FiltersClear all
Professional Services results
Showing results in professional services.
Microsoft & Multi-Cloud Security Penetration Testing: 5-Day AssessmentBDO LLPCREST certified Ethical Hackers from BDO perform penetration tests on your Microsoft and Multi-Cloud environment and test the setup of Microsoft Azure AD, Defender, Sentinel and Purview.
+3
Applicable to:
Identity
Security
Storage
1 out of 60
SOC de Soluções Microsoft Azure e Microsoft 365Redbelt SecurityServiços de gerenciamento, operação e resposta a incidentes focado em soluções e ambientes Microsoft.
+3
Applicable to:
Identity
Networking
Security
2 out of 60
Azure Virtual Desktop Assessment: 2 Week AssessmentBig Green IT - DevAzure Virtual Desktop Assessment begins with a comprehensive assessment, during which our team evaluates the existing environment & provides recommendations for performance, scalability & resilience.
+3
Applicable to:
Identity
Networking
Security
3 out of 60
SOC Compliance readiness check: 1-Month Professional ServiceIT Partner LLCAssess your organization's readiness for SOC compliance, helping identify and address potential control and policy issues to prepare for an official SOC audit effectively.
+2
Applicable to:
Identity
Security
4 out of 60
Azure Security Assessment: 2 Week AssessmentBig Green IT - DevEvery Defender project starts with a thorough assessment where our team evaluates the current setup. Based on this, we offer suggestions to enhance security, performance, and scalability.
+3
Applicable to:
Identity
Security
Storage
5 out of 60
Palo Alto Firewall Deployment: 6-Week ImplementationRSM Product Sales LLCEmpower your network's security and safeguard your digital landscape with the Palo Alto firewall solution deployed by RSM.
+3
Applicable to:
Identity
Networking
Security
6 out of 60
Azure MFA Quick Start: 2-Week ImplementationAll Covered, a division of Konica MinoltaA 2-week consulting implementation that will enhance your organization's identity security capabilities through Azure Multi-Factor Authentication (MFA)
+2
Applicable to:
Identity
Security
7 out of 60
Okta to Microsoft Entra ID Migration: 3-Wk ImplementationWithum DigitalThis Okta to Microsoft Entra ID Migration Solution Will Streamline Your Identity Management for Enhanced Security and Cost Reduction
+2
Applicable to:
Identity
Security
8 out of 60
Eviden's Application Strategy WorkshopEviden International France - SASEviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
+3
Applicable to:
App Modernization
Data Platform
Identity
9 out of 60
Security Warrior: Managed ServiceTechConnectOur Security Warrior, will give you the visibility and remediation into your Azure security posture to manage the risk through an affordable single pane of glass solution.
+3
Applicable to:
DevOps
Identity
Security
10 out of 60
Sentinel Accelerator 4-Wk | Implementation/POCBulletproof Solutions Inc.Accelerate Sentinel Deployment for clients and Maximize Utilization
+2
Applicable to:
Identity
Security
11 out of 60
Azure Security Assessment (3 Weeks)Bulletproof Solutions Inc.The offer provides a comprehensive report of security gaps and recommendations for an Azure Environment.
+3
Applicable to:
Identity
Security
Storage
12 out of 60
Azure Well Architected Framework (AWAF) AssessmentNOVENTIQOptimize Azure efficiency and security with our Well-Architected Framework Assessment. Uncover challenges, enhance performance, and fortify your infrastructure for success.
+3
Applicable to:
Identity
Security
Storage
13 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
14 out of 60
Windows Autopilot - Initial Setup: 3-Wk Initial Professional ServiceIT Partner LLCImplement Windows Autopilot for seamless device deployment, enabling automated, image-free Windows deployment to PCs worldwide, requiring minimal infrastructure.
+3
Applicable to:
Identity
Migration
Security
15 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
+2
Applicable to:
Identity
Security
16 out of 60
Virtual Desktop Workshop: Azure & Windows 365 PC - 2 hour WorkshopB&R Business SolutionsWhich is right for my business case Azure Virtual Desktop or Windows 365 PC? The purpose of this workshop is to provide the information you need to make a well informed & confident decision.
+3
Applicable to:
Identity
Networking
Security
17 out of 60
Zero Trust SecuritySentinel Technologies Inc.76% of organizations have experienced a ransomware attack at some point in the last two years - State of the Phish Report 2023
+3
Applicable to:
Disaster Recovery
Identity
Security
18 out of 60
Telehealth and Telemedicine Maturity WorkshopSentinel Technologies Inc.Sentinel's Telehealth & Telemedicine Maturity Workshop analyzes the current status of your distributed care environment and helps you establish a clear strategy for the future.
