ФилтриИзчистване на всички
Professional Services резултата
Показват се резултати след professional services.
Cloud Security Approach: 2-months AssessmentPyxisThrough the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
+3
Applicable to:
Analytics
Identity
Security
1 out of 60
Secure SAP on Azure : 2-Hrs BriefingTCS - Security2 Hrs briefing on TCS Managed Security services offering leveraging contextual and pre-integrated solution for protecting SAP ecosystem on Azure
+3
Applicable to:
Identity
Networking
Security
2 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxisEvolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
+3
Applicable to:
Analytics
Identity
Security
3 out of 60
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
4 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
5 out of 60
Cloud Security Compliance: 4-months AssessmentPyxisThe CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
+3
Applicable to:
Analytics
Identity
Security
6 out of 60
Cloud Security Services: 12-months ImplementationPyxisWe audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
+3
Applicable to:
Analytics
Identity
Security
7 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield LtdSpartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
+3
Applicable to:
Identity
Migration
Security
8 out of 60
Postura de seguridad Azure: Evaluación de 2 semanasIT EraEjecutar un Assessment inicial para identificar riesgos y vulnerabilidades que permita establecer una estrategia de seguridad a través de la oferta de Microsoft Security
+3
Applicable to:
Identity
Migration
Security
9 out of 60
IBM Threat Management with Microsoft’s SAP Threat Monitoring Solution for Microsoft AzureIBM Security ServicesConsulting and managed security services from IBM Security supporting Microsoft Defender, Azure Sentinel, and the SAP Threat Monitoring solution for Sentinel
+2
Applicable to:
Identity
Security
10 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies ServicesDelivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
+2
Applicable to:
Identity
Security
11 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.aiImplementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
+1
Applicable to:
Identity
12 out of 60
HCLTech Unified Digital AccessHCL America Inc_HCLTHCLTech’s Unified Digital Access solution protects enterprise users and apps from cybersecurity attacks by aiding with right enterprise security posture with easy access to Apps and services.
+1
Applicable to:
Identity
13 out of 60
Transition To Cloud: 2-Day WorkshopSaportif Technology QFZ LLCProductivity and teamwork are fundamental to build resilience for your people, teams, and organization.
+3
Applicable to:
Identity
Migration
Security
14 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Consulting LimitedOur offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
+3
Applicable to:
Identity
Security
Storage
15 out of 60
KS B2C - Azure AD Identidades Externas: Implementación de 4 semanasKnowledge System Consulting México (KsConsulting México)Azure AD B2C proporciona la funcionalidad de "Identidad como Servicio" para escenarios de comercio B2B/B2C para aplicaciones de negocio hacia usuarios y organizaciones externas.
+2
Applicable to:
Identity
Security
16 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private LimitedWe help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
+3
Applicable to:
Identity
Migration
Security
17 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
+3
Applicable to:
Identity
Migration
Security
18 out of 60