FiltersClear all
Professional Services results
Showing results in professional services.
Cloud Security Approach: 2-months AssessmentPyxisThrough the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
+3
Applicable to:
Analytics
Identity
Security
1 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxisEvolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
+3
Applicable to:
Analytics
Identity
Security
2 out of 60
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
3 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
4 out of 60
Cloud Security Compliance: 4-months AssessmentPyxisThe CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
+3
Applicable to:
Analytics
Identity
Security
5 out of 60
Cloud Security Services: 12-months ImplementationPyxisWe audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
+3
Applicable to:
Analytics
Identity
Security
6 out of 60
IGA and Zero Trust with Microsoft Entra ID and Saviynt: ImplementationOxford Computer Group LLCOxford Computer Group, Saviynt, and Microsoft's Identity Governance & Administration (IGA) solution propels enterprise organizations toward Zero Trust security.
+2
Applicable to:
Identity
Security
7 out of 60
Privileged Identity Management JumpstartSteeves Understand and control privileged accounts with a simple to implement solution
+2
Applicable to:
Identity
Migration
8 out of 60
Azure Virtual Desktop: 2-Wk ImplementationPetabytz IncStart experiencing the best kind of virtualization with Azure Virtual Desktop in minutes to enable remote work. Provides employees the same experience they would have on a local desktop.
+3
Applicable to:
Identity
Migration
Security
9 out of 60
skillup_consulting_openedx_v1Flexible Road LLCOpen edX Learning Management System with Azure.
+3
Applicable to:
Backup
Identity
Storage
10 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
11 out of 60
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to:
App Modernization
Identity
12 out of 60
SAP SuccessFactors and Microsoft Entra ID Integration: 6-wk ImplementationOxford Computer Group LLCEnable User Lifecycle Management by integrating SAP SuccessFactors and Microsoft Entra ID.
+1
Applicable to:
Identity
13 out of 60
Assesment Azure Base4Base4 Security Chile SPAThe Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
+3
Applicable to:
Analytics
Identity
Security
14 out of 60
Red Canary Microsoft Sentinel WorkshopRed CanaryGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
+2
Applicable to:
Identity
Security
15 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
16 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
17 out of 60
AD Domain Consolidation for Migration to Microsoft Entra ID: 6 wk ImpOxford Computer Group LLCGet started on your journey towards zero trust by consolidating your organization’s Active Directories for better visibility, efficiency, and security.
+3
Applicable to:
Identity
Migration
Security
18 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
19 out of 60
Credential Manager: 5-Day Implementation SolutionCreospark Consulting Services IncThis solution harnesses the capabilities of Dataverse, Power Apps, Power Automate, and Azure Key Vault technologies to redefine how organizations protect sensitive user credentials and information.
+3
Applicable to:
Backup
Identity
Security
20 out of 60
User Profile Manager: 5-Day Implementation SolutionCreospark Consulting Services IncThis solution offers users a window into their access privileges, allowing them to effortlessly navigate their information and files.
+2
Applicable to:
Archive
Identity
21 out of 60
Deploy Azure ResourcesESTI Consulting ServicesThis consulting engagement is targeted at new Azure clients. The key engagement deliverable is a secure, network-connected, and functional tenant on the Azure platform.
+3
Applicable to:
Identity
Networking
Security
22 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
23 out of 60
External IAM 5 day assessmentCondatis Group LimitedCondatis is offering an external Identity and Access Management (IAM) assessment focusing on how your organisation secures and manages external identities in your business context.
+2
Applicable to:
Identity
Security
24 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
25 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
27 out of 60
Migration vers AzureProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans votre migration vers Azure
+3
Applicable to:
Identity
Migration
Security
28 out of 60
MIM Migration To Entra ID Assessment: 8-Wk AssessmentModern MethodologiesMicrosoft Identity Manager Current state assessment and transition plan to Microsoft Entra ID
+2
Applicable to:
Identity
Security
29 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITEDOverwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
+2
Applicable to:
Identity
Security
30 out of 60
QServices AI-Powered SaaS AutomationQ SERVICES INCAI-powered SaaS platform for customer support, workflow automation, and efficiency boost.
+3
Applicable to:
App Modernization
AI & Machine Learning
Identity
31 out of 60
Microsoft Entra Verified ID: 3-8 Day WorkshopCondatis Group LimitedAn immersive 3-8 day workshop designed to provide a deep dive into Microsoft Entra Verified ID.
+1
Applicable to:
Identity
32 out of 60
Microsoft Entra Verified ID: POCCondatis Group LimitedCondatis is offering a Microsoft Entra Verified ID Proof of Concept demonstrating how your organisation can leverage digital identity credentials to streamline onboarding and secure access.
+1
Applicable to:
Identity
33 out of 60
Microsoft Entra ID WorkshopCondatis Group LimitedAn immersive 3 - 8 day workshop designed to provide a deep dive into Microsoft Entra ID.
+1
Applicable to:
Identity
34 out of 60
Microsoft Entra ID Governance: 3 - 8 Day WorkshopCondatis Group LimitedAn immersive 3-8 day workshop designed to provide a deep dive into Microsoft Entra ID Governance.
+1
Applicable to:
Identity
35 out of 60
Microsoft Entra ID: POCCondatis Group LimitedCondatis is offering a Microsoft Entra ID Proof of Concept demonstrating how your organisation can strengthen security and unify identity management.
+1
Applicable to:
Identity
36 out of 60
Microsoft Entra ID Governance: POCCondatis Group LimitedCondatis is offering a Microsoft Entra ID Governance Proof of Concept to demonstrate how organisations can improve operations and empower teams.
