FiltersClear all
Professional Services results
Showing results in professional services.
IGA and Zero Trust with Microsoft Entra ID and Saviynt: ImplementationOxford Computer Group LLCOxford Computer Group, Saviynt, and Microsoft's Identity Governance & Administration (IGA) solution propels enterprise organizations toward Zero Trust security.
+2
Applicable to:
Identity
Security
1 out of 60
Purple Team Assessment: 1 Week AssessmentBridewell Consulting LimitedTest your organisation's defensive capabilities by conducting a purple team assessment in collaboration with Bridewell
+3
Applicable to:
Identity
Migration
Security
2 out of 60
HCLTech Unified Digital AccessHCL America Inc_HCLTHCLTech’s Unified Digital Access solution protects enterprise users and apps from cybersecurity attacks by aiding with right enterprise security posture with easy access to Apps and services.
+1
Applicable to:
Identity
3 out of 60
Virtusa’s Hybrid Cloud Management using Azure Arc: 5 Weeks Pilot ImplementationVIRTUSA LTDVirtua’s Hybrid Cloud Management uses Azure Arc to build a strategy for addressing organization-wide hybrid cloud complexity
+2
Applicable to:
Identity
Security
4 out of 60
Virtusa's Zero Trust Security Assessment for Azure Cloud:4-Weeks AssessmentVIRTUSA LTDVirtusa's Zero Trust Security assessment uses the zero-trust model to enable best-practice controls for you to safeguard data. confidentiality, integrity, and availability.
+3
Applicable to:
Identity
Networking
Security
5 out of 60
Accelerating Cloud Virtual Desktops: 2-Hour WorkshopSlalom ConsultingThis Free Workshop will introduce you to how Azure Virtual Desktops help you embrace a remote workforce while maintaining control through secure workstation experiences on any device.
+3
Applicable to:
Identity
Migration
Networking
6 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology HoldingOur offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
+3
Applicable to:
Identity
Security
Storage
7 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology HoldingGet a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
+3
Applicable to:
Identity
Security
Storage
8 out of 60
Azure Active Directory Migration: 3-Wk AssessmentiC Consult Gesellschaft für Systemintegration und Kommunikation mbHThis offer is ideal for customers that want to consolidate grown Identity and Access Management/MFA solutions to reach a best of breed approach for Azure AD infrastructure and Azure AD principles.
+3
Applicable to:
Identity
Migration
Security
9 out of 60
Azure Security Accelerator SuiteNeudesicMitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
+3
Applicable to:
Identity
Networking
Security
10 out of 60
Spyglass Cloud Security: 6-week AssessmentQuisitiveThe Spyglass Cloud Security Assessment is a complete evaluation of your organization ’s cloud security posture centered around identity, data, devices, applications, and access.
+3
Applicable to:
Identity
Security
Storage
11 out of 60
Azure Security: 3-week AssessmentQuisitiveA Quisitive Azure Security Assessment offers actionable insight about your cloud security posture, with peace of mind for how your Azure deployment can be made more safe and secure.
+3
Applicable to:
App Modernization
Identity
Security
12 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTDDotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
+3
Applicable to:
App Modernization
Identity
Storage
13 out of 60
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITEDProvide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
+3
Applicable to:
Analytics
Data Platform
Identity
14 out of 60
Red Canary Microsoft Sentinel WorkshopRed CanaryGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
+2
Applicable to:
Identity
Security
15 out of 60
Security as a Service: 3-Wk ImplementationA3Cloud SolutionsImprove your security of your solutions and infrastructures in Azure Cloud.
+3
Applicable to:
Identity
Migration
Security
16 out of 60
Azure Security Essentials: 3-Wk ImplementationAgile ITOnboarding Azure for Security and Compliance (Essentials) seeks to reduce the mean time to detection by consolidating logging, analytics, detection, and response into a single cohesive solution
+3
Applicable to:
Identity
Networking
Security
17 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
18 out of 60
Microsoft Intune - Initial Setup for Windows devices: 2-Wk Consulting ServiceIT Partner LLCComprehensive support to customers in their journey of leveraging Microsoft Azure, particularly in getting started with or expanding their utilization of the platform.
+3
Applicable to:
Identity
Migration
Security
19 out of 60
Cloud Security Workshop: 2 half-days workshopMallow OyWe'll check your Azure environment for security issues and suggest remedies for them
+3
Applicable to:
App Modernization
Identity
Security
20 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
21 out of 60
Enterprise - Zero Trust Strategy & Journey MapJohn Keells Information Technology Pvt LtdOrganizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid & multi-cloud workplace, and ensures cyber security assurance.
+2
Applicable to:
Identity
Security
22 out of 60
Hybrid Infra Management Though Azure ArcJohn Keells Information Technology Pvt LtdAzure Arc brings a unified management platform to your data centers, Azure Cloud as well as other clouds and edge, no matter how complex your environments may look like.
