Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
FiltrosBorrar todo


Servicios de consultoría resultados

Mostrando resultados en servicios de consultoría
Microsoft 365 Cyber Insurance Review: 2-5 Wk AssessmentKiZAN Technologies
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Map your business cyber insurance carrier requirements to Microsoft 365 environment controls ranked by priority and impact to your security posture.
1 out of 60
AgileAscend: Microsoft 365 GCC High Implementation for CMMC ComplianceAgile IT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Agile IT has created a specialized set of services required to meet CMMC 2.0 Leveraging Microsoft 365 services in GCC High.
2 out of 60
Full Cutover Google Workspace to Office 365 migration: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Migrate G Suite (Google Apps) to Microsoft 365, transferring mailboxes, calendars, tasks, contacts, files, and documents seamlessly to Exchange Online and OneDrive.
3 out of 60
Workshop for Microsoft 365 Threat ProtectionCDW
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Workshop for Microsoft 365 Threat Protection provides the following objectives to ensure thorough enablement of crucial Microsoft products for a more secure environment.
4 out of 60
Data Protection Program & Strategy Design - 12 Week ImplementationProtiviti
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
End-to-End Data Protection to Identify, Classify, Protect and Optimize Your Data in Microsoft 365
5 out of 60
Microsoft 365 Security Health Check: 3 day AssessmentISCG SP Z O O
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Microsoft 365 is a multi-layer solution with the right security policies you can block over 99.9 percent of account compromise attacks!
6 out of 60
Microsoft 365 Copilot Data and Security Readiness: 4-Week AssessmentSpyglass MTG, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our Microsoft 365 Copilot Data and Security Readiness Assessment is a scoped engagement that is designed to accelerate the ability to integrate and consume Copilot across your enterprise.
7 out of 60
Copilot Readiness AssessmentAscent Global, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Ascent’s one-hour discovery session ensures customers have the processes, procedures, and foundational technologies to secure and run Microsoft Copilot before implementation.
8 out of 60
SCCM to Intune Migration Plan: 2-week AssessmentMobile Mentor
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Our migration plan gives you a roadmap, a timeline, and best practices to migrate from SCCM / ConfigMan to Intune.
9 out of 60
Microsoft 365 Strategic Roadmap WorkshopCDI LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
CDI provides this Strategic Roadmap workshop to identify workloads that can be migrated to Microsoft 365 and design a roadmap for you, our customer, to drive adoption and improve ROI.
10 out of 60
Deployment of Copilot for Microsoft 365Windows Management Experts, Inc.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Enhance the productivity of Microsoft 365 with our premium Deployment service for Copilot for Microsoft 365.
11 out of 60
eDiscovery Workshop: 4 hours WorkshopPlanet Technologies
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A half-day Workshop that provides an overview and deep understanding of Microsoft 365 eDiscovery Standard and Premium products.
12 out of 60
Onesec Digital IdentitySecure Nextgen Systems
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Having a Zero Trust and IGA/IAM (Identity Governance and Administration / Identity and Access Management) service offering becomes increasingly relevant
13 out of 60
Accelerate Windows 365: 1-mo Proof of ConceptAMTRA Solutions Ltd
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Accelerate Windows 365 offers innovative management capabilities for your environment and optimizes your existing investment in cloud solutions.
14 out of 60
MDS Managed MXDR EngagementMaureen Data Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Designed to enhance your organization’s security posture, this workshop provides insights into advanced threat detection, response strategies & integration of cutting-edge security technologies.
15 out of 60
Microsoft 365 Copilot Success FrameworkInsight
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Insight’s Microsoft 365 Copilot Success Framework service is designed to enable your organization to securely drive ROI and take advantage of all that Microsoft 365 Copilot has to offer.
16 out of 60
Threatscape’s Conditional Access for Zero Trust (CAZT)THREATSCAPE LIMITED
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Conditional Access for Zero Trust service rapidly onboards your tenant into a robust and scalable Conditional Access architecture that adheres to Microsoft’s Zero Trust and Well-Architected frameworks
17 out of 60
Lenovo Cyber Resiliency as a Service DeploymentLenovo Software
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
CRaaS Deployment Service is designed to deploy and integrate required software within your IT production environment, ensuring compatibility with your existing systems
18 out of 60
Managed Detection and Response [Threat Hunting]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Inspect events in your network to locate threat indicators and entities
19 out of 60
Getting Ready for CoPilot with PurviewPatriot Consulting Technology Group LLC
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The "Getting Ready for CoPilot with Purview" workshop is crafted to prepare organizations for the eventual adoption of Microsoft's CoPilot, by first implementing Microsoft Purview
20 out of 60
SNP’s Approach to Copilot for Microsoft 365SNP Technologies
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The SNP approach to Copilot for Microsoft 365 enhances productivity and efficiency in organizations through the capabilities of Copilot for Microsoft 365
21 out of 60
Avanade Microsoft Security Service Edge Quick StartAvanade, Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Microsoft’s new Security Service Edge (SSE) capability empowers organizations on their Zero Trust journey though unique in the market integration with Microsoft Entra.
