Yes, for example in a typical "Enterprise" setting. But note that the tech support will be one of your company (or a subsidiary, well-known partner, whatever). You will reach it through your company's ticketing system. Yes, they have the same bad accent like the criminals in your videos, but they're legitimate (not necessarily knowledgeable or helpful, though... I've once had one of them delete one year worth of "useless" data for an entire geographic region before I could shout "stop this!").
One thing to note is that tech support never initiates the session (as pointed out in Esa Jokinen's answer, too). If anyone asks you to, it is 100% certain illegitimate.
However, and this is important, do note that the reverse conclusion is not true. If you initiated the session, that does not necessarily mean that the other side is legitimate or professional, or non-fraudulent. It certainly seems that way, but it's not necessarily the case.
In fact, the procedure that is shown in the videos that you mention exploit this very appearance to trick the pigeon into trusting the criminal.
You get shown some sort of scary notice and you are to call support (they're kind enough to even provide the number, so you don't need to Google it!). So you actually do initiate the session. Clearly it's legitimate, isn't it!
If you show signs of doubt, the criminal on the other end will point that out as well: "It's alright, you did call us, remember. And we're Microsoft partners, this is why your Windows showed that screen".
But although you did initiate the session, it is of course still fraudulent. The only goal of the entire endeavor is to find someone stupid enough to either download and execute some malware, or grant remote access with a user account that has admin rights (the default for most home users).
Upon which typically the first thing will be to sabotage the -- so far perfectly working -- computer in such a way that it can no longer be started without their help (e.g. by encrypting the user profiles), for which they will extort a lot of money. Then you will be shown some directory listings and stuff, which to the uneducated average user looks like something very important and scary, and well... in the end you're going to pay because your computer is now unusable. Which, if you don't fall for the scam right away and pay them anyway, you'll discover after rebooting.