Feedback geben
Hilfe und Support
Gespeicherte Elemente
Private Pläne
Nur einen Moment, wir melden Sie an...
FilterAlle löschen


Beratungsdienste Ergebnisse

Es werden Ergebnisse in beratungsdienste angezeigt.
Anzeigen verknüpfte Ergebnisse in branchenclouds.
Microsoft 365 Endpoint Manager Deployment Roadmap Assessment - 4 Week AssessmentProtiviti
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Actionable plan and high-level view to move towards a successful Microsoft Endpoint Manager (MEM) deployment and migration
1 out of 60
Hybrid Cloud Security Workshop - 1-DayZones, LLC
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Identify current, ongoing risks to your cloud environment and define next steps to accelerate your security journey
2 out of 60
Modern Endpoint Management: 2-Hr AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
There’s a reason Microsoft chose us as their Modern Endpoint Management Partner of the Year for 2023. We believe you can reduce your threat risk by modernizing your Endpoint Management Strategy.
3 out of 60
Egyptian Data Protection Law: 2 Days WorkshopGLOBAL BRANDS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-insider-risk product iconInsider Risk
Egyptian Data Protection Law offer aims to give you a brief description of the following: Data Privacy Basics The Egyptian Data Protection Law main highlights
4 out of 60
Defender for IoT Operational Technology: 8-Week POCITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
ITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
5 out of 60
Modern Workplace Optimization - 4 Week AssessmentProtiviti
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
This assessment for Microsoft 365 helps customers obtain insights to what it takes to improve productivity against Cyber Threats for Workforce Productivity.
6 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Microsoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
7 out of 60
KMicro MXDR for SMBKMicro Tech, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
KMicro MXDR for SMB helps businesses reduce operational complexity and strengthen cybersecurity defenses by managing their Microsoft Defender XDR environment.
8 out of 60
Microsoft 365 Copilot: 1-Day AssessmentData Market Bilgi Hizmetleri A.S
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-power-platform-for-teams product iconPower Platform for Teams
How Microsoft 365 Copilot can transform your business and the overall concepts you must understand to better daily business life.
9 out of 60
Assessment and Roadmap: Microsoft Security (Azure, Microsoft 365, Active Directory, Entra ID) 6-Week EngagementKudelski Security
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
This assessment defines and recommends steps to achieve your desired security state using your existing security solutions and capabilities.
10 out of 60
Microsoft Sentinel Quick StartEdgile, Inc.
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Production pilot, which is expected to provide centralized log collection, detection of previously undetected threats, investigation with artificial intelligence, and Rapid Response to incidents.
11 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Inspect events in your network to locate threat indicators and entities
12 out of 60
iT1's Security AssessmentIt1 Source LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Improve your security awareness and be prepared to defend against common security threats with Microsoft 365 Security Tools
13 out of 60
Securing your Microsoft 365 environment according to Microsoft Best Practice Recommendations: 2-Months Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Strengthen online security with Microsoft 365 for Business, optimizing your environment for increased productivity, enhanced cybersecurity, and cost reduction while safeguarding sensitive data.
14 out of 60
Microsoft 365 Managed Security Services: 2-Hour Free BriefingNetwoven
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Netwoven Managed Security Services provides administration, monitoring and governance activities for your Microsoft 365 subscription
15 out of 60
Cyderes Architecture Engineering Services for Microsoft 365 Defender for EndpointCyderes
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Cyderes has developed Microsoft 365 Defender security adoption advisory services to help our clients architect and implement onboarding of Microsoft 365 Defender security features.
16 out of 60
M365 Compliance Assessment: 4-Wk AssessmentKiZAN Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Manage and Improve your organizations compliance
17 out of 60
Darktrace Managed Network SensorSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Sophisticated cyberattacks often spread across a network before most security tools even notice, let alone have the chance to react. Sentinel partner Darktrace offers cutting-edge, real-time threat
18 out of 60
Microsoft 365 / Office 365 / Azure / Dynamics 365 Knowledge Transfer: 3-Hours Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-knowledge-and-insights product iconKnowledge & Insights
Unlock the true potential of your Microsoft 365 environment with our specialized "Knowledge Transfer" consulting service – a roadmap to maximize your organization's capabilities.
19 out of 60
Zones Implementation of Microsoft DefenderZones, LLC
+1
Applicable to:
m365-sa-cloud-security product iconCloud Security
Enhance cybersecurity with Zones' Microsoft Defender suite, offering expert implementation, comprehensive coverage, and continuous support.
