Connect your frontline workforce with purpose-built tools and experiences that allow them to do their best work.
Use Office apps designed for all mobile devices and tablets.
Access, share, and collaborate on files from anywhere.
Engage and inform with intelligent video.
Build the business apps you need and extend or customize the apps you already use.
Make a repetitive task easy with workflow automation.
Build with confidence on a low-code database for Teams.
Plan your day and manage your life.
Access Microsoft Cloud services resources.
Organize teamwork.
Easily create surveys and polls to collect customer feedback, measure employee satisfaction, and organize team events.
Reduce your risk of damage and get information in a succinct, real-time view of the attack timeline.
Prevent malicious code from running by ensuring only known, good code can run.
Protect enterprise apps and data against accidental data leaks on both enterprise and personal devices.
Monitor your overall compliance posture, review recommended actions and configure settings to meet complex compliance obligations.
Use manual retention labels, content search, and basic auditing to help with compliance.
Connect and stay organized with email, calendar, and contacts with Outlook for the web and mobile.
Chat, meet, share files, and work with business apps within a shared workspace. Also includes Walkie Talkie, Tasks Management and Shift Management.
Easily set up a collection of resources to share and collaborate with specific coworkers.
Respond to business needs with custom chatbots for Teams.
Share and manage content, knowledge, and applications to empower teamwork.
Connect and engage with enterprise social networking.
Sign in to laptops, tablets, devices, or apps fast and without a password.
Protect derived domain credentials.
Enhance security, simplify access, and set smart policies with a single identity platform.
Protect against software threats like viruses, malware, and spyware across email, apps, the cloud, and the web.
Isolate enterprise-defined untrusted sites to protect your company while employees use the internet.
Address threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers.
Discover, classify, label, and protect sensitive documents and emails.
Increase your visibility and control over your organization’s security posture with a centralized dashboard.