FiltersClear all
Professional Services results
Showing results in professional services.
PwC Cybersecurity and Risk CapabilitiesPricewaterhousecoopers LLPReimagine risk and unlock opportunities through a human-led, tech-powered approach.
+2
Applicable to:
Identity
Security
1 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
2 out of 60
Azure AD Identity Protection AssessmentAVASOFTOur Azure AD Identity Protection Assessment identifies vulnerabilities and strengthens security. Mitigate risks with advanced threat detection and tailored defense strategies.
+2
Applicable to:
Identity
Security
3 out of 60
Single Sign On (SSO) for Applications using Entra ID by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user access. Simplify authentication with SSO, reduce password fatigue, and enhance security and productivity.
+2
Applicable to:
Identity
Security
4 out of 60
AVASecure 360 - Entra ID Access Management Solutions by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user provisioning, access requests, and reviews. Enhance security, efficiency, and compliance effortlessly.
+2
Applicable to:
Identity
Security
5 out of 60
Microsoft Azure AD AuthenticationAVASOFTStruggling with user access management? Azure AD Authentication automates provisioning, access requests, and reviews, enhancing security, efficiency, and compliance.
+2
Applicable to:
Identity
Security
6 out of 60
Strengthen Your Azure Security - 3 days Comprehensive Risk AssessmentAVASOFTIdentify and address security gaps in Azure with our Risk Assessment. Gain insights, tailored recommendations, and best practices to strengthen your security and maintain compliance.
+2
Applicable to:
Identity
Security
7 out of 60
On-premises Active Directory Infra AssessmentAVASOFTOur On-Premises AD Infrastructure Assessment identifies vulnerabilities and compliance gaps. Strengthen security and ensure compliance with actionable insights and expert recommendations.
+2
Applicable to:
Identity
Security
8 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
9 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
11 out of 60
Kyndryl IAM Design and Implementation ServicesKyndryl Inc.Kyndryl IAM Services provide IAM solutions for hybrid and cloud environments using Microsoft Entra. Focus on user authentication, identity governance, and secure access with Zero Trust principles.
+3
Applicable to:
Backup
Identity
Security
12 out of 60
Hybrid AD Identity Security AssessmentAVASOFTOur Hybrid AD Identity Security Assessment identifies vulnerabilities and compliance gaps. Fortify your Hybrid AD, enhance security, and ensure compliance with actionable insights.
+2
Applicable to:
Identity
Security
13 out of 60
HIPAA Compliance Risk Assessment & Gap AnalysisAvertium, LLCAvertium’s team of healthcare and security consultants apply their deep knowledge of compliance to the way you do business.
+2
Applicable to:
Identity
Security
14 out of 60
Microsoft 365 Managed Cloud Virtual Machine ServiceT-Systems International With the “Microsoft 365 Cloud Virtual Machine Service – Azure Virtual Desktop” product, Telekom provides operational and configuration services
+3
Applicable to:
Identity
Networking
Security
15 out of 60
Security Information and Event Management (SIEM) MigrationKyndryl Inc.Kyndryl SIEM Migration service transitions legacy SIEMs to Microsoft Sentinel, ensuring comprehensive coverage for both on premise and cloud assets. Services include discovery, design, implementation.
+3
Applicable to:
Disaster Recovery
Identity
Security
16 out of 60
Azure Landing Zone Deployment ServiceLotus Beta AnalyticsThe "Azure Landing Zone Deployment Service" simplifies setting up secure, compliant Azure environments with pre-configured templates, ensuring a solid foundation for cloud operations and governance.
+2
Applicable to:
Identity
Security
17 out of 60
Kyndryl Managed Extended Detection and Response (XDR)Kyndryl Inc.Kyndryl helps customers extend their protection beyond just endpoints to cover all assets, including email, identity, SaaS applications, cloud infrastructure, and data.
+3
Applicable to:
Disaster Recovery
Identity
Security
18 out of 60
Evaluación de seguridad Multicloud con Microsoft Cloud Security Benchmark (MCSB): Evaluación/Análisis de 2-6 semanas de MCSB.Cloud ContinuityCon Seguridad Multicloud proteja sus entornos de nube dinámicos con controles robustos y líneas base de servicio, mediante Microsoft Cloud Security Benchmark con los mejores estándares de seguridad.
