Invia feedback
Guida e supporto
Elementi salvati
Piani privati
Accesso in corso, attendi qualche istante...
FiltriCancella tutto


Servizi di consulenza risultati

Visualizzazione di risultati in servizi di consulenza.
Managed Extended Detection and Response Service (MXDR)Agilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
With Agilis MXDR, we make secure posture possible 24/7, while providing you optimized security by integrating security products and data into comprehensive solutions.
1 out of 60
Quadra Entra Permissions ManagementQuadrasystems.net (India) P Ltd
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Understand how permissions creep can impact the attack surface risk in your cloud infrastructure​ Understand how to manage user and identity risk
2 out of 60
Microsoft 365 Security Program - 10 WeeksTrace3
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This engagement’s primary objective is to develop and rationalize Client's Security use cases and construct a roadmap around the adoption of the Microsoft 365 Security and Mobility Suite.
3 out of 60
Microsoft 365 Threat Protection : 2-Wk ImplementationAgilis Teknoloji Çözümleri A.Ş.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
"Stay one step ahead of cyber threats with Microsoft 365 Threat Protection - your shield in the digital battlefield."
4 out of 60
Secure Identities and Access Management AssessmentInvoke
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
To provide enterprise customers with a detailed identity assessment report, a high-level migration plan, and demonstrations of Microsoft Entra Azure AD and Microsoft Entra Identity Governance features
5 out of 60
Red Canary Cloud Security AssessmentRed Canary
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Assess your security posture, look for vulnerabilities and identity risks with recommendations to mitigate with a Microsoft Security Assessment
6 out of 60
Microsoft 365 Security: 2-week assessmentMirai Security Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
We will assess your Microsoft 365 environment to identify immediate security risks and measure its compliance against the Center for Internet Security (CIS) Benchmarks configuration guidelines
7 out of 60
Endpoint Management with Security - 4 days - FREE WorkshopOPEN BPO
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
This workshop will show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration with the Microsoft products you already use
8 out of 60
GoDaddy to Office 365 MigrationSkyTerra Technologies LLC
+3
Applicable to:
m365-sa-calling-for-microsoft-teams product iconCalling for Microsoft Teamsm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
If you are using GoDaddy Office 365, we strongly recommend a different approach and migrate to native Microsoft 365
9 out of 60
IBM Digital Workforce OfferingIBM Consulting - EA
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-power-platform-for-teams product iconPower Platform for Teams
IBM Digital Workforce Offering helps clients to streamline their cloud transition journey with minimal disruption and maximum efficiency while enhancing employee productivity.
10 out of 60
Identity and Access Management Quick StartSoftchoice
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Prioritizing security services to combat identity breaches by prioritizing security services, and protecting against mismanaged privileges, and access-related data breaches.
11 out of 60
Endpoint Management with Security WorkshopMigrate LLC
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Let us show you how to leverage intelligent security, risk-based controls, zero-touch provisioning, advanced analytics, and deep integration to the Microsoft products you already use
12 out of 60
Wc-PC- Wragby Cloud PCWragby Business Solutions & Technologies Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
The Wragby Cloud PC is our consulting service designed to provide a new solution for organizations with the productivity, security, and collaboration benefits of Windows 365.
13 out of 60
Windows 365 Deployment : 12 month ImplementationPatriot Consulting Technology Group LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Patriot will design, configure, test and deploy Microsoft Windows 365 for your environment.
14 out of 60
MFA JumpstartSentinel Technologies Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan.
15 out of 60
Infosys Modern Identity and Access Solution with MS EntraInfosys Limited
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Microsoft Entra encompasses all of Microsoft’s identity and access capabilities to have a secure access for the users and across Microsoft 365 services from corporate networks to anywhere.
16 out of 60
Cloud-Native Migration Service: 4-Month ImplementationCyclotron Inc.
+2
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
With Cyclotron's Cloud-Native Migration (CNM) service, organizations can leverage our expertise in planning and executing the shift from Active Directory to Azure AD.
