FilterAlle löschen
Professional Services Ergebnisse
Es werden Ergebnisse in professional services angezeigt.
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
1 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
2 out of 60
Cloud Security Compliance: 4-months AssessmentPyxisThe CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
+3
Applicable to:
Analytics
Identity
Security
3 out of 60
Cloud Security Services: 12-months ImplementationPyxisWe audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
+3
Applicable to:
Analytics
Identity
Security
4 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield LtdSpartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
+3
Applicable to:
Identity
Migration
Security
5 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.aiImplementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
+1
Applicable to:
Identity
6 out of 60
HCLTech Unified Digital AccessHCL America Inc_HCLTHCLTech’s Unified Digital Access solution protects enterprise users and apps from cybersecurity attacks by aiding with right enterprise security posture with easy access to Apps and services.
+1
Applicable to:
Identity
7 out of 60
Transition To Cloud: 2-Day WorkshopSaportif Technology QFZ LLCProductivity and teamwork are fundamental to build resilience for your people, teams, and organization.
+3
Applicable to:
Identity
Migration
Security
8 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology HoldingOur offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
+3
Applicable to:
Identity
Security
Storage
9 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private LimitedWe help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
+3
Applicable to:
Identity
Migration
Security
10 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
+3
Applicable to:
Identity
Migration
Security
11 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology HoldingGet a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
+3
Applicable to:
Identity
Security
Storage
12 out of 60
skillup_consulting_openedx_v1Flexible Road LLCOpen edX Learning Management System with Azure.
+3
Applicable to:
Backup
Identity
Storage
13 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam FranceSecure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
+2
Applicable to:
Identity
Networking
14 out of 60
Secure Identities with Cognizant's Next-Gen Microsoft Defender for Identity ServiceCognizantSecure your identities with Cognizant’s Next-Gen Identity and Access Management Service, powered by Microsoft Defender for Identity and Azure Active Directory
+2
Applicable to:
Identity
Security
15 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
16 out of 60
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to:
App Modernization
Identity
17 out of 60
Assesment Azure Base4Base4 Security Chile SPAThe Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
+3
Applicable to:
Analytics
Identity
Security
18 out of 60
Azure Security Accelerator SuiteNeudesicMitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
+3
Applicable to:
Identity
Networking
Security
19 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARSALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
+3
Applicable to:
App Modernization
Identity
Migration
20 out of 60
Azure Virtual Desktop 1-Day AssessmentREDINGTON GULF FZE - HQAssess and Design Azure Virtual Desktop Solution to get Organization Up and Running with AVD
+3
Applicable to:
Identity
Migration
Security
21 out of 60
CloudPOS: 4-Week ImplementationMediasoft Data Systems LimitedThe all-in-one cloud-based point-of-sale solution. Boost efficiency, streamline operations, and enhance the customer experience with the user-friendly, secure, and fast software solutions.
+3
Applicable to:
Analytics
Archive
Identity
22 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTDDotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
+3
Applicable to:
App Modernization
Identity
Storage
23 out of 60
Red Canary Microsoft Sentinel WorkshopRed CanaryGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
+2
Applicable to:
Identity
Security
24 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
25 out of 60
Security as a Service: 3-Wk ImplementationA3Cloud SolutionsImprove your security of your solutions and infrastructures in Azure Cloud.
+3
Applicable to:
Identity
Migration
Security
26 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
27 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
28 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
29 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
30 out of 60
Modern workplace Active DirectorySii Sp. z o.o.Modern workplace Active Directory implementation, migration and support
+2
Applicable to:
Identity
Security
31 out of 60
Enterprise - Zero Trust Strategy & Journey MapJohn Keells Information Technology Pvt LtdOrganizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid & multi-cloud workplace, and ensures cyber security assurance.
+2
Applicable to:
Identity
Security
32 out of 60
Detection & Response Services (MXDR)Cloud LifeCloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
+3
Applicable to:
AI & Machine Learning
Identity
Security
33 out of 60
Sentinel-as-a-ServiceCloud LifeCloud Life delivers an innovative cloud-based AI and ML-enhanced Sentinel-as-a-Service, empowering your team with managed SIEM/SOAR capabilities using optimum Microsoft MXDR Services
+3
Applicable to:
AI & Machine Learning
Identity
Security
34 out of 60
Brillio Open Banking SolutionBrillioA robust, scalable, and secure solution that is designed to address the ever-evolving regulatory landscape and empower financial institutions to stay ahead in this new era of banking.
+3
Applicable to:
Data Platform
Identity
Security
35 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
36 out of 60
Microsoft Sentinel DeploymentBlazeClan Technologies Pvt. LtdBlazeclan offers Microsoft Sentinel deployment, integration, configuration and optimization in the customer's environment seamlessly.
