FiltersClear all
Professional Services results
Showing results in professional services.
NIS2 Rapid Readiness Check for AzureFuture Processing S.A.Free, one-day Azure security assessment for NIS2 compliance. Identify IAM, storage, and network risks with expert recommendations from Future Processing cybersecurity specialists.
+3
Applicable to:
App Modernization
Disaster Recovery
Security
1 out of 60
Active Insights AssessmentBDOMigrate and modernize your estate with an assessment of ongoing support operations as your Cloud Solution Provider.
+2
Applicable to:
Identity
Security
2 out of 60
AI Ignition - (not MarketPlace transactable)OBT Live AI Ignition - Rapidly deploy secure and scalable AI solutions with measurable business impact in weeks
+3
Applicable to:
Analytics
AI & Machine Learning
Security
3 out of 60
Redapt Modern SecOps Proof of ValueRedapt, Inc. Modernize Your Security Operations with Expert Guidance
+3
Applicable to:
Backup
Big Data
Security
4 out of 60
Birlasoft AI Driven Platform for SecurityBIRLASOFT LIMITEDiSight is a SaaS-based AI-Driven Platform for optimizing costs & enhancing productivity.
+3
Applicable to:
Disaster Recovery
Identity
Security
5 out of 60
Cloud Foundations: Well-Architected Framework ReviewApex Systems LLCOur Microsoft-certified Cloud SMEs conduct a Well-Architected Framework Review that identifies risks, optimizes costs, and empowers your cloud journey
+3
Applicable to:
App Modernization
Migration
Security
6 out of 60
TSG Cloud CareTechnology Service Group LtdUK managed cloud services that scale with your ambitions.
+3
Applicable to:
Data Platform
Identity
Security
7 out of 60
LBA KubeXpress - Fast track AKS DeploymentLotus Beta AnalyticsLBA KubeXpress rapidly deploys secure, production-ready AKS clusters—accelerating your journey to containerized workloads on Azure.
+3
Applicable to:
App Modernization
DevOps
Security
8 out of 60
Unlocking Compliance Excellence with Microsoft PurviewiLink Systems, Inc.Streamline compliance & data security with iLink’s Microsoft Purview services — implementation, policy enforcement, reporting and tailored ongoing support
+1
Applicable to:
Security
9 out of 60
Transform Your Enterprise with AI-Driven Managed ServicesiLink Systems, Inc.Get peak performance from your cloud environment with iLink’s AI-powered Managed Services—24/7 monitoring, automated issue resolution, and expert support for scalable IT operations.
+2
Applicable to:
Security
Storage
10 out of 60
Comprehensive IT Security Assessment : Safeguarding Your Digital AssetsiLink Systems, Inc.Strengthen your organization's security posture with iLink Digital’s Security Assessment, uncover vulnerabilities, reduce risks, and build resilience across your IT environment.
+2
Applicable to:
Identity
Security
11 out of 60
IBM Technology Expert Labs ADVISE Auatomation Hashicorp non-SaaS and SaaS Offerings CONTACT MEIBM SoftwareBM Technology Expert Labs ADVISE Hashicorp remotely delivered, no "hands on keyboard", comprehensive product-oriented professional services offerings for non-SaaS and SaaS products.
+2
Applicable to:
Disaster Recovery
Security
12 out of 60
NuHarbor’s Microsoft Security Exposure Management Quick StartNuharbor Security Inc.Rapidly deploy Microsoft Security Exposure Management to reduce risks and improve posture.
+1
Applicable to:
Security
13 out of 60
Cloud4C Advanced Network Security and AccessCloud4C Services Pte LtdCloud4C’s Advanced Network Security and Access protects cloud perimeters with Azure Firewall, WAF, DDoS, Front Door, Bastion, and Zero Trust controls for secure, resilient, and compliant connectivity.