+2
Applicable to:
Identity
Security
23 out of 60
AVD Cost Optimization ProgramTechPlus TalentAre you looking to maximize the value of your Azure Virtual Desktop (AVD) environment while minimizing costs? Look no further! Tech Plus Talent is thrilled to present our Azure AVD Cost Optimization P
+3
Applicable to:
Backup
Identity
Security
24 out of 60
Azure Single Sign-On: 3-Day Azure Single Sign-On (SSO) with a third-party applicationIT Partner LLCSingle sign-on (SSO) means that users do not need to sign in to every , they log into Azure AD once, and these credentials are used for other applications such as Sales Force, Slack, Zendesk, etc.
+3
Applicable to:
App Modernization
Identity
Security
25 out of 60
Microsoft Copilot Readiness AssessmentGC Brokers Inc.Ensure organizational readiness for the release of Microsoft Co-Pilot. Ensure your organization is ready for the adoption of this groundbreaking new technology.
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
26 out of 60
Active Directory AssessmentAppWeb LLCDynapt offers a comprehensive evaluation of your Active Directory (AD) infrastructure for Azure Readiness with valuable insights and recommendations for a optimized and secured environment.
+2
Applicable to:
Identity
Security
27 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
28 out of 60
Azure Virtual Desktop Secure Platform designed by CloudAstro - Revolutionize Your Workplace (4 Days - Workshop)CloudAstro GmbHEmbrace the future with AVD Secure Platform, where mobility meets cutting-edge security for all industries.
+3
Applicable to:
DevOps
Identity
Security
29 out of 60
Rapid Cyberattack Assessment Workshop (Full - On-site)IT Partner LLCThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
+3
Applicable to:
Backup
Identity
Security
30 out of 60
Microsoft & Multi-Cloud Security Penetration Testing: 5-Day AssessmentBDO LLPCREST certified Ethical Hackers from BDO perform penetration tests on your Microsoft and Multi-Cloud environment and test the setup of Microsoft Azure AD, Defender, Sentinel and Purview.
+3
Applicable to:
Identity
Security
Storage
31 out of 60
SOC Compliance readiness check: 1-Month Professional ServiceIT Partner LLCAssess your organization's readiness for SOC compliance, helping identify and address potential control and policy issues to prepare for an official SOC audit effectively.
+2
Applicable to:
Identity
Security
32 out of 60
Eviden's Application Strategy WorkshopEviden International France - SASEviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
+3
Applicable to:
App Modernization
Data Platform
Identity
33 out of 60
Windows Autopilot - Initial Setup: 3-Wk Initial Professional ServiceIT Partner LLCImplement Windows Autopilot for seamless device deployment, enabling automated, image-free Windows deployment to PCs worldwide, requiring minimal infrastructure.
+3
Applicable to:
Identity
Migration
Security
34 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
+2
Applicable to:
Identity
Security
35 out of 60
KloudIdentity: Application Onboarding to Entra made simple with our SCIM GatewayKloudyNet Technologies SDN BHDKloudIdentity is our proprietary SCIM Gateway to onboard LOB & Cloud applications (including non SCIM compliant), databases and other applications to Microsoft Entra for users and groups provisioning.
+2
Applicable to:
Identity
Security
36 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoorThis assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
+3
Applicable to:
Identity
Networking
Security
37 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoormyCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
+3
Applicable to:
Identity
Networking
Security
38 out of 60
24x7 SOC Service by IntelequiaIntelequia Technologies24x7 monitoring, protection and automated response to cyberthreats
+3
Applicable to:
Analytics
Identity
Security
39 out of 60
Cognizant Cyber Threat Defense, powered by MicrosoftCognizantCognizant's Cyber Threat Defense offering provides a set of structured methodologies and tools to assess, migrate, modernize and manage your Security Operations Center (SOC).
+3
Applicable to:
AI & Machine Learning
Identity
Security
40 out of 60
Azure Cloud 5-Week AssessmentVigilant TechnologiesWe offer an Azure Cloud Assessment to help your organization plan and prepare for a move to the Azure cloud, or scan and provide feedback on existing Azure deployments.
+3
Applicable to:
Identity
Networking
Security
41 out of 60
Azure Zero Trust Assessment: 1 Day WorkshopSlalom ConsultingCreate your Azure security foundation: We will work with your organization's security and infrastructure leaders to create a point-in-time snapshot of where you are in your security journey.
+2
Applicable to:
Identity
Security
42 out of 60
Azure AD Single Sign-On (SSO) (Entra ID) with Ramp Implementation: 5-Days Consulting ServiceIT Partner LLCThe goal of this service is to enable seamless access to Ramp and other cloud applications with one login using Azure AD SSO, improving security, productivity, and simplifying user management.