22 out of 60
Journey to Microsoft 365 Copilot: 4-hours WorkshopPROJECT INFORMATICA SRL
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Microsoft 365 Copilot workshop bring to you the opportunity to create awareness about holistic to Microsoft 365 Copilot
23 out of 60
CGI - NextGen Windows Jumpstart Workshop / Atelier - FY25CGI Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Utilize CGI expertise and Microsoft funding to discover Windows 365 Cloud PC / Profitez de l’expertise de CGI et du financement de Microsoft pour découvrir le poste de travail infonuagique Windows 365
24 out of 60
Microsoft 365 Managed ServicesNetrix Global
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
Netrix’s 24x7x365 managed services for Microsoft 365 combines a reactive service desk with proactive strategic planning to ensure your team is productive and secure.
25 out of 60
Secure Identities using Microsoft Entra ID with AVASOFTAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Entra ID Security Hardening simplifies user access in organizations through automation, enhancing security and operational efficiency.
26 out of 60
Varonis JumpstartSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Sentinel’s Varonis Jumpstart assists your organization with the implementation and configuration of Varonis to enhance security and prevent data loss incidents.
27 out of 60
Securing Identities and Access: 3-day WorkshopECF Data LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The Securing Identities and Access Workshop is intended to help you cover the security landscape, obtain insights into your identity posture, and craft an improvement roadmap using Microsoft 365.
28 out of 60
SmartStart for IntuneMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
29 out of 60
Edgile Caller Verifier Powered by Entra ID : 8 WksWipro Ltd
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Wipro's Edgile Caller Verifier solution powered by Entra ID helps to authenticate service desk agents using multiple authentication methods and enable them to verify end users calling in for support.
30 out of 60
Data Protection and Governance with Microsoft PurviewAVASOFT
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Confident in your data governance security? With Microsoft Purview, we ensure data safety with encryption, access controls, and automated governance, safeguarding your business and compliance.
31 out of 60
Microsoft Entra Cloud Permissions Risk Check: 15-Days WorkshopWipro Ltd
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Wipro's Entra cloud permission workshop to help enterprises rapidly enable the service with Azure, and multi-cloud providers to discover privilege permission risks associated with identities
32 out of 60
Capgemini Modern Workspace PortfolioCapgemini Group
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
Capgemini’s Modern Workspace that is focusing on reinventing the workplace by creating superior, experiences for employees everywhere.
33 out of 60
Microsoft Endpoint Manager: 8-Hours WorkshopOnex Group
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Learn how to secure Windows 11 environments with Microsoft Endpoint Manager
34 out of 60
Microsoft Funded Workshop for Copilot for Microsoft 365: 2-Wk AssessmentProServeIT
+2
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
If your company is eligible, we can deliver a Microsoft funded readiness assessment for Copilot for Microsoft 365 to you free of charge ($5,000 USD value).
35 out of 60
Defend Against Threats with SIEM Plus XDR: 3-Day Usage WorkshopCGI Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
A 3-day workshop to guide your organization in effectively using Defender for Office 365, Defender for Endpoint and Azure Active Directory Identity Protection to reduce security operations overhead.
36 out of 60
Endpoint Management Solutions: 4-Wk ImplementationSignal Alliance Technology Holding
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Discover how Signal Alliance Consulting enables users in your organization to be productive, on any device, without compromising IT security by leveraging Microsoft Endpoint Management.
37 out of 60
Inviso KickStarter - Microsoft 365 E3 AdoptionInviso Corporation
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-workplace-analytics product iconWorkplace Analytics
Helping customers KickStart features in Microsoft 365 E3 Subscription
38 out of 60
Microsoft 365 Copilot Everyday AI Adoption: 2wksInsight
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Insight’s Everyday AI Adoption for Microsoft 365 Copilot Program is designed to help organizations bring this technology to users in a way that promotes responsible adoption and drives productivity.
39 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Microsoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
40 out of 60
Microsoft Defender for Endpoint Implementation: 10-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Advanced endpoint security and threat protection: detect, investigate, and respond to attacks.
41 out of 60
Copilot Readiness: 2-Wk WorkshopCentric Consulting, LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
A facilitated workshop to build a Roadmap to guide your organization in implementing Copilot
42 out of 60
Cyber Security AssessmentAegis Innovators
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Understand how Microsoft Security capabilities can improve your cyber posture and mitigate risk by developing a cyber plan and identifying common threats.
43 out of 60
Microsoft 365 Security Assessment: 3-Week AssessmentSpyglass MTG, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Our 3-Week Microsoft 365 Security Assessment captures your current security state and documents a plan to safeguard your organization with integrated security, compliance, and identity solutions.
