FiltersClear all
Professional Services results
Showing results in professional services.
Cloud Security Approach: 2-months AssessmentPyxisThrough the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
+3
Applicable to:
Analytics
Identity
Security
1 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxisEvolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
+3
Applicable to:
Analytics
Identity
Security
2 out of 60
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
3 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
4 out of 60
Cloud Security Compliance: 4-months AssessmentPyxisThe CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
+3
Applicable to:
Analytics
Identity
Security
5 out of 60
Cloud Security Services: 12-months ImplementationPyxisWe audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
+3
Applicable to:
Analytics
Identity
Security
6 out of 60
skillup_consulting_openedx_v1Flexible Road LLCOpen edX Learning Management System with Azure.
+3
Applicable to:
Backup
Identity
Storage
7 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
8 out of 60
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to:
App Modernization
Identity
9 out of 60
SAP SuccessFactors and Microsoft Entra ID Integration: 6-wk ImplementationOxford Computer Group LLCEnable User Lifecycle Management by integrating SAP SuccessFactors and Microsoft Entra ID.
+1
Applicable to:
Identity
10 out of 60
Assesment Azure Base4Base4 Security Chile SPAThe Assesment on the Azure environment has the goal of giving the CISO ’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
+3
Applicable to:
Analytics
Identity
Security
11 out of 60
Managed Microsoft XDR - 12 month managed serviceANS Group LimitedANS will manage your Microsoft endpoint & workload protection tooling consisting of Microsoft 365 Defender, Defender for Cloud and Microsoft Sentinel, via our 24x7x365 UK based 3 Tiered SOC
+3
Applicable to:
Identity
Networking
Security
12 out of 60
Security COE - Managed Service (12 months minimum)ANS Group LimitedGain access to highly skilled engineering squads to continually develop, engineer and optimise services across your Azure Security solution suite to drive value rapidly.
+3
Applicable to:
Identity
Networking
Security
13 out of 60
Security ReviewShaping CloudShaping Cloud will perform a high-level security assessment throughout your organisation's IT infrastructure.
+3
Applicable to:
Backup
Identity
Security
14 out of 60
Red Canary Microsoft Sentinel WorkshopRed CanaryGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
+2
Applicable to:
Identity
Security
15 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
16 out of 60
Azure Advanced Security 4-Week ImplementationServentAzure Advanced Security is a service provided by Servent to help you take advantage of the multi-layered security provided by Microsoft across datacentres, infrastructure and operations in Azure
+2
Applicable to:
Identity
Security
17 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
18 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
19 out of 60
Azure Active Directory B2C - Assess & PlanShaping CloudAzure Active Directory B2C provides business-to-customer identity as a service. We can design, develop & implement a customer identity & access management solution based in Azure Active Directory B2C.
+2
Applicable to:
Identity
Security
20 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
21 out of 60
External IAM 5 day assessmentCondatis Group LimitedCondatis is offering an external Identity and Access Management (IAM) assessment focusing on how your organisation secures and manages external identities in your business context.
+2
Applicable to:
Identity
Security
22 out of 60
Digital BackpackTelelink Business Services EADThe Digital Backpack is an expansive learning platform that supports various teaching models—remote, in-person, and hybrid.
+1
Applicable to:
Identity
23 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
24 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
26 out of 60
MIM Migration To Entra ID Assessment: 8-Wk AssessmentModern 42Microsoft Identity Manager Current state assessment and transition plan to Microsoft Entra ID
+2
Applicable to:
Identity
Security
27 out of 60
Well Architectured FrameWork Review by NessNess IsraelStrengthen Your Cloud Architecture with Ness Cloud. Get tailored recommendations for Operational Excellence, Security, Reliability, Performance Efficiency, Cost Optimization, and Sustainability.
+3
Applicable to:
DevOps
Identity
Security
28 out of 60
Cloud Security Assessment By NessNess IsraelEnhance Your Cloud Security with Ness Cloud. Our assessment uncovers vulnerabilities, misconfigurations, and weaknesses, offering customized recommendations to strengthen your cloud environment.
+3
Applicable to:
Identity
Migration
Security
29 out of 60
Cloud Architect Review by NessNess IsraelOptimize Your Cloud Architecture with Ness. Our Cloud Architect Review provides a comprehensive analysis of your cloud setup, ensuring it is efficient, reliable, and cost-effective.
+3
Applicable to:
DevOps
Identity
Security
30 out of 60
Landing Zone Setup by NessNess IsraelEstablish a Secure Foundation with Ness. Our Landing Zone Setup ensures a compliant, secure and scalable Azure environment for your workloads.
+3
Applicable to:
DevOps
Identity
Migration
31 out of 60
Front Door Implementation by NessNess IsraelOptimize your site and app performance and resilience. The Front Door Implementation by Ness Cloud ensures efficient and secure content delivery for your applications and reduced server loads.
+3
Applicable to:
DevOps
Identity
Security
32 out of 60
Sapphire Managed XDR for Microsoft ServiceSapphire Technologies LimitedMicrosoft MXDR (Sentinel & Defender) defends your business, rapidly shutting down cyber threats.
+3
Applicable to:
Identity
Networking
Security
33 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITEDOverwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
+2
Applicable to:
Identity
Security
34 out of 60
QServices AI-Powered SaaS AutomationQ SERVICES INCAI-powered SaaS platform for customer support, workflow automation, and efficiency boost.
+3
Applicable to:
App Modernization
AI & Machine Learning
Identity
35 out of 60
Microsoft Entra Verified ID: 3-8 Day WorkshopCondatis Group LimitedAn immersive 3-8 day workshop designed to provide a deep dive into Microsoft Entra Verified ID.
