FilterAlle löschen
Professional Services Ergebnisse
Es werden Ergebnisse in professional services angezeigt.
Azure Virtual WAN Transit Network Layer: 2-Wk AssessmentOrange Business Services SAAudits your existing network set up and documents the current configuration. Providing an opportunity to improve your network for application performance that your business requires
+3
Applicable to:
Disaster Recovery
Networking
Security
1 out of 60
Security Operations as a Platform (SOaaP): Advisory, Implementation, and Managed ServicesKyndryl Inc.Work with Kyndryl on comprehensive advisory, design, implementation, and managed services for EDR, SIEM, vulnerability management, and incident management for your organization
+3
Applicable to:
Backup
Disaster Recovery
Security
2 out of 60
Azure Cloud Foundations: 1 Hour BriefingTEKsystems Global Services LLC.Have us build a muti-subscription Azure environment that accounts for scale, security governance, networking, and identity. We use a code-based approach for cloud resource deployment and config.
+3
Applicable to:
Data Platform
DevOps
Security
3 out of 60
Cloud Security 2-day AssessmentDexMachValidate your cloud app workloads against best practices and Well-Architected principles. Improve your security posture and gain visibility through insightful reports with recommendations.
+3
Applicable to:
Analytics
Identity
Security
4 out of 60
Managed Microsoft Endpoint Detection and Response with BTBritish Telecommunications plc.Our Endpoint Detection and Response (EDR) service combines BT’s market leading Managed Security Service to help improve your security posture at the endpoint utilising Microsoft’s leading EDR product.
+2
Applicable to:
Backup
Security
5 out of 60
GitHub 1-Day Workshop for Administrators and DevelopersDexMachWelcome to our hands-on workshop, designed specifically for administrators and developers aiming to enhance their GitHub environment.
+3
Applicable to:
Analytics
DevOps
Security
6 out of 60
GitHub for Developers: 1-Day TrainingDexMachA comprehensive training for developers who utilize GitHub coding services. Showcasing the rich features of GitHub and empowering participants with a clear understanding of how to use them.
+3
Applicable to:
App Modernization
DevOps
Security
7 out of 60
GitHub 1-Day Training for AdministratorsDexMachA comprehensive training for administrators handling GitHub environments. Showcasing the robust features of GitHub and empowering participants with a clear understanding of how to utilize them.
+3
Applicable to:
App Modernization
DevOps
Security
8 out of 60
DATA GOVERNANCE PURVIEW - PROOF OF CONCEPTInetum (HO)DATA GOVERNANCE - PURVIEW : Build Data Trust and Improve Business Efficiency with Inetum's Collaborative Data Governance Solution on Microsoft Purview
+2
Applicable to:
Data Platform
Security
9 out of 60
CAF WorkshopSii Sp. z o.o.We will guide you through the scope of Cloud Adoption Framework practices to make your organization better prepared for cloud adoption
+2
Applicable to:
Migration
Security
10 out of 60
Dynamics 365 Copilot Assessment with Cloud Intel - 4 WeeksCLICK2CLOUD INCAutomates repetitive and time-consuming administrative tasks in sales, customer service, and broader business operations with Cloud Intel’s Dynamics 365 Copilot Assessment.
+3
Applicable to:
App Modernization
AI & Machine Learning
Security
11 out of 60
AI Use Case Workshop (Generative AI / Microsoft 365 Copilot)KPCS CZ, s.r.o.Explore generative AI with our free AI UseCase Workshop! In 4 hours, we analyze your business, uncover opportunities, and propose potential use cases for integrating generative AI into your operations
+3
Applicable to:
AI & Machine Learning
Data Platform
Security
12 out of 60
Azure Well Architected Framework (AWAF) AssessmentNOVENTIQOptimize Azure efficiency and security with our Well-Architected Framework Assessment. Uncover challenges, enhance performance, and fortify your infrastructure for success.
+3
Applicable to:
Identity
Security
Storage
13 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
14 out of 60
Skygrade Application Modernization Service for Microsoft Azure: 10 Week ImplementationCognizantCognizant Skygrade is a packaged solution enabling organizations to transform hybrid and multi-cloud estates, at enterprise scale, backed by Cognizant and powered by Azure services and accelerators.
+3
Applicable to:
App Modernization
DevOps
Security
15 out of 60
NIS2 AssessmentInsightInsight’s security and compliance experts will provide an assessment based on the European NIS2 guidelines including Azure and Microsoft 365 Security. We deliver using industry standard frameworks
+3
Applicable to:
Identity
Networking
Security
16 out of 60
Microsoft Sentinel: 5 Week WorkshopAdvensDécouvrir Microsoft Sentinel et avoir une première vision des menaces dans votre environnement Azure.
+1
Applicable to:
Security
17 out of 60
DATA GOVERNANCE PURVIEW - ASSESSMENT (3 days)Inetum (HO)DATA GOVERNANCE - PURVIEW : Build Data Trust and Improve Business Efficiency with Inetum's Collaborative Data Governance Solution on Microsoft Purview
+2
Applicable to:
Data Platform
Security
18 out of 60
Copilot Readiness AssessmentKPCS CZ, s.r.o.Assess your readiness for Microsoft Copilot with our tailored engagement! Gain insights from experts, align Copilot with your goals, and evaluate licensing, technical, and organizational readiness.
