Poslat zpětnou vazbu
Nápověda a podpora
Uložené položky
Soukromé plány
Počkejte chvilku, přihlásíme vás…
FiltryVymazat vše


Výsledky Konzultační služby

Zobrazují se výsledky v konzultační služby.
Zobrazení související výsledky v industry clouds.
Microsoft 365 Rapid Security Assessment: 1-Wk AssessmentAwara IT
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft 365 Rapid Security Assessment is a quick yet comprehensive evaluation to enhance Microsoft 365 security against evolving cyber threats
1 out of 60
Modern SecOps Engagement: 4-Week WorkshopTech One Global
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The Modern SecOps Engagement is a comprehensive 4-week assessment designed to provide a bird’s eye view across your enterprise using Microsoft Sentinel and the Unified SecOps Platform.
2 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 WeeksWipro Ltd
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
3 out of 60
Threatscape CSI EngagementsTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
4 out of 60
Microsoft Funded Workshop for Threat Protection envisioning WorkshopVM GLOBAL SOLUTIONS(PTY)LTD
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Microsoft Funded Workshop for Threat Protection envisioning Workshop for Microsoft 365 will upskill your team, provide knowledge Microsoft Security
5 out of 60
DORA act assessment and implementationSii Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
6 out of 60
Microsoft 365 threat protection assessmentAVASOFT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Identify vulnerabilities and threats in Microsoft 365. Use advanced protection, intelligence, detection, and response to safeguard data. Enhance security with real-time insights and monitoring.
7 out of 60
Proof of Concept Solution Microsoft 365 CopilotKPCS CZ, s.r.o.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Embark on a transformative journey with KPCS's 4 weeks PoC for Microsoft 365 Copilot. Uncover tailored use-cases and maximize the value for your business. Revolutionize your approach to innovation.
8 out of 60
Cybersecurity Managed Services for Microsoft by SoftwareOneSoftwareOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Securing your digital landscape with SoftwareOne Cybersecurity Managed Services for Microsoft
9 out of 60
Copilot for Security Readiness AssessmentPerformanta
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Futureproof your Business Security with Microsoft Security Copilot and Performanta
10 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Conditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
11 out of 60
Hyperbolt Secure DeployDelphi Consulting
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Hyperbolt Secure Deploy offers automated Microsoft 365 Security implementation, delivering enterprise-grade protection in weeks using industry-standard policies.
12 out of 60
MDS - Microsoft Security Copilot WorkshopMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Discover how Microsoft Security Copilot can enhance your security operations, streamline incident response, and empower your security teams
13 out of 60
ALFA Managed SOC with Microsoft Defender XDR and SentinelAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
ALFA Managed Security Operations Center (SOC) leverages the powerful capabilities of Microsoft Defender Extended Detection and Response (XDR) and Microsoft Sentinel (SIEM & SOAR) to provide a robust,
14 out of 60
Copilot For Microsoft 365 Readiness AssessmentTHREATSCAPE LIMITED
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Threatscape’s Copilot for Microsoft 365 Readiness Assessment (CRA) service can help you understand, and begin to address, the risks of Copilot for Microsoft 365 adoption.
15 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies Services
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Dell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
16 out of 60
Application Monitoring Solution with Microsoft SentinelAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance security and performance with Microsoft Sentinel. Proactive monitoring ensures resilience. Simplify compliance and focus on business goals while we manage app security.
17 out of 60
AVASecure 360 Next-Gen MXDR Managed ServicesAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
At AVASOFT, we are committed to securing your digital environment through a holistic Managed Extended Detection and Response (MXDR) solution.
18 out of 60
Microsoft Cloud Application for 3rd Party AppsAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Secure your cloud with Microsoft Cloud App Security. Control third-party apps, prevent data leaks, and ensure compliance with robust monitoring and policies.
19 out of 60
Microsoft 365 Security AssessmentSii Sp. z o.o.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We assess general security controls and Microsoft 365 tools, delivering tailored recommendations to enhance cybersecurity.
20 out of 60
4security: Backup as a Service for Microsoft 3654Sight Holdings
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Protect your data with 4Security's Microsoft 365 Backup as a Service. Seamless integration, automated backups, and reliable data recovery for businesses of all sizes.
21 out of 60
Microsoft 365 complete security HardneningAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Are you informed about your Microsoft 365 security? Our solutions address security challenges in Teams, SharePoint, and more. Custom policies, threat detection, and monitoring ensure compliance. ​
22 out of 60
Rapid Remediation of Microsoft Secure ScoreCyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost your Microsoft Secure Score, reduce risk and increase cyber resilience with expert-led rapid remediation.