+3
Applicable to:
Identity
Networking
Security
14 out of 60
Cloud4C Microsoft Sentinel Enterprise DeploymentCloud4C Services Pte LtdCloud4C’s Microsoft Sentinel Enterprise Deployment accelerates SIEM adoption with structured rollout, customization, training, and optimization for enterprise-scale threat detection and response
+3
Applicable to:
Analytics
Migration
Security
15 out of 60
Cloud4C External Attack Surface Assessment (EASM + MDTI)Cloud4C Services Pte LtdCloud4C’s External Attack Surface Assessment uses Microsoft Defender EASM + MDTI to uncover shadow IT, misconfigurations, CVEs, and risks, delivering dashboards and remediation plans
+3
Applicable to:
Identity
Networking
Security
16 out of 60
Cloud4C Entra Governance & Compliance SuiteCloud4C Services Pte LtdCloud4C’s Entra Governance & Compliance Suite delivers identity governance, protection, and privileged access management with audit-ready workflows to strengthen compliance and reduce insider risks
+3
Applicable to:
Analytics
Identity
Security
17 out of 60
Cloud4C Zero Trust Readiness and StrategyCloud4C Services Pte LtdCloud4C’s Zero Trust Readiness and Strategy delivers maturity assessment, tailored architecture, and phased rollout planning with Microsoft Defender integrations for secure Zero Trust transformation
+3
Applicable to:
Identity
Networking
Security
18 out of 60
Cloud4C Security Posture AssessmentCloud4C Services Pte LtdCloud4C’s Security Posture Assessment delivers Zero Trust–aligned advisory with Secure Score reviews, Defender telemetry, workshops, and board-ready reporting to strengthen enterprise security.
+3
Applicable to:
Identity
Networking
Security
19 out of 60
Cloud4C OT & IoT Security AssessmentCloud4C Services Pte LtdThis assessment leverages Microsoft Defender for IoT to map assets, model threats, and deliver vulnerability reports with a remediation roadmap for industrial and connected environments.
+3
Applicable to:
Identity
Networking
Security
20 out of 60
Cloud4C Microsoft Cloud Security – Enterprise SuiteCloud4C Services Pte LtdCloud4C’s Microsoft Cloud Security – Enterprise Suite delivers unified protection with CNAPP, DevSecOps, WAF/DDoS, data security, and confidential computing in one enterprise-grade Zero Trust package.
+3
Applicable to:
Identity
Networking
Security
21 out of 60
Cloud4C Developer & DevOps Security BundleCloud4C Services Pte LtdCloud4C’s Developer & DevOps Security Bundle secures applications, workloads, and CI/CD pipelines with Entra Workload ID, PIM, and Conditional Access, supported by developer-focused onboarding.
+3
Applicable to:
DevOps
Identity
Security
22 out of 60
Cloud4C Confidential & Identity-Aware ComputingCloud4C Services Pte LtdCloud4C’s Confidential & Identity-Aware Computing secures data-in-use with Azure Confidential VMs, Managed HSM, Key Vault, and encryption policies for privacy-preserving, compliance-ready workloads.
+3
Applicable to:
Identity
Networking
Security
23 out of 60
Cloud4C Microsoft Copilot for Security –Readiness AssessmentCloud4C Services Pte LtdCloud4C’s Microsoft Copilot for Security Readiness Assessment identifies gaps, delivers recommendations, and builds a roadmap for smooth adoption of AI-driven security operations
+3
Applicable to:
AI & Machine Learning
Identity
Security
24 out of 60
Cloud4C Awareness Training + Incident WorkshopCloud4C Services Pte LtdThis readiness workshop delivers security training, phishing simulations, and tabletop incident response exercises to build employee resilience and organizational preparedness
+3
Applicable to:
Identity
Networking
Security
25 out of 60
Cloud4C Azure Identity Foundation AcceleratorCloud4C Services Pte LtdCloud4C’s Entra Zero Trust Starter Pack delivers identity, conditional access, privileged identity management, and secure private access to help organizations launch their Zero Trust journey
+3
Applicable to:
Identity
Networking
Security
26 out of 60
Cloud4C Microsoft Purview Data Protection OfferingCloud4C Services Pte LtdCloud4C’s Microsoft Purview Data Protection unifies discovery, classification, and compliance with AI-driven governance to prevent data loss and risks across Microsoft 365, Azure, and hybrid estates
+3
Applicable to:
Analytics
Identity
Security
27 out of 60
Cloud4C Defender for Office 365 Deployment OfferingCloud4C Services Pte LtdCloud4C’s Defender for Office 365 Deployment secures email and collaboration tools with expert setup, testing, and best practices to reduce threats, boost trust, and ensure compliant communication
+3
Applicable to:
Analytics
Identity
Security
28 out of 60
Cloud4C Intune Endpoint Compliance & Security Suite OfferingCloud4C Services Pte LtdCloud4C’s Intune Endpoint Compliance & Security Suite secures devices, enforces compliance, and streamlines endpoint management with Microsoft Intune, Defender for Endpoint, and Entra ID integration.