20 out of 60
Cybersecurity Assessment: 5-Wk AssessmentPSM Partners
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
This assessment helps CISO, CIO, CRO, and similar professionals understand the importance of security and gain insights on safeguarding their organization against potential threats.
21 out of 60
Microsoft Cybersecurity AssessmentAkins IT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
22 out of 60
Modern SecOps Discovery SessionAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Complimentary discovery session for qualified customers to optimize the intelligence of their teams and better leverage their existing Microsoft technology.
23 out of 60
Secure Data Management with Microsoft PurviewAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Confident in your Secure Data Management with Microsoft Purview? We secure data with encryption, access controls, and automated governance, ensuring compliance and protecting your business.
24 out of 60
MDS - Threat Protection EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 3-day engagement to discover threats and vulnerabilities to a customer's Microsoft cloud and on-premises environments & enhance a customer's ability to detect, respond & mitigate security threats.
25 out of 60
Nonprofit Security Maturity Assessment - 4 weeksBDO Digital, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Roadmap to increase your security score with cost-effective security tools
26 out of 60
Copilot for Security Rapid Test Flight | 2-Wk WorkshopBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
This is a two-week engagement tailored to ensure you receive expert assistance in deploying your Copilot for Security effectively and efficiently.
27 out of 60
Cybersecurity Assessment Engagement - 4 weeksGrant Thornton LLP
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Enhance Your Cloud Security Posture with Grant Thornton’s Cybersecurity Assessment
28 out of 60
Threat Protection Engagement - 4 weeksGrant Thornton LLP
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Improve your Security Posture with Grant Thornton's Threat Protection Engagement
29 out of 60
Defender for Office365Suri Services SC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Suri Services y Office 365: La alianza impenetrable en ciberseguridad.
30 out of 60
Microsoft Sentinel Security Consulting ServiceComtrade System Integration
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Microsoft Sentinel Consulting Services offers tailored expertise to strengthen and simplify your security environment using cutting-edge technology from Microsoft.
31 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
32 out of 60
Domain Services and Active Directory Roles Migration: 3-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
This service moves key server tasks to a new one for upgrades or system changes.
33 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
34 out of 60
Cybersecurity AssessmentCDI LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
The Cybersecurity Assessment is designed to evaluate a customer’s cybersecurity posture and reduce their risk exposure by using advanced Microsoft Security products
35 out of 60
C1st Implementation of Microsoft Defender for Office 365C1st Technologies LLC
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Enhance email security for businesses by implementing Defender for Office 365 with Exchange Online Protection (EOP). Our goal is to protect organizational email from spam, phishing, and sophisticated
36 out of 60
Microsoft 365 GCC High Rapid DeploymentDaymark Solutions
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Services
Deploy Microsoft 365 GCC High services in days, not weeks, while leveraging Daymark’s enhanced security baseline.
37 out of 60
Microsoft 365 HIPAA/HITECH 20 Hour ImplementationNew Charter Technologies, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Implementation of Microsoft 365 to include compliance policies and templates for health care.
38 out of 60
Microsoft 365 Identity Security Health Check: 1-Wk AssessmentITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
39 out of 60
Microsoft 365 Manage Service–12 mth ImplementationAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-firstline-workers product iconFrontline Workers
Alfa Connections providing Microsoft 365 Managed service is designed to enhance your workforce experience by supporting your organization on planning, enablement, implementation, and adoption.
40 out of 60
Deploy Microsoft Intune for Mobile Device ManagementDaymark Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Management
Optimize Mobile Device Management and Security with Microsoft Intune.
41 out of 60
Avanade Modern Workplace FY23Avanade, Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
Modern Workplace Consulting Services
42 out of 60
Microsoft Sentinel Log Management and Threat Detection by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Boost security and compliance. Proactive support, troubleshooting, and optimization enhance device management. Focus on business success while we manage endpoint security complexities.
43 out of 60
Secure Modern Workplace with Microsoft and Ergo: 1-Wk AssessmentErgoServices
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Ergo's Microsoft 365 secure audit for your modern workplace environment, resulting in detailed report of findings, recommendations and deployment plan of these recommendations.
44 out of 60
On-Ramp to Microsoft 365 Tenant-to-Tenant Migration: 12-week ImplementationQuisitive
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Quisitive has the expertise to plan, manage, and implement your Microsoft 365 tenant to tenant migration, taking into account identity management, workload migration, and change management.
45 out of 60
Implementation of Microsoft Security CopilotAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
46 out of 60
MX Spooler Service to avoid NDRs and bounced emails: 2-Wk Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Service used to avoid Non-Delivery Reports and bounced emails during tenant-to-tenant migration.
