FiltresEsborra-ho tot
Professional Services resultats
Es mostren resultats a professional services.
IBM Cloud Security Posture Management for Microsoft AzureIBM Security ServicesAddress cloud security and compliance posture management concerns delivered via Microsoft Azure native security features or via 3rd party solutions in an enterprise or MSSP (as-a-service) approach
+1
Applicable to:
Security
1 out of 60
IBM Rapid Security Assessment for Microsoft AzureIBM Security ServicesUnderstand your organization's current security posture as well as receive customized recommendations to address challenges around vulnerability and risk related to your cloud estate.
+1
Applicable to:
Security
2 out of 60
IBM Cloud Native Security Services for Microsoft AzureIBM Security ServicesSimplify the configuration and management of cloud native security controls . Ensure the proper security controls are in place across your Microsoft Azure environment.
+1
Applicable to:
Security
3 out of 60
IBM X-Force Red Cloud Offensive Testing Services for Microsoft AzureIBM Security ServicesX-Force Red Cloud Testing Security Services offers offensive security services which include penetration testing, vulnerability management services, red teaming, code reviews, and static analysis.
+1
Applicable to:
Security
4 out of 60
IBM Cloud Workload Protection for Microsoft AzureIBM Security ServicesIBM Security’s Cloud Workload Protection services were built to provide assessment, solution design, implementation, and managed security services that will help you to secure your cloud workloads
+1
Applicable to:
Security
5 out of 60
IBM Security Strategy Services for Microsoft AzureIBM Security ServicesDrive your cloud transformation with an integrated security strategy. Our cloud security strategy engagement offering is designed to help you develop security maturity and define the target state
+1
Applicable to:
Security
6 out of 60
DevSecOps: 3-Weeks ImplementationFlexsin Technologies Pvt. Ltd.Continuous Integration/Deployment on Azure for any New or Existing projects to develop, release, and deploy code to achieve the Automate, Autoscaling, and Transparent process.
+3
Applicable to:
DevOps
Disaster Recovery
Security
7 out of 60
IBM Secure Design for Digital Transformation for Microsoft AzureIBM Security ServicesEngage us to adopt a Secure-By-Design culture to drive rapid application deployment that will ensure application security and reduce security defect costs.
+1
Applicable to:
Security
8 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies ServicesDelivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
+2
Applicable to:
Identity
Security
9 out of 60
Cyber Recovery Implementation Services on Microsoft AzureDell Technologies Advisory, Design, and Deployment services for Dell PowerProtect Cyber Recovery Solution for Microsoft Azure to protect critical data from Ransomware and other destructive Cyberattacks.
+3
Applicable to:
Backup
Disaster Recovery
Security
10 out of 60
How to get started with Cloud security in Microsoft Azure: 4h workshopBillennium S.A.4-hour workshop on how to keep your organization secure in the Microsoft Azure environment led by a certified cyber security expert (MVP and MCT).
+1
Applicable to:
Security
11 out of 60
IBM X-Force Incident Response Retainer Services for Microsoft Azure and hybrid cloudIBM Security ServicesThe IBM Security X-Force Incident Response Retainer provides Azure customers access to a team of IR experts trained to help your organization plan, prepare and respond to threats and data breaches.
+1
Applicable to:
Security
12 out of 60
IBM X-Force Red Vulnerability Management Services for Azure and Hybrid CloudIBM Security ServicesIdentifying, prioritizing and remediating the vulnerabilities that matter most.
+1
Applicable to:
Security
13 out of 60
IBM Protect & Govern Sensitive DataIBM Security ServicesGet ahead of compliance demands and protect against data breaches with secure data across Microsoft Azure and your hybrid cloud environments.
+1
Applicable to:
Security
14 out of 60
ColdFusion App Migration: 4 Week ImplementationMedia3 Technologies, LLCInfrastructure Review, Design, and Deployment
System Migration Services
Security and Azure Service Consumption Optimization
Additional Professional Services
+3
Applicable to:
App Modernization
Migration
Security
15 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private LimitedWe help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
+3
Applicable to:
Identity
Migration
Security
16 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
+3
Applicable to:
Identity
Migration
Security
17 out of 60
Data Warehouse Migration AssessmentCLICK2CLOUD INCClick2Cloud’s Data Warehouse Migration Assessment helps you create a fact-based roadmap and offers an estimation for the migration of the existing data warehouse to the modern Azure data warehouse.
+2
Applicable to:
Migration
Security
18 out of 60
Managed Services for Microsoft EntraDXCAdvisory and Managed Services for Microsoft Entra
+2
Applicable to:
Identity
Security
19 out of 60
Managed Detection and Response ServiceNTT LimitedA scalable, cloud-native, security analytics and response platform that provides intelligent security analytics with threat intelligence across the enterprise.
