FiltersClear all
Professional Services results
Showing results in professional services.
Cloud Security Approach: 2-months AssessmentPyxisThrough the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
+3
Applicable to:
Analytics
Identity
Security
1 out of 60
ADP to Active Directory - 1 Week ImplementationCovenant Technology PartnersIntegrate ADP to Active Directory to automate employee onboarding within your organization.
+1
Applicable to:
Identity
2 out of 60
Secure SAP on Azure : 2-Hrs BriefingTCS - Security2 Hrs briefing on TCS Managed Security services offering leveraging contextual and pre-integrated solution for protecting SAP ecosystem on Azure
+3
Applicable to:
Identity
Networking
Security
3 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxisEvolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
+3
Applicable to:
Analytics
Identity
Security
4 out of 60
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
5 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
6 out of 60
Cloud Security Compliance: 4-months AssessmentPyxisThe CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
+3
Applicable to:
Analytics
Identity
Security
7 out of 60
Microsoft Sentinel Consulting Services: 12-Months ImplementationForsyte IT SolutionsMicrosoft Sentinel consulting services are designed to get you up and running quickly to maximize your return on investment in Microsoft's advanced security technologies.
+2
Applicable to:
Identity
Security
8 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield LtdSpartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
+3
Applicable to:
Identity
Migration
Security
9 out of 60
IGA and Zero Trust with Microsoft Entra ID and Saviynt: ImplementationOxford Computer Group LLCOxford Computer Group, Saviynt, and Microsoft's Identity Governance & Administration (IGA) solution propels enterprise organizations toward Zero Trust security.
+2
Applicable to:
Identity
Security
10 out of 60
SC-100T00: Microsoft Cybersecurity Architect: 4 Days WorkshopNETCOM LEARNINGSC-100T00: Microsoft Cybersecurity Architect course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance
+2
Applicable to:
Identity
Security
11 out of 60
Managed Desktop - 12 Month - Managed Service ImplementationCoretek ServicesComprehensive Managed Desktop Solution Leveraging Microsoft AVD & Windows 365
+2
Applicable to:
Identity
Security
12 out of 60
CoreDefend Managed XDR Microsoft Security SolutionCoretek ServicesA Comprehensive Managed XDR Security Solution Using Microsoft Security Tools to Improve Security Posture
+2
Applicable to:
Identity
Security
13 out of 60
IBM Threat Management with Microsoft’s SAP Threat Monitoring Solution for Microsoft AzureIBM Security ServicesConsulting and managed security services from IBM Security supporting Microsoft Defender, Azure Sentinel, and the SAP Threat Monitoring solution for Sentinel
+2
Applicable to:
Identity
Security
14 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies ServicesDelivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
+2
Applicable to:
Identity
Security
15 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.aiImplementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
+1
Applicable to:
Identity
16 out of 60
Next Generation SOC: 4Wk ImplementationCOEMServicios profesionales de seguridad para proteger la Infraestructura, redes y aplicaciones, fomentando el consumo de Azure a través de los diferentes conectores y la retención de la información.
+3
Applicable to:
Identity
Networking
Security
17 out of 60
Sentinel: 3-Day WorkshopBridewell Consulting LimitedMitigate threats, and work with Bridewell's leading cloud security specialists to develop a roadmap to drive improvements in your Sentinel deployment.
+3
Applicable to:
Identity
Networking
Security
18 out of 60
HCLTech Unified Digital AccessHCL America Inc_HCLTHCLTech’s Unified Digital Access solution protects enterprise users and apps from cybersecurity attacks by aiding with right enterprise security posture with easy access to Apps and services.
+1
Applicable to:
Identity
19 out of 60
Virtusa’s Hybrid Cloud Management using Azure Arc: 5 Weeks Pilot ImplementationVIRTUSA LTDVirtua’s Hybrid Cloud Management uses Azure Arc to build a strategy for addressing organization-wide hybrid cloud complexity
+2
Applicable to:
Identity
Security
20 out of 60
Virtusa's Zero Trust Security Assessment for Azure Cloud:4-Weeks AssessmentVIRTUSA LTDVirtusa's Zero Trust Security assessment uses the zero-trust model to enable best-practice controls for you to safeguard data. confidentiality, integrity, and availability.
