FiltersClear all
Professional Services results
Showing results in professional services.
Cloud Assessment: 2-wk assessment on effective, secure use of Azure & Microsoft 365IMS Solutions GroupAssess for efficient and secure deployment of Azure and Microsoft 365 with a focus on appropriate licenses, features, and resource usage - for small and medium businesses.
+2
Applicable to:
Identity
Security
1 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARSALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
+3
Applicable to:
App Modernization
Identity
Migration
2 out of 60
Security Level Up: 4-Wk ImplementationProServeITBuild your security baseline environment and level it up with the appropriate Microsoft cybersecurity technologies. Ensure your business continuity even after a cyberattack & protect your reputation.
+2
Applicable to:
Identity
Security
3 out of 60
Spyglass Cloud Security: 6-week AssessmentQuisitiveThe Spyglass Cloud Security Assessment is a complete evaluation of your organization’s cloud security posture centered around identity, data, devices, applications, and access.
+3
Applicable to:
Identity
Security
Storage
4 out of 60
Security Managed Services Consulting: 12-Month ImplementationProServeITEnhance your cybersecurity baseline & take it to a higher standard with appropriate Microsoft cybersecurity technologies. Proactive measures & regular audits will ensure business continuity.
+2
Applicable to:
Identity
Security
5 out of 60
Azure Security: 3-week AssessmentQuisitiveA Quisitive Azure Security Assessment offers actionable insight about your cloud security posture, with peace of mind for how your Azure deployment can be made more safe and secure.
+3
Applicable to:
App Modernization
Identity
Security
6 out of 60
Bulletproof 365 Enterprise: MXDR Service (Sentinel and Defender for Cloud)Bulletproof Solutions Inc.With the combination of SIEM+DfC, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
+2
Applicable to:
Identity
Security
7 out of 60
Microsoft Sentinel Quick Start: 6-week ImplementationQuisitiveGet ahead with the next generation solution for Security Information and Event Management (SIEM) and Security Orchestration and Automated Remediation (SOAR) with our Microsoft Sentinel Quick Start.
+2
Applicable to:
Identity
Security
8 out of 60
Onesec 7x24 Managed Security Operation ServicesSecure Nextgen SystemsTakes care of your organization using the full artificial intelligence and machine learning power of Microsoft Sentinel to detect potential threats that can cause a significant loss
+3
Applicable to:
Identity
Networking
Security
9 out of 60
Azure Data Modernization: 4-Hour WorkshopIvision, Inc.In this 4-hour workshop designed for data professionals, our data and BI experts will guide your team though a tailored, interactive exploration to put you on the path to data management success.
+3
Applicable to:
Analytics
Data Platform
Identity
10 out of 60
CloudPOS: 4-Week ImplementationMediasoft Data Systems LimitedThe all-in-one cloud-based point-of-sale solution. Boost efficiency, streamline operations, and enhance the customer experience with the user-friendly, secure, and fast software solutions.
+3
Applicable to:
Analytics
Archive
Identity
11 out of 60
8 wks - Implementacion de Sistemas de Pruebas de vida con reconocimiento facial para Onboarding de clientes o Deteccion de fraude54cuatro MexicoImplemente servicios cognitivos de Azure para evitar el fraude relacionado con la identificación de sus clientes
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
12 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTDDotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
+3
Applicable to:
App Modernization
Identity
Storage
13 out of 60
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITEDProvide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
+3
Applicable to:
Analytics
Data Platform
Identity
14 out of 60
Red Canary Microsoft Sentinel WorkshopRed CanaryGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
+2
Applicable to:
Identity
Security
15 out of 60
Azure Health CheckIvision, Inc.Azure Health Check
+3
Applicable to:
Backup
Identity
Networking
16 out of 60
Implementation of Cloud Endpoints using Microsoft IntuneConcurrency, Inc.Modernize endpoint management and security with Microsoft Intune
+2
Applicable to:
Identity
Security
17 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
18 out of 60
Security as a Service: 3-Wk ImplementationA3Cloud SolutionsImprove your security of your solutions and infrastructures in Azure Cloud.
+3
Applicable to:
Identity
Migration
Security
19 out of 60
Enhance and Enforce Security with Azure Conditional AccessCornerstone Information Technologies, LLCAre you confident that your Azure environment is secure? We have a solution.
+3
Applicable to:
App Modernization
Identity
Security
20 out of 60
Azure Security Essentials: 3-Wk ImplementationAgile ITOnboarding Azure for Security and Compliance (Essentials) seeks to reduce the mean time to detection by consolidating logging, analytics, detection, and response into a single cohesive solution
+3
Applicable to:
Identity
Networking
Security
21 out of 60
Mergers, Acquisitions, and Divestitures (MAD)Concurrency, Inc.Concurrency helps clients that are divesting, acquiring, or merging companies or divisions. Confidently navigate IT transitions with a proven, user-first approach.
