FiltersClear all
Professional Services results
Showing results in professional services.
LBAN_Secure_Static_Web_Hosting:3Days ImplementationLotus Beta AnalyticsHosting Secure static websites on Azure Storage Accounts involves uploading HTML, CSS, JavaScript, and image files in a container named $web, setting index and error pages and mapping to a domain name
+2
Applicable to:
Security
Storage
1 out of 60
Development Enterprise Mobility Apps 8 weeksRysun Labs (formerly Krish Compusoft Services)Wish to extend Enterprise apps to field reps? Rysun (Formerly KCS) provides mobility dev services along with hosting the app to Azure cloud
+3
Applicable to:
App Modernization
Migration
Security
2 out of 60
Microsoft 365 Copilot with OpenAI on Azure Security Assessment - 8 hours workshopC3IT Software SolutionsMicrosoft 365 Copilot with OpenAI on Azure Security Assessment - 8 hours workshop where we are providing the roadmap of what can we done in the future
+2
Applicable to:
AI & Machine Learning
Security
3 out of 60
TCS AI-Driven Well-Architected AssessmentTata Consultancy Services Ltd.Assess your workloads continuously and run optimally, using Microsoft Azure Well-Architected best-practices and various technology assessment
+3
Applicable to:
App Modernization
Migration
Security
4 out of 60
Dell Implementation Services for Microsoft Azure Site RecoveryDell Technologies ServicesDell Services provides advisory and implementation services for Azure cloud customers, enabling organizations to replicate and thus protect critical cloud workloads with time-tested frameworks.
+3
Applicable to:
Backup
Disaster Recovery
Security
5 out of 60
Wipro Microsoft Copilot for Security Readiness Workshop: 1 dayWipro LtdWipro's Microsoft Copilot’s Security Readiness Workshop will help you demonstrate the value it brings at machine speed & scale and preparing enterprises to embrace Generative AI for Security.
+2
Applicable to:
AI & Machine Learning
Security
6 out of 60
TCS Responsible AI Development Service on Azure OpenAITCS - Azure TCS through this development service, aims to help enterprises in implementing Responsible AI controls in Azure Open AI based solutions in an efficient and safe manner.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
7 out of 60
Cognizant Cyber Threat Defense, powered by MicrosoftCognizantCognizant's Cyber Threat Defense offering provides a set of structured methodologies and tools to assess, migrate, modernize and manage your Security Operations Center (SOC).
+3
Applicable to:
AI & Machine Learning
Identity
Security
8 out of 60
Azure AI-Copilot PoC and Rapid Deployment Program: 4 Weeks - Click2CloudCLICK2CLOUD INCEmbark on a transformative journey with Click2Cloud's Azure AI-Copilot PoC and Rapid Deployment programme.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
9 out of 60
Eviden’s Application Transformation Services with Cloud Code Refactor InsightsEviden International France - SASEviden’s Application Transformation services invoke code refactoring and configuration automation, leading to cloud readiness for faster release cycles and a consistent deployment process.
+2
Applicable to:
App Modernization
Security
10 out of 60
Microsoft Advanced Log Routing Service with ADXBlueVoyantA cost-effective alternative to storing all your logs on Microsoft Sentinel
+1
Applicable to:
Security
11 out of 60
PwC Cybersecurity and Risk CapabilitiesPricewaterhousecoopers LLPReimagine risk and unlock opportunities through a human-led, tech-powered approach.
+2
Applicable to:
Identity
Security
12 out of 60
Eviden Quality Inspector - Automate your quality control with computer visionEviden International France - SASQuality Inspector automates quality control with computer vision using various devices and processing options.
+3
Applicable to:
AI & Machine Learning
Data Platform
Security
13 out of 60
SQL AssessBraintree by VoxA SQL database assessment is a process of analysing your database environment to identify and resolve any issues that may affect its performance, security, availability and scalability.
+2
Applicable to:
Data Platform
Security
14 out of 60
Datacentre Infrastructure Consolidation & ManagementGlobal Computing and TelecomsConsolidate and manage datacentre infrastructure efficiently with tailored solutions, scalable to small, medium, and large organizations, optimizing costs and performance.
+2
Applicable to:
Migration
Security
15 out of 60
AIS Health Check: 2-Wk ServiceSolidify ABThe purpose of the service is to improve your Azure integration environment and ensure its reliability, security, and performance.
+3
Applicable to:
Analytics
Networking
Security
16 out of 60
BizTalk migration to Azure Integration ServicesSolidify ABTo migrate existing integrations from your current integration platform to Azure.
+3
Applicable to:
App Modernization
Migration
Security
17 out of 60
Hitachi AI Compass for Responsible AIHitachi Digital Services LLCAI Compass is Hitachi Digital Services Responsible AI offering, which enables transparency, security, safety, privacy & trustworthiness in AI applications.