+1
Applicable to:
Security
20 out of 60
Cyber security servicesUAB SOLUTIONLAB PRODUCTIONTo provide excellent cyber security services
+2
Applicable to:
DevOps
Security
21 out of 60
Microsoft Sentinel: 5 Day POC DeploymentWIZARD GROUP LIMITEDExperienced in SIEM and SOC migrations and improvement, Wizard Cyber will take you through a guided Proof of Concept that demonstrates the real value of Microsoft Sentinel,
+1
Applicable to:
Security
22 out of 60
Innovation Anywhere with Azure ARC: 5 Week ImplementationCognizantLeverage Azure Arc to unify management, governance and security of your hybrid, on-premises, datacenter, private and public cloud environments
+2
Applicable to:
Backup
Security
23 out of 60
SAP Enterprise Threat Detection & ProtectionJohn Keells Information Technology Pvt LtdSAP Systems usually process and store sensitive & highly critical data. Therefore, to increase overall protection for SAP ERP data from cyber threats, "Sentinel Solution for SAP" is essential.
+2
Applicable to:
Security
Storage
24 out of 60
IntraSenz - Digitally Next Employee Engagement with Microsoft Viva ConnectionTOTAL EBIZ SOLUTIONS PTE. LTD.Fast Track Employee Engagement Experience Using IntraSenz on Viva Connection in 30 Days.
+3
Applicable to:
Migration
Security
Storage
25 out of 60
Enterprise - Zero Trust Strategy & Journey MapJohn Keells Information Technology Pvt LtdOrganizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid & multi-cloud workplace, and ensures cyber security assurance.
+2
Applicable to:
Identity
Security
26 out of 60
Teams Solution for Retail FLW Workforce: 2 Wk Proof of ConceptsSaxon Infosystems Private LimitedA Repository of Processes Pre-built for Microsoft Teams for Frontline workers and Supervisors in Retail
+3
Applicable to:
Data Platform
Security
Storage
27 out of 60
ISO 27001 Readiness Assessment for Azure EnvironmentVisionet Systems Inc.Advance confidently towards ISO 27001 certification for your Azure environment with Visionet's readiness assessment. Get a detailed analysis of your infrastructure operations & security policies.
+3
Applicable to:
Backup
Identity
Security
28 out of 60
Fortifying SDLC on Azure with Defender for DevOps: 3-Wks Consulting AssessmentWipro LtdDiscover and evaluate the application security risk posture on Azure with Wipro's Application Security framework leveraging Defender for DevOps
+2
Applicable to:
DevOps
Security
29 out of 60
Cloud Landing Zone with F5: 3-Week POCTrace3, LLCUtilize a customized Azure Landing Zone solution by Trace3 and offer expert support to mitigate the perceived complexities and educate on multi-cloud F5 adoption strategies.
+3
Applicable to:
Migration
Networking
Security
30 out of 60
TCS Smart Migration Services for MicrosoftTata Consultancy Services Ltd.Expedite your organization’s applications migration to cloud platforms.
+3
Applicable to:
App Modernization
Migration
Security
31 out of 60
BESTDoc | Upgrade a Soporte PremiumThe Best Experience in Technology S.A.Soporte Premium para optimizar el Sistema de Gestión Documental Electrónico BESTDoc
+2
Applicable to:
Archive
Security
Azure Sentinel: 5-Day ImplementationIbn Technologies LtdThe Azure Sentinel Implementation is a comprehensive Professional Services package offered by CloudIBN. This package includes the design, deployment, and fine-tuning of the Azure Sentinel
+1
Applicable to:
Security
33 out of 60
TCS Responsible AI Assessment for Generative AITCS - Azure TCS offers Responsible AI (RAI) Assessment service to our customers and partners in gauging their Azure Open AI based Gen AI solutions against the core tenets of RAI.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
34 out of 60
Capgemini Managed Security Services with Sentinel for SAPCapgemini GroupThe solution is focused on providing a clear overview of vulnerabilities present in the complex SAP landscape from different domains.
+1
Applicable to:
Security
35 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
36 out of 60
Dell Implementation Services for Microsoft Defender on CloudDell Technologies ServicesAdvisory and Deployment services aligned to your cloud security objectives, enabling you to gain comprehensive visibility of your cloud security posture across your environments.
+1
Applicable to:
Security
37 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Unisys Well-Architected ReviewUnisys Corp / Blue BellUnisys offers a comprehensive assessment process for Azure workloads, guided by certified architects. During your review, leverage this expertise to evaluate your adoption of best practices.
+2
Applicable to:
Migration
Security
39 out of 60
Security Information and Event Management (SIEM) MigrationKyndryl Inc.Kyndryl SIEM Migration service transitions legacy SIEMs to Microsoft Sentinel, ensuring comprehensive coverage for both on premise and cloud assets. Services include discovery, design, implementation.
+3
Applicable to:
Disaster Recovery
Identity
Security
40 out of 60
Azure Landing Zone Deployment ServiceLotus Beta AnalyticsThe "Azure Landing Zone Deployment Service" simplifies setting up secure, compliant Azure environments with pre-configured templates, ensuring a solid foundation for cloud operations and governance.
+2
Applicable to:
Identity
Security
41 out of 60
Azure to Sophos/FortiGate VPN SetupLotus Beta AnalyticsSeamlessly connect your Azure environment to Sophos or FortiGate firewalls with our expert VPN setup service, ensuring secure, reliable site-to-site or point-to-site connectivity for your enterprise.