+3
Applicable to:
Identity
Migration
Security
22 out of 60
Azure Virtual Desktop JumpstartSentinel Technologies Inc.Azure Virtual Desktop is a desktop and application virtualization service that runs in the
Azure cloud.
+2
Applicable to:
Identity
Migration
23 out of 60
Azure AD B2C for Healthcare: 2-Wk AcceleratorFormula5Formula5's Azure B2C Accelerator helps Healthcare organizations to build secure and HIPAA compliant identity platforms to secure access to applications and resources used by doctors and patients.
+3
Applicable to:
App Modernization
Identity
Security
24 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
25 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
26 out of 60
Microsoft Intune - Initial Setup for Windows devices: 2-Wk Consulting ServiceIT Partner LLCComprehensive support to customers in their journey of leveraging Microsoft Azure, particularly in getting started with or expanding their utilization of the platform.
+3
Applicable to:
Identity
Migration
Security
27 out of 60
Avertium Professional Security Services for Microsoft Azure 1 - 12 MonthsAvertium, LLCIdentify & remediate issues impacting the overall security posture of an organization’s environment & develop a roadmap for the ongoing evolution of security controls and optimization.
+3
Applicable to:
Identity
Migration
Security
28 out of 60
Cloud Security Workshop: 2 half-days workshopMallow OyWe'll check your Azure environment for security issues and suggest remedies for them
+3
Applicable to:
App Modernization
Identity
Security
29 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
30 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
31 out of 60
Modern workplace Active DirectorySii Sp. z o.o.Modern workplace Active Directory implementation, migration and support
+2
Applicable to:
Identity
Security
32 out of 60
Enterprise - Zero Trust Strategy & Journey MapJohn Keells Information Technology Pvt LtdOrganizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid & multi-cloud workplace, and ensures cyber security assurance.
+2
Applicable to:
Identity
Security
33 out of 60
Hybrid Infra Management Though Azure ArcJohn Keells Information Technology Pvt LtdAzure Arc brings a unified management platform to your data centers, Azure Cloud as well as other clouds and edge, no matter how complex your environments may look like.
+2
Applicable to:
Identity
Security
34 out of 60
AVD Cost Optimization ProgramTechPlus TalentAre you looking to maximize the value of your Azure Virtual Desktop (AVD) environment while minimizing costs? Look no further! Tech Plus Talent is thrilled to present our Azure AVD Cost Optimization P
+3
Applicable to:
Backup
Identity
Security
35 out of 60
AD Domain Consolidation for Migration to Microsoft Entra ID: 6 wk ImpOxford Computer Group LLCGet started on your journey towards zero trust by consolidating your organization’s Active Directories for better visibility, efficiency, and security.
+3
Applicable to:
Identity
Migration
Security
36 out of 60
Verifiable Credentials with Microsoft Entra Verified ID: full architecture design with initial deploymentFormula5Formula5's Microsoft Entra Verified ID Workshop & POC helps organizations to understand decentralized identity concepts and implement secure identity solutions using Verifiable Credentials.
+2
Applicable to:
Identity
Security
37 out of 60
Detection & Response Services (MXDR)Cloud LifeCloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
+3
Applicable to:
AI & Machine Learning
Identity
Security
38 out of 60
Azure Single Sign-On: 3-Day Azure Single Sign-On (SSO) with a third-party applicationIT Partner LLCSingle sign-on (SSO) means that users do not need to sign in to every , they log into Azure AD once, and these credentials are used for other applications such as Sales Force, Slack, Zendesk, etc.
+3
Applicable to:
App Modernization
Identity
Security
39 out of 60
FinOps Adoption ServicesSoftchoiceAttain financial control over your Azure environment to realize your investment in cloud workloads
+2
Applicable to:
Analytics
Identity
40 out of 60
Sentinel-as-a-ServiceCloud LifeCloud Life delivers an innovative cloud-based AI and ML-enhanced Sentinel-as-a-Service, empowering your team with managed SIEM/SOAR capabilities using optimum Microsoft MXDR Services
+3
Applicable to:
AI & Machine Learning
Identity
Security
41 out of 60
Azure Security: 3-Week AssessmentSpyglass MTG, LLCSpyglass’s 3-Week Azure Security Assessment captures your current security state and documents a plan to safeguard your entire organization.
+2
Applicable to:
Identity
Security
42 out of 60
Microsoft Copilot Readiness AssessmentGC Brokers Inc.Ensure organizational readiness for the release of Microsoft Co-Pilot. Ensure your organization is ready for the adoption of this groundbreaking new technology.