+3
Applicable to:
AI & Machine Learning
Data Platform
Security
19 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
+2
Applicable to:
Identity
Security
20 out of 60
Sentinel Migration: 4-Wk Proof of ConceptELEVATE Solutions LimitedThe purpose of Microsoft Sentinel proof of concept (PoC) is to test how well the SIEM integrates with the existing infrastructure and meets your unique security needs.
+1
Applicable to:
Security
21 out of 60
NIS2 directive assessment and implementationSii Sp. z o.o.Secure cyber environment is crucial for organizations health, competitive power and protection against loss or corruption of sensitive data they deal with on a daily basis
+1
Applicable to:
Security
22 out of 60
Azure AI Services: 1-Day AssessmentData Market Bilgi Hizmetleri A.SHow Azure AI Services can transform your business and the overall concepts you must understand to do more with less effort.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
23 out of 60
Imperium Azure ConsultingIMPERIUM DYNAMICS LLCExpert guidance to help your business take control of the cloud.
+3
Applicable to:
AI & Machine Learning
Migration
Security
24 out of 60
Security Copilot Assessment with Cloud Intel - 4 WeeksCLICK2CLOUD INCCloud Intel's Security Copilot Assessment simplifies the integration of Security Copilot, enhancing intelligent protection for your network against cyberthreats.
+3
Applicable to:
App Modernization
AI & Machine Learning
Security
25 out of 60
Aximsoft Automation Services (CI/CD)AximsoftAccelerate Your Development Lifecycle with Azure Automation (CI/CD)
+3
Applicable to:
App Modernization
Big Data
Security
26 out of 60
Workshop Threat Protection con Microsoft Sentinel: Blindaje Avanzado contra Amenazas Cibernéticas - 4Wk WorkShopENCAMINA S.L.Una inmersión profunda en la estrategia de seguridad, adaptada a tu organización
+3
Applicable to:
Identity
Networking
Security
27 out of 60
CloudGuard Sentinel HealthcheckCLOUDGUARD LTDEnsure optimal performance, best practice configuration management, cost management controls and optimisation from consumption and security detection performance from Microsoft Sentinel
+1
Applicable to:
Security
28 out of 60
Azure Security ReviewCWSIAn evaluation service that will provide comprehensive insights into your existing Azure presence and the potential risks linked to it.
+1
Applicable to:
Security
29 out of 60
Azure Cloud Migration: 3 Days AssessmentSabancıDxAzure Migration Assessment is to thoroughly evaluate the existing IT infrastructure and determine the feasibility, challenges, and opportunities associated with migrating to the Azure Cloud platform
+3
Applicable to:
Disaster Recovery
Migration
Security
30 out of 60
Azure DevOps Setup: 1 week programCloudgarner Solutions Pvt LtdInnovate Your Build Processes with Csharptek's Azure DevOps
+3
Applicable to:
DevOps
Security
Storage
31 out of 60
Avanade Secure Identities and AccessAvanade, Inc.At Avanade we help our customers to evolve their identity strategy to enable trustworthy and interoperable digital identities.
+1
Applicable to:
Security
32 out of 60
Azure Arc EnablementNordcloud an IBM companyManage your workloads anywhere by leveraging all of the great Azure capabilities you already know.
+2
Applicable to:
Data Platform
Security
33 out of 60
Azure Landing Zone Design and Implementation: 8 WeeksMobiz Inc.Optimize your Azure journey with our purpose-built Azure Landing Zone for streamlined and secure cloud deployment.
+3
Applicable to:
DevOps
Networking
Security
34 out of 60
myCloudDoor Managed Extended Detection and Response (MXDR)myCloudDoormyCloudDoor Managed Extended Detection & Response service (MXDR) powered by Sentinel and Defender
+1
Applicable to:
Security
35 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoorThis assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
+3
Applicable to:
Identity
Networking
Security
36 out of 60
Azure Security AssessmentBlazeClan Technologies Pvt. LtdBlazeclan Security Assessment helps the customer to quickly understand the security posture of their
Azure cloud landscape
+1
Applicable to:
Security
37 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoormyCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
+3
Applicable to:
Identity
Networking
Security
38 out of 60
IBM Cloud XDR Managed ServiceIBM Security ServicesManaged Service Implementation of IBM's Cloud XDR Service, an end to end managed service utilising Microsoft Sentinel and the Microsoft Defender Suite.
+1
Applicable to:
Security
39 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SASUtilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
+2
Applicable to:
Identity
Security
40 out of 60
Eviden's Data Security CSI Engagement 4 Week AssessmentEviden International France - SASElevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
+3
Applicable to:
Analytics
Identity
Security
41 out of 60
AI Powered Chatbot: 4-Wk Proof of ConceptCLICK2CLOUD INCUnlock the Future of Customer Engagement and Operational Excellence with a Personalized AI-Powered Chatbot.