+1
Applicable to:
Identity
37 out of 60
Microsoft Entra Privileged Identity Management ConfigurationTechNet UC LLCConfigure Microsoft Entra PIM to enforce least privilege, enable just-in-time access, and reduce risk with real-time auditing, approval workflows, and Conditional Access integration.
+3
Applicable to:
Analytics
Identity
Security
38 out of 60
Azure Rights Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Rights Management in their production environment.
+3
Applicable to:
App Modernization
Identity
Security
39 out of 60
Identity Health Check: 3-Week AssessmentCondatis Group LimitedPackaged consultancy service to help a business analyse, plan and build a robust and modern identity solution with Azure AD.
+1
Applicable to:
Identity
40 out of 60
Azure Empowered Endpoint Mgmt- 2wk ImplementationSteeves Protect your organization’s critical network endpoints and devices against potential cyber threats and security breaches with Steeves and Associates’ EndPoint Management + Security Service.
+2
Applicable to:
Identity
Security
41 out of 60
Azure Identity Management: 4 Weeks ImplementationCommunication Square LLC4 week Implementation is designed to help customers fully utilize Azure Identity and Access Management in their existing infrastructure and training.
+3
Applicable to:
Data Platform
Identity
Storage
42 out of 60
Azure Identity Management: 2 Week Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see and utilize Azure Identity and Access Management in demo environment.
+2
Applicable to:
Identity
Security
43 out of 60
Endpoint Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Device and Application Management solution and train their IT team.
+2
Applicable to:
Identity
Security
44 out of 60
Remote Learning Solution: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to re-imagine how your institution approaches secure communication, compliance to industry defined standards and access to data is secure on Microsoft Teams.
+3
Applicable to:
Identity
Security
Storage
45 out of 60
Remote Learning Solution: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Teams based Remote Learning Solution in their existing infrastructure and trainings.
+3
Applicable to:
Identity
Security
Storage
46 out of 60
Remote Learning Solution: 1-Hour briefingCommunication Square LLC1 hour Briefing on Remote Learning Solution
+3
Applicable to:
Identity
Security
Storage
47 out of 60
Azure Virtual Desktop - 5-week ImplementationSpektra Systems LLCSpektra Systems offers premium consulting & implementation services for Microsoft Azure Virtual Desktop, We provide quality AVD solution with minimal cost, best in class security & productivity.
+3
Applicable to:
Identity
Migration
Storage
48 out of 60
Secure Virtual Desktop: 1 Week AssessmentOpstack IncA proven solution built to assess, plan and deliver a secure Remote Desktop solution, based on Microsoft WVD through a thoughtful assessment of your identity, network and compute infrastructure
+3
Applicable to:
Identity
Networking
Security
49 out of 60
Azure Migration and Remote Work: 10 Day AssessmentOpstack IncPurpose built to assess and deliver an environment assessment for Azure migration and secure remote work (WVD) through a thoughtful assessment of your identity, network and compute infrastructure.
+3
Applicable to:
Identity
Migration
Security
50 out of 60
Azure AD Connect: 2-Day ImplementationPetabytz IncIn this 2 day workshop we will teach you how to integrate your on-premises AD DS environment with Azure AD
+3
Applicable to:
Identity
Migration
Security
51 out of 60
Microsoft Entra ID Single Sign-On 2wk Pilot ImplementationOxford Computer Group LLCThis 2-week pilot implementation is designed to help customers understand and test Microsoft Entra ID Single Sign-On (SSO) by configuring SSO for 5 applications.
+2
Applicable to:
App Modernization
Identity
52 out of 60
Custom Microsoft Entra ID Identity Solutions: 4-wk ImpOxford Computer Group LLCEnterprise Identity Solutions (IAM, IGA, and Compliance) using Modern Authentication and Microsoft Entra ID and Microsoft Entra ID Governance
+2
Applicable to:
Identity
Security
53 out of 60
Microsoft Identity - 3 Day WorkshopAvalerisDevelop a strategic plan to protect identities while still giving users the freedom to work and collaborate with others.
+2
Applicable to:
Identity
Security
54 out of 60
Windows Virtual Desktop: 1-Day AssessmentDigiTechWindows Virtual Desktop Assessment includes comprehensive pre-implementation assessment for WVD requirements and your business needs
+3
Applicable to:
Identity
Migration
Storage
55 out of 60
Web Applications Modernization 1-day AssessmentSela Group (HQ)Web Application Modernization Consultancy is a professional consultancy service for cloud transition without disturbing business continuity.
+3
Applicable to:
App Modernization
DevOps
Identity
56 out of 60
Azure Cloud Adoption 4 - Week AssessmentAKAVEIL TECHNOLOGIES INCStrategic Assessment to Migration & Operation
+3
Applicable to:
Identity
Migration
Security
57 out of 60
Digital Trusted Identity Advisory: 2-week WorkshopNTT DATA Inc.Identity and Access Management (IAM) Azure AD Advisory 2-week Workshop helps determine how IAM can address key security challenges and enable your adaptive workforce as a dynamic workplace.
+2
Applicable to:
Identity
Security
58 out of 60
Hybrid Cloud Security Workshop - 3 WeeksIngram Micro India Private LimitedThe engagement involves showcasing in customer’s production environment Azure defender features, discovering real threats to selected hybrid workloads, and analyzing security vulnerabilities.
+3
Applicable to:
Big Data
Identity
Security
59 out of 60
Azure AD B2C QuickStart: ImplementationOxford Computer Group LLCOCG's Basic, Basic+, Standard, and Standard+ implementation packages can help you start managing external identities with Azure Active Directory B2C.
+3
Applicable to:
App Modernization
Identity
Security
60 out of 60