FiltersClear all
Professional Services results
Showing results in professional services.
Igel Azure Virtual Desktop As A Service 2-Hours WorkshopTriStratus Ltd.IGEL Technology provides a Linux based “Next generation edge operating system" which is purpose-built for secure access to cloud workspaces such as Azure Virtual Desktops.
+3
Applicable to:
App Modernization
Identity
Security
1 out of 60
IAM Architecture 3-Weeks ImplementationToreon CVBASetting up a custom fitting IAM model to give your business the control it needs.
+2
Applicable to:
Identity
Security
2 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield LtdSpartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
+3
Applicable to:
Identity
Migration
Security
3 out of 60
Cloud Security: 4-Wk ImplementationCampana & Schott GmbHThe Cloud Security services help you to assess your current cloud security posture and to plan and implement continous cloud security improvements based on the Microsoft Security solutions platform
+2
Applicable to:
Identity
Security
4 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies ServicesDelivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
+2
Applicable to:
Identity
Security
5 out of 60
Azure Cost Optimization: 1 Day WorkshopALEF Distribution RO S.A.Understand, monitor and optimize your cloud spendings in Azure with our "Cost Optimization Workshop".
+3
Applicable to:
Identity
Migration
Security
6 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.aiImplementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
+1
Applicable to:
Identity
7 out of 60
HCLTech Unified Digital AccessHCL America Inc_HCLTHCLTech’s Unified Digital Access solution protects enterprise users and apps from cybersecurity attacks by aiding with right enterprise security posture with easy access to Apps and services.
+1
Applicable to:
Identity
8 out of 60
Microsoft SaaS Lizenz-Dashboard - Azure Service Connector (ASC) - 1 Wk Proof of ConceptsmcTeam Systems Management Consulting GmbH & Co.KGImplementierung und Proof of Concept einer Lösung zum Analysieren ihrer Azure Active Directory (AAD), Microsoft Endpoint Manager (Intune) und SaaS Daten.
+3
Applicable to:
Analytics
Data Platform
Identity
9 out of 60
Accelerating Cloud Virtual Desktops: 2-Hour WorkshopSlalom ConsultingThis Free Workshop will introduce you to how Azure Virtual Desktops help you embrace a remote workforce while maintaining control through secure workstation experiences on any device.
+3
Applicable to:
Identity
Migration
Networking
10 out of 60
7 Point Cloud Readiness Check: 3 days CheckupSwiss IT Security AGTake your company to the cloud: Our 7 Point Cloud Readiness Check gets you cloud-ready and helps you set up a migration roadmap in no time.
+3
Applicable to:
Identity
Migration
Security
11 out of 60
skillup_consulting_openedx_v1Flexible Road LLCOpen edX Learning Management System with Azure.
+3
Applicable to:
Backup
Identity
Storage
12 out of 60
Skaylink Azure Networking: 1-Day AssessmentSkaylink GmbHA networking assessment to verify the current state and future requirements of the organisation's network to support the migration of workloads and data to Microsoft Azure.
+3
Applicable to:
Identity
Networking
Security
13 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam FranceSecure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
+2
Applicable to:
Identity
Networking
14 out of 60
Assesment Azure Base4Base4 Security Chile SPAThe Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
+3
Applicable to:
Analytics
Identity
Security
15 out of 60
Azure Security Accelerator SuiteNeudesicMitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
+3
Applicable to:
Identity
Networking
Security
16 out of 60
Cybersecurity mit Zero Trust – 2 Days WorkshopTechniData IT AGBei einer passwortlosen Authentifizierung wird auf die Eingabe des Passworts verzichtet, stattdessen wird dieses meist durch einen biometrischen Faktor oder eine PIN ersetzt.