+3
Applicable to:
App Modernization
AI & Machine Learning
Security
42 out of 60
Azure Cloud Security AssessmentIntelliasComprehensive information security and compliance service, which comprises two levels of analysis with the findings obtained being progressively more detailed.
+1
Applicable to:
Security
43 out of 60
Compunnel_Azure_DevOpsCompunnel Software GroupCompunnel's Azure DevOps Services offer a comprehensive suite designed to streamline and optimize the software development process. By integrating these services, businesses can achieve significant im
+3
Applicable to:
Big Data
DevOps
Security
44 out of 60
Eviden's Microsoft Sentinel CSI Engagement 5 WK WorkshopEviden International France - SASIncrease the security of your Microsoft Cloud with our workshop. We deploy Microsoft 365 trial lic, configure Security tools, and conduct threat exploration to discover and mitigate threats actively.
+1
Applicable to:
Security
45 out of 60
Eviden's Azure Cloud Consulting Services – Landing ZonesEviden International France - SASA consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
+2
Applicable to:
Identity
Security
46 out of 60
Azure Cost-Optimization: 2-Day AssessmentSUMM-IT S.A.Summ-it's 2-day Azure platform cost optimization assessment focuses on analyzing current cloud consumption and identifying opportunities to optimize resources and costs.
Ocena optymalizacji kosztów
+3
Applicable to:
App Modernization
Migration
Security
47 out of 60
Azure Sentinel: 5-Day ImplementationIbn Technologies LtdThe Azure Sentinel Implementation is a comprehensive Professional Services package offered by CloudIBN. This package includes the design, deployment, and fine-tuning of the Azure Sentinel
+1
Applicable to:
Security
48 out of 60
End-to-end Security Services for Azure & Microsoft 365Hexaware TechnologiesComprehensive Security Services offer to accelerate your security journey to Azure cloud and validate against attacks to ensure security compliance with our Defender.
+1
Applicable to:
Security
49 out of 60
TCS Responsible AI Assessment for Generative AITCS - Azure TCS offers Responsible AI (RAI) Assessment service to our customers and partners in gauging their Azure Open AI based Gen AI solutions against the core tenets of RAI.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
50 out of 60
Managed Services for Azure Network Operation CenterCelebal Technologies Private LimitedUnleash the Power of Connectivity with CT Managed Services for Azure Network Operation Center
+3
Applicable to:
DevOps
Networking
Security
51 out of 60
BSE_Azure_Virtual_Desktop : From 3 to 6 days POCProjetlysSolutions de bureaux virtuels pour les entreprises privées, les collectivités publiques et les hôpitaux
+2
Applicable to:
App Modernization
Security
52 out of 60
HCLTech's Cybersecurity ServicesHCL Technologies Limited.HCLTech is a leading global technology company that helps enterprises reimagine their businesses for the digital age. Secure your cloud journey with HCLTech's comprehensive portfolio of cybersecurity
+3
Applicable to:
Backup
Identity
Security
53 out of 60
Capgemini Managed Security Services with Sentinel for SAPCapgemini GroupThe solution is focused on providing a clear overview of vulnerabilities present in the complex SAP landscape from different domains.
+1
Applicable to:
Security
54 out of 60
LBAN_Secure_Static_Web_Hosting:3Days ImplementationLotus Beta AnalyticsHosting Secure static websites on Azure Storage Accounts involves uploading HTML, CSS, JavaScript, and image files in a container named $web, setting index and error pages and mapping to a domain name
+2
Applicable to:
Security
Storage
55 out of 60
Microsoft 365 Copilot with OpenAI on Azure Security Assessment - 8 hours workshopC3IT Software SolutionsMicrosoft 365 Copilot with OpenAI on Azure Security Assessment - 8 hours workshop where we are providing the roadmap of what can we done in the future
+2
Applicable to:
AI & Machine Learning
Security
56 out of 60
TCS AI-Driven Well-Architected AssessmentTata Consultancy Services Ltd.Assess your workloads continuously and run optimally, using Microsoft Azure Well-Architected best-practices and various technology assessment
+3
Applicable to:
App Modernization
Migration
Security
57 out of 60
Dell Implementation Services for Microsoft Azure Site RecoveryDell Technologies ServicesDell Services provides advisory and implementation services for Azure cloud customers, enabling organizations to replicate and thus protect critical cloud workloads with time-tested frameworks.
+3
Applicable to:
Backup
Disaster Recovery
Security
58 out of 60
Wipro Microsoft Copilot for Security Readiness Workshop: 1 dayWipro LtdWipro's Microsoft Copilot’s Security Readiness Workshop will help you demonstrate the value it brings at machine speed & scale and preparing enterprises to embrace Generative AI for Security.
+2
Applicable to:
AI & Machine Learning
Security
59 out of 60
Azure Virtual Desktop ImplementationSii Sp. z o.o.Implementation of Cloud Modern Desktop using Microsoft Azure VDI
+3
Applicable to:
Migration
Networking
Security
60 out of 60