+3
Applicable to:
Identity
Networking
Security
19 out of 60
Azure Well-Architected Framework: Evaluación/Análisis de 2-4 semanas de Ejecución.Cloud ContinuityWell Architected ayuda a las empresas a obtener cargas de trabajo más eficientes, seguras y resilientes en Azure, optimizando tus costos y mejoran su rendimiento general.
+3
Applicable to:
App Modernization
Identity
Security
20 out of 60
Copilot for Security Readiness AssessmentAvertium, LLCCopilot for Security readiness assessment will prepare you to defend beyond machine speed.
+2
Applicable to:
Identity
Security
21 out of 60
Microsoft Entra ID: Consultancy & ImplementationNOVENTIQRevolutionize Access Management with Microsoft Entra ID
+2
Applicable to:
Identity
Security
22 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITEDOverwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
+2
Applicable to:
Identity
Security
23 out of 60
Microsoft Entra Private Access - Proof of Concept (PoC)Onevinn ABMicrosoft Entra Private Access, is a cutting-edge Security Service Edge (SSE) solution designed to provide secure, seamless access to private applications and resourses.
+2
Applicable to:
Identity
Security
24 out of 60
Microsoft Entra ID Conditional Access: 10-Day ImplementationWIZARD GROUP LIMITEDdesigned to quickly and effectively deploy Entra ID Conditional Access policies to enhance your organisation's security posture
+3
Applicable to:
Identity
Migration
Security
25 out of 60
Microsoft Purview: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur implementation service aims to streamline the deployment of Microsoft Purview, ensuring that your organization can leverage its full capabilities to make informed decisions
+3
Applicable to:
Identity
Migration
Security
26 out of 60
Microsoft Entra : Quick Start AcceleratorWIZARD GROUP LIMITEDThis service ensures that your organization can quickly leverage the full capabilities of Microsoft Entra ID to enhance security and streamline access management
+3
Applicable to:
Identity
Migration
Security
27 out of 60
Microsoft Purview Quickstart Accelerator Implementation with Wizard CyberWIZARD GROUP LIMITEDThis service ensures that your organization can quickly harness the power of Microsoft Purview to manage and govern your data effectively
+3
Applicable to:
Identity
Migration
Security
28 out of 60
Azure Identity Security ImplementationBaufestIn a context of increasing threats of identity theft and excessive privilege exploitation, our team of specialists works alongside our clients to implement secure identity management in Azure.
+2
Applicable to:
Identity
Security
29 out of 60
Azure Threat Detection & Response ImplementationBaufestWith tools such as Microsoft Sentinel, Web Application Firewall (WAF), Microsoft Defender and Threat Detection, their critical assets are protected through proactive monitoring and response
+2
Applicable to:
Identity
Security
30 out of 60
Active Directory: Free Security and Performance AssessmentMismo Systems Private LimitedWe help you assess your Active Directory environment for security, health, performance, and upgrade readiness, identifying gaps and providing remediation recommendations based on best practices.
+1
Applicable to:
Identity
31 out of 60
Active Directory Comprehensive Review: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Active Directory environment for security, health, performance, and upgrade readiness, identifying gaps and providing remediation recommendations based on best practices.
+1
Applicable to:
Identity
32 out of 60
Azure Hardening Security ImplementationBaufestWe use advanced hardening practices to reduce the attack surface and strengthen the infrastructure, adapting to specific regulations and certifications such as NIST, ISO 27001, and GDPR
+2
Applicable to:
Identity
Security
33 out of 60
Azure Sentinel Implementation & Security OptimizationGO TO CLOUD SASImpulsa la seguridad de tu empresa con Azure Sentinel Security Accelerator, una solución SIEM y SOAR en la nube que permite detectar, analizar y responder a amenazas en tiempo real.
