FiltreRyd alle
Professional Services resultater
Viser resultater i professional services.
Implementation of Azure Virtual Desktop on Azure LocalSNP TechnologiesModernize Your Virtual Desktop Infrastructure with Confidence with Azure Local
+3
Applicable to:
Data Platform
Migration
Security
1 out of 60
Microsoft Sentinel Health Check & Optimization: 2-week assessmentWhite Hat IT Security KftAssessment and optimization aiming to elevate Sentinel Security Operations posture and costs
+1
Applicable to:
Security
2 out of 60
AI Recruitment Screening Chatbot – 2-Week PilotiFour Technolab Private LimitedOur AI Recruitment Screening Chatbot is the fastest and most affordable way to experience the value of AI driven recruitment.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
3 out of 60
AI Procurement Assistant Chatbot – 3-Week Paid PilotiFour Technolab Private LimitedYou’ll get a ready-to-use AI chatbot integrated with Dynamics 365 to automate purchase requests, approvals, and vendor lookups. It includes secure access, deployment in Web, and training for smo
+3
Applicable to:
Analytics
AI & Machine Learning
Security
4 out of 60
Accion Labs | SmartOps- AI infused DevOpsAccion Labs US, Inc.Kick-start Your Transformation with a Streamlined DevOps Strategy. Accelerate your organization's transformation and drive efficient decision-making by implementing a robust DevOps strategy.
+3
Applicable to:
AI & Machine Learning
DevOps
Security
5 out of 60
Cloud Security Envisioning WorkshopVerify8Given the volume and complexity of identities, data, applications, devices, and infrastructure, it’s essential to learn how secure your organization is, and how to mitigate and protect against threats
+1
Applicable to:
Security
6 out of 60
Data_Security_WorkshopWIZARD GROUP LIMITEDis designed to help organizations identify real data security and compliance risks within their Microsoft 365 environments and understand how to mitigate them using Microsoft Purview
+3
Applicable to:
Data Platform
Identity
Security
7 out of 60
Cloud Security Posture Management Service over Microsoft Defender for CloudMinsaitServicio especializado de Minsait Cyber para evaluar y mejorar la postura de seguridad cloud con Microsoft Defender for Cloud, priorizando riesgos y fortaleciendo el cumplimiento multicloud.
+3
Applicable to:
AI & Machine Learning
Identity
Security
8 out of 60
Identity & Access Management Bootstrapping PackageSpanish Point TechnologiesThe Spanish Point Identity & Access Management (IAM) assessment helps organisations evaluate their customer and partner identity access landscape, identify gaps, and build a clear roadmap to implement
+3
Applicable to:
App Modernization
Identity
Security
9 out of 60
Azure Operations & Governance: 2-6 Week AssessmentPlan A TechnologiesEvaluate your operational readiness, security posture, and governance model with a comprehensive discovery assessment from Plan A Technologies.
+3
Applicable to:
Analytics
DevOps
Security
10 out of 60
Managed Azure Support & OperationsPlan A TechnologiesMaximize your cloud reliability and performance with proactive support, infrastructure management, and 24/7 operations from Plan A Technologies.
+3
Applicable to:
Analytics
DevOps
Security
11 out of 60
Anchnet One-stop MLPS 2.0 Compliance Service上海安畅网络科技股份有限公司This service includes technical support for Azure China cloud platform and can assist customers in easily passing China Cybersecurity Law MLPS 2.0 compliance certification.
+1
Applicable to:
Security
12 out of 60
Anchnet SmartCare Managed Security Services上海安畅网络科技股份有限公司It offers a range of services including 7*24h security monitoring, emergency response, vulnerability assessment, security governance, log analysis, and alert management on Microsoft Azure.
+3
Applicable to:
Identity
Networking
Security
13 out of 60
Accion Labs | AI accelerated Purview ImplementationAccion Labs US, Inc.Unified data security, governance, and compliance powered by Microsoft Purview and AI accelerators for enterprise-scale control.
+2
Applicable to:
Identity
Security
14 out of 60
Free 2-Hour Microsoft Fabric Consultation for EWON Flexy 205 Integration with Azure IoT HubiFour Technolab Private LimitedGet a simple, easy plan to bring all your industrial data together and make smart decisions using Microsoft Fabric.
Start with a free 2-hour session to audit your current setup and share the solution
+3
Applicable to:
Analytics
Internet of Things
Security
15 out of 60
Identity and Access Management (IAM) bSidebSideGestión de acceso sólida, escalable y alineada con estándares internacionales. Protege cuentas privilegiadas frente a ataques como phishing, escalamiento de privilegios y movimientos laterales.
+3
Applicable to:
DevOps
Identity
Security
16 out of 60
S-SDLC Desarrollo de Software Seguro bSidebSideDetectamos y corregimos vulnerabilidades antes de escribir una sola línea de código, alineando la seguridad con los objetivos de negocio.