+2
Applicable to:
Identity
Security
17 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTDDotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
+3
Applicable to:
App Modernization
Identity
Storage
18 out of 60
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITEDProvide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
+3
Applicable to:
Analytics
Data Platform
Identity
19 out of 60
Red Canary Microsoft Sentinel WorkshopRed CanaryGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
+2
Applicable to:
Identity
Security
20 out of 60
Azure Cloud Essentials Workshop – BASISACP IT Solutions GmbHThe Azure Cloud Essentials Workshop Basis is a one-day customer workshop that covers the fundamental elements of our Azure platform
+3
Applicable to:
Identity
Networking
Storage
21 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
22 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
23 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
24 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
25 out of 60
Modern workplace Active DirectorySii Sp. z o.o.Modern workplace Active Directory implementation, migration and support
+2
Applicable to:
Identity
Security
26 out of 60
Detection & Response Services (MXDR)Cloud LifeCloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
+3
Applicable to:
AI & Machine Learning
Identity
Security
27 out of 60
Sentinel-as-a-ServiceCloud LifeCloud Life delivers an innovative cloud-based AI and ML-enhanced Sentinel-as-a-Service, empowering your team with managed SIEM/SOAR capabilities using optimum Microsoft MXDR Services
+3
Applicable to:
AI & Machine Learning
Identity
Security
28 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
29 out of 60
secure_multi_cloud_workshopSwiss IT Security Deutschland GmbHSicheres Management Ihrer hybriden Multi-Cloud Umgebung auf Basis des Zero-Trust-Prinzip mit Microsoft Defender for Cloud.
+3
Applicable to:
DevOps
Identity
Security
30 out of 60
Azure Virtual Desktop Secure Platform designed by CloudAstro - Revolutionize Your Workplace (4 Days - Workshop)CloudAstro GmbHEmbrace the future with AVD Secure Platform, where mobility meets cutting-edge security for all industries.
+3
Applicable to:
DevOps
Identity
Security
31 out of 60
Azure Active Directory - 2-tägiger Workshopevoila GmbHOptimieren Sie Identitätsverwaltung in unserem 2-tägigen Workshop. Lernen Sie, mit Azure Active Directory Benutzer & Anwendungen effizient zu verwalten und sicher zu teilen
+2
Applicable to:
Identity
Security
32 out of 60
Microsoft & Multi-Cloud Security Penetration Testing: 5-Day AssessmentBDO LLPCREST certified Ethical Hackers from BDO perform penetration tests on your Microsoft and Multi-Cloud environment and test the setup of Microsoft Azure AD, Defender, Sentinel and Purview.
+3
Applicable to:
Identity
Security
Storage
33 out of 60
Eviden's Application Strategy WorkshopEviden International France - SASEviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
+3
Applicable to:
App Modernization
Data Platform
Identity
34 out of 60
Microsoft 365 Azure Tenant Management EntraID: 2 month POC with workshopT-Systems International With the Bundle Quickstart, T-Systems supports the customer on their Azure tenant with a minimum configuration of the Microsoft Entra ID for use in self-service.
+3
Applicable to:
App Modernization
Identity
Internet of Things
35 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
+2
Applicable to:
Identity
Security
36 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SASUtilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
+2
Applicable to:
Identity
Security
37 out of 60
Eviden's Data Security CSI Engagement 4 Week AssessmentEviden International France - SASElevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
+3
Applicable to:
Analytics
Identity
Security
38 out of 60
Eviden's Azure Cloud Consulting Services – Landing ZonesEviden International France - SASA consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
+2
Applicable to:
Identity
Security
39 out of 60
HCLTech's Cybersecurity ServicesHCL Technologies Limited.HCLTech is a leading global technology company that helps enterprises reimagine their businesses for the digital age. Secure your cloud journey with HCLTech's comprehensive portfolio of cybersecurity
+3
Applicable to:
Backup
Identity
Security
40 out of 60
Workshop for Azure Cost Optimization using FinOpsSii Sp. z o.o.Control your costs in the cloud with the FinOps methodology
+2
Applicable to:
DevOps
Identity
41 out of 60
Cognizant Cyber Threat Defense, powered by MicrosoftCognizantCognizant's Cyber Threat Defense offering provides a set of structured methodologies and tools to assess, migrate, modernize and manage your Security Operations Center (SOC).
+3
Applicable to:
AI & Machine Learning
Identity
Security
42 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
43 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
44 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
46 out of 60
Azure Zero Trust Assessment: 1 Day WorkshopSlalom ConsultingCreate your Azure security foundation: We will work with your organization's security and infrastructure leaders to create a point-in-time snapshot of where you are in your security journey.
+2
Applicable to:
Identity
Security
47 out of 60
HIPAA Compliance Risk Assessment & Gap AnalysisAvertium, LLCAvertium’s team of healthcare and security consultants apply their deep knowledge of compliance to the way you do business.
+2
Applicable to:
Identity
Security
48 out of 60
Security Information and Event Management (SIEM) MigrationKyndryl Inc.Kyndryl SIEM Migration service transitions legacy SIEMs to Microsoft Sentinel, ensuring comprehensive coverage for both on premise and cloud assets. Services include discovery, design, implementation.
+3
Applicable to:
Disaster Recovery
Identity
Security
49 out of 60
Cloud Enabler for Hybrid CloudDevoteam SACloud Enabler for Hybrid Cloud offers seamless hybrid IT management via an automated Single Control Plane, streamlining operations across on-premises and multi-cloud, boosting visibility and agility.
+3
Applicable to:
App Modernization
DevOps
Identity
50 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITEDOverwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
+2
Applicable to:
Identity
Security
51 out of 60
Microsoft Entra ID Conditional Access: 10-Day ImplementationWIZARD GROUP LIMITEDdesigned to quickly and effectively deploy Entra ID Conditional Access policies to enhance your organisation's security posture
+3
Applicable to:
Identity
Migration
Security
52 out of 60
Microsoft Purview: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur implementation service aims to streamline the deployment of Microsoft Purview, ensuring that your organization can leverage its full capabilities to make informed decisions
+3
Applicable to:
Identity
Migration
Security
53 out of 60
Microsoft Entra : Quick Start AcceleratorWIZARD GROUP LIMITEDThis service ensures that your organization can quickly leverage the full capabilities of Microsoft Entra ID to enhance security and streamline access management
+3
Applicable to:
Identity
Migration
Security
54 out of 60
LTIMindtree Security Identity Assessment As A ServiceLTIMindtree LimitedThis LTIMindtree offering provides the detailed overview of assessment activities and outcomes tailored for Identity services
+2
Applicable to:
Identity
Security
55 out of 60
QServices AI-Powered SaaS AutomationQ SERVICES INCAI-powered SaaS platform for customer support, workflow automation, and efficiency boost.
+3
Applicable to:
App Modernization
AI & Machine Learning
Identity
56 out of 60
Microsoft Identity Security Posture-4h assessmentReplyAssessment of Microsoft Cloud or Hybrid Identity and Access Management Solution Security Posture
+2
Applicable to:
Identity
Security
57 out of 60
Implementation of Microsoft Entra ID IntegrationITX360 (Pvt) Ltd.Enhance security and simplify access with Microsoft Entra ID Integration, featuring SSO, MFA, passwordless login, and role-based access
+2
Applicable to:
Identity
Security
58 out of 60
Azure Virtual Desktop & Productivity 2 Week ImplementationAKAVEIL TECHNOLOGIES INCAzure Virtual Desktop provides secure, remote access to desktops and apps, simplifying traditional VDI management through a fully managed, cloud-based solution.
+3
Applicable to:
Identity
Migration
Security
59 out of 60
Azure Virtual Desktop & Productivity 2 Week Implementation for Law Firms and Legal TeamsAKAVEIL TECHNOLOGIES INCAzure Virtual Desktop provides secure, remote access to desktops and apps, simplifying traditional VDI management through a fully managed, cloud-based solution.
+3
Applicable to:
Identity
Migration
Security
60 out of 60