+2
Applicable to:
Identity
Security
19 out of 60
Workshop Threat Protection con Microsoft Sentinel: Blindaje Avanzado contra Amenazas Cibernéticas - 4Wk WorkShopENCAMINA S.L.Una inmersión profunda en la estrategia de seguridad, adaptada a tu organización
+3
Applicable to:
Identity
Networking
Security
20 out of 60
External IAM 5 day assessmentCondatis Group LimitedCondatis is offering an external Identity and Access Management (IAM) assessment focusing on how your organisation secures and manages external identities in your business context.
+2
Applicable to:
Identity
Security
21 out of 60
Lightstream Comprehensive Azure Core Security AssessmentLightstreamLightstream will provide a comprehensive understanding of your Azure security landscape with actionable recommendations.
+3
Applicable to:
Identity
Networking
Security
22 out of 60
KloudIdentity: Application Onboarding to Entra made simple with our SCIM GatewayKloudyNet Technologies SDN BHDKloudIdentity is our proprietary SCIM Gateway to onboard LOB & Cloud applications (including non SCIM compliant), databases and other applications to Microsoft Entra for users and groups provisioning.
+2
Applicable to:
Identity
Security
23 out of 60
Threat Protection: 5-day EngagementBridewell Consulting LimitedMitigate cyber security risks within your Microsoft Azure environments by attending a 5 day workshop with Bridewell.
+3
Applicable to:
Identity
Networking
Security
24 out of 60
Defender For Cloud: 1-Wk Proof of ConceptBridewell Consulting LimitedSecure your organisation's Azure Cloud workloads by leveraging the expertise of a leading cyber security services provider to review and optimise your implementation of Defender for Cloud.
+3
Applicable to:
Identity
Networking
Security
25 out of 60
Microsoft Entra Verified ID: An Informative Briefing on Key Features and Real-World ApplicationsFormula5Formula5's briefing on Microsoft Entra Verified ID provides organizations with a clear understanding of the fundamental concepts and potential behind Verifiable Credentials.
+3
Applicable to:
App Modernization
Identity
Security
26 out of 60
Microsoft Entra Products OverviewFormula5Formula5's briefing on Microsoft Entra provides clear overview of available products under Microsoft Entra umbrella.
+3
Applicable to:
App Modernization
Identity
Security
27 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoorThis assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
+3
Applicable to:
Identity
Networking
Security
28 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoormyCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
+3
Applicable to:
Identity
Networking
Security
29 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SASUtilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
+2
Applicable to:
Identity
Security
30 out of 60
Eviden's Data Security CSI Engagement 4 Week AssessmentEviden International France - SASElevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
+3
Applicable to:
Analytics
Identity
Security
31 out of 60
LogicalisOne: 12-month supportLogicalis, Inc.Logicalis One offers on demand Professional Services to support Azure environments by providing certified consultants to define, architect and/or integrate new or existing Azure capabilities.
+3
Applicable to:
Identity
Networking
Security
32 out of 60
Azure AssureManaged SolutionHarness the power of the cloud, enabling you to concentrate on optimizing your data while entrusting Managed Solution with the responsibility of managing and securing your infrastructure.
+2
Applicable to:
Identity
Security
33 out of 60
Eviden's Azure Cloud Consulting Services – Landing ZonesEviden International France - SASA consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
+2
Applicable to:
Identity
Security
34 out of 60
24x7 SOC Service by IntelequiaIntelequia Technologies24x7 monitoring, protection and automated response to cyberthreats
+3
Applicable to:
Analytics
Identity
Security
35 out of 60
Lightstream Complimentary Azure Core Security AssessmentLightstreamLightstream will provide a complimentary comprehensive understanding of your Azure security landscape with actionable recommendations.
+3
Applicable to:
Identity
Networking
Security
36 out of 60
Keycloak-3 weeks ImplementationApexonKeycloak is an open-source identity and access management solution. Apexon repackages open source Keycloak and provides one-click deployment with automation and customization.
+3
Applicable to:
Analytics
DevOps
Identity
37 out of 60
HCLTech's Cybersecurity ServicesHCL Technologies Limited.HCLTech is a leading global technology company that helps enterprises reimagine their businesses for the digital age. Secure your cloud journey with HCLTech's comprehensive portfolio of cybersecurity
+3
Applicable to:
Backup
Identity
Security
38 out of 60
Apexon Lab-as-a-Service (LaaS) – 4 Weeks - Proof of ConceptApexonUnlock the power of rapid innovation with Apexon LaaS, leveraging Azure AI Services, including Copilot, Azure Open AI, NLP, Vision, Speech, Search, Anomaly Detector and Document Processing.