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
43 out of 60
Proactive Security: Cyber Threat Defense 2-Week POCHitachi SolutionsFeeling overwhelmed by complex security threats? Need to optimize your cybersecurity resources? Consider our 2-Week POC and transform your cybersecurity stance with powerful solutions from Microsoft.
+2
Applicable to:
Identity
Security
44 out of 60
Active Directory AssessmentAppWeb LLCDynapt offers a comprehensive evaluation of your Active Directory (AD) infrastructure for Azure Readiness with valuable insights and recommendations for a optimized and secured environment.
+2
Applicable to:
Identity
Security
45 out of 60
Microsoft Entra Verified ID: 6-week Proof of ConceptOxford Computer Group LLCOxford Computer Group's Microsoft Entra Verified ID Proof of Concept can help you discover the power and benefits of authentic verifiable credentials.
+2
Applicable to:
Identity
Security
46 out of 60
Brillio Open Banking SolutionBrillioA robust, scalable, and secure solution that is designed to address the ever-evolving regulatory landscape and empower financial institutions to stay ahead in this new era of banking.
+3
Applicable to:
Data Platform
Identity
Security
47 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
48 out of 60
ISO 27001 Readiness Assessment for Azure EnvironmentVisionet Systems Inc.Advance confidently towards ISO 27001 certification for your Azure environment with Visionet's readiness assessment. Get a detailed analysis of your infrastructure operations & security policies.
+3
Applicable to:
Backup
Identity
Security
49 out of 60
Secure Identities and Access - Azure Active Directory: 3-Week ImplementationRSM Product Sales LLCProtect your data and resources from unauthorized access or malicious attacks by securing identities and access with Azure Active Directory
+3
Applicable to:
Identity
Networking
Security
50 out of 60
Microsoft Entra ID Evaluation: 1-Week ProgramWindows Management Experts, Inc.With Entra ID Evaluation, gain insights into your authentication & access control systems. Strengthen data protection and achieve compliance effortlessly. Safeguard your valuable assets NOW!
+3
Applicable to:
Identity
Migration
Security
51 out of 60
Azure Virtual Desktop Secure Platform designed by CloudAstro - Revolutionize Your Workplace (4 Days - Workshop)CloudAstro GmbHEmbrace the future with AVD Secure Platform, where mobility meets cutting-edge security for all industries.
+3
Applicable to:
DevOps
Identity
Security
52 out of 60
Azure Security Assessment – by NIST 800-53Visionet Systems Inc.Harness Visionet's expertise to secure and optimize your Azure environment with our Security Assessment service grounded in NIST 800-53 Rev 4 best practices.
+3
Applicable to:
Identity
Networking
Security
53 out of 60
Rapid Cyberattack Assessment Workshop (Full - On-site)IT Partner LLCThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
+3
Applicable to:
Backup
Identity
Security
54 out of 60
Microsoft Intune setup: 4-Wk ImplementationExodus Integrity Services, Inc.Effortlessly implement Microsoft Intune: Seamless MDM, MAM, app deployment & security settings. Tailored setup for streamlined device management.
+3
Applicable to:
Identity
Networking
Security
55 out of 60
Best Practices For Your Azure Healthcare CloudMed Tech SolutionsMTS offers premier consulting services for your healthcare infrastructure needs. MTS offers a free consult to help refine and tailor your organization’s Azure cloud strategy to your specific needs.
+2
Applicable to:
Identity
Storage
56 out of 60
Microsoft Sentinel DeploymentBlazeClan Technologies Pvt. LtdBlazeclan offers Microsoft Sentinel deployment, integration, configuration and optimization in the customer's environment seamlessly.
+3
Applicable to:
Identity
Networking
Security
57 out of 60
Azure Well Architected Review - 5 Days AssessmentBlazeClan Technologies Pvt. LtdBlazeclan offers Azure Well Architected Review to help customers assess the environment for reliability, cost management, operational excellence, security and performance efficiency.
+3
Applicable to:
Identity
Migration
Networking
58 out of 60
Credential Manager: 5-Day Implementation SolutionCreospark Consulting Services IncThis solution harnesses the capabilities of Dataverse, Power Apps, Power Automate, and Azure Key Vault technologies to redefine how organizations protect sensitive user credentials and information.
+3
Applicable to:
Backup
Identity
Security
59 out of 60
User Profile Manager: 5-Day Implementation SolutionCreospark Consulting Services IncThis solution offers users a window into their access privileges, allowing them to effortlessly navigate their information and files.
+2
Applicable to:
Archive
Identity
60 out of 60