17 out of 60
Discover Sensitive Data: 3-Wk AssessmentKiZAN Technologies
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Identify and assess the security posture, location, and movement patterns of sensitive data in your organization to better understand required solutions.
18 out of 60
Zero Trust Defend Against Threats: 7-Wk ImplementationKiZAN Technologies
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Accelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
19 out of 60
Zero Trust Foundation: 6-Wk ImplementationKiZAN Technologies
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Accelerate the deployment of the Microsoft Zero Trust Foundation solutions for your Microsoft 365 tenant to ensure secure access to your cloud investments.
20 out of 60
Microsoft 365 Cloud Security Readiness: 3-Wk AssessmentKiZAN Technologies
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
Leverage Microsoft secure scores to evaluate and improve an organization's security posture, providing insights, recommendations, and mitigations to enhance overall security defenses.
21 out of 60
Onesec Identity Governance Lifecycle AssessmentSecure Nextgen Systems
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
The Onesec Identity Governance Lifecycle Assessment evaluates organization's Identity Governance Model maturity by analyzing assignments and access logs to identify potential risks in the identity env
22 out of 60
Microsoft Entra Verified ID and Credivera: 3-day Planning WorkshopOxford Computer Group LLC
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
This Planning Workshop is designed to help you get started with a verifiable credentials solution using Credivera and Microsoft Entra Verified ID.
23 out of 60
ADFS to Microsoft Entra ID Migration: 4-Wk ImplementationPerformanta
+1
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Management
Undertake a seamless ADFS to Microsoft Entra ID app migration, improving security, offering up new features, and getting your organisation back on track.
24 out of 60
General Data Protection Regulation (GDPR): 4-Wk Data Discovery ServiceIT Partner LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Multi-step process to discover and scan data sources within the organization for personal data. The outcome: detailed inventory of data sources, together with the data they contain.
25 out of 60
Windows 365 Standardized PilotMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
The Windows 365 Standardized Pilot helps customers (who are already using Microsoft Intune for cloud-based management) envision how Windows 365 unlocks hybrid work scenarios.
26 out of 60
Azure performance and cost optimization assessment: 3-Days Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
The primary goal of this service is to establish a robust Mobile Device Management (MDM) foundation using modern Microsoft 365 and Azure tools.
27 out of 60
SmartStart for IntuneMobile Mentor
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Management
The SmartStart for Intune workshop will help you showcase the value of Microsoft 365, leading with Microsoft Intune to manage and secure users’ devices, apps, and identities from anywhere.
28 out of 60
Office 365 Tenant - Initial Setup: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
The goal is to efficiently and effectively set up your organization's Office 365 tenant, enabling seamless access to a suite of productivity tools and collaboration services.
29 out of 60
Design and Implementation of Microsoft Security Solutions: 12-Week EngagementKudelski Security
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-insider-risk product iconInsider Risk
Kudelski Security’s Microsoft specialists will help you deploy the right Microsoft security technology, the right way, to achieve your security objectives.
30 out of 60
Securing Identities WorkshopSynergy Technical, LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
The foundation of cybersecurity is to quickly and accurately identify authorized users and give them proper access to the information and tools they need to do their job.
31 out of 60
Cloud App Security Information and Threat Protection: 3-Wk Professional serviceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Protect the work of cloud services, monitor employees' devices, obtains information about the security of these devices, vulnerabilities, attempts to hack devices, suspicious activities.
32 out of 60
Multi-Factor Authentication - Initial Setup: 3-Professional serviceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
The goal of the service is to make Microsoft 365 accounts safer by adding an extra layer of security, so only authorized users can access them.
33 out of 60
Advanced Threat Protection - Protect your email: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The goal of the service is to make your email communication safer by stopping harmful emails and protecting sensitive information from cyber threats.
34 out of 60
Microsoft Exchange Server Decommissioning: 5-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
The goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
35 out of 60
Microsoft Secure Score - increase to 200: 3-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
The goal of this service is to increase the Microsoft Secure Score to over 200, ensuring a higher level of cybersecurity and protection for your organization's digital environment.
