FiltersClear all
Professional Services results
Showing results in professional services.
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Consulting LimitedOur offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
+3
Applicable to:
Identity
Security
Storage
1 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Consulting LimitedGet a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
+3
Applicable to:
Identity
Security
Storage
2 out of 60
Azure Security Accelerator SuiteNeudesicMitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
+3
Applicable to:
Identity
Networking
Security
3 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTDDotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
+3
Applicable to:
App Modernization
Identity
Storage
4 out of 60
Red Canary Microsoft Sentinel WorkshopRed CanaryGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
+2
Applicable to:
Identity
Security
5 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
6 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
7 out of 60
Sentinel Ready 24x7readymindCombine la experiencia de nuestros profesionales en ciberseguridad con la potencia de Microsoft Sentinel, una plataforma líder en la gestión de información y eventos de seguridad.
+2
Applicable to:
Identity
Security
8 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
9 out of 60
Eviden's Application Strategy WorkshopEviden International France - SASEviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
+3
Applicable to:
App Modernization
Data Platform
Identity
10 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
+2
Applicable to:
Identity
Security
11 out of 60
Microsoft Entra: Tu Aliado en SeguridadSuri Services SCImpulsa la seguridad y gestión de tu organización con nuestro programa de implementación de Microsoft Entra.
+2
Applicable to:
Identity
Security
12 out of 60
ALIANDO Managed Extended Detection and Response (MXDR)myCloudDoorALIANDO Managed Extended Detection & Response service (MXDR) powered by Sentinel and Defender
+3
Applicable to:
Identity
Networking
Security
13 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoorThis assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
+3
Applicable to:
Identity
Networking
Security
14 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoormyCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
+3
Applicable to:
Identity
Networking
Security
15 out of 60
Microsoft 365 Managed Cloud Virtual Machine ServiceT-Systems International With the “Microsoft 365 Cloud Virtual Machine Service – Azure Virtual Desktop” product, Telekom provides operational and configuration services
+3
Applicable to:
Identity
Networking
Security
16 out of 60
Evaluación de seguridad Multicloud con Microsoft Cloud Security Benchmark (MCSB): Evaluación/Análisis de 2-6 semanas de MCSB.Cloud ContinuityCon Seguridad Multicloud proteja sus entornos de nube dinámicos con controles robustos y líneas base de servicio, mediante Microsoft Cloud Security Benchmark con los mejores estándares de seguridad.
+3
Applicable to:
Identity
Networking
Security
17 out of 60
Azure Well-Architected Framework: Evaluación/Análisis de 2-4 semanas de Ejecución.Cloud ContinuityWell Architected ayuda a las empresas a obtener cargas de trabajo más eficientes, seguras y resilientes en Azure, optimizando tus costos y mejoran su rendimiento general.
+3
Applicable to:
App Modernization
Identity
Security
18 out of 60
Microsoft Entra ID: Consultancy & ImplementationNOVENTIQRevolutionize Access Management with Microsoft Entra ID
+2
Applicable to:
Identity
Security
19 out of 60
Azure Identity Security ImplementationBaufestIn a context of increasing threats of identity theft and excessive privilege exploitation, our team of specialists works alongside our clients to implement secure identity management in Azure.
+2
Applicable to:
Identity
Security
20 out of 60
Azure Threat Detection & Response ImplementationBaufestWith tools such as Microsoft Sentinel, Web Application Firewall (WAF), Microsoft Defender and Threat Detection, their critical assets are protected through proactive monitoring and response
+2
Applicable to:
Identity
Security
21 out of 60
Azure Hardening Security ImplementationBaufestWe use advanced hardening practices to reduce the attack surface and strengthen the infrastructure, adapting to specific regulations and certifications such as NIST, ISO 27001, and GDPR
+2
Applicable to:
Identity
Security
22 out of 60
Microsoft Identity Security Posture-4h assessmentReplyAssessment of Microsoft Cloud or Hybrid Identity and Access Management Solution Security Posture
+2
Applicable to:
Identity
Security
23 out of 60
Implementation of Microsoft Entra ID IntegrationITX360 (Pvt) Ltd.Enhance security and simplify access with Microsoft Entra ID Integration, featuring SSO, MFA, passwordless login, and role-based access
+2
Applicable to:
Identity
Security
24 out of 60
Azure Virtual Desktop & Productivity 2 Week ImplementationAKAVEIL TECHNOLOGIES INCAzure Virtual Desktop provides secure, remote access to desktops and apps, simplifying traditional VDI management through a fully managed, cloud-based solution.
+3
Applicable to:
Identity
Migration
Security
25 out of 60
Azure Virtual Desktop & Productivity 2 Week Implementation for Law Firms and Legal TeamsAKAVEIL TECHNOLOGIES INCAzure Virtual Desktop provides secure, remote access to desktops and apps, simplifying traditional VDI management through a fully managed, cloud-based solution.