+3
Applicable to:
DevOps
Identity
Security
17 out of 60
S-SDLC bSide Marco de TrabajobSideIntegración de seguridad desde la conceptualización del software, Detectamos y corregimos vulnerabilidades antes de escribir una sola línea de código, alineando la seguridad con el negocio.
+3
Applicable to:
DevOps
Disaster Recovery
Security
18 out of 60
Desarrollo de Software Seguro bSide EntrenamientobSideDetectamos y corregimos vulnerabilidades antes de escribir una sola línea de código, alineando la seguridad con los objetivos de negocio y fomentando una cultura donde todos son responsables.
+3
Applicable to:
DevOps
Identity
Security
19 out of 60
GRC bSide BasicbSideMejora el cumplimiento regulatorio con evidencia clara, reduce la exposición a riesgos legales, técnicos y operativos, y establece estándares homogéneos en entornos dispersos.
+3
Applicable to:
DevOps
Identity
Security
20 out of 60
CISO as a Service bSide EssentialbSideDiseño e implementación de la estrategia de ciberseguridad de su empresa, cumpliendo con marcos regulatorios y contractuales, mejora de seguridad mediante evaluaciones, monitoreo, y políticas.
+3
Applicable to:
DevOps
Identity
Security
21 out of 60
Cloud Security bSidebSideProtección integral que asegura la confidencialidad, integridad y disponibilidad de sus datos y aplicaciones en la nube.
+3
Applicable to:
DevOps
Identity
Security
22 out of 60
CISO as a Service bSide ComplementbSideConsolide la estrategia de ciberseguridad de su empresa, cumpliendo con marcos regulatorios y contractuales.
Mejora la postura de seguridad mediante evaluaciones, monitoreo y políticas.
+3
Applicable to:
DevOps
Identity
Security
23 out of 60
CISO as a Service bSide ProfessionalbSideEstrategia de ciberseguridad para su empresa, cumpliendo con marcos regulatorios y contractuales.
Mejora la postura de seguridad mediante evaluaciones, monitoreo, políticas y gestión de incidentes.
+3
Applicable to:
DevOps
Identity
Security
24 out of 60
GRC Advance bSidebSideFormalización del gobierno de seguridad en desarrollo y operación.
Mejora el cumplimiento regulatorio con evidencia clara, reduce la exposición a riesgos legales, técnicos y operativos.
+3
Applicable to:
DevOps
Identity
Security
25 out of 60
Data Security & Privacy bSidebSideProtección integral de datos sensibles en cada etapa de su ciclo de vida. Permite clasificar, cifrar y controlar el acceso a la información con precisión, facilitando el cumplimiento de normativas.
+3
Applicable to:
DevOps
Identity
Security
26 out of 60
Data Security Posture Management with Microsoft PurviewKyndryl Inc.Assess and improve your data security posture with continuous visibility, risk insights, and compliance support to protect sensitive data across hybrid and multi-cloud environments.
+3
Applicable to:
Big Data
Disaster Recovery
Security
27 out of 60
Kyndryl Agentic AI Digital Trust ServicesKyndryl Inc.Kyndryl Agentic AI Digital Trust Services provide comprehensive security solutions for autonomous AI systems in hybrid and cloud environments using Microsoft's AI and security ecosystem. Focus on AI a
+3
Applicable to:
AI & Machine Learning
Disaster Recovery
Security
28 out of 60
Azure Rights Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Rights Management in their production environment.
+3
Applicable to:
App Modernization
Identity
Security
29 out of 60
Azure Rights Management: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see, understand and test the Azure Rights Management on a demo tenant.
+3
Applicable to:
App Modernization
Identity
Security
30 out of 60
Azure Security Center: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to secure workloads in Azure Cloud.
+3
Applicable to:
Identity
Security
Storage
31 out of 60
Disaster Site Recovery: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Cloud for Business Continuity
+3
Applicable to:
Backup
Disaster Recovery
Security
32 out of 60
Azure Rights Management: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to deploy and manage Azure Rights Management.
+3
Applicable to:
App Modernization
Identity
Security
33 out of 60
Azure Security Center: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see Azure Security Center benefits and stay ahead of changing threat landscape across the cloud.
+3
Applicable to:
Identity
Security
Storage
34 out of 60
Azure PCI DSS Compliance: 4-Hr AssessmentDGITAL LabsDGITAL Labs offers an assessment session to transform an Azure environment compliant to PCI DSS standard.
+3
Applicable to:
Analytics
App Modernization
Security
35 out of 60
Microsoft Azure Sentinel 4-Week WorkshopCloud4C Services Pte LtdA workshop allowing you to experience “Azure Sentinel” a combination of SIEM and SOAR solution powered by the built-in AI, analytics and automation with an ability to write the custom alerts
+3
Applicable to:
Identity
Migration
Security
36 out of 60
Azure Integration Services - 1 week assesementIWConnectNo application is isolated and functions alone. Nowadays, when you build or buy a software, you will need to connect it to other software.