23 out of 60
Threat Protection Engagement: 4-Week WorkshopTech One Global
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This 4-week engagement deep dives into the next-gen Microsoft Security tools, provides a thorough analysis of your security posture, and offers actionable steps to enhance your threat protection.
24 out of 60
Red Canary MSSP FastTrack for SecurityRed Canary
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Leverage Red Canary's MSSP FastTrack for Security services to streamline the deployment of your E5 security workloads.
25 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
26 out of 60
Microsoft 365 Security & Compliance AssessmentITX360 (Pvt) Ltd.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Microsoft 365 security assessment with a detailed report and recommendations to improve your security and compliance
27 out of 60
Modern Workplace Security 10-Wk ImplementationWipro Ltd
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Wipro’s Modern Workplace Security and Compliance 10-Wk Base Implementation offering powered by Microsoft 365 Security and Compliance
28 out of 60
Email Security Threat AssessmentAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in your email data security? Our Email Security Threat Assessment ensures compliance and protects sensitive data with encryption, access controls, and automated governance.
29 out of 60
Endpoint Management WorkshopYork Telecom Corp
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
3 Day Workshop for Microsoft Endpoint Manager (MEM)...Learn the capabilities of MEM, how to deploy and best practices.
30 out of 60
Barracuda Office 365 email-based securityCrayon
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defense, API-based inbox defense, incident response, data protection, and compliance capabilities.
31 out of 60
Threat Protection WorkshopMobile Mentor
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
During this engagement, we’ll partner with you to strengthen your organization’s approach to cybersecurity and help you better understand how to prioritize and mitigate potential attacks.
32 out of 60
Copilot - 2 Days Adoption WorkshopINSOMEA COMPUTER SOLUTIONS TUNISIE SARL
+2
Applicable to:
m365-sa-firstline-workers product iconFrontline Workersm365-sa-threat-protection product iconThreat Protection
INSOMEA will help users in adopting copilot within companies from different sectors and sizes
33 out of 60
Microsoft Sentinel Security Consulting ServiceComtrade System Integration
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
34 out of 60
Microsoft Defender for Business Managed Service: Monthly MDRe2e-assure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Maximise your investment in Microsoft Defender for Business with our 24/7 detect & respond services.
35 out of 60
Azure and Microsoft 365 SecOps DiagnosticsBlueVoyant
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
BlueVoyant experts review an organization's Azure and Microsoft 365 Defender Security Portal to identify potential vulnerabilities and provide actionable recommendations.
36 out of 60
SecureBlu MDR Service for Microsoft 365 DefenderNew Era Technology
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
SecureBlu Managed Detection and Response (MDR) maintains optimal security posture by continuously minimizing the attack surface and improving visibility via enhanced monitoring and response.
37 out of 60
G Suite to Office 365 migration: 1-Hour Assessmenttrue org cloud
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Assessment of your current G Suite environment to plan migration to Office 365
38 out of 60
Data Leak DetectionAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Rapid Data Leak Detection: integrate leak‑feed connectors into Sentinel, automate notifications, and Microsoft Security plans.
39 out of 60
KMicro MXDR for SMBKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
KMicro MXDR for SMB helps businesses reduce operational complexity and strengthen cybersecurity defenses by managing their Microsoft Defender XDR environment.
40 out of 60
Implementation of Microsoft Security CopilotAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
41 out of 60
AVASecure 360 - Microsoft Defender for Endpoint Security Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Manage and analyze device logs, gain activity insights, ensure compliance, centralize monitoring, retain logs, and quickly identify and investigate security incidents.
42 out of 60
Sensitive data risk assessmentAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in assessing data risks? With Microsoft Purview, we evaluate vulnerabilities and integrate mitigation strategies, enhancing your data security and safeguarding your business.
43 out of 60
AVASecure 360 - Microsoft 365 Security & Governance Solutions by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Aware of your Microsoft 365 security? Our solutions secure Teams, SharePoint, and more. Use custom policies, threat detection, and monitoring to protect data, mitigate risks, and ensure compliance.
44 out of 60
IT Infrastructure OptimizationAwara IT Kazakhstan LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
IT Infrastructure Optimization: express audit, hybrid/multicloud design, IaC automation, monitoring on Azure and Microsoft 365 Infrastructure Optimization.
45 out of 60
Red Canary Cloud Security AssessmentRed Canary
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
46 out of 60
Symity Consulting for Microsoft SecuritySYMITY, part of Charterhouse Voice & Data Ltd
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Whether you need help planning a watertight security strategy, or need support for seamless deployment, adoption and ongoing management – we’ve got you covered.
