Enviar comentarios
Help & support
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
FiltrosBorrar todo

  • Su ubicación
  • Productos (1)
    • Dynamics 365
    • Microsoft 365 (1)
      • Adopción y administración de los cambios
      • Llamada para Microsoft Teams
      • Seguridad en la nube
      • Servicios de asesoría de cumplimiento
      • Implementación y administración de dispositivos
      • Trabajadores de primera línea
      • Administración de identidad y acceso
      • Information Protection y Gobernanza
      • Riesgo interno
      • Conocimiento e información
      • Salas de reuniones para Microsoft Teams
      • Reuniones para Microsoft Teams
      • Microsoft 365 Live Events
      • Administración de dispositivos móviles
      • Power Platform for Teams
      • Soluciones personalizadas de Teams
      • Implementación de trabajo en equipo
      • Protección contra amenazas
      • Workplace Analytics
    • Power Platform
  • Sectores
  • Tipo de servicio

Servicios de consultoría resultados

Mostrando resultados en servicios de consultoría
Vista resultados relacionados en nubes del sector.
Vulnerability ManagementBlack Cell Magyarország Korlatolt Felelossegu Tarsasag
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Rapidly and continuously prioritize the biggest vulnerabilities on your most critical assets
1 out of 60
Implementation of Microsoft Security CopilotAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
To assist customers fully utilized Microsoft Security Copilot, a generative AI-powered security solution that enhances defenders’ efficiency and capabilities, improving security outcomes at scale.
2 out of 60
Microsoft Priva: Quick Start Accelerator Implementation by Wizard CyberWIZARD GROUP LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Our comprehensive service is designed to help organizations rapidly deploy and optimize Priva, ensuring robust data privacy and compliance management
3 out of 60
Managed Detection and Response (MDR) for Microsoft 365 Defender & Sentinel (XDR): Monthly Managed ServiceInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Provide cross-domain threat protection and simplify breach prevention
4 out of 60
Mobile Intune: 1-Wk Accelerated ImplementionITC Secure Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Accelerated Deployment of Microsoft Intune for Corporate Mobile Devices (iOS, Android and macOS)
5 out of 60
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITED
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Threatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
6 out of 60
BYOD Intune 1-Wk Accelerated ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Accelerated Deployment of Microsoft Intune for Bring Your Own Device (BYOD) capability
7 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage WorkshopCGI Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
8 out of 60
Enhance Identity Security with Entra ID P2 (Azure AD P2) 6-Wk | Implementation/POCBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This offer provides Microsoft 365 customers customers with best practice implementations and understanding of the P2 features of Entra ID (previously known as Azure AD P2)
9 out of 60
Defender for IoT Operational Technology: 8-Week POCITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
ITC Secure's Defender for IoT for Operational Technology Proof of Concept helps you visualise and understand the threats to your OT/ICS environment.
10 out of 60
Bulletproof 365 Standard, Managed IT ServiceBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Managed IT Services and Support to Make Your Business Run Smoother
11 out of 60
Cyber Security Services 9 days AssessmentAlfa Connections Pte Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Helps you to build your security roadmap, based on facts from your organization's hybrid infrastructure. It enables you to prove that you take security seriously.
12 out of 60
Security Copilot Value AcceleratorAvanade, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Designed to help organizations modernize their security operations and administration by leveraging Gen AI.
13 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
14 out of 60
Defender for Endpoint: 5-Day ImplementationITC Secure Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Accelerated Deployment of Microsoft Defender for Endpoint including demonstration and best practice
15 out of 60
Microsoft 365 Tenant - 1-Wk AssessmentPoint Alliance Inc
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
You may have set up your Cloud tenant internally and followed many of the default settings at the time, or you may have had the assistance of an outside consultant to configure these settings.
16 out of 60
Microsoft 365 Security Hardening; 4-Wk ServiceProArch Technologies, Inc
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The Microsoft 365 Security Hardening Service implements security policies, configurations, settings, and other tools that provide the highest impact on reducing risk
17 out of 60
Secure Multi-Cloud Environments: 3-day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
The Secure Multi-Cloud Environments Workshop helps customers gain insights on active threats and vulnerabilities related to their hybrid and multi-cloud workloads within Microsoft 365.
18 out of 60
Microsoft 365 Risk 5-Days AssessmentKPCS CZ, s.r.o.
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Microsoft 365 Risk Assessment provides preventive and comprehensive check of the Customer's Microsoft 365 Environment.
19 out of 60
Microsoft 365 Defender - MXDR Service - 1 Year ImplementationCGI Inc.
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Unleash your Microsoft Defender 365 capabilities. Automatically detect & correlate threat signals across your endpoints, email, cloud applications, identities, cloud and on-premises workloads.
20 out of 60
Microsoft 365 Security Review: 3-Wk AssessmentProArch Technologies, Inc
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Identifies security weaknesses in the Microsoft cloud environment and delivers a specific plan for reducing risk
21 out of 60
BUI Cyber MDR - 1 Day Discovery WorkshopBUI (Pty) Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Readiness workshop and introduction to BUI's managed cybersecurity breach detection, investigation and response service.