+1
Applicable to:
Identity
36 out of 60
Microsoft Entra Verified ID: POCCondatis Group LimitedCondatis is offering a Microsoft Entra Verified ID Proof of Concept demonstrating how your organisation can leverage digital identity credentials to streamline onboarding and secure access.
+1
Applicable to:
Identity
37 out of 60
Cloud Architecture Migration Service上海诺未网络科技有限公司NovaTech offers a one-stop cloud migration and modernization solution for enterprises, helping them reduce costs, improve efficiency, enhance secur
+3
Applicable to:
Identity
Migration
Security
38 out of 60
Microsoft Entra ID WorkshopCondatis Group LimitedAn immersive 3 - 8 day workshop designed to provide a deep dive into Microsoft Entra ID.
+1
Applicable to:
Identity
39 out of 60
Microsoft Entra ID Governance: 3 - 8 Day WorkshopCondatis Group LimitedAn immersive 3-8 day workshop designed to provide a deep dive into Microsoft Entra ID Governance.
+1
Applicable to:
Identity
40 out of 60
Microsoft Entra ID: POCCondatis Group LimitedCondatis is offering a Microsoft Entra ID Proof of Concept demonstrating how your organisation can strengthen security and unify identity management.
+1
Applicable to:
Identity
41 out of 60
Microsoft Entra ID Governance: POCCondatis Group LimitedCondatis is offering a Microsoft Entra ID Governance Proof of Concept to demonstrate how organisations can improve operations and empower teams.
+1
Applicable to:
Identity
42 out of 60
External Penetration Testing for EducationABTechnologiesUncover security risks in your Azure and internet-facing systems to strengthen your Microsoft cloud environment.
+3
Applicable to:
Identity
Networking
Security
43 out of 60
CMMC ImplementationGolden Five LLCG5 ensures comprehensive implementation of all applicable and addressable Cybersecurity Maturity Model Certification (CMMC) practices across Levels 1 through 3. This includes robust coverage wit
+3
Applicable to:
Analytics
Identity
Security
44 out of 60
Azure Rights Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Rights Management in their production environment.
+3
Applicable to:
App Modernization
Identity
Security
45 out of 60
Surveyor 360 WVD: 10 Day AssessmentPHOENIX SOFTWARE LTDAssessment of current infrastructure & apps. Outcome is working pilot and production ready WVD. Agenda KickOff Meeting, Architecture Options, Produce Design Document and Azure resources. Offer for UK.
+3
Applicable to:
App Modernization
Identity
Migration
46 out of 60
Identity Health Check: 3-Week AssessmentCondatis Group LimitedPackaged consultancy service to help a business analyse, plan and build a robust and modern identity solution with Azure AD.
+1
Applicable to:
Identity
47 out of 60
Zero-trust Workplace Security: 2wk ImplementationAdfolksSecurity, Governance & Operational Insights in the Modern Workplace Implementation in 2 business weeks
+3
Applicable to:
Analytics
Identity
Security
48 out of 60
Velocity Landing Zone - 2 Hour Evaluation WorkshopSol-TecLet us help you understand how to get up and running in Azure quickly with a fully functional Azure environment ready to run production workloads, designed and implemented in your Azure tenancy
+2
Applicable to:
Identity
Migration
49 out of 60
Azure Foundation 4-Week ImplementationServentAzure Foundation is a comprehensive set of security, governance and cost management solutions for Azure. This offering is under pinned by the Microsoft Cloud Adoption Framework for Azure.
+3
Applicable to:
Identity
Networking
Security
50 out of 60
Azure Identity Management: 4 Weeks ImplementationCommunication Square LLC4 week Implementation is designed to help customers fully utilize Azure Identity and Access Management in their existing infrastructure and training.
+3
Applicable to:
Data Platform
Identity
Storage
51 out of 60
Azure Identity Management: 2 Week Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see and utilize Azure Identity and Access Management in demo environment.
+2
Applicable to:
Identity
Security
52 out of 60
Endpoint Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Device and Application Management solution and train their IT team.
+2
Applicable to:
Identity
Security
53 out of 60
Remote Learning Solution: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to re-imagine how your institution approaches secure communication, compliance to industry defined standards and access to data is secure on Microsoft Teams.
+3
Applicable to:
Identity
Security
Storage
54 out of 60
Remote Learning Solution: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Teams based Remote Learning Solution in their existing infrastructure and trainings.
+3
Applicable to:
Identity
Security
Storage
55 out of 60
Remote Learning Solution: 1-Hour briefingCommunication Square LLC1 hour Briefing on Remote Learning Solution
+3
Applicable to:
Identity
Security
Storage
56 out of 60
Windows Virtual Desktop: 2-WK ImplementationCAMWOOD LIMITEDOur WVD Deployment Accelerator will deliver an enterprise-grade Windows Virtual Desktop environment to support your remote working needs
+3
Applicable to:
Identity
Migration
Security
57 out of 60
Azure Virtual Desktop - 5-week ImplementationSpektra Systems LLCSpektra Systems offers premium consulting & implementation services for Microsoft Azure Virtual Desktop, We provide quality AVD solution with minimal cost, best in class security & productivity.
+3
Applicable to:
Identity
Migration
Storage
58 out of 60
Secure Virtual Desktop: 1 Week AssessmentOpstack IncA proven solution built to assess, plan and deliver a secure Remote Desktop solution, based on Microsoft WVD through a thoughtful assessment of your identity, network and compute infrastructure
+3
Applicable to:
Identity
Networking
Security
59 out of 60
WVD Rapid Deployment: 2 Week ImplementationCloud DirectFast and cost-effective implementation of an Azure WVD environment to enable work from any location for up to 50 users. This can be used as an initial phase to a larger WVD project or as a POC
+2
Applicable to:
Identity
Migration
60 out of 60