+3
Applicable to:
Identity
Networking
Security
37 out of 60
Azure Well Architected Review - 5 Days AssessmentBlazeClan Technologies Pvt. LtdBlazeclan offers Azure Well Architected Review to help customers assess the environment for reliability, cost management, operational excellence, security and performance efficiency.
+3
Applicable to:
Identity
Migration
Networking
38 out of 60
Windows 365 Cloud PC - 4Wk DeploymentBespin Global MEA, an e& enterprise CompanyWindows 365: Elevate Your Workforce Experience with Azure Cloud PC
+3
Applicable to:
Identity
Networking
Security
39 out of 60
Eviden's Application Strategy WorkshopEviden International France - SASEviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
+3
Applicable to:
App Modernization
Data Platform
Identity
40 out of 60
Azure Well Architected Framework (AWAF) AssessmentNOVENTIQOptimize Azure efficiency and security with our Well-Architected Framework Assessment. Uncover challenges, enhance performance, and fortify your infrastructure for success.
+3
Applicable to:
Identity
Security
Storage
41 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
42 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
+2
Applicable to:
Identity
Security
43 out of 60
Workshop Threat Protection con Microsoft Sentinel: Blindaje Avanzado contra Amenazas Cibernéticas - 4Wk WorkShopENCAMINA S.L.Una inmersión profunda en la estrategia de seguridad, adaptada a tu organización
+3
Applicable to:
Identity
Networking
Security
44 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoorThis assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
+3
Applicable to:
Identity
Networking
Security
45 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoormyCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
+3
Applicable to:
Identity
Networking
Security
46 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SASUtilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
+2
Applicable to:
Identity
Security
47 out of 60
Eviden's Data Security CSI Engagement 4 Week AssessmentEviden International France - SASElevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
+3
Applicable to:
Analytics
Identity
Security
48 out of 60
Eviden's Azure Cloud Consulting Services – Landing ZonesEviden International France - SASA consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
+2
Applicable to:
Identity
Security
49 out of 60
HCLTech's Cybersecurity ServicesHCL Technologies Limited.HCLTech is a leading global technology company that helps enterprises reimagine their businesses for the digital age. Secure your cloud journey with HCLTech's comprehensive portfolio of cybersecurity
+3
Applicable to:
Backup
Identity
Security
50 out of 60
Cognizant Cyber Threat Defense, powered by MicrosoftCognizantCognizant's Cyber Threat Defense offering provides a set of structured methodologies and tools to assess, migrate, modernize and manage your Security Operations Center (SOC).
+3
Applicable to:
AI & Machine Learning
Identity
Security
51 out of 60
PwC Cybersecurity and Risk CapabilitiesPricewaterhousecoopers LLPReimagine risk and unlock opportunities through a human-led, tech-powered approach.
+2
Applicable to:
Identity
Security
52 out of 60
AI Assessment: Quality Improvement and Defect DetectionEduFin IT, Inc. d/b/a Brightpoint InfotechAI assessment for quality improvement and defect detection using AI. We assist in seamlessly integrating Azure services, this assessment identifies areas for improvement in your manufactring process
+3
Applicable to:
AI & Machine Learning
DevOps
Identity
53 out of 60
Cloud Security AssessmentBarikat Internet guvenligi bilisim tic . A.s.Simplifies security and risk with continuous, value-driven monitoring and management services
+2
Applicable to:
Identity
Security
54 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
55 out of 60
Azure AD Identity Protection AssessmentAVASOFTOur Azure AD Identity Protection Assessment identifies vulnerabilities and strengthens security. Mitigate risks with advanced threat detection and tailored defense strategies.
+2
Applicable to:
Identity
Security
56 out of 60
Single Sign On (SSO) for Applications using Entra ID by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user access. Simplify authentication with SSO, reduce password fatigue, and enhance security and productivity.
+2
Applicable to:
Identity
Security
57 out of 60
AVASecure 360 - Entra ID Access Management Solutions by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user provisioning, access requests, and reviews. Enhance security, efficiency, and compliance effortlessly.
+2
Applicable to:
Identity
Security
58 out of 60
Microsoft Azure AD AuthenticationAVASOFTStruggling with user access management? Azure AD Authentication automates provisioning, access requests, and reviews, enhancing security, efficiency, and compliance.
+2
Applicable to:
Identity
Security
59 out of 60
Strengthen Your Azure Security - 3 days Comprehensive Risk AssessmentAVASOFTIdentify and address security gaps in Azure with our Risk Assessment. Gain insights, tailored recommendations, and best practices to strengthen your security and maintain compliance.
+2
Applicable to:
Identity
Security
60 out of 60