+2
Applicable to:
Networking
Security
42 out of 60
Azure Well-Architected Framework: Evaluación/Análisis de 2-4 semanas de Ejecución.Cloud ContinuityWell Architected ayuda a las empresas a obtener cargas de trabajo más eficientes, seguras y resilientes en Azure, optimizando tus costos y mejoran su rendimiento general.
+3
Applicable to:
App Modernization
Identity
Security
43 out of 60
Unisys Attack Surface DiscoveryUnisys Corp / Blue BellNavigate your attack surface with an adversary's eye. With Unisys Attack Surface Discovery, you can outsmart threats and outpace risks.
+1
Applicable to:
Security
44 out of 60
Microsoft Entra ID Conditional Access: 10-Day ImplementationWIZARD GROUP LIMITEDdesigned to quickly and effectively deploy Entra ID Conditional Access policies to enhance your organisation's security posture
+3
Applicable to:
Identity
Migration
Security
45 out of 60
Microsoft Purview: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur implementation service aims to streamline the deployment of Microsoft Purview, ensuring that your organization can leverage its full capabilities to make informed decisions
+3
Applicable to:
Identity
Migration
Security
46 out of 60
Microsoft Entra : Quick Start AcceleratorWIZARD GROUP LIMITEDThis service ensures that your organization can quickly leverage the full capabilities of Microsoft Entra ID to enhance security and streamline access management
+3
Applicable to:
Identity
Migration
Security
47 out of 60
Microsoft Purview Quickstart Accelerator Implementation with Wizard CyberWIZARD GROUP LIMITEDThis service ensures that your organization can quickly harness the power of Microsoft Purview to manage and govern your data effectively
+3
Applicable to:
Identity
Migration
Security
48 out of 60
Azure DevOps Practice and Platform AssessementAptum Technologies (USA) Inc.Transform your development practices with Aptum's comprehensive DevOps assessment. Get expert evaluation of your security, automation, and operational efficiency, plus a clear roadmap for improvement.
+3
Applicable to:
App Modernization
DevOps
Security
49 out of 60
Ops AmplifAIer: Amplify IT Operations with GenAITech Mahindra LimitedGenerative AI is enabling a paradigm shift in the traditional ways the IT industry leverages Artificial Intelligence for IT Operations (AIOps).
+2
Applicable to:
AI & Machine Learning
Security
50 out of 60
Implementation of Microsoft Entra ID IntegrationITX360 (Pvt) Ltd.Enhance security and simplify access with Microsoft Entra ID Integration, featuring SSO, MFA, passwordless login, and role-based access
+2
Applicable to:
Identity
Security
51 out of 60
Assessment of Azure Cost OptimizationITX360 (Pvt) Ltd.Maximize savings with ITX360’s 5-Day Azure Cost Optimization Assessment. We analyze your Azure environment to identify cost-saving opportunities and ensure you get the most value from your investment.
+1
Applicable to:
Security
52 out of 60
LBAN Azure Frontdoor ConfiguratorLotus Beta AnalyticsLBAN Azure Front Door Configurator simplifies the setup of secure, scalable global web traffic routing with custom domain, SSL, WAF, and load balancing configurations.
+3
Applicable to:
App Modernization
Networking
Security
53 out of 60
Azure Cloud Security Optimization – Free 5-Day AssessmentITX360 (Pvt) Ltd.A 5-day expert-led Azure Security Assessment designed to evaluate your cloud environment, identify risks, and provide actionable recommendations for enhancing security and compliance—all at no cost
+1
Applicable to:
Security
54 out of 60
Invillia Platform Web DevelopmentInvillia Desenvolvimento de Produtos Digitais LTDAEnd-to-end digital solution development using GitHub Copilot to accelerate productivity, enable agile delivery, and ensure security aligned with strategic business goals.
+3
Applicable to:
App Modernization
DevOps
Security
55 out of 60
Azure Security Optimization: 5-Day AssessmentITX360 (Pvt) Ltd.Strengthen your Azure cloud security with ITX360’s 5-day expert assessment. Identify risks, evaluate configurations, and receive actionable recommendations aligned with Zero Trust.
+1
Applicable to:
Security
56 out of 60
Nimtech Cloud Journey Assessment - NetworkNimtechStart your Azure Cloud Journey with a comprehensive Cloud Adoption Framework (CAF) workshop, tailored to your network infrastructure needs
+2
Applicable to:
Networking
Security
57 out of 60
Windows in Cloud AssessmentTask Systems LimitedUnlock Azure Virtual Desktop Success: Expert-Led WVD Assessment & Migration Blueprint
+3
Applicable to:
Identity
Migration
Security
58 out of 60
AVD Managed Service - with support by VirtexVirtexComprehensive 24/7 Infrastructure Management Service designed to optimize, secure, and maintain Microsoft AVD environments
+3
Applicable to:
App Modernization
Migration
Security
59 out of 60
GitHub Advisory ServicesInfoMagnus LLC On-demand GitHub advisory to optimize Azure-integrated DevOps workflows aligning strategy, security, and collaboration to extend Microsoft cloud adoption and value.
+3
Applicable to:
DevOps
Migration
Security
60 out of 60