+3
Applicable to:
Identity
Networking
Security
21 out of 60
Accelerating Cloud Virtual Desktops: 2-Hour WorkshopSlalom ConsultingThis Free Workshop will introduce you to how Azure Virtual Desktops help you embrace a remote workforce while maintaining control through secure workstation experiences on any device.
+3
Applicable to:
Identity
Migration
Networking
22 out of 60
Azure Governance & Platform: ImplementationConcurrency, Inc.Build a secure, scalable foundation for cloud adoption with Azure Landing Zones and governance best practices
+3
Applicable to:
Identity
Networking
Security
23 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology HoldingOur offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
+3
Applicable to:
Identity
Security
Storage
24 out of 60
Security and Compliance: 3 Week Proof of ConceptAVASOFTOur well-defined scope engagement will help you kick start your Security and Compliance operations based on Azure.
+2
Applicable to:
Identity
Security
25 out of 60
Microsoft Azure Security: 2 - Week AssessmentAVASOFTAVASOFT provides state-of-art Microsoft Azure security assessments for future-ready enterprises.
+3
Applicable to:
Identity
Networking
Security
26 out of 60
Hybrid Identity & Access Management: 8 - Week ImplementationAVASOFTThe goal of the project is to strategize and implement an Identity and Access Management solution based on Microsoft Identity Manager (MIM) 2016 and Azure Active Directory.
+3
Applicable to:
Identity
Migration
Security
27 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private LimitedWe help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
+3
Applicable to:
Identity
Migration
Security
28 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
+3
Applicable to:
Identity
Migration
Security
29 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology HoldingGet a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
+3
Applicable to:
Identity
Security
Storage
30 out of 60
skillup_consulting_openedx_v1Flexible Road LLCOpen edX Learning Management System with Azure.
+3
Applicable to:
Backup
Identity
Storage
31 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam FranceSecure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
+2
Applicable to:
Identity
Networking
32 out of 60
Azure Sentinel 5 hours Online WorkshopCLOUD SERVICESThis 5-hour workshop contains theoretic and practical parts. It is designed to help you to start working with Azure Sentinel
+3
Applicable to:
Disaster Recovery
Identity
Security
33 out of 60
Azure Active Directory Migration: 3-Wk AssessmentiC Consult Gesellschaft für Systemintegration und Kommunikation mbHThis offer is ideal for customers that want to consolidate grown Identity and Access Management/MFA solutions to reach a best of breed approach for Azure AD infrastructure and Azure AD principles.
+3
Applicable to:
Identity
Migration
Security
34 out of 60
SAP SuccessFactors and Microsoft Entra ID Integration: 6-wk ImplementationOxford Computer Group LLCEnable User Lifecycle Management by integrating SAP SuccessFactors and Microsoft Entra ID.
+1
Applicable to:
Identity
35 out of 60
Assesment Azure Base4Base4 Security Chile SPAThe Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
+3
Applicable to:
Analytics
Identity
Security
36 out of 60
Microsoft Security License Utilisation & Commercial Assessment: 2-Week AssessmentBridewell Consulting LimitedProvide an overview of organisations current licensing position, identify what security Microsoft products could be utilised & build an adoption framework
+3
Applicable to:
Identity
Networking
Security
37 out of 60
Azure Security Accelerator SuiteNeudesicMitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
+3
Applicable to:
Identity
Networking
Security
38 out of 60
Managed Services for Microsoft EntraDXCAdvisory and Managed Services for Microsoft Entra
+2
Applicable to:
Identity
Security
39 out of 60
Microsoft Certification Exam Preparation: 8 Hours WorkshopNETCOM LEARNINGThis session helps prepare your teams to pass the Microsoft Certification exams.
+3
Applicable to:
Identity
Migration
Storage
40 out of 60
Security Discovery: 4-Wk AssessmentProServeITA security discovery & assessment will provide a new understanding of cyber threat trends & let you know where to start. Ensure your business continuity, protect your reputation & instill trust.