22 out of 60
Managed Workspace Protection for Microsoft 365 DefenderOrange Business Services - Global
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Implementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Workspace Protection for Microsoft 365 Defender
23 out of 60
Threat Protection - 7 days ImplementationSPAN d.d.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Enhance the security of your cloud environment to make it less vulnerable to cyber attacks. Security built into Microsoft 365 provides excellent opportunities for enterprise protection.
24 out of 60
Guardian 365 Managed Security Services (Microsoft MXDR Verified)Forsyte IT Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Guardian 365 is the always-on security managed service offering end-to-end protection, monitoring, detection, and remediation of attacks on your infrastructure, data, users, and endpoints 24x7.
25 out of 60
Microsoft Threat Protection Workshop: 5-Wk WrkshopProArch Technologies, Inc
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Improve your Microsoft 365 security posture with a Microsoft Threat Protection Workshop
26 out of 60
Zero-Trust Secure Email 6wk ImpSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
27 out of 60
GDPR Assessment: 6-Week AssessmentHappiest Minds Technologies Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-threat-protection product iconThreat Protection
Enable enterprises GDPR compliance through a phased set of services ranging from in-depth gap assessment, one-time process & technical remediation and continuous compliance services.
28 out of 60
Managed Threat Detection [xdr] for Microsoft 365 DefenderOrange Business Services - Global
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Implementation of Microsoft 365 Defender for optimizing threat detection via the service Orange Cyberdefense Managed Threat Detection [xdr] for Microsoft 365 Defender
29 out of 60
Zero-trust collaboration security 6wk ImplementSynergy Advisors LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Collaborate securely across employees, partners, and vendors. Our offering drives the design and implementation of a customized solution, based on your unique use cases
30 out of 60
MDS Managed MXDR EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Designed to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
31 out of 60
Quadra DefendX Managed Threat Protection ServicesQuadrasystems.net (India) P Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Maximize Microsoft Defender XDR capabilities with DefendX - Quadra's Managed Threat Protection Services
32 out of 60
Microsoft Intune Pilot ImplementationTechNet UC LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
TechNet UC’s Microsoft Intune Pilot Implementation is a comprehensive solution designed to propel enterprises toward superior IT management and security standards.
33 out of 60
Defend Against Threats with SIEM Plus XDR usage WorkshopOrange Business Services - Global
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Our workshop will help you designing and deploying Microsoft security technologies for your unique needs.
34 out of 60
Microsoft 365 Security AssessmentCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CDW’s Microsoft 365 Security Assessment allows us to give you real insight into your current environment and create a roadmap with you to meet your security goals.
35 out of 60
Managed Threat Detection [xdr] [log]Orange Cyberdefense Global
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Stop threats with a cloud-native SIEM adapted to your new business needs.
36 out of 60
Microsoft Security Solutions - 4 Week AssessmentProtiviti
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Microsoft security solutions provide a unique offering of out of the box end to end security for the enterprise, delivering more capabilities at lower cost.
37 out of 60
Microsoft Security Copilot POV & Adoption PlanBDO Digital, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Prove the value of Microsoft Security Copilot & establish the necessary safeguards against excessive access and misuse while readying your group for safe, cost-effective adoption
38 out of 60
Microsoft Cybersecurity AssessmentThe Partner Masters
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Develop a strategic cyber plan, identify common threat scenarios and understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk.
39 out of 60
Aseguramiento de ciberseguridad: taller 4 semanasSofistic Colombia SAS
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Consultoría para la de seguridad adaptada a las necesidades de la empresa orientada en proteger la información y remediar vulnerabilidades de Microsoft 365.
40 out of 60
Microsoft Intune Suite Pilot ImplementationTechNet UC LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
TechNet UC is proud to present our comprehensive Microsoft Intune Suite Pilot, designed to help enterprises explore and evaluate the extensive capabilities of Intune Suite tools.
41 out of 60
Complete MXDR Threat Protection Powered by Microsoft SentinelKiZAN Technologies
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protection
Managed security services to protect against an evolving cyber threat landscape 24x7x365 with Microsoft Entra ID Protection, Microsoft Sentinel, and Microsoft Defender.
42 out of 60
Threat Protection Assessment & Zero Trust ArchitectureBDO Digital, LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Set Future-Proof Security Goals and Build a Roadmap to Strengthen Your Microsoft 365 Posture with a Zero Trust Architecture and Threat Protection Assessment
43 out of 60
End-to-end Threat Protection Workshop and PilotExelegent
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Threat Protection Engagement assures customers of a proactive approach to managing and mitigating identified threats and discovered vulnerabilities.