+3
Applicable to:
Data Platform
DevOps
Security
37 out of 60
Host public services on Azure - 1 week assessmentIWConnectDo you have troubles with maintaining internet facing hardware and software on-premise? Do you want to take this burden off of your organization and even more reduce the cost?
+3
Applicable to:
App Modernization
Migration
Security
38 out of 60
Are you ready for the cloud? - 1 week assessmentIWConnectAre you thinking whether you should move to the cloud? You are doubting its capabilities?
+3
Applicable to:
App Modernization
Migration
Security
39 out of 60
CSRA Cyber Security Risk Assessment - 4 wk assessSecure Nextgen SystemsA multi-phased, multi-dimensional solution to assess your Cyber risk and define your Cyber security strategy according to what matters the most to your organization.
+3
Applicable to:
Backup
Identity
Security
40 out of 60
Azure Managed Security Services: 2 Wk AssessmentUSTCyberProof will conduct a cyber maturity assessment for deploying an on-cloud SOC platform on an Azure environment.
+3
Applicable to:
AI & Machine Learning
DevOps
Security
41 out of 60
Azure Sentinel: QuickStart 1-Hr WorkshopForteventoOverview of Azure Sentinel service and quick setup of first connector (Microsoft 365) data collection, analysis. Start collecting Microsoft 365 activity data for free. See Azure Sentinel capabilities.
+2
Applicable to:
Identity
Security
42 out of 60
Remote Work Solution: 1 Hour BriefingCommunication Square LLCThis briefing or as we at Communication Square like to call it Cloud Strategy Call is designed to help customers understand the benefits of Remote Work Solution
+2
Applicable to:
Data Platform
Security
43 out of 60
Azure Security Center: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Security Center, while having the ability to manage and control.
+3
Applicable to:
Identity
Security
Storage
44 out of 60
Azure Rights Management: 1 Hour BriefingCommunication Square LLC1 hour Briefing on Azure Rights Management in the Cloud
+3
Applicable to:
App Modernization
Identity
Security
45 out of 60
Endpoint Management: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see how diverse the mobile eco system is and how azure is helping to protect and secure sensitive data.
+2
Applicable to:
Identity
Security
46 out of 60
First Line Workers Solution:4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure based First Line workers Solution in their existing infrastructure and training's.
+3
Applicable to:
Big Data
Data Platform
Security
47 out of 60
Remote Work Solution: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure based Remote Work Solution in their existing infrastructure and trainings.
+3
Applicable to:
Big Data
Data Platform
Security
48 out of 60
Endpoint Management: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to protect corporate data on employee's personal and corporate devices.
+3
Applicable to:
Identity
Security
Storage
49 out of 60
First Line Worker Solution:2 Week Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help every IT Director utilize a scalable solution that connects to their workforce utilizing voice, video and chat.
+3
Applicable to:
Big Data
Data Platform
Security
50 out of 60
Remote Work Solution: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to deploy and manage Remote Work Solution in Microsoft Azure Cloud.
+2
Applicable to:
Big Data
Security
51 out of 60
HIPAA Ready Compliance: 2 Weeks Proof of ConceptCommunication Square LLC2 week Proof of Concept is designed to help customers see HIPAA ready solution on our DEMO environment and test policies, restrictions and access for different department\users
+3
Applicable to:
Identity
Security
Storage
52 out of 60
Azure Identity Management: 2 Week Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see and utilize Azure Identity and Access Management in demo environment.
+2
Applicable to:
Identity
Security
53 out of 60
First Line Workers Solution: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to deploy and manage First Line Workers Solution in Microsoft Azure Cloud.
+3
Applicable to:
Data Platform
Identity
Security
54 out of 60
Remote Work Solution: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to re-imagine how your business approaches secure communication, compliance to industry defined standards and access to data is secure on Azure Cloud.
+3
Applicable to:
Big Data
Data Platform
Security
55 out of 60
HIPAA Ready Compliance: 1 Week AssessmentCommunication Square LLC1 week assessment is designed to help customers plan for ways to get ready solution for HIPAA compliance
+3
Applicable to:
Identity
Security
Storage
56 out of 60
Azure Security Center: 1 Hour BriefingCommunication Square LLC1 hour Briefing on Azure Security
+3
Applicable to:
Identity
Security
Storage
57 out of 60
Azure Identity Management: 1 Week AssessmentCommunication Square LLC1 week assessment is designed to help customers plan for ways to deploy and manage Azure Identity and Access Management
+2
Applicable to:
Data Platform
Security
58 out of 60
Azure Identity Management: 1 Hour BriefingCommunication Square LLC1 hour Briefing on Azure Identity and Access Management
+2
Applicable to:
Data Platform
Security
59 out of 60
HCLTech MACCelerate - Workload Assessment and Factory Model Migration ServicesHCL America Inc_HCLTFactory-based execution model to maximize reuse and efficiency, leveraging ARM templates and Devops
+3
Applicable to:
App Modernization
Migration
Security
60 out of 60