ให้คำติชม
ความช่วยเหลือและการสนับสนุน
รายการที่บันทึกไว้
แผนส่วนตัว
รอสักครู่ กําลังนําคุณเข้าสู่ระบบ...
ตัวกรองล้างทั้งหมด

  • ตำแหน่งที่ตั้งของคุณ
  • ผลิตภัณฑ์ (1)
    • Azure
    • Dynamics 365
    • Microsoft 365 (1)
      • การจัดการการเปลี่ยนแปลงและการเริ่มนำไปใช้
      • การโทรสำหรับ Microsoft Teams
      • การรักษาความปลอดภัยในคลาวด์
      • บริการให้คําปรึกษาด้านการปฏิบัติตามข้อบังคับ
      • การจัดการและการปรับใช้งานอุปกรณ์
      • พนักงานแนวหน้า
      • ระบบบริหารจัดการตัวตนและการเข้าถึงทรัพยากร
      • นโยบายการกำกับดูแลและการป้องกันข้อมูล
      • ความเสี่ยงภายใน
      • ความรู้และข้อมูลเชิงลึก
      • ห้องประชุมสำหรับ Microsoft Teams
      • การประชุมสำหรับ Microsoft Teams
      • Microsoft 365 Live Events
      • การจัดการอุปกรณ์เคลื่อนที่
      • Power Platform for Teams
      • โซลูชันแบบกำหนดเองของ Teams
      • การปรับใช้ทีมเวิร์ก
      • การป้องกันภัยคุกคาม
      • Workplace Analytics
    • Power Platform
  • อุตสาหกรรม
  • ประเภทของบริการ
  • แบบจำลองราคา

ผลลัพธ์ Professional Services รายการ

กำลังแสดงผลลัพธ์ รายการใน professional services
ดู ผลลัพธ์ ที่เกี่ยวข้องใน ระบบคลาวด์ในอุตสาหกรรม.
NVISO Microsoft 365 Security AssessmentNVISO
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The goal of this service is to identify security flaws that can affect your security posture on Microsoft 365, and provide you with a plan to mitigate these risks.
1 out of 52
Exobe Windows 365 PilotExobe AB
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
We are pleased to offer a Microsoft Windows 365 pilot that shows how to accomplish more with all the resources available in Windows 365.
2 out of 52
Microsoft 365 Copilot workshop: 1-week consulting servicesUni Systems S.M.S.A.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
This workshop helps organizations to prepare for Microsoft Copilot by assessing licensing, technical readiness, data protection, and showcasing benefits.
3 out of 52
Intune Security Reviewmnemonic
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Management
Enhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
4 out of 52
Insight´s Microsoft Cloud Advisory ServiceInsight Technology Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Provides a 2 weeks assessment of our client’s estate across the following six areas: Microsoft 365, Azure, On-Premises, Business Critical Applications, Skills & Resourcing & Cost optimisation.
5 out of 52
Purview Information Protection: setup and adoptionDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Protect your sensitive data with Purview Information Protection. We configure Microsoft Purview to classify, secure, and manage critical information, ensuring compliance across your organization.
6 out of 52
Implementation of Copilot readiness assessmentDev4Side
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-teamwork-deployment product iconTeamwork Deployment
Prepare for Microsoft Copilot with our Readiness Assessment. We evaluate your systems, licensing, and data infrastructure to ensure a smooth, effective adoption across your organization.
7 out of 52
Microsoft 365 Copilot Value Discovery: 2-Week AssessmentPrimend
+2
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Security
Unlock the full potential of Microsoft Copilot. Discover high-value use cases, optimize your AI readiness, and build a robust business case for AI transformation
8 out of 52
itm8 Managed Detection and Responseitm8 Sverige AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Implementation of itm8 Managed Detection and Response based on Defender for Business
9 out of 52
Modern Security Operations EngagementFUJITSU
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Detect and stop threats early with AI-powered SecOps. Gain visibility, prioritize risks, and automate security operations.
10 out of 52
Get Value from Adoption of Microsoft CopilotNexer Group AB
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Get tools for how to measure and promote the adoption of AI tools like Microsoft 365 Copilot and agents in your organisation. Get usertrainings, champion programs etc in place with our help.
11 out of 52
Exobe DPIA ServiceExobe AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A Data Protection Impact Assessment (DPIA) is a structured process used to ensure GDPR compliance and responsible handling of personal data.
12 out of 52
Microsoft Endpoints Management PilotAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Get started with Microsoft 365 endpoint security — Intune configuration, Defender monitoring, and a detailed pilot report in 2 weeks.