44 out of 60
Secure Identities and Access Management AssessmentInvoke
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
To provide enterprise customers with a detailed identity assessment report, a high-level migration plan, and demonstrations of Microsoft Entra Azure AD and Microsoft Entra Identity Governance features
45 out of 60
Implementation of Microsoft Entra ID GovernanceSpyglass MTG, LLC
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
For any business interested in securing internal and external Identities with Entra ID
46 out of 60
General Data Protection Regulation (GDPR): 4-Wk Data Discovery ServiceIT Partner LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Multi-step process to discover and scan data sources within the organization for personal data. The outcome: detailed inventory of data sources, together with the data they contain.
47 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
48 out of 60
MDS - Data Security Readiness Assessment for Copilot for Microsoft 365Maureen Data Systems
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A 3-day comprehensive assessment to help organizations set the foundations of data security, privacy and governance in preparation for Copilot for Microsoft 365
49 out of 60
SharePoint Premium Readiness Assessment & Roadmap - 5 Week AssessmentProtiviti
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
Evaluate and ensure your readiness for implementing SharePoint Premium, considering technical, business case, data lifecycle, and administration perspectives.
50 out of 60
Identity & Endpoint Protection with Microsoft Zero TrustDell Technologies Services
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Dell Services offers a variety of solutions to help businesses adopt a Microsoft-centric Zero Trust protection model.
51 out of 60
Incident Response RetainerSentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Proactive services, discounted rates, contracted service levels, andflexible use provisions with Sentinel’s leading Incident Response Team.
52 out of 60
Microsoft 365 Email Threat Protection AssessmentAVASOFT
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Microsoft 365 Email Threat Protection Assessment evaluates your email security, identifies vulnerabilities, and provides tailored solutions to enhance your email data protection and security measures.
53 out of 60
Fortis Assessment Microsoft Online SecuritySentinel Technologies Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Reduce risk with rapid actionable recommendations to harden your Office 365 & Azure A.D. services
54 out of 60
Secure Hybrid Identity - Defender for Identity: 6 week ImplementationPerformanta
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Secure Hybrid Identity: Defender for Identity - identify vulnerabilities in on-premises AD, empower companies to understand risks involved and enable ongoing monitoring to identify new vulnerabilities
55 out of 60
Eviden Compliance Assessment (CSAT) zur Einhaltung der europäischen NIS-2-RichtlinieEviden International France - SAS
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Unternehmen stehen vor der Herausforderung, die europäische NIS2-Richtlinie bis zur nationalen Umsetzungsfrist im Oktober 2024 umzusetzen.
56 out of 60
Microsoft Cloud App Security Shadow IT Assessment by AVASOFTAVASOFT
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Know your data access points' and cloud apps' security with MCAS and Defender for Endpoints. Customize policies, detect threats, and monitor in real-time to control data and ensure compliance.
57 out of 60
Hiram MachadoadaQuest
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Protect, Simplify, Power better experience with Windows 11, Windows 365 and Intune. Unlock hybrid work scenarios!
58 out of 60
Microsoft 365 Copilot Deployment and Readiness ServicesInsight
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Insight can guide you on your Microsoft 365 Copilot journey with help of more than 1,500 dedicated Modern Work professionals who have been working to optimize Microsoft environments for 20 years.
59 out of 60
Active Assure Attack Assessment - 3 WeeksBDO Digital, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Breach and Attack Simulations — We Attack to Defend You
60 out of 60
  • Anterior
  • 1
  • 2
  • 3
  • 4
  • 5
  • Siguiente
Novedades
  • Surface Pro
  • Surface Laptop
  • Surface Laptop Studio 2
  • Surface Laptop Go 3
  • Microsoft Copilot
  • Microsoft 365
  • Explora los productos de Microsoft
  • Aplicaciones de Windows 11
Microsoft Store
  • Perfil de la cuenta
  • Centro de descarga
  • Soporte de Microsoft Store
  • Devoluciones
  • Seguimiento de pedidos
  • Reciclar
  • Garantías comerciales
Educación
  • Microsoft Educación
  • Dispositivos para educación
  • Microsoft Teams para Educación
  • Microsoft 365 Educación
  • Office Educación
  • Formación y desarrollo de educadores
  • Ofertas para estudiantes y padres
  • Azure para estudiantes
Empresas
  • Microsoft Cloud
  • Seguridad de Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Pequeñas empresas
Desarrolladores y TI
  • Desarrollador de Microsoft
  • Microsoft Learn
  • Soporte técnico para aplicaciones del marketplace de IA
  • Microsoft Tech Community
  • Azure Marketplace
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
Compañía
  • Oportunidades de empleo
  • Acerca de Microsoft
  • Noticias de la compañía
  • Privacidad en Microsoft
  • Inversores
  • Sostenibilidad
Español (España, alfabetización internacional) Icono de exclusión de opciones de privacidad Tus opciones de privacidad Privacidad de la salud del consumidor
  • Sitemap
  • Contacte con Microsoft
  • Privacidad y Cookies
  • Condiciones de uso
  • Marcas registradas
  • Sobre nuestra publicidad
  • EU Compliance DoCs
  • Manage cookies
  • © Microsoft 2025