+3
Applicable to:
DevOps
Identity
Security
34 out of 60
Microsoft Identity Security Posture-4h assessmentReplyAssessment of Microsoft Cloud or Hybrid Identity and Access Management Solution Security Posture
+2
Applicable to:
Identity
Security
35 out of 60
ManageOps: MultiCloud Infrastructure & Operations SolutionGO TO CLOUD SASOptimice y gestione su infraestructura en la nube de forma estratégica y segura con los Cloud Managed Services de GoToCloud, impulsando el crecimiento y reduciendo costos operativos.
+3
Applicable to:
Backup
DevOps
Identity
36 out of 60
Implementation of Microsoft Entra ID IntegrationITX360 (Pvt) Ltd.Enhance security and simplify access with Microsoft Entra ID Integration, featuring SSO, MFA, passwordless login, and role-based access
+2
Applicable to:
Identity
Security
37 out of 60
Azure Virtual Desktop & Productivity 2 Week ImplementationAKAVEIL TECHNOLOGIES INCAzure Virtual Desktop provides secure, remote access to desktops and apps, simplifying traditional VDI management through a fully managed, cloud-based solution.
+3
Applicable to:
Identity
Migration
Security
38 out of 60
Azure Virtual Desktop & Productivity 2 Week Implementation for Law Firms and Legal TeamsAKAVEIL TECHNOLOGIES INCAzure Virtual Desktop provides secure, remote access to desktops and apps, simplifying traditional VDI management through a fully managed, cloud-based solution.
+3
Applicable to:
Identity
Migration
Security
39 out of 60
Azure Security / Compliance Audit 5 Day AssessmentAKAVEIL TECHNOLOGIES INCThoroughly assess your Azure environment to uncover risks, boost security, and ensure compliance with industry standards
+2
Applicable to:
Identity
Security
40 out of 60
Invillia Real-time Fraud Detection With Streaming AnalyticsInvillia Desenvolvimento de Produtos Digitais LTDAReal-time fraud detection and prevention using Azure analytics and AI. Designed for companies with high transaction volumes aiming to reduce risk and improve decision-making.
+3
Applicable to:
Analytics
DevOps
Identity
41 out of 60
Microsoft Purview Migration Accelerator - 1 Week Proof of Concept EngagementMAQ SoftwareTransform your data governance with our 1-Week Proof of Concept Pilot for Microsoft Purview to streamline data governance, enhance security, and ensure compliance.
+3
Applicable to:
Identity
Migration
Security
42 out of 60
Onesec.AI Secure SuiteSecure Nextgen SystemsAt Onesec, we developed Onesec.AI Secure Suite, a comprehensive solution that combines artificial intelligence with Microsoft’s best-in-class security technologies
+3
Applicable to:
AI & Machine Learning
Identity
Security
43 out of 60
LBAN CloudSecure – Secured by Microsoft Defender for CloudLotus Beta AnalyticsLBAN CloudSecure delivers end-to-end Azure protection with Microsoft Defender for Cloud—boosting security, compliance, and visibility across your cloud workloads.
+2
Applicable to:
Identity
Security
44 out of 60
Windows in Cloud AssessmentTask Systems LimitedUnlock Azure Virtual Desktop Success: Expert-Led WVD Assessment & Migration Blueprint
+3
Applicable to:
Identity
Migration
Security
45 out of 60
Domain wise AI Knowledge Agents Ask. Cite. Retrieve. Repeat.atQorSupercharge enterprise productivity with an intelligent, AI-powered knowledge assistant. Built on Microsoft Azure OpenAI, SharePoint, and Power Platform, this multi-agent solution delivers accurate.
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
46 out of 60
Intelligent Compliance & Document Validation with Azure AIatQorAccelerate and automate your document compliance workflows using AI. This intelligent system extracts data from multiple documents types, applies 150+ compliance checks, ensures error-free val
+3
Applicable to:
App Modernization
AI & Machine Learning
Identity
47 out of 60
Microsoft Copilot for Security Workshop by OnevinnOnevinn ABIn this expert-led workshop, you’ll learn how to use generative AI to strengthen your security posture, empower your security teams, and make data-driven decisions faster.