36 out of 60
Windows 365: 4 Week Readiness AssessmentNetrix Global
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Get an analysis of your existing virtual desktop infrastructure environment and proactively identify any potential technical or procedural risks that could impede the rollout.
37 out of 60
Password-less Authentication: 2-Wk ImplemetationIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Enhance security and streamline user authentication by eliminating the reliance on traditional passwords, improving both user experience and organizational information security.
38 out of 60
Microsoft Defender for Identity Deployment: 1 Week ImplementationSoluciones Tecnológicas Overcast S.A.P.I. de CV
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-insider-risk product iconInsider Risk
Identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
39 out of 60
Security Compass Framework: 1 Week - 4 Months Briefing, Playbook, ImplementationReply
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Valorem Reply’s Security Compass Framework is a holistic approach to Security vendor consolidation and solution replacement planning, implementation, and execution.
40 out of 60
Enable Multi-Factor Authentication For All Users: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Multi-Factor Authentication (MFA) is a simple but very efficient way to increase account security.
41 out of 60
Apply Information Rights Management protection to email: 5-Day Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Ensure that only authorized individuals can access and use the information. This can be especially useful for sensitive or confidential information that needs to be protected from unauthorized access
42 out of 60
Training & Support Solution for Securing Identities + Access Implementation Adoption: 3-Month WorkshopVitalyst
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Alithya offers a complete package for adoption of security solutions after an implementation, including project management, learning, and support tailored to your organization's needs.
43 out of 60
Secure Devices Outreach Program for Frontline Workers: 3-Month WorkshopVitalyst
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Alithya's employee outreach program for remote & frontline workers, offering white-glove training, support, and deployment services to secure their devices.
44 out of 60
Microsoft 365 Security WorkshopCollective Insights
+2
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Equip your organization with insights, strategies, and tools to fortify defenses, mitigate threats, and enhance overall security readiness across your digital estate.
45 out of 60
Microsoft 365 Copilot Deployment and Readiness ServicesInsight
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Insight can guide you on your Microsoft 365 Copilot journey with help of more than 1,500 dedicated Modern Work professionals who have been working to optimize Microsoft environments for 20 years.
46 out of 60
Microsoft 365 Security: 30-Days ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-compliance-advisory-services product iconCompliance Advisory Servicesm365-sa-identity-and-access-management product iconIdentity & Access Management
Establish a foundational, secure environment for clients by configuring their Microsoft 365 tenant with core security features.
47 out of 60
Microsoft 365 Security: 90 Days ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Establish a secure environment by configuring the client's tenant with core Microsoft 365 security features, providing tailored cybersecurity solutions to enhance data security and protection.
48 out of 60
Microsoft 365 Security Beyond Service: 1-Month Consulting ServiceIT Partner LLC
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Establish a robust and tailored Microsoft 365 security environment, enhancing core security features and enabling a secured ecosystem for client data, backed by continuous monitoring and optimization.
49 out of 60
Co-pilot Technical ReadinessPHOENIX SOFTWARE LTD
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
Help your organisation ensure that they are technically ready for Co-pilot
50 out of 60
Zero Trust Security 10-Hour AssessmentJourneyTEAM
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
JourneyTeam’s Zero Trust Security Assessment is designed to provide a clear, actionable strategy for strengthening your organization’s Microsoft 365 security posture.
51 out of 60
On-Prem Exchange to Office 365 Migration: 4-Wk MigrationExodus Integrity Services, Inc.
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
Simplify your email migration process to Office 365 with ease and efficiency.
52 out of 60
Microsoft Intune DeploymentSecure Future Bilgi Tek. ve Hiz. Tic A.S.
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Managementm365-sa-threat-protection product iconThreat Protection
The "Microsoft Intune Proof of Concept" service offers a strategic and hands-on approach for organizations to assess the capabilities and benefits of Microsoft Intune, Microsoft's cloud-based mobile d
53 out of 60
Managed Detection and Response [Security Monitoring]Black Cell Magyarország Korlatolt Felelossegu Tarsasag
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Safeguard your entire organization with Managed Security Services on Microsoft Defender
54 out of 60
Copilot Readiness Assessment for Microsoft 365Mint Management Technologies
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-knowledge-and-insights product iconKnowledge & Insights
Mint Group is thrilled to bring you a consulting service designed to supercharge your Microsoft 365 experience and get you Microsoft 365 Copilot ready.