+3
Applicable to:
Analytics
Identity
Security
29 out of 60
Cloud4C Continuous Optimization for Microsoft Security OfferCloud4C Services Pte LtdCloud4C Continuous Optimization for Microsoft Security delivers ongoing reviews, tuning, and advisory to maximize Defender and Sentinel performance, sustain compliance, and adapt to evolving threats.
+3
Applicable to:
Analytics
Networking
Security
30 out of 60
Microsoft 365 Defender Enterprise DeploymentCloud4C Services Pte LtdCloud4C’s Microsoft 365 Defender Enterprise Deployment delivers unified protection with expert rollout, configuration, testing, and advisory for secure, scalable Microsoft 365 environments.
+3
Applicable to:
Analytics
Identity
Security
31 out of 60
Security and Compliance: 3-Wk Proof of ConceptConterraThis fixed scope engagement helps you to quickly start your Security and Compliance operations based on Azure.
+2
Applicable to:
Identity
Security
32 out of 60
AKS Post-Deploy Operations: 10-Wk ImplementationAltorosMentoring and upskilling customer platform teams with essential Kubernetes skills
Reducing operational effort and filling knowledge gaps
+2
Applicable to:
Analytics
Security
33 out of 60
Azure Infrastructure as a Service: 3-Day POCSyCom TechnologiesAllow SyCom to provide a POC for migration of infrastructure to Azure. This engagement will include a WB session, cost analysis with ROI information and a POC for up to 2 systems.
+2
Applicable to:
Migration
Security
34 out of 60
CI/CD on Azure: 2-Wk ImplementationAltorosAutomate the deployment and updates of your cloud-native platform clusters. Push applications in a standardized and automated way.
+3
Applicable to:
App Modernization
DevOps
Security
35 out of 60
AKS Enablement: 4-wk ImplementationAltorosInstallation of Kubernetes and related technology, providing a “dial tone” of Kubernetes for customers
On-Demand Kubernetes services for your developers
+3
Applicable to:
App Modernization
Networking
Security
36 out of 60
Microsoft Azure API Management: 3-Day AssessmentTwoConnect - App Modernization & Azure Data SolutionsAzure API Management and Azure Networking give your apps and services global reach.
+3
Applicable to:
App Modernization
Migration
Security
37 out of 60
Azure- Azure Advanced Networking 2 Day POCSyCom TechnologiesWhiteboard and planning session to identify business objectives and craft a solution that will enhance Azure networking and security.
+3
Applicable to:
Migration
Networking
Security
38 out of 60
Azure Rights Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Rights Management in their production environment.
+3
Applicable to:
App Modernization
Identity
Security
39 out of 60
Azure Rights Management: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see, understand and test the Azure Rights Management on a demo tenant.
+3
Applicable to:
App Modernization
Identity
Security
40 out of 60
Azure Security Center: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to secure workloads in Azure Cloud.
+3
Applicable to:
Identity
Security
Storage
41 out of 60
Disaster Site Recovery: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Cloud for Business Continuity
+3
Applicable to:
Backup
Disaster Recovery
Security
42 out of 60
Azure Rights Management: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to deploy and manage Azure Rights Management.
+3
Applicable to:
App Modernization
Identity
Security
43 out of 60
Azure Security Center: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see Azure Security Center benefits and stay ahead of changing threat landscape across the cloud.
+3
Applicable to:
Identity
Security
Storage
44 out of 60
Azure Virtual Desktop: 4-Week PoCInfopulseInfopulse will help your enterprise to achieve strategic digital transformation goals with Azure Virtual configuration, migration, and deployment of your RDS/VDI infrastructure to Azure.
+3
Applicable to:
Disaster Recovery
Migration
Security
45 out of 60
Azure Virtual Desktop: 1 week Proof-of-ConceptChoice Solutions,L.L.CThe Azure Virtual Desktop Proof of Concept Jump Start is a versatile offering that utilizes Azure to enable companies to examine the role of virtual desktops to align with business objectives.