+3
Applicable to:
App Modernization
AI & Machine Learning
Security
18 out of 60
Cloud MigrationSolifyPlanung und Durchführung von VM Migrationen (Lift & Shift) in die Azure Cloud sowie die Bereitstellung der Azure Landing Zone
+3
Applicable to:
Backup
Migration
Security
19 out of 60
GenAI Consulting & Engineering: 6-Wk ImplementationVisionet Systems, IncReimagine your business, IT and boost productivity with GenAI based solutions & practices for your Azure environments.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
20 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
21 out of 60
GCT Azure Sentinel: 12 Month Enablement with ManagementGlobal Computing and TelecomsGCT's Proactive, cloud-native security with threat detection, response ,insights and Management
+3
Applicable to:
Analytics
Migration
Security
22 out of 60
Azure Virtual Desktop Services: (3 Week Assessment)Infinite Computer Solutions IncAzure Virtual Desktop (AVD) provides affordable, seamless, secure remote desktop and application experiences to employees across the globe.
+2
Applicable to:
Migration
Security
23 out of 60
Microsoft Sentinel Design & Deployment AcceleratorThe Partner MastersAccelerate your design, deployment and configuration of Microsoft Sentinel using a templatized best practices approach from Microsoft cyber security experts
+1
Applicable to:
Security
24 out of 60
Copilot for Security: 3-hour introduction workshopWhite Hat IT Security KftRecommended for those who are interested in Copilot for Security. This brief introduction shows the current capabilities and value of Copilot for Security.
+2
Applicable to:
AI & Machine Learning
Security
25 out of 60
Sentinel Engagement WorkshopOrange Cyberdefense GlobalGain a bird’s eye view across your enterprise with SIEM for a modern world.
+1
Applicable to:
Security
26 out of 60
SoftwareOne Managed Extended Detection and Response for Microsoft SentinelSoftwareOneFuture-proof your cyber security with Managed Detection and Response (MDR)
+2
Applicable to:
Analytics
Security
27 out of 60
Fabricator: Unified Workbench for Microsoft FabricTech Mahindra LimitedTechM Fabricator, designed to simplify the journey from data collection to consumption through an intuitive orchestration pipeline and metadata driven automation.
+3
Applicable to:
Analytics
Data Platform
Security
28 out of 60
Azure AD Identity Protection AssessmentAVASOFTOur Azure AD Identity Protection Assessment identifies vulnerabilities and strengthens security. Mitigate risks with advanced threat detection and tailored defense strategies.
+2
Applicable to:
Identity
Security
29 out of 60
Single Sign On (SSO) for Applications using Entra ID by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user access. Simplify authentication with SSO, reduce password fatigue, and enhance security and productivity.
+2
Applicable to:
Identity
Security
30 out of 60
AVASecure 360 - Entra ID Access Management Solutions by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user provisioning, access requests, and reviews. Enhance security, efficiency, and compliance effortlessly.
+2
Applicable to:
Identity
Security
31 out of 60
Microsoft Azure AD AuthenticationAVASOFTStruggling with user access management? Azure AD Authentication automates provisioning, access requests, and reviews, enhancing security, efficiency, and compliance.
+2
Applicable to:
Identity
Security
32 out of 60
Dell Implementation Services for Backup on Microsoft AzureDell Technologies ServicesAttain strategic data protection policy guidance and recommendations.
+2
Applicable to:
Backup
Security
33 out of 60
I-Nxt Virtual DesktopCognizantAccelerate the deployment of a highly scalable, secure and flexible Azure Virtual Desktop (AVD) by utilizing Nerdio Manager for Enterprise.
+2
Applicable to:
Networking
Security
34 out of 60
Strengthen Your Azure Security - 3 days Comprehensive Risk AssessmentAVASOFTIdentify and address security gaps in Azure with our Risk Assessment. Gain insights, tailored recommendations, and best practices to strengthen your security and maintain compliance.
+2
Applicable to:
Identity
Security
35 out of 60
On-premises Active Directory Infra AssessmentAVASOFTOur On-Premises AD Infrastructure Assessment identifies vulnerabilities and compliance gaps. Strengthen security and ensure compliance with actionable insights and expert recommendations.
+2
Applicable to:
Identity
Security
36 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
37 out of 60
Dell Implementation Services for Microsoft Defender on CloudDell Technologies ServicesAdvisory and Deployment services aligned to your cloud security objectives, enabling you to gain comprehensive visibility of your cloud security posture across your environments.
+1
Applicable to:
Security
38 out of 60
Azure Cost OptimizationH One (Private) LimitedUnexpectedly high bills can be a frustrating surprise, and Azure billing is no different. Keeping a close watch on your Azure expenditures can help you stay within budget and avoid unnecessary costs.
+3
Applicable to:
Networking
Security
Storage
39 out of 60
API Release Process into Azure API ManagementSolidify ABSetup of API Management and lifecycle processes around APIs
+3
Applicable to:
DevOps
Networking
Security
40 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
42 out of 60
Kyndryl IAM Design and Implementation ServicesKyndryl Inc.Kyndryl IAM Services provide IAM solutions for hybrid and cloud environments using Microsoft Entra. Focus on user authentication, identity governance, and secure access with Zero Trust principles.
