FiltersClear all
Professional Services results
Showing results in professional services.
Cloud Security Approach: 2-months AssessmentPyxisThrough the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
+3
Applicable to:
Analytics
Identity
Security
1 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxisEvolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
+3
Applicable to:
Analytics
Identity
Security
2 out of 60
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
3 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
4 out of 60
Cloud Security Compliance: 4-months AssessmentPyxisThe CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
+3
Applicable to:
Analytics
Identity
Security
5 out of 60
Cloud Security Services: 12-months ImplementationPyxisWe audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
+3
Applicable to:
Analytics
Identity
Security
6 out of 60
Microsoft Sentinel Consulting Services: 12-Months ImplementationForsyte IT SolutionsMicrosoft Sentinel consulting services are designed to get you up and running quickly to maximize your return on investment in Microsoft's advanced security technologies.
+2
Applicable to:
Identity
Security
7 out of 60
IGA and Zero Trust with Microsoft Entra ID and Saviynt: ImplementationOxford Computer Group LLCOxford Computer Group, Saviynt, and Microsoft's Identity Governance & Administration (IGA) solution propels enterprise organizations toward Zero Trust security.
+2
Applicable to:
Identity
Security
8 out of 60
SC-100T00: Microsoft Cybersecurity Architect: 4 Days WorkshopNETCOM LEARNINGSC-100T00: Microsoft Cybersecurity Architect course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance
+2
Applicable to:
Identity
Security
9 out of 60
Managed Desktop - 12 Month - Managed Service ImplementationCoretek ServicesComprehensive Managed Desktop Solution Leveraging Microsoft AVD & Windows 365
+2
Applicable to:
Identity
Security
10 out of 60
Next Generation SOC: 4Wk ImplementationCOEMServicios profesionales de seguridad para proteger la Infraestructura, redes y aplicaciones, fomentando el consumo de Azure a través de los diferentes conectores y la retención de la información.
+3
Applicable to:
Identity
Networking
Security
11 out of 60
Azure Virtual Desktop: 2-Wk ImplementationPetabytz IncStart experiencing the best kind of virtualization with Azure Virtual Desktop in minutes to enable remote work. Provides employees the same experience they would have on a local desktop.
+3
Applicable to:
Identity
Migration
Security
12 out of 60
skillup_consulting_openedx_v1Flexible Road LLCOpen edX Learning Management System with Azure.
+3
Applicable to:
Backup
Identity
Storage
13 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
14 out of 60
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to:
App Modernization
Identity
15 out of 60
SAP SuccessFactors and Microsoft Entra ID Integration: 6-wk ImplementationOxford Computer Group LLCEnable User Lifecycle Management by integrating SAP SuccessFactors and Microsoft Entra ID.
+1
Applicable to:
Identity
16 out of 60
Assesment Azure Base4Base4 Security Chile SPAThe Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
+3
Applicable to:
Analytics
Identity
Security
17 out of 60
Microsoft Certification Exam Preparation: 8 Hours WorkshopNETCOM LEARNINGThis session helps prepare your teams to pass the Microsoft Certification exams.
+3
Applicable to:
Identity
Migration
Storage
18 out of 60
Microsoft Sentinel Quick Start: 6-week ImplementationQuisitiveGet ahead with the next generation solution for Security Information and Event Management (SIEM) and Security Orchestration and Automated Remediation (SOAR) with our Microsoft Sentinel Quick Start.
+2
Applicable to:
Identity
Security
19 out of 60
Red Canary Microsoft Sentinel WorkshopRed CanaryGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
+2
Applicable to:
Identity
Security
20 out of 60
Azure Health CheckIvision, Inc.Azure Health Check
+3
Applicable to:
Backup
Identity
Networking
21 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
22 out of 60
Avertium Professional Security Services for Microsoft Azure 1 - 12 MonthsAvertium, LLCIdentify & remediate issues impacting the overall security posture of an organization’s environment & develop a roadmap for the ongoing evolution of security controls and optimization.