47 out of 60
ShadowManage Microsoft 365 SSPSRKK
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Comprehensive Cybersecurity Assurance with ShadowManage Microsoft 365 SSP: Integrated Protection Across Identities, Email and Collaboration, Endpoints, Applications, Clouds, and Workloads.
48 out of 60
Microsoft 365 Security Review: AssessmentCyberOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insightsm365-sa-threat-protection product iconThreat Protection
Identify vulnerabilities, optimise configurations and enhance security with CyberOne’s Microsoft 365 Security Review: Assessment.
49 out of 60
Active Directory Security on DemandComtrade System Integration
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Discover hidden vulnerabilities and perform detailed analysis of Active Directory security posture using Comtrade AD Security on demand - ADSOD service.
50 out of 60
True Managed Security Service- 3 day Workshoptrue org cloud
+3
Applicable to:
m365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
You have a vision. We can help you secure it...
51 out of 60
Microsoft Sentinel - Log Management and threat detectionAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Integrating Microsoft Sentinel with External EDR optimizes device management by proactively identifying and mitigating threats, ensuring regulatory compliance, and enhancing overall security protocols
52 out of 60
Teams & SharePoint Security HardeningAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-teams-custom-solutions product iconTeams Custom Solutionsm365-sa-threat-protection product iconThreat Protection
Teams and SharePoint Security Hardening ensures robust security with custom policies, threat detection, and real-time monitoring to safeguard data and ensure compliance.
53 out of 60
Microsoft Intune Quickstart ImplementationTechNet UC LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The purpose of TechNet UC’s Microsoft Intune Quick Start offer is to provide organizations with expert guidance and support for the efficient deployment and management of Intune.
54 out of 60
Secure & Manage Devices using the Microsoft Intune Suite with AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Seamlessly secure devices with Microsoft Intune. Simplify management, protect against cyber threats, and ensure robust endpoint protection. Tailored solutions for peace of mind
55 out of 60
Defender for Endpoint Managed Servicee2e-assure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft Defender Managed Services, 24/7 detection and response to cyber attacks through Defender.
56 out of 60
Defend, Protect, Secure with Microsoft Defender XDRComtrade System Integration
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Take the security of your environment to the next level by implementing a unified security platform that provides visibility, investigation, and response across the cyberattack chain.
57 out of 60
Protect 365 App - 1 hour implementationCloud Life
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The Protect 365 app gives insight and grip in Microsoft Cloud security & compliance. Get the most important Devices, Data, Identity, Apps risk in one overview, and understand how to mitigate.
58 out of 60
Secure Modern Workplace Platform ImplementationCognizant
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-teamwork-deployment product iconTeamwork Deploymentm365-sa-threat-protection product iconThreat Protection
Enables teams to securely collaborate, connect and be more productive than ever before, no matter when or where they work.
59 out of 60
Office 365 Teamwork Security - Managed ServiceCognizant
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Teamwork Security provides a comprehensive security management service for Office 365 platforms
60 out of 60
  • 1
  • 2
  • 3
  • Další
Co je nového
  • Surface Pro
  • Surface Laptop
  • Surface Laptop Studio 2
  • Surface Laptop Go 3
  • Microsoft Copilot
  • Microsoft 365
  • Prohlédnout produkty Microsoft
Microsoft Store
  • Profil účtu
  • Centrum stahování
  • Podpora pro Microsoft Store
  • Vrácení
  • Sledování objednávky
  • Recyklace
  • Commercial Warranties
Vzdělávání
  • Microsoft Education
  • Zařízení pro vzdělávání
  • Microsoft Teams pro vzdělávání
  • Microsoft 365 Education
  • Office Education
  • Vzdělávání a rozvoj pedagogů
  • Akce pro studenty a rodiče
  • Azure pro studenty
Firmy
  • Microsoft Cloud
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Vývojáři a IT
  • Microsoft pro vývojáře
  • Microsoft Learn
  • Podpora aplikací s umělou inteligenci v obchodě Marketplace
  • Odborná komunita Microsoft
  • Azure Marketplace
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
Společnost
  • Kariéra
  • Novinky u společnosti
  • Microsoft a ochrana osobních údajů
  • Investoři
  • Udržitelnost
Čeština (Česko) Ikona nesouhlasu s volbami ochrany osobních údajů Vaše volby ochrany osobních údajů Ochrana osobních údajů spotřebitele ve zdravotnictví
  • Sitemap
  • Kontaktujte nás
  • Ochrana osobních údajů a soubory cookie
  • Podmínky používání
  • Ochranné známky
  • O našich reklamách
  • EU Compliance DoCs
  • Manage cookies
  • © Microsoft 2025