+3
Applicable to:
Identity
Migration
Security
46 out of 60
Digital Forensics Incident Response 2-wk WorkshopNTT LimitedDigital Forensics Incident Response (DFIR) services augment your ability to respond to security incidents. Your response has a direct bearing on costs, reputation, share price, and business success.
+3
Applicable to:
Backup
Disaster Recovery
Security
47 out of 60
Cybersecurity Advisory Baseline 1-wk WorkshopNTT LimitedCybersecurity Advisory Baseline is an asset-based consulting engagement that uses workshops and interviews to assess cybersecurity maturity across all areas of your people, processes and technologies.
+3
Applicable to:
Internet of Things
Migration
Security
48 out of 60
Secure Account Lifecycle Management: 8 Week ImpCatalyteSecure Account Lifecycle Management – Streamline and automate the account management lifecycle with Azure AD and Workday!
+2
Applicable to:
Identity
Security
49 out of 60
Birlasoft Blockchain Consulting & PoC: 10 weeksBIRLASOFT LIMITEDDiscover the right scenarios for blockchain adoption in your organization & get the proof of value. The offering spans identification and planning of blockchain use cases to a PoC
+3
Applicable to:
App Modernization
DevOps
Security
50 out of 60
Initial 2-Hr Assessment: Moving to the CloudKEYSTONE TECHNOLOGY CONSULTANTSThis is a 2 hour assessment for customers considering moving to the cloud. We will deliver a roadmap to using services such as Microsoft Azure, Azure Active Directory, Azure backup and others.
+3
Applicable to:
Backup
Migration
Security
51 out of 60
GlidePath™ for Cloud Governance: 2-4 Week WorkshopSirius Computer SolutionsGlidePath™ for Cloud Governance Standard Service delivers a 40 hour workshop and discovery plus a 2-4 weeks Baseline Governance Deployment in your Azure Environment.
+2
Applicable to:
Identity
Security
52 out of 60
GlidePath™ for Cloud Governance: 1-2 Week WorkshopSirius Computer SolutionsGlidePath™ for Cloud Governance Basic Service delivers a 24hour workshop and discovery plus a 1-2 weeks Baseline Governance Deployment in your Azure Environment.
+2
Applicable to:
Identity
Security
53 out of 60
GlidePath™ for Cloud Governance: (3)2hr WorkshopsSirius Computer SolutionsThe GlidePath™ for Cloud Governance Jumpstart Service delivers (3) two-hour workshops to help you embrace Access, Security, and Governance in your Azure Environment.
+2
Applicable to:
Identity
Security
54 out of 60
GlidePath™ for Cloud Governance 4-8 Week WorkshopSirius Computer SolutionsGlidePath™ for Cloud Governance Enterprise Service delivers a 40 hour workshop and discovery plus a 4-8 weeks Baseline Governance Deployment in your Azure Environment.
+2
Applicable to:
Identity
Security
55 out of 60
Azure App Services: 4-weeks Implementation ServiceComtechRIM India Private LimitedAzure App Service implementation package for organizations that are facing performance, scale or security issues with their applications
+3
Applicable to:
DevOps
Migration
Security
56 out of 60
Azure Access Management: 1-Wk ImpOptiv Security Inc.Optiv’s Microsoft Azure Access Management consulting services can ensure your organization’s Azure implementation meets your business and security requirements.
+3
Applicable to:
Data Platform
Identity
Security
57 out of 60
Cloud Security Assessment: Two Week AssessmentLogicalis, Inc.The Logicalis Cloud Security Assessment provides a rapid analysis of an existing Azure Cloud environment compared against best practices for security, performance, agility, scale and cost.
+3
Applicable to:
Identity
Networking
Security
58 out of 60
Citrix on Azure WVD: 1 Week Proof of ConceptSayersOver the duration of 1 week, Sayers experts will guide you through a PoC experience built around you to demonstrate the benefits of Azure WVD for your Citrix Virtual Apps and Desktops.
+3
Applicable to:
App Modernization
Disaster Recovery
Security
59 out of 60
Azure Design & Deployment: 3 Week ImplementationLogicalis, Inc.Logicalis PRCP Design & Deployment services for Azure provides the best practice foundations to deploy Azure rapidly with the guardrails that secure the environment for your business workloads.
+3
Applicable to:
Disaster Recovery
Migration
Security
60 out of 60