44 out of 60
Unified Identity & Secure Edge Modernization with Entra Suite+BDO Digital, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Modernize Identity & Network Access to enable Zero Trust for employees, customers and partners in any cloud from anywhere, to any app, AI, or resource
45 out of 60
Threat Protection: 2-Week WorkshopForsyte IT Solutions
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation security tools to work for you with this Microsoft 365 Threat Protection Workshop.
46 out of 60
ThreatHunter MXDR MSSP: 12-Mo ImplementationeGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
To assist our customers with advanced security services focused on identifying and mitigating cloud and device malicious threats and providing 24x7 monitoring and response services.
47 out of 60
Zero-Trust: 3-Day AssessmentToreon CVBA
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A zero-trust assessment to guide you towards improving your Identity posture in Microsoft 365 and Azure AD.
48 out of 60
Lenovo Cyber Resiliency as a Service EDALenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Environment Discovery Assessment: A comprehensive service to evaluate and enhance your organization's cybersecurity posture and IT infrastructure within the Microsoft 365 environment.
49 out of 60
Defender Pak365: Microsoft Defender ImplementationRavanty Tech Consulting, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Empower your organization with comprehensive, AI-driven protection tailored to meet evolving security needs with the help of Microsoft Defender.
50 out of 60
Microsoft 365 Threat Check Assessment: 3-Wk AssessmentInvoke
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Microsoft Threat Check Assessment offering is designed to understand the customer’s security goals and objectives, identify security threats across Microsoft 365, and provide recommendations.
51 out of 60
Cybersecurity Assessment: Microsoft WorkshopOrange Cyberdefense Global
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Understand your readiness for common security threats.
52 out of 60
SoftwareOne Managed Detection and Response Service for Microsoft SentinelSoftwareOne
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-threat-protection product iconThreat Protectionm365-sa-workplace-analytics product iconWorkplace Analytics
Future-proof your cyber security with Managed Detection and Response (MDR)
53 out of 60
MDS - Zero Trust Assessment & AdvisoryMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Assess the Zero Trust maturity stage of your organization & receive targeted milestone guidance & actionable roadmap, plus assistance & advice to improve your security posture.
54 out of 60
Threat Protection: 2 week Engagement WorkshopOrange Cyberdefense Global
+1
Applicable to:
m365-sa-threat-protection product iconThreat Protection
Learn how to put next-generation Microsoft Security tools to work for you
55 out of 60
Assessment of Microsoft IntuneCDW
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
CDW's Assessment of Microsoft Intune is a professional service that provides a comprehensive review of your current Microsoft Intune environment, including policies, settings and configurations.
56 out of 60
Secure & Improve Windows 10 & 11 with NextGen Windows: 3 Day WorkshopAgile IT
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Build on your investments in Microsoft 365 by reducing risks and increase delight with your organization to manage and secure Windows locally and in the cloud
57 out of 60
Microsoft Intune Custom DeploymentTechNet UC LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Our custom Microsoft Intune Deployment is designed to streamline your organization's device management with precision and personalization.
58 out of 60
Incident Response Tabletop Exercises: 2-Wk BriefingeGroup Enabling Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-insider-risk product iconInsider Riskm365-sa-threat-protection product iconThreat Protection
Be proactive and prepare your IT team for emergencies with a Disaster Plan
59 out of 60
Defender for IoT Enterprise: 8-Week POCITC Secure Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-threat-protection product iconThreat Protection
Understanding risk with unmanaged IoT devices can be difficult. Our Defender for Enterprise IoT Proof of Concept helps you visualise and understand the threats to your environment.
60 out of 60
  • Anterior
  • 2
  • 3
  • 4
  • 5
  • 6
  • Siguiente
Novedades
  • Copilot para organizaciones
  • Copilot para uso personal
  • Microsoft 365
  • Explora los productos de Microsoft
  • Aplicaciones de Windows 11
Microsoft Store
  • Perfil de la cuenta
  • Centro de descargas
  • Devoluciones
  • Seguimiento de pedidos
Educación
  • Microsoft Educación
  • Dispositivos para el sector educativo
  • Microsoft Teams para Educación
  • Microsoft 365 Educación
  • Office Educación
  • Entrenamiento y desarrollo para educadores
  • Ofertas para estudiantes y padres
  • Azure para estudiantes
Empresa
  • Microsoft Cloud
  • Seguridad de Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Desarrollador y TI
  • Desarrollador de Microsoft
  • Microsoft Learn
  • Admite aplicaciones del Marketplace de IA
  • Comunidad de Microsoft Tech
  • Microsoft Marketplace
  • Microsoft Power Platform
  • Visual Studio
Compañía
  • Trabajos
  • Acerca de Microsoft
  • Privacidad en Microsoft
  • Inversionistas
  • Sustentabilidad
Español (Colombia) Icono de exclusión de opciones de privacidad Tus opciones de privacidad Privacidad de la salud del consumidor
  • Sitemap
  • Contáctenos
  • Privacidad
  • Aviso legal
  • Marcas Registradas
  • Sobre nuestra publicidad
  • Manage cookies
  • © Microsoft 2025