazione di Microsoft Loop e del nuovo Microsoft Outlook come prerequisiti alla attivazione di Microsoft 365 Copilot
50 out of 60
NVISO Microsoft 365 Security AssessmentNVISO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
51 out of 60
base-IT Copilot für Microsoft 365 Readiness WorkshopBaseIT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-teamwork-deployment product iconTeamwork Deployment
Bereiten Sie sich mit dem base-IT Copilot für Microsoft 365 - Readiness Workshop auf die Zukunft vor. Copilot ist Ihr KI-Assistent, der Ihre täglichen Anwendungen smarter macht.
52 out of 60
Security Assessment: 4-Wk AssessmentAvvale S.p.A.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Examine your organization's security posture, focusing on Microsoft 365 and Azure
53 out of 60
Audit de sécurité : 5 joursEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Evaluation complète des systèmes de sécurité informatique visant à identifier les failles, les risques et les opportunités d'amélioration
54 out of 60
POC Securité IT : 2 semainesEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Validation des capacités des solutions de sécurité Microsoft dans votre environnement
55 out of 60
Solutions de Sécurité Microsoft : 4 semainesEconocom Products & Solutions Belux
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Implémentation de solutions de sécurité avancées avec Microsoft 365 Defender Suite
56 out of 60
Microsoft 365 Copilot workshop: 1-week consulting servicesUni Systems S.M.S.A.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
57 out of 60
Insight´s Microsoft Cloud Advisory ServiceInsight Technology Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Provides a 2 weeks assessment of our client’s estate across the following six areas: Microsoft 365, Azure, On-Premises, Business Critical Applications, Skills & Resourcing & Cost optimisation.
58 out of 60
Implementation of Copilot readiness assessmentDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
59 out of 60
Quick Start Accelerator for Microsoft IntuneWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our service is designed to help organizations swiftly deploy and configure Microsoft Intune, ensuring a secure and efficient management of devices and applications
60 out of 60
  • ก่อนหน้า
  • 1
  • 2
  • 3
  • 4
  • 5
  • ถัดไป
เกี่ยวกับ Marketplace
  • เหตุใดจึงต้องเลือก Microsoft Marketplace
  • บล็อก
  • เรื่องราวของลูกค้า
สำหรับลูกค้า
  • เวลาทำการ
  • คู่มือเริ่มต้นใช้งาน
  • เอกสารทางเทคนิค
  • ข้อเสนอส่วนตัว
  • ข้อผูกพันการใช้ Microsoft Azure
  • การเรียกเก็บเงินและการออกใบแจ้งหนี้
สำหรับคู่ค้า
  • ร่วมเป็นคู่ค้า
  • ลงทะเบียน
  • รับการสนับสนุนด้านการตลาด
  • เอกสารทางเทคนิค
  • คำแนะนำทีละขั้นตอนในการสร้าง เผยแพร่ และขาย
  • ร่วมมีสิทธิ์ร่วมขาย
  • ชุมชน Marketplace สำหรับคู่ค้า
  • การขาย Marketplace ผ่านช่องทาง
  • ข้อเสนอส่วนตัวหลายฝ่ายสำหรับคู่ค้าช่องทาง
ธุรกิจ
  • Microsoft AI
  • การรักษาความปลอดภัยของ Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
บริษัท
  • ตำแหน่งงาน
  • ข่าวบริษัท
  • สิทธิ์ส่วนบุคคลที่ Microsoft
  • นักลงทุน
  • ความยั่งยืน
ไทย (ไทย) ไอคอนการเลือกไม่รับตัวเลือกความเป็นส่วนตัวของคุณ ตัวเลือกความเป็นส่วนตัวของคุณ ความเป็นส่วนตัวด้านสุขภาพของผู้บริโภค
  • ผังเว็บไซต์
  • ติดต่อเรา
  • ความเป็นส่วนตัวและคุกกี้
  • ข้อกำหนดการใช้
  • เครื่องหมายการค้า
  • เกี่ยวกับโฆษณาของเรา
  • จัดการคุกกี้
  • © Microsoft 2026