+3
Applicable to:
Backup
Identity
Security
43 out of 60
Azure Health CheckWIZARD GROUP LIMITEDThis service guides Azure Deployments to optimise costs, enhance security, and align architecture with industry standards, maximising Azure Cloud Infrastructure benefits
+3
Applicable to:
Networking
Security
Storage
44 out of 60
QA assessmentCiklumAnalyze testing processes & practices.
Get the GAP analysis against a hybrid approach containing practises from TMMi and TPI.
Receive overall maturity evaluation.
+3
Applicable to:
Analytics
DevOps
Security
45 out of 60
Hybrid AD Identity Security AssessmentAVASOFTOur Hybrid AD Identity Security Assessment identifies vulnerabilities and compliance gaps. Fortify your Hybrid AD, enhance security, and ensure compliance with actionable insights.
+2
Applicable to:
Identity
Security
46 out of 60
Setup Azure Landing Zone: 6 weeks ImplementationPeritos SolutionsWe've designed the framework for organizations migrating to Azure. The Azure Landing Zone sets best practices for streamlined, secure, and efficient setups, ideal for confident cloud transitions.
+3
Applicable to:
DevOps
Migration
Security
47 out of 60
softip_landing_zoneSOFTIP, a.s.Softip solution using terraform technology can help you quickly deploy an Azure environment that is alligned with CAF, Azure Security Baseline (ASB/MCSB), OWASP, GDPR, and SOFTIP best practises.
+3
Applicable to:
DevOps
Networking
Security
48 out of 60
Intune Assessment - 1 Day WorkshopValtoAn assessment of the Microsoft 365 Intune Environment checking all services within the platform and covering off additional tools available in your organisation to assist with MDM.
+3
Applicable to:
Backup
Networking
Security
49 out of 60
Infrastructure Migration to Azure with Click2Cloud - An AMM PartnerCLICK2CLOUD INCMigrate your infrastructure workload to Azure Cloud with Click2Cloud’s Migration and Modernization service offerings, ensuring a seamless transition, optimization, and support.
+3
Applicable to:
Migration
Security
Storage
50 out of 60
Neudesic Copilot JumpstartNeudesicDesigned as a three-phase workshop, Neudesic's Microsoft 365 Copilot Jumpstart Workshop helps customers assess their needs, prioritize Copilot use cases & define an actionable implementation roadmap.
+3
Applicable to:
App Modernization
AI & Machine Learning
Security
51 out of 60
Cognizant offering for Oracle Database@AzureCognizantMigrate your critical Oracle workloads to Azure leveraging Cognizant’s expertise in Discovery, Analysis, Sizing, Oracle license management and migration of Oracle Databases to Oracle Database@Azure
+3
Applicable to:
Migration
Networking
Security
52 out of 60
Managed Security Services with Microsoft Sentinel (5 Hours workshop - FREE)Infinite Computer Solutions IncFortify your Cybersecurity with Microsoft Sentinel & Infinite: AI-enhanced threat detection, seamless incident response, and comprehensive security insights
+3
Applicable to:
Analytics
DevOps
Security
53 out of 60
Rackspace Managed XDR powered by Microsoft SentinelRackspaceSecure your digital assets with Rackspace Managed XDR, blending Microsoft Sentinel, advanced threat detection, SOC analysts, and AI-driven response.
+1
Applicable to:
Security
54 out of 60
DXC's Microsoft Copilot for Security Readiness AssessmentDXCMicrosoft’s Copilot for Security is a disruptive generative AI technology designed to enhance security operations.
+1
Applicable to:
Security
55 out of 60
Traceability and Verification System: 0.5-day BriefingReplyJoin us for a half-day briefing on Solidsoft Reply's Traceability and Verification System (TRVST), our innovative solution to combating the proliferation of falsified medicines.
+3
Applicable to:
App Modernization
Big Data
Security
56 out of 60
Migration to Azure VMware: 8 weeks AssessmentElitmind SPAssessment specifies the scope and methodology for assessing your organization's current on-premises VMware environment to facilitate a smooth migration to AVS in the Azure Cloud.
+3
Applicable to:
Migration
Networking
Security
57 out of 60
3-Week Security Baseline AssessmentAvertium, LLCOrganizations that lack the resources to accurately assess their security deployments will benefit from this in-depth assessment.
+1
Applicable to:
Security
58 out of 60
Eviden's Smart Factory 3-Weeks AssessmentEviden International France - SASThe solutions lead to reductions in inventory-holding costs, increased labor productivity, reduced machine downtime, throughput increase, improved forecasting accuracy, cost-of-quality improvements
+3
Applicable to:
Analytics
AI & Machine Learning
Security
59 out of 60
HITRUST Certification e1, i1 or r2Avertium, LLCSimplify the HITRUST certification experience, unburden your teams, and get a clear and actionable roadmap that builds towards a mature security posture.
+1
Applicable to:
Security
60 out of 60