13 out of 52
Identity and Access Control ImplementationSMART business LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Cybersecurity starts with identity. Empower your digital workplace with our Identity & Access Control Services!
14 out of 52
Continuous Improvement Services for Microsoft 365SCIBER
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Sciber’s Continuous Improvement service keeps your Microsoft 365 environment aligned with updates and best practices, turning changes into tailored insights that maximize your investment.
15 out of 52
Microsoft Security and Defender Hardening: 2-week acceleratorWhite Hat IT Security Kft
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Review and harden Microsoft Security configurations based on industry best practices
16 out of 52
Nexer Data Governance - Get ready for AINexer Group AB
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
To get ready for AI you need to have control of your data. Effective data governance is crucial for ensuring compliance with data privacy regulations and maintaining data integrity.
17 out of 52
ITE ZeroTrust360™Information Technology of Egypt Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
ITE ZeroTrust360™ delivers end-to-end security visibility and protection through Zero Trust framework.
18 out of 52
Quadra BluForge Managed SecOpsQuadrasystems.net (India) P Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Discover a unified SecOps platform fusing automation, generative AI, and expert-led SOC to detect, respond, and prevent threats faster and smarter than ever.
19 out of 52
Avanade Intelligent Security OperationsAvanade, Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Intelligent Security Ops unifies threat protection, automation, and managed services to simplify security, cut costs, and safeguard cloud and on-prem environments.
20 out of 52
Minsait Cyber SmartMDR SOC ServiceMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Servicio gestionado de detección y respuesta avanzada, basado en Microsoft Sentinel y Defender XDR, que permite anticiparse a amenazas y responder de forma ágil, automatizada y eficaz.
21 out of 52
Minsait Threath Protection Engagement WorkshopMinsait
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Evaluate your cybersecurity maturity and identify real threats affecting your organization with Minsait Cyber and Microsoft. Strengthen your threat detection and incident response with tailored recomm
22 out of 52
Microsoft 365 Copilot Readiness: Data & Access Security Audit by ISCGISCG so. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Microsoft 365 environment audit focused on data access, security risks and Copilot readiness.
23 out of 52
Innofactor Intune foundation: 2 wk implementationInnofactor Norway
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Microsoft 365 - Intune Foundation is an established framework for basic configuration and acceleration of Microsoft Endpoint Manager MEM based on best practises from Innofactor.
24 out of 52
Microsoft 365 Tenant Setup, 1-Day ImplementationTec Networks GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
We provide you a good-practice configured tenant for the best experience with Microsoft 365
25 out of 52
Zerotrust Starterkit with Onevinn, 2 days!Onevinn AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Introduction to Zerotrust with Passwordless and YubiKeys – Get an understanding of what the Passwordless technology is and what you can achieve with YubiKeys
26 out of 52
Zero-Trust: 3-Day AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
27 out of 52
Passwordless Starterkit 25 Yubikeys, 4h WorkshopOnevinn AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Introduction to Passwordless with 25 YubiKeys – get an understanding of what the Passwordless technology is and what you can achieve with Yubikeys
28 out of 52
Portfolio Rationalisation: 10-Wk ImplementationPricewaterhouseCoopers UK
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Manage security cost by assessing current security capabilities and consolidating security controls, capabilities and services with Microsoft technology
29 out of 52
Microsoft Endpoint Manager PoC - 4 weeksXenit AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Xenit’s Proof-of-Concept (PoC) includes both a configuration in Microsoft Endpoint Manager and a strategy workshop.
30 out of 52
Xenit Workspace - 4 weeks implementationXenit AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With the workplace as a service, you give your employees a secure and managed client computer, filled with applications in Microsoft's user-friendly and familiar interfaces.
31 out of 52
Cyber Security Lifecycle: 12 Months ImplementationExobe AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The goal and objective of the service is that your company should always have the best possible security posture for your Microsoft 365 environment.
32 out of 52
Threat Protection - 7 days ImplementationSPAN d.d.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
33 out of 52
Onevinn Information Protection: 5 day WorkshopOnevinn AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Onevinn Information Protection workshop that helps the customer utilize their investment in Microsoft 365.
34 out of 52
Onevinn Threat Protection: 5 day WorkshopOnevinn AB
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Onevinn Threat Protection workshop that helps the customer utilize their investment in Microsoft 365.
35 out of 52
Microsoft 365 Security: 1-Wk AssessmentInnofactor Norway
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Innofactor’s Microsoft 365 Security assessment secures organizations business operation by providing insights and recommendations to help minimizing security risks.