47 out of 60
Intune Security Reviewmnemonic
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-mobile-device-management product iconMobile Device Management
Enhance your Microsoft Intune deployment with mnemonic's specialised service for optimal device management and security in Microsoft Azure environments.
48 out of 60
Microsoft 365 Fundamentals: 1 Day WorkshopNETCOM LEARNING
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-teams-custom-solutions product iconTeams Custom Solutionsm365-sa-threat-protection product iconThreat Protection
Introduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
49 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
50 out of 60
Health-Check for Microsoft 365 Tenant: AssessmentnovaCapta GmbH
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-knowledge-and-insights product iconKnowledge & Insights
Microsoft 365 nach höchsten Sicherheitsstandards und Best Practices absichern, schützen und optimieren
51 out of 60
OneSec Defender for Endpoint – Migration offerSecure Nextgen Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
The OneSec Defender for Endpoint Migration offers expert guidance for migrating to Microsoft Defender for Endpoint on Windows 10/11 devices, aligning with Microsoft's best practices
52 out of 60
Microsoft Defender for Cloud Apps JumpstartSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Microsoft Defender for Cloud Apps address security gaps in an organization's environment.
53 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
54 out of 60
Windows 365 Assessment - 1 dayCC Bilgi Teknolojileri
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Hybrid Windows for a hybrid world Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC. From contractors and interns to software developers and indust
55 out of 60
Cloud Security Implementation: 3-WK implementationNeWay Technologies Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft Defender for Cloud, a tool for security posture management & threat protection will enable our customers to strengthen their security posture for resources running in Azure & Cloud platform.
56 out of 60
Microsoft 365: 3 Week Solution AssessmentFirst National Technology Solutions, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-meetings-for-microsoft-teams product iconMeetings for Microsoft Teamsm365-sa-teamwork-deployment product iconTeamwork Deployment
Partner with FNTS to conduct a 3 week workplace modernization solution assessment to build a TOC analysis & evaluate current purchasing structure to make recommendations for adoption of Microsoft 365.
57 out of 60
"Threat Protection: 3 Day Workshop"Insentra Pty Ltd
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Our Threat protection workshop is designed to create customer intent for deploying advanced Microsoft Security products.
58 out of 60
Modern Data Protection with Microsoft 365 + Cohesity: 5-Day WorkshopeGroup Enabling Technologies, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
With Microsoft 365 Backup and Cohesity we focus on Hybrid-Cloud Governance, Security, and a design for Data Protection to create the resilience that a business needs to move forward.
59 out of 60
Microsoft 365 Strategy, guidance and governance workshop by Nexer: 1 DayNexer Group AB
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governance
We will help you go through your Microsoft 365 implementation and make sure that you follow Microsofts Best Practices.
60 out of 60
  • Zurück
  • 2
  • 3
  • 4
  • 5
  • 6
  • Weiter
Neuigkeiten
  • Surface Pro
  • Surface Laptop
  • Surface Laptop Studio 2
  • Surface Laptop Go 3
  • Microsoft Copilot
  • Microsoft 365
  • Microsoft-Produkte erkunden
  • Windows 11-Apps
Microsoft Store
  • Kontoprofil
  • Download Center
  • Microsoft Store-Support
  • Rückgaben
  • Bestellnachverfolgung
  • Abfallverwertung
  • Weitere Informationen
Bildungswesen
  • Microsoft Bildung
  • Geräte für den Bildungsbereich
  • Microsoft Teams for Education
  • Microsoft 365 Education
  • Office Education
  • Ausbildung und Weiterbildung von Lehrpersonal
  • Angebote für Studenten und Eltern
  • Azure für Studenten
Unternehmen
  • Microsoft Cloud
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Entwicklung & IT
  • Microsoft-Entwickler
  • Microsoft Learn
  • Support für KI-Apps im Marketplace
  • Microsoft Tech Community
  • Azure Marketplace
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
Im Unternehmen
  • Jobs & Karriere
  • Unternehmensnachrichten
  • Datenschutz bei Microsoft
  • Investoren
  • Nachhaltigkeit
Deutsch (Österreich) Abwahlsymbol „Ihre Datenschutzoptionen“ Ihre Datenschutzoptionen Verbraucherdatenschutz für Gesundheitsdaten
  • Sitemap
  • Impressum
  • Datenschutz & Cookies
  • Nutzungsbedingungen
  • Markenzeichen
  • Informationen zu unserer Werbung
  • EU Compliance DoCs
  • Manage cookies
  • © Microsoft 2025