+3
Applicable to:
App Modernization
Identity
Security
43 out of 60
Azure AD Single Sign-On (SSO) (Entra ID) with Bamboo HR Implementation: 5-Days Consulting ServiceIT Partner LLCService enables seamless Azure AD Single Sign-On integration with Bamboo HR, enhancing security, simplifying user authentication, and improving productivity by using one login for multiple application
+3
Applicable to:
App Modernization
Identity
Security
44 out of 60
User Information Synchronization Between Azure AD (Entra ID) and Ramp: 5-Days Consulting ServiceIT Partner LLCSync user information between Azure AD (Entra ID) and Ramp, automating updates to ensure data consistency, reduce errors, and maintain secure, seamless data exchange with detailed logging.
+3
Applicable to:
Identity
Migration
Security
45 out of 60
Well Architectured FrameWork Review by NessNess IsraelStrengthen Your Cloud Architecture with Ness Cloud. Get tailored recommendations for Operational Excellence, Security, Reliability, Performance Efficiency, Cost Optimization, and Sustainability.
+3
Applicable to:
DevOps
Identity
Security
46 out of 60
Cloud Architect Review by NessNess IsraelOptimize Your Cloud Architecture with Ness. Our Cloud Architect Review provides a comprehensive analysis of your cloud setup, ensuring it is efficient, reliable, and cost-effective.
+3
Applicable to:
DevOps
Identity
Security
47 out of 60
Landing Zone Setup by NessNess IsraelEstablish a Secure Foundation with Ness. Our Landing Zone Setup ensures a compliant, secure and scalable Azure environment for your workloads.
+3
Applicable to:
DevOps
Identity
Migration
48 out of 60
Microsoft 365 Managed Cloud Virtual Machine ServiceT-Systems International With the “Microsoft 365 Cloud Virtual Machine Service – Azure Virtual Desktop” product, Telekom provides operational and configuration services
+3
Applicable to:
Identity
Networking
Security
49 out of 60
Azure Security 6-Wk ImplementationAlfa Connections Pte LtdAzure Security protect Azure and your entire multi-cloud environment with built-in security, powered by AI. We focus on 2 main components: Microsoft Sentinel and Microsoft Defender for Cloud.
+2
Applicable to:
Identity
Security
50 out of 60
Entra Assessment: - 3 Wk AssessmentiC Consult GmbHThis offer is perfect for customers looking to streamline their Identity and Access Management/MFA solutions, aiming to achieve a best-of-breed approach for Azure infrastructure and Entra principles.
+3
Applicable to:
Identity
Migration
Security
51 out of 60
ReportGen: 5-Hrs ImplementationSystems LtdThis offer will help you to get emails shift summary automatically
+3
Applicable to:
Identity
Networking
Security
52 out of 60
Azure Network Architecture ReviewmnemonicAccelerate your cloud journey and improve network security with mnemonic’s Azure Networking Architecture Review, designed to help you adopt and optimise Microsoft Azure’s networking services.
+3
Applicable to:
Identity
Networking
Security
53 out of 60
Strengthen your Security with AI: Copilot for Security PoCPatriot Consulting Technology Group LLCReadiness Check as we review your existing Defender XDR, Entra ID, Purview & Intune environment
+3
Applicable to:
AI & Machine Learning
Identity
Security
54 out of 60
Multi Cloud Security Briefing: Secure Multi & Hybrid Cloud EnvironmentsApex Systems LLCThis one-hour session is tailored for IT and security leaders looking to bolster their Azure Cloud security posture, mitigate risks, and align with best practices in governance and compliance.
+2
Applicable to:
Identity
Security
55 out of 60
Kanerika Foundation Pack on Microsoft Purview: ImplementationKanerikaKanerika’s Foundation Pack is designed to help organizations kickstart their Data Governance and Compliance implementation effectively
+3
Applicable to:
Big Data
Identity
Security
56 out of 60
Azure Identity Security ImplementationBaufestIn a context of increasing threats of identity theft and excessive privilege exploitation, our team of specialists works alongside our clients to implement secure identity management in Azure.
+2
Applicable to:
Identity
Security
57 out of 60
LTIMindtree Security Identity Assessment As A ServiceLTIMindtree LimitedThis LTIMindtree offering provides the detailed overview of assessment activities and outcomes tailored for Identity services
+2
Applicable to:
Identity
Security
58 out of 60
Azure Threat Detection & Response ImplementationBaufestWith tools such as Microsoft Sentinel, Web Application Firewall (WAF), Microsoft Defender and Threat Detection, their critical assets are protected through proactive monitoring and response
+2
Applicable to:
Identity
Security
59 out of 60
Managed XDR Defense for Commercial, GCC, GCCHRSM Product Sales LLCDefend your organization with managed threat detection and response services, emphasizing 24x7 security, automation, and integrated threat intelligence
+3
Applicable to:
Data Platform
Identity
Security
60 out of 60