FiltersClear all
Professional Services results
Showing results in professional services.
Entra ID Well-Architected reviewNordcloud an IBM companyReview your current Entra ID environment against Nordcloud and Microsoft best practices.
+2