36 out of 52
Microsoft 365 Strategic Security Workshop (1day)Edgeguide AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
To establish an organization specific plan and in addition a better understanding of actual customer needs as it relates to the security, identity, and compliance portfolio in Microsoft 365.
37 out of 52
Microsoft 365 Backup: 3 wks implementationXenit AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
A complete backup plan with unlimited storage, unlimited rentention, GDPR modul and protection for malware and ransomware.
38 out of 52
Microsoft 365 Security: 2-WK Assessment EssentialsDustin AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
An executive assessment into essential security capabilities, map against normal/high risk scenario and security hygiene
39 out of 52
Compliance Manager Training: 1/2 day WorkshopCloud Essentials
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Compliance Manager Training - a 1/2 day training session about Microsoft 365 Compliance Manager facilitated by an experienced member of our team
40 out of 52
Manage and Investigate Risk: 2 weeks WorkshopCloud Essentials
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
A risk check followed by advisory workshop to build a sustainable strategy around insider risk within Microsoft 365 and further accelerate your compliance journey.
41 out of 52
Discover Sensitive Data: 2 weeks WorkshopCloud Essentials
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Discover Sensitive Data Workshop - an automated data risk check to uncover dark data risks with analysis and recommendations
42 out of 52
Microsoft 365 Defender: 10-Day AssessmentVenzo A/S
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Let VENZO empower your organization to safeguard against cybercrime perpetrators with our Microsoft 365 Defender Solutions
43 out of 52
Microsoft 365 Security Assessment and Roadmap: 1 Day WorkshopCloud Essentials
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Accelerating your Zero Trust strategy through a readiness assessment, workshop and roadmap
44 out of 52
Tietoevry endpoint security 2h workshopTietoevry
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The purpose of the endpoint security workshop for Microsoft Defender is to help Customers understand the full potential security benefits within each of the Microsoft Defender solutions.
45 out of 52
Conscia Security Hardening; 3-6 Weeks Consulting and ImplementationNil d.o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We offer a suite of services and solutions that can help secure your applications, workstations, and servers that use Microsoft solutions (Windows, Exchange, Azure, Office 365...).
46 out of 52
Lighthouse Mitigate Compliance & Privacy Risks Workshop - 4 WkLighthouse Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
This hands-on workshop helps intelligently identify and take effective action on insider risk leveraging Microsoft 365 and Purview.
47 out of 52
Microsoft 365 Governance: 1 month AssessmentCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Crayon Microsoft 365 Governance Assessment will assess your configuration and build recommendation report
48 out of 52
Modernize Endpoints (Microsoft Intune): 1 Day WorkshopCrayon
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The Endpoint Management Workshop is a one-day engagement that will help you showcase the value of Microsoft Endpoint Manager and how to manage users’ devices and apps from anywhere.
49 out of 52
Road to Microsoft 365: 1 month ImplementationCrayon
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Crayon Microsoft 365 migration services brings best practices and expertise to assure seamless migration.
50 out of 52
Cybersecurity Fitness Roadmap: 6-Wk AssessmentHiQ Stockholm AB
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Plan, create and implement a strategy for improving your organizational Cyber Hygiene using Microsoft Security Technologies.
51 out of 52
Assessment-Implementation Plan for Information Protection: 3-Months AssesmentCipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
52 out of 52
  • ก่อนหน้า
  • 1
  • 2
  • 3
  • 4
  • 5
About Marketplace
  • Why Microsoft Marketplace
  • Blogs
  • Customer stories
For customers
  • Office hours
  • Get started guide
  • Technical documentation
  • Private offers
  • Microsoft Azure consumption commitment
  • Billing and invoicing
For partners
  • Become a partner
  • Get listed
  • Get marketing support
  • Technical documentation
  • Step-by-step guidance to build, publish, and sell
  • Become co-sell eligible
  • Marketplace Community for Partners
  • Channel-led Marketplace sales
  • Multiparty private offers for channel partners
Business
  • Microsoft Cloud
  • Microsoft Security
  • Dynamics 365
  • Microsoft 365
  • Microsoft Power Platform
  • Microsoft Teams
  • Microsoft 365 Copilot
  • Small Business
Company
  • Careers
  • About Microsoft
  • Company news
  • Privacy at Microsoft
  • Investors
  • Diversity and inclusion
  • Accessibility
  • Sustainability
English (United States) Your Privacy Choices Opt-Out Icon Your Privacy Choices Consumer Health Privacy
  • Sitemap
  • Contact Us
  • Privacy & Cookies
  • Terms of Use
  • Trademarks
  • About our ads
  • Manage cookies
  • © Microsoft 2025