+2
Applicable to:
Identity
Security
41 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARSALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
+3
Applicable to:
App Modernization
Identity
Migration
42 out of 60
Security Level Up: 4-Wk ImplementationProServeITBuild your security baseline environment and level it up with the appropriate Microsoft cybersecurity technologies. Ensure your business continuity even after a cyberattack & protect your reputation.
+2
Applicable to:
Identity
Security
43 out of 60
Spyglass Cloud Security: 6-week AssessmentQuisitiveThe Spyglass Cloud Security Assessment is a complete evaluation of your organization’s cloud security posture centered around identity, data, devices, applications, and access.
+3
Applicable to:
Identity
Security
Storage
44 out of 60
Security Managed Services Consulting: 12-Month ImplementationProServeITEnhance your cybersecurity baseline & take it to a higher standard with appropriate Microsoft cybersecurity technologies. Proactive measures & regular audits will ensure business continuity.
+2
Applicable to:
Identity
Security
45 out of 60
Azure Security: 3-week AssessmentQuisitiveA Quisitive Azure Security Assessment offers actionable insight about your cloud security posture, with peace of mind for how your Azure deployment can be made more safe and secure.
+3
Applicable to:
App Modernization
Identity
Security
46 out of 60
Microsoft Sentinel Quick Start: 6-week ImplementationQuisitiveGet ahead with the next generation solution for Security Information and Event Management (SIEM) and Security Orchestration and Automated Remediation (SOAR) with our Microsoft Sentinel Quick Start.
+2
Applicable to:
Identity
Security
47 out of 60
Onesec 7x24 Managed Security Operation ServicesSecure Nextgen SystemsTakes care of your organization using the full artificial intelligence and machine learning power of Microsoft Sentinel to detect potential threats that can cause a significant loss
+3
Applicable to:
Identity
Networking
Security
48 out of 60
Azure Data Modernization: 4-Hour WorkshopIvision, Inc.In this 4-hour workshop designed for data professionals, our data and BI experts will guide your team though a tailored, interactive exploration to put you on the path to data management success.
+3
Applicable to:
Analytics
Data Platform
Identity
49 out of 60
CloudPOS: 4-Week ImplementationMediasoft Data Systems LimitedThe all-in-one cloud-based point-of-sale solution. Boost efficiency, streamline operations, and enhance the customer experience with the user-friendly, secure, and fast software solutions.
+3
Applicable to:
Analytics
Archive
Identity
50 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTDDotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
+3
Applicable to:
App Modernization
Identity
Storage
51 out of 60
Red Canary Microsoft Sentinel WorkshopRed CanaryGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
+2
Applicable to:
Identity
Security
52 out of 60
Azure Health CheckIvision, Inc.Azure Health Check
+3
Applicable to:
Backup
Identity
Networking
53 out of 60
Implementation of Cloud Endpoints using Microsoft IntuneConcurrency, Inc.Modernize endpoint management and security with Microsoft Intune
+2
Applicable to:
Identity
Security
54 out of 60
Security as a Service: 3-Wk ImplementationA3Cloud SolutionsImprove your security of your solutions and infrastructures in Azure Cloud.
+3
Applicable to:
Identity
Migration
Security
55 out of 60
Azure Security Essentials: 3-Wk ImplementationAgile ITOnboarding Azure for Security and Compliance (Essentials) seeks to reduce the mean time to detection by consolidating logging, analytics, detection, and response into a single cohesive solution
+3
Applicable to:
Identity
Networking
Security
56 out of 60
Mergers, Acquisitions, and Divestitures (MAD)Concurrency, Inc.Concurrency helps clients that are divesting, acquiring, or merging companies or divisions. Confidently navigate IT transitions with a proven, user-first approach.
+3
Applicable to:
Identity
Migration
Security
57 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
58 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
59 out of 60
Microsoft Intune - Initial Setup for Windows devices: 2-Wk Consulting ServiceIT Partner LLCComprehensive support to customers in their journey of leveraging Microsoft Azure, particularly in getting started with or expanding their utilization of the platform.
+3
Applicable to:
Identity
Migration
Security
60 out of 60