+3
Applicable to:
Identity
Migration
Security
26 out of 60
Azure Security / Compliance Audit 5 Day AssessmentAKAVEIL TECHNOLOGIES INCThoroughly assess your Azure environment to uncover risks, boost security, and ensure compliance with industry standards
+2
Applicable to:
Identity
Security
27 out of 60
Invillia Real-time Fraud Detection With Streaming AnalyticsInvillia Desenvolvimento de Produtos Digitais LTDAReal-time fraud detection and prevention using Azure analytics and AI. Designed for companies with high transaction volumes aiming to reduce risk and improve decision-making.
+3
Applicable to:
Analytics
DevOps
Identity
28 out of 60
Onesec.AI Secure SuiteSecure Nextgen SystemsAt Onesec, we developed Onesec.AI Secure Suite, a comprehensive solution that combines artificial intelligence with Microsoft’s best-in-class security technologies
+3
Applicable to:
AI & Machine Learning
Identity
Security
29 out of 60
LBAN CloudSecure – Secured by Microsoft Defender for CloudLotus Beta AnalyticsLBAN CloudSecure delivers end-to-end Azure protection with Microsoft Defender for Cloud—boosting security, compliance, and visibility across your cloud workloads.
+2
Applicable to:
Identity
Security
30 out of 60
Windows in Cloud AssessmentTask Systems LimitedUnlock Azure Virtual Desktop Success: Expert-Led WVD Assessment & Migration Blueprint
+3
Applicable to:
Identity
Migration
Security
31 out of 60
Cloud4C Advanced Network Security and AccessCloud4C Services Pte LtdCloud4C’s Advanced Network Security and Access protects cloud perimeters with Azure Firewall, WAF, DDoS, Front Door, Bastion, and Zero Trust controls for secure, resilient, and compliant connectivity.
+3
Applicable to:
Identity
Networking
Security
32 out of 60
Cloud4C External Attack Surface Assessment (EASM + MDTI)Cloud4C Services Pte LtdCloud4C’s External Attack Surface Assessment uses Microsoft Defender EASM + MDTI to uncover shadow IT, misconfigurations, CVEs, and risks, delivering dashboards and remediation plans
+3
Applicable to:
Identity
Networking
Security
33 out of 60
Cloud4C Entra Governance & Compliance SuiteCloud4C Services Pte LtdCloud4C’s Entra Governance & Compliance Suite delivers identity governance, protection, and privileged access management with audit-ready workflows to strengthen compliance and reduce insider risks
+3
Applicable to:
Analytics
Identity
Security
34 out of 60
Cloud4C Zero Trust Readiness and StrategyCloud4C Services Pte LtdCloud4C’s Zero Trust Readiness and Strategy delivers maturity assessment, tailored architecture, and phased rollout planning with Microsoft Defender integrations for secure Zero Trust transformation
+3
Applicable to:
Identity
Networking
Security
35 out of 60
Cloud4C Security Posture AssessmentCloud4C Services Pte LtdCloud4C’s Security Posture Assessment delivers Zero Trust–aligned advisory with Secure Score reviews, Defender telemetry, workshops, and board-ready reporting to strengthen enterprise security.
+3
Applicable to:
Identity
Networking
Security
36 out of 60
Cloud4C OT & IoT Security AssessmentCloud4C Services Pte LtdThis assessment leverages Microsoft Defender for IoT to map assets, model threats, and deliver vulnerability reports with a remediation roadmap for industrial and connected environments.
+3
Applicable to:
Identity
Networking
Security
37 out of 60
Cloud4C Microsoft Cloud Security – Enterprise SuiteCloud4C Services Pte LtdCloud4C’s Microsoft Cloud Security – Enterprise Suite delivers unified protection with CNAPP, DevSecOps, WAF/DDoS, data security, and confidential computing in one enterprise-grade Zero Trust package.
+3
Applicable to:
Identity
Networking
Security
38 out of 60
Cloud4C Developer & DevOps Security BundleCloud4C Services Pte LtdCloud4C’s Developer & DevOps Security Bundle secures applications, workloads, and CI/CD pipelines with Entra Workload ID, PIM, and Conditional Access, supported by developer-focused onboarding.
+3
Applicable to:
DevOps
Identity
Security
39 out of 60
Cloud4C Confidential and Identity-Aware ComputingCloud4C Services Pte LtdCloud4C’s Confidential and Identity-Aware Computing secures data-in-use with Azure Confidential VMs, Managed HSM, Key Vault, and encryption policies for privacy-preserving, compliance-ready workloads.