55 out of 60
Hiram MachadoadaQuest
+3
Applicable to:
m365-sa-device-deployment-and-management product iconDevice Deployment & Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-mobile-device-management product iconMobile Device Management
Protect, Simplify, Power better experience with Windows 11, Windows 365 and Intune. Unlock hybrid work scenarios!
56 out of 60
Securing On-prem AD with Defender for Identity 3-Wk | Implementation/POCBulletproof Solutions Inc.
+3
Applicable to:
m365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-threat-protection product iconThreat Protection
Provide Implementation steps and best practices for Configuring Defender for Identity on on-prem AD Domain Controllers and/or AD Federation Services &/or AD Certificate Services
57 out of 60
Microsoft 365 Information Protection 1-day WorkshopGrant Thornton LLP
+3
Applicable to:
m365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governancem365-sa-threat-protection product iconThreat Protection
Review your organization’s information protection approach and level of development and receive advice on potential Microsoft solutions and capabilities that can enhance your program.
58 out of 60
Hybrid Office 365 Migration from your own Exchange Server: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-cloud-security product iconCloud Securitym365-sa-identity-and-access-management product iconIdentity & Access Management
Hybrid migration integrates on-premises Exchange with Microsoft 365, facilitating migration or serving as a permanent state for both organizations.
59 out of 60
Cutover Exchange Online Migration from a Third-Party Hosted Exchange Server: 7-Days Professional ServiceIT Partner LLC
+3
Applicable to:
m365-sa-adoption-and-change-management product iconAdoption & Change Managementm365-sa-identity-and-access-management product iconIdentity & Access Managementm365-sa-information-protection-and-governance product iconInformation Protection & Governance
A flexible and quick way to migrate all emails, contacts, tasks, and other data from a third-party hosted and managed Exchange Server to Microsoft 365 Exchange Online.
60 out of 60
  • Indietro
  • 4
  • 5
  • 6
  • 7
  • 8
  • Avanti
Le novità
  • Surface Pro
  • Surface Laptop
  • Surface Laptop Studio 2
  • Surface Laptop Go 3
  • Microsoft Copilot
  • Microsoft 365
  • Esplora i prodotti Microsoft
  • App di Windows 11
Microsoft Store
  • Profilo account
  • Download Center
  • Supporto Microsoft Store
  • Resi
  • Monitoraggio ordini
  • Riciclaggio
  • Garanzie commerciali
Formazione
  • Microsoft Education
  • Dispositivi per l'istruzione
  • Microsoft Teams per l'istruzione
  • Microsoft 365 Education
  • Office Education
  • Formazione e sviluppo per gli insegnanti
  • Offerte per studenti e genitori
  • Azure per studenti
Aziende
  • Microsoft Cloud
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Piccole imprese
Sviluppatori e IT
  • Sviluppatore Microsoft
  • Microsoft Learn
  • Supporto per le app del marketplace di IA
  • Microsoft Tech Community
  • Azure Marketplace
  • AppSource
  • Microsoft Power Platform
  • Visual Studio
Azienda
  • Opportunità di carriera
  • Informazioni su Microsoft
  • Notizie aziendali
  • Privacy in Microsoft
  • Investitori
  • Accessibilità
  • Sostenibilità
Italiano (Italia) Icona di rifiuto esplicito delle scelte di privacy Le tue scelte sulla privacy Privacy per l'integrità dei consumer
  • Sitemap
  • Contattaci
  • Privacy e cookie
  • Condizioni per l'utilizzo
  • Marchi
  • Informazioni sulle inserzioni
  • EU Compliance DoCs
  • Manage cookies
  • Accessibilità
  • © Microsoft 2025