+3
Applicable to:
AI & Machine Learning
Identity
Security
48 out of 60
Cloud4C Advanced Network Security and AccessCloud4C Services Pte LtdCloud4C’s Advanced Network Security and Access protects cloud perimeters with Azure Firewall, WAF, DDoS, Front Door, Bastion, and Zero Trust controls for secure, resilient, and compliant connectivity.
+3
Applicable to:
Identity
Networking
Security
49 out of 60
Cloud4C External Attack Surface Assessment (EASM + MDTI)Cloud4C Services Pte LtdCloud4C’s External Attack Surface Assessment uses Microsoft Defender EASM + MDTI to uncover shadow IT, misconfigurations, CVEs, and risks, delivering dashboards and remediation plans
+3
Applicable to:
Identity
Networking
Security
50 out of 60
Cloud4C Entra Governance & Compliance SuiteCloud4C Services Pte LtdCloud4C’s Entra Governance & Compliance Suite delivers identity governance, protection, and privileged access management with audit-ready workflows to strengthen compliance and reduce insider risks
+3
Applicable to:
Analytics
Identity
Security
51 out of 60
Cloud4C Zero Trust Readiness and StrategyCloud4C Services Pte LtdCloud4C’s Zero Trust Readiness and Strategy delivers maturity assessment, tailored architecture, and phased rollout planning with Microsoft Defender integrations for secure Zero Trust transformation
+3
Applicable to:
Identity
Networking
Security
52 out of 60
Cloud4C Security Posture AssessmentCloud4C Services Pte LtdCloud4C’s Security Posture Assessment delivers Zero Trust–aligned advisory with Secure Score reviews, Defender telemetry, workshops, and board-ready reporting to strengthen enterprise security.
+3
Applicable to:
Identity
Networking
Security
53 out of 60
Cloud4C OT & IoT Security AssessmentCloud4C Services Pte LtdThis assessment leverages Microsoft Defender for IoT to map assets, model threats, and deliver vulnerability reports with a remediation roadmap for industrial and connected environments.
+3
Applicable to:
Identity
Networking
Security
54 out of 60
Cloud4C Microsoft Cloud Security – Enterprise SuiteCloud4C Services Pte LtdCloud4C’s Microsoft Cloud Security – Enterprise Suite delivers unified protection with CNAPP, DevSecOps, WAF/DDoS, data security, and confidential computing in one enterprise-grade Zero Trust package.
+3
Applicable to:
Identity
Networking
Security
55 out of 60
Cloud4C Developer & DevOps Security BundleCloud4C Services Pte LtdCloud4C’s Developer & DevOps Security Bundle secures applications, workloads, and CI/CD pipelines with Entra Workload ID, PIM, and Conditional Access, supported by developer-focused onboarding.
+3
Applicable to:
DevOps
Identity
Security
56 out of 60
Cloud4C Confidential & Identity-Aware ComputingCloud4C Services Pte LtdCloud4C’s Confidential & Identity-Aware Computing secures data-in-use with Azure Confidential VMs, Managed HSM, Key Vault, and encryption policies for privacy-preserving, compliance-ready workloads.
+3
Applicable to:
Identity
Networking
Security
57 out of 60
Cloud4C Microsoft Copilot for Security –Readiness AssessmentCloud4C Services Pte LtdCloud4C’s Microsoft Copilot for Security Readiness Assessment identifies gaps, delivers recommendations, and builds a roadmap for smooth adoption of AI-driven security operations
+3
Applicable to:
AI & Machine Learning
Identity
Security
58 out of 60
Cloud4C Awareness Training + Incident WorkshopCloud4C Services Pte LtdThis readiness workshop delivers security training, phishing simulations, and tabletop incident response exercises to build employee resilience and organizational preparedness
+3
Applicable to:
Identity
Networking
Security
59 out of 60
Cloud4C Azure Identity Foundation AcceleratorCloud4C Services Pte LtdCloud4C’s Entra Zero Trust Starter Pack delivers identity, conditional access, privileged identity management, and secure private access to help organizations launch their Zero Trust journey
+3
Applicable to:
Identity
Networking
Security
60 out of 60