+3
Applicable to:
Identity
Migration
Security
23 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
24 out of 60
AD Domain Consolidation for Migration to Microsoft Entra ID: 6 wk ImpOxford Computer Group LLCGet started on your journey towards zero trust by consolidating your organization’s Active Directories for better visibility, efficiency, and security.
+3
Applicable to:
Identity
Migration
Security
25 out of 60
Verifiable Credentials with Microsoft Entra Verified ID: full architecture design with initial deploymentFormula5Formula5's Microsoft Entra Verified ID Workshop & POC helps organizations to understand decentralized identity concepts and implement secure identity solutions using Verifiable Credentials.
+2
Applicable to:
Identity
Security
26 out of 60
Azure Security: 3-Week AssessmentSpyglass MTG, LLCSpyglass’s 3-Week Azure Security Assessment captures your current security state and documents a plan to safeguard your entire organization.
+2
Applicable to:
Identity
Security
27 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
28 out of 60
Credential Manager: 5-Day Implementation SolutionCreospark Consulting Services IncThis solution harnesses the capabilities of Dataverse, Power Apps, Power Automate, and Azure Key Vault technologies to redefine how organizations protect sensitive user credentials and information.
+3
Applicable to:
Backup
Identity
Security
29 out of 60
User Profile Manager: 5-Day Implementation SolutionCreospark Consulting Services IncThis solution offers users a window into their access privileges, allowing them to effortlessly navigate their information and files.
+2
Applicable to:
Archive
Identity
30 out of 60
Azure MFA Quick Start: 2-Week ImplementationAll Covered, a division of Konica MinoltaA 2-week consulting implementation that will enhance your organization's identity security capabilities through Azure Multi-Factor Authentication (MFA)
+2
Applicable to:
Identity
Security
31 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
32 out of 60
External IAM 5 day assessmentCondatis Group LimitedCondatis is offering an external Identity and Access Management (IAM) assessment focusing on how your organisation secures and manages external identities in your business context.
+2
Applicable to:
Identity
Security
33 out of 60
Lightstream Comprehensive Azure Core Security AssessmentLightstreamLightstream will provide a comprehensive understanding of your Azure security landscape with actionable recommendations.
+3
Applicable to:
Identity
Networking
Security
34 out of 60
LogicalisOne: 12-month supportLogicalis, Inc.Logicalis One offers on demand Professional Services to support Azure environments by providing certified consultants to define, architect and/or integrate new or existing Azure capabilities.
+3
Applicable to:
Identity
Networking
Security
35 out of 60
Lightstream Complimentary Azure Core Security AssessmentLightstreamLightstream will provide a complimentary comprehensive understanding of your Azure security landscape with actionable recommendations.
+3
Applicable to:
Identity
Networking
Security
36 out of 60
Digital BackpackTelelink Business Services EADThe Digital Backpack is an expansive learning platform that supports various teaching models—remote, in-person, and hybrid.
+1
Applicable to:
Identity
37 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
38 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
40 out of 60
Spyglass MTG Defender for Cloud: 4-Week ImplementationSpyglass MTG, LLCThe Spyglass MTG Defender for Cloud offers simplified security management for multi-cloud environments with a 4-week $35K implementation.
+2
Applicable to:
Identity
Security
41 out of 60
MIM Migration To Entra ID Assessment: 8-Wk AssessmentModern MethodologiesMicrosoft Identity Manager Current state assessment and transition plan to Microsoft Entra ID
+2
Applicable to:
Identity
Security
42 out of 60
Well Architectured FrameWork Review by NessNess IsraelStrengthen Your Cloud Architecture with Ness Cloud. Get tailored recommendations for Operational Excellence, Security, Reliability, Performance Efficiency, Cost Optimization, and Sustainability.
+3
Applicable to:
DevOps
Identity
Security
43 out of 60
Cloud Security Assessment By NessNess IsraelEnhance Your Cloud Security with Ness Cloud. Our assessment uncovers vulnerabilities, misconfigurations, and weaknesses, offering customized recommendations to strengthen your cloud environment.