+3
Applicable to:
DevOps
Identity
Internet of Things
39 out of 60
DevOps as a Service 6-month agreementIT ITSE S.A.S.Ofrecemos una solución integral para implementar y gestionar prácticas de DevOps en una organización de manera externalizada.
+3
Applicable to:
DevOps
Identity
Security
40 out of 60
Workshop for Azure Cost Optimization using FinOpsSii Sp. z o.o.Control your costs in the cloud with the FinOps methodology
+2
Applicable to:
DevOps
Identity
41 out of 60
Cognizant Cyber Threat Defense, powered by MicrosoftCognizantCognizant's Cyber Threat Defense offering provides a set of structured methodologies and tools to assess, migrate, modernize and manage your Security Operations Center (SOC).
+3
Applicable to:
AI & Machine Learning
Identity
Security
42 out of 60
Azure Security Assessment: Initial AuditArchitectnow, LLCEnsure that your Azure Resources are secure and setup properly! Our team can help with immediate ACTIONABLE recommendations and assistance!
+3
Applicable to:
Disaster Recovery
Identity
Security
43 out of 60
Azure Governance Workshop: 5-Day WorkshopeGroup Enabling TechnologiesLearn how to create, enforce, and audit Microsoft Azure Policies
+2
Applicable to:
Identity
Security
44 out of 60
PwC Cybersecurity and Risk CapabilitiesPricewaterhousecoopers LLPReimagine risk and unlock opportunities through a human-led, tech-powered approach.
+2
Applicable to:
Identity
Security
45 out of 60
Digital BackpackTelelink Business Services EADThe Digital Backpack is an expansive learning platform that supports various teaching models—remote, in-person, and hybrid.
+1
Applicable to:
Identity
46 out of 60
AI Assessment: Quality Improvement and Defect DetectionEduFin IT, Inc. d/b/a Brightpoint InfotechAI assessment for quality improvement and defect detection using AI. We assist in seamlessly integrating Azure services, this assessment identifies areas for improvement in your manufactring process
+3
Applicable to:
AI & Machine Learning
DevOps
Identity
47 out of 60
Azure Cloud 5-Week AssessmentVigilant TechnologiesWe offer an Azure Cloud Assessment to help your organization plan and prepare for a move to the Azure cloud, or scan and provide feedback on existing Azure deployments.
+3
Applicable to:
Identity
Networking
Security
48 out of 60
Formula5's Azure AD B2C 2-Wk AcceleratorFormula5Formula5's Azure B2C Accelerator helps organizations build secure and legally compliant identity platforms to secure access to applications and resources.
+3
Applicable to:
App Modernization
Identity
Security
49 out of 60
External Identities Hub Architecture 2-Week PoCFormula5Leverage our package of architecture design, initial scripts, and source code to boost of your modern CIAM platform development, using Microsoft Entra and Azure services.
+3
Applicable to:
DevOps
Identity
Security
50 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
51 out of 60
通天云云迁移方案北京通天云计算有限公司云咨询/云化评估/云规划设计/云迁移/云创新
+3
Applicable to:
Identity
Migration
Security
52 out of 60
Azure AD Identity Protection AssessmentAVASOFTOur Azure AD Identity Protection Assessment identifies vulnerabilities and strengthens security. Mitigate risks with advanced threat detection and tailored defense strategies.
+2
Applicable to:
Identity
Security
53 out of 60
Single Sign On (SSO) for Applications using Entra ID by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user access. Simplify authentication with SSO, reduce password fatigue, and enhance security and productivity.
+2
Applicable to:
Identity
Security
54 out of 60
AVASecure 360 - Entra ID Access Management Solutions by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user provisioning, access requests, and reviews. Enhance security, efficiency, and compliance effortlessly.
+2
Applicable to:
Identity
Security
55 out of 60
Microsoft Azure AD AuthenticationAVASOFTStruggling with user access management? Azure AD Authentication automates provisioning, access requests, and reviews, enhancing security, efficiency, and compliance.
+2
Applicable to:
Identity
Security
56 out of 60
Strengthen Your Azure Security - 3 days Comprehensive Risk AssessmentAVASOFTIdentify and address security gaps in Azure with our Risk Assessment. Gain insights, tailored recommendations, and best practices to strengthen your security and maintain compliance.
+2
Applicable to:
Identity
Security
57 out of 60
On-premises Active Directory Infra AssessmentAVASOFTOur On-Premises AD Infrastructure Assessment identifies vulnerabilities and compliance gaps. Strengthen security and ensure compliance with actionable insights and expert recommendations.
+2
Applicable to:
Identity
Security
58 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
59 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security