+3
Applicable to:
Identity
Networking
Security
40 out of 60
Cloud4C Microsoft Copilot for Security –Readiness AssessmentCloud4C Services Pte LtdCloud4C’s Microsoft Copilot for Security Readiness Assessment identifies gaps, delivers recommendations, and builds a roadmap for smooth adoption of AI-driven security operations
+3
Applicable to:
AI & Machine Learning
Identity
Security
41 out of 60
Cloud4C Awareness Training and Incident WorkshopCloud4C Services Pte LtdThis readiness workshop delivers security training, phishing simulations, and tabletop incident response exercises to build employee resilience and organizational preparedness
+3
Applicable to:
Identity
Networking
Security
42 out of 60
Cloud4C Azure Identity Foundation AcceleratorCloud4C Services Pte LtdCloud4C’s Entra Zero Trust Starter Pack delivers identity, conditional access, privileged identity management, and secure private access to help organizations launch their Zero Trust journey
+3
Applicable to:
Identity
Networking
Security
43 out of 60
Cloud4C Microsoft Purview Data Protection OfferingCloud4C Services Pte LtdCloud4C’s Microsoft Purview Data Protection unifies discovery, classification, and compliance with AI-driven governance to prevent data loss and risks across Microsoft 365, Azure, and hybrid estates
+3
Applicable to:
Analytics
Identity
Security
44 out of 60
Cloud4C Defender for Office 365 Deployment OfferingCloud4C Services Pte LtdCloud4C’s Defender for Office 365 Deployment secures email and collaboration tools with expert setup, testing, and best practices to reduce threats, boost trust, and ensure compliant communication
+3
Applicable to:
Analytics
Identity
Security
45 out of 60
Cloud4C Intune Endpoint Compliance & Security Suite OfferingCloud4C Services Pte LtdCloud4C’s Intune Endpoint Compliance & Security Suite secures devices, enforces compliance, and streamlines endpoint management with Microsoft Intune, Defender for Endpoint, and Entra ID integration.
+3
Applicable to:
Analytics
Identity
Security
46 out of 60
Microsoft 365 Defender Enterprise DeploymentCloud4C Services Pte LtdCloud4C’s Microsoft 365 Defender Enterprise Deployment delivers unified protection with expert rollout, configuration, testing, and advisory for secure, scalable Microsoft 365 environments.
+3
Applicable to:
Analytics
Identity
Security
47 out of 60
Azure Managed Service上海诺未网络科技有限公司NovaTech offers comprehensive Azure cloud environment operation and maintenance services.
+3
Applicable to:
Analytics
Identity
Security
48 out of 60
AI Agent Customization Services上海诺未网络科技有限公司Custom AI assistants tailored for specific business needs, powered by Microsoft Copilot Studio and Azure AI Foundry technologies with enterprise security and compliance.
+3
Applicable to:
AI & Machine Learning
Data Platform
Identity
49 out of 60
Identity and Access Management (IAM) bSidebSideGestión de acceso sólida, escalable y alineada con estándares internacionales. Protege cuentas privilegiadas frente a ataques como phishing, escalamiento de privilegios y movimientos laterales.
+3
Applicable to:
DevOps
Identity
Security
50 out of 60
S-SDLC Desarrollo de Software Seguro bSidebSideDetectamos y corregimos vulnerabilidades antes de escribir una sola línea de código, alineando la seguridad con los objetivos de negocio.
+3
Applicable to:
DevOps
Identity
Security
51 out of 60
Desarrollo de Software Seguro bSide EntrenamientobSideDetectamos y corregimos vulnerabilidades antes de escribir una sola línea de código, alineando la seguridad con los objetivos de negocio y fomentando una cultura donde todos son responsables.
+3
Applicable to:
DevOps
Identity
Security
52 out of 60
GRC bSide BasicbSideMejora el cumplimiento regulatorio con evidencia clara, reduce la exposición a riesgos legales, técnicos y operativos, y establece estándares homogéneos en entornos dispersos.
+3
Applicable to:
DevOps
Identity
Security
53 out of 60
CISO as a Service bSide EssentialbSideDiseño e implementación de la estrategia de ciberseguridad de su empresa, cumpliendo con marcos regulatorios y contractuales, mejora de seguridad mediante evaluaciones, monitoreo, y políticas.
+3
Applicable to:
DevOps
Identity
Security
54 out of 60
CISO as a Service bSide ComplementbSideConsolide la estrategia de ciberseguridad de su empresa, cumpliendo con marcos regulatorios y contractuales.
Mejora la postura de seguridad mediante evaluaciones, monitoreo y políticas.
+3
Applicable to:
DevOps
Identity
Security
55 out of 60
CISO as a Service bSide ProfessionalbSideEstrategia de ciberseguridad para su empresa, cumpliendo con marcos regulatorios y contractuales.
Mejora la postura de seguridad mediante evaluaciones, monitoreo, políticas y gestión de incidentes.
+3
Applicable to:
DevOps
Identity
Security
56 out of 60
GRC Advance bSidebSideFormalización del gobierno de seguridad en desarrollo y operación.
Mejora el cumplimiento regulatorio con evidencia clara, reduce la exposición a riesgos legales, técnicos y operativos.
+3
Applicable to:
DevOps
Identity
Security
57 out of 60
Data Security & Privacy bSidebSideProtección integral de datos sensibles en cada etapa de su ciclo de vida. Permite clasificar, cifrar y controlar el acceso a la información con precisión, facilitando el cumplimiento de normativas.
+3
Applicable to:
DevOps
Identity
Security
58 out of 60
Azure Rights Management: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see, understand and test the Azure Rights Management on a demo tenant.
+3
Applicable to:
App Modernization
Identity
Security
59 out of 60
Azure Rights Management: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to deploy and manage Azure Rights Management.
+3
Applicable to:
App Modernization
Identity
Security
60 out of 60