+3
Applicable to:
Identity
Migration
Security
44 out of 60
Cloud Architect Review by NessNess IsraelOptimize Your Cloud Architecture with Ness. Our Cloud Architect Review provides a comprehensive analysis of your cloud setup, ensuring it is efficient, reliable, and cost-effective.
+3
Applicable to:
DevOps
Identity
Security
45 out of 60
Landing Zone Setup by NessNess IsraelEstablish a Secure Foundation with Ness. Our Landing Zone Setup ensures a compliant, secure and scalable Azure environment for your workloads.
+3
Applicable to:
DevOps
Identity
Migration
46 out of 60
Front Door Implementation by NessNess IsraelOptimize your site and app performance and resilience. The Front Door Implementation by Ness Cloud ensures efficient and secure content delivery for your applications and reduced server loads.
+3
Applicable to:
DevOps
Identity
Security
47 out of 60
Nagarro's GAiN: Unlock the power of AI for your enterpriseNagarroNagarro's GAiN platform leverages Azure AI to unlock enterprise data, transforming customer and employee experience.
+3
Applicable to:
AI & Machine Learning
Identity
Security
48 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITEDOverwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
+2
Applicable to:
Identity
Security
49 out of 60
Azure Cloud Transformation - 8 WeeksCloudifyops Private LimitedTransform your business in 8 weeks using our Azure Cloud program: strategic planning, expert advisory, and smooth migration to Azure with easy adoption to the cloud and future growth.
+3
Applicable to:
Backup
Identity
Migration
50 out of 60
Cloud Consulting for Azure - 4 Weeks EngagementCloudifyops Private LimitedAccelerate your cloud journey with our 4-week Azure Cloud Consulting program, which includes deep IT assessment, gap analysis, and a strategic roadmap to address issues and optimize Azure adoption.
+3
Applicable to:
Identity
Migration
Networking
51 out of 60
App ModernizationCloudifyops Private LimitedRevitalize legacy applications with our App Modernization Services, ensuring efficiency, security, and innovation in the cloud-native era. Unlock growth opportunities and modernize for future success.
+3
Applicable to:
App Modernization
Identity
Security
52 out of 60
Data Security EngagementECF Data LLCMitigate risks with ECF Data's Data Security Workshop, powered by Microsoft Purview.
+3
Applicable to:
Backup
Identity
Security
53 out of 60
ProtectYourBusiness with Advanced Identity & Access ManagementECF Data LLCSecure access to ECF Data’s Azure IAM solutions. Simplify user access, protect data, and integrate identity management for seamless security.
+2
Applicable to:
Identity
Security
54 out of 60
Migration of Microsoft Sentinel ModernizeExelegentMigrate from legacy SIEM to Microsoft Sentinel; a cloud native SIEM + SOAR
+3
Applicable to:
Identity
Migration
Security
55 out of 60
QServices AI-Powered SaaS AutomationQ SERVICES INCAI-powered SaaS platform for customer support, workflow automation, and efficiency boost.
+3
Applicable to:
App Modernization
AI & Machine Learning
Identity
56 out of 60
ManageOps: MultiCloud Infrastructure & Operations SolutionGO TO CLOUD SASOptimice y gestione su infraestructura en la nube de forma estratégica y segura con los Cloud Managed Services de GoToCloud, impulsando el crecimiento y reduciendo costos operativos.
+3
Applicable to:
Backup
DevOps
Identity
57 out of 60
Microsoft Entra Verified ID: 3-8 Day WorkshopCondatis Group LimitedAn immersive 3-8 day workshop designed to provide a deep dive into Microsoft Entra Verified ID.
+1
Applicable to:
Identity
58 out of 60
Microsoft Entra Verified ID: POCCondatis Group LimitedCondatis is offering a Microsoft Entra Verified ID Proof of Concept demonstrating how your organisation can leverage digital identity credentials to streamline onboarding and secure access.
+1
Applicable to:
Identity
59 out of 60
Microsoft Entra ID WorkshopCondatis Group LimitedAn immersive 3 - 8 day workshop designed to provide a deep dive into Microsoft Entra ID.
+1
Applicable to:
Identity
60 out of 60