FiltersClear all
Professional Services results
Showing results in professional services.
Azure Advanced Security 4-Week ImplementationServentAzure Advanced Security is a service provided by Servent to help you take advantage of the multi-layered security provided by Microsoft across datacentres, infrastructure and operations in Azure
+2
Applicable to:
Identity
Security
1 out of 60
Security as a Service: 3-Wk ImplementationA3Cloud SolutionsImprove your security of your solutions and infrastructures in Azure Cloud.
+3
Applicable to:
Identity
Migration
Security
2 out of 60
Azure Firewall 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+3
Applicable to:
Identity
Networking
Security
3 out of 60
Azure Sentinel 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Sentinel and configure it together according to Microsoft’s best practices conformed to your environment.
+2
Applicable to:
Identity
Security
4 out of 60
Azure Firewall 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Firewall and configure it together according to Microsoft’s best practices conformed to your environment.
+3
Applicable to:
Disaster Recovery
Identity
Security
5 out of 60
Azure AD B2C 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+2
Applicable to:
Identity
Security
6 out of 60
Azure Key Vault 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure key Vault and configure it together according to Microsoft’s best practices conformed to your environment.
+3
Applicable to:
DevOps
Identity
Security
7 out of 60
Azure Security 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Security and configure it together according to Microsoft’s best practices conformed to your environment.
+3
Applicable to:
Disaster Recovery
Identity
Security
8 out of 60
Azure Active Directory 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we ’ll cover the capabilities of Azure Active Directory and configure it together according to Microsoft’s best practices conformed to your environment.
+2
Applicable to:
Identity
Security
9 out of 60
Azure Active Directory B2C 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Active Directory B2C and configure it together according to Microsoft’s best practices conformed to your environment.
+2
Applicable to:
Identity
Security
10 out of 60
Azure Sentinel 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+3
Applicable to:
Disaster Recovery
Identity
Security
11 out of 60
Azure Security 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment
+3
Applicable to:
Data Platform
Identity
Security
12 out of 60
Azure Active Directory 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+2
Applicable to:
Identity
Security
13 out of 60
Azure Security 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure Security with a professional Solution Architect.
+3
Applicable to:
Disaster Recovery
Identity
Security
14 out of 60
Azure Active Directory (Azure AD) 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure AD with a professional Solution Architect
+2
Applicable to:
Identity
Security
15 out of 60
Azure Firewall 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure Firewall with a professional Solution Architect.
+3
Applicable to:
Disaster Recovery
Identity
Security
16 out of 60
Azure Active Directory B2C (Azure AD B2C) 2 Hours BriefingDirect Expertsn the current briefing you get 2 hours review of Azure AD B2C with a professional Solution Architect.
+2
Applicable to:
Identity
Security
17 out of 60
Azure key Vault 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure key Vault with a professional Solution Architect.
+3
Applicable to:
DevOps
Identity
Security
18 out of 60
Azure Sentinel 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure Sentinel with a professional Solution Architect.
+3
Applicable to:
Backup
Identity
Security
19 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
20 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
21 out of 60
Zero Trust - Security Posture Managed ServicesNOVENTIQZero Trust Security Posture Managed Services enables customers to outsource cybersecurity posture management.
+3
Applicable to:
Identity
Networking
Security
22 out of 60
Cloud Security Workshop: 2 half-days workshopMallow OyWe'll check your Azure environment for security issues and suggest remedies for them
+3
Applicable to:
App Modernization
Identity
Security
23 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
24 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
25 out of 60
Modern workplace Active DirectorySii Sp. z o.o.Modern workplace Active Directory implementation, migration and support
+2
Applicable to:
Identity
Security
26 out of 60
AVD Cost Optimization ProgramTechPlus TalentAre you looking to maximize the value of your Azure Virtual Desktop (AVD) environment while minimizing costs? Look no further! Tech Plus Talent is thrilled to present our Azure AVD Cost Optimization P
+3
Applicable to:
Backup
Identity
Security
27 out of 60
Detection & Response Services (MXDR)Cloud LifeCloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
+3
Applicable to:
AI & Machine Learning
Identity
Security
28 out of 60
Managed Azure Virtual Desktop (Base) - 12 month Managed ServiceANS Group LimitedProvide, manage and control secure modern workplaces with Managed Azure Virtual Desktop from ANS
+3
Applicable to:
Identity
Migration
Security
29 out of 60
Sentinel-as-a-ServiceCloud LifeCloud Life delivers an innovative cloud-based AI and ML-enhanced Sentinel-as-a-Service, empowering your team with managed SIEM/SOAR capabilities using optimum Microsoft MXDR Services
+3
Applicable to:
AI & Machine Learning
Identity
Security
30 out of 60
Brillio Open Banking SolutionBrillioA robust, scalable, and secure solution that is designed to address the ever-evolving regulatory landscape and empower financial institutions to stay ahead in this new era of banking.
+3
Applicable to:
Data Platform
Identity
Security
31 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
32 out of 60
ISO 27001 Readiness Assessment for Azure EnvironmentVisionet Systems Inc.Advance confidently towards ISO 27001 certification for your Azure environment with Visionet's readiness assessment. Get a detailed analysis of your infrastructure operations & security policies.
+3
Applicable to:
Backup
Identity
Security
33 out of 60
Azure Security Assessment – by NIST 800-53Visionet Systems Inc.Harness Visionet's expertise to secure and optimize your Azure environment with our Security Assessment service grounded in NIST 800-53 Rev 4 best practices.
+3
Applicable to:
Identity
Networking
Security
34 out of 60
Microsoft Sentinel DeploymentBlazeClan Technologies Pvt. LtdBlazeclan offers Microsoft Sentinel deployment, integration, configuration and optimization in the customer's environment seamlessly.
+3
Applicable to:
Identity
Networking
Security
35 out of 60
Azure Well Architected Review - 5 Days AssessmentBlazeClan Technologies Pvt. LtdBlazeclan offers Azure Well Architected Review to help customers assess the environment for reliability, cost management, operational excellence, security and performance efficiency.
+3
Applicable to:
Identity
Migration
Networking
36 out of 60
Azure Active Directory B2C - Assess & PlanShaping CloudAzure Active Directory B2C provides business-to-customer identity as a service. We can design, develop & implement a customer identity & access management solution based in Azure Active Directory B2C.
+2
Applicable to:
Identity
Security
37 out of 60
Microsoft & Multi-Cloud Security Penetration Testing: 5-Day AssessmentBDO LLPCREST certified Ethical Hackers from BDO perform penetration tests on your Microsoft and Multi-Cloud environment and test the setup of Microsoft Azure AD, Defender, Sentinel and Purview.
+3
Applicable to:
Identity
Security
Storage
38 out of 60
Azure Well Architected Framework ReviewTrustmarque Solutions LimitedWell Architected Framework Review of your core Azure deployment to assess the environment against the Microsoft WAF 5 pillars and generate a gap analysis, remediation strategies and recommendations.
+3
Applicable to:
Disaster Recovery
Identity
Security
39 out of 60
Eviden's Application Strategy WorkshopEviden International France - SASEviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
+3
Applicable to:
App Modernization
Data Platform
Identity
40 out of 60
Security Warrior: Managed ServiceTechConnectOur Security Warrior, will give you the visibility and remediation into your Azure security posture to manage the risk through an affordable single pane of glass solution.
+3
Applicable to:
DevOps
Identity
Security
41 out of 60
Azure Well Architected Framework (AWAF) AssessmentNOVENTIQOptimize Azure efficiency and security with our Well-Architected Framework Assessment. Uncover challenges, enhance performance, and fortify your infrastructure for success.
+3
Applicable to:
Identity
Security
Storage
42 out of 60
Microsoft 365 Azure Tenant Management EntraID: 2 month POC with workshopT-Systems International With the Bundle Quickstart, T-Systems supports the customer on their Azure tenant with a minimum configuration of the Microsoft Entra ID for use in self-service.
+3
Applicable to:
App Modernization
Identity
Internet of Things
43 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
44 out of 60
NIS2 AssessmentInsightInsight’s security and compliance experts will provide an assessment based on the European NIS2 guidelines including Azure and Microsoft 365 Security. We deliver using industry standard frameworks
+3
Applicable to:
Identity
Networking
Security
45 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
+2
Applicable to:
Identity
Security
46 out of 60
Workshop Threat Protection con Microsoft Sentinel: Blindaje Avanzado contra Amenazas Cibernéticas - 4Wk WorkShopENCAMINA S.L.Una inmersión profunda en la estrategia de seguridad, adaptada a tu organización
+3
Applicable to:
Identity
Networking
Security
47 out of 60
External IAM 5 day assessmentCondatis Group LimitedCondatis is offering an external Identity and Access Management (IAM) assessment focusing on how your organisation secures and manages external identities in your business context.
+2
Applicable to:
Identity
Security
48 out of 60
KloudIdentity: Application Onboarding to Entra made simple with our SCIM GatewayKloudyNet Technologies SDN BHDKloudIdentity is our proprietary SCIM Gateway to onboard LOB & Cloud applications (including non SCIM compliant), databases and other applications to Microsoft Entra for users and groups provisioning.
+2
Applicable to:
Identity
Security
49 out of 60
Threat Protection: 5-day EngagementBridewell Consulting LimitedMitigate cyber security risks within your Microsoft Azure environments by attending a 5 day workshop with Bridewell.
+3
Applicable to:
Identity
Networking
Security
50 out of 60
Defender For Cloud: 1-Wk Proof of ConceptBridewell Consulting LimitedSecure your organisation's Azure Cloud workloads by leveraging the expertise of a leading cyber security services provider to review and optimise your implementation of Defender for Cloud.
+3
Applicable to:
Identity
Networking
Security
51 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoorThis assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
+3
Applicable to:
Identity
Networking
Security
52 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoormyCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
+3
Applicable to:
Identity
Networking
Security
53 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SASUtilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
+2
Applicable to:
Identity
Security
54 out of 60
Eviden's Data Security CSI Engagement 4 Week AssessmentEviden International France - SASElevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
+3
Applicable to:
Analytics
Identity
Security
55 out of 60
Data Governance AssessmentKI group GmbHThe Data Governance Assessment guarantees transparency regarding who, when, and how data can be utilized in your organization.
+3
Applicable to:
Analytics
Data Platform
Identity
56 out of 60
Eviden's Azure Cloud Consulting Services – Landing ZonesEviden International France - SASA consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
+2
Applicable to:
Identity
Security
57 out of 60
24x7 SOC Service by IntelequiaIntelequia Technologies24x7 monitoring, protection and automated response to cyberthreats
+3
Applicable to:
Analytics
Identity
Security
58 out of 60
Keycloak-3 weeks ImplementationApexonKeycloak is an open-source identity and access management solution. Apexon repackages open source Keycloak and provides one-click deployment with automation and customization.
+3
Applicable to:
Analytics
DevOps
Identity
59 out of 60
HCLTech's Cybersecurity ServicesHCL Technologies Limited.HCLTech is a leading global technology company that helps enterprises reimagine their businesses for the digital age. Secure your cloud journey with HCLTech's comprehensive portfolio of cybersecurity
+3
Applicable to:
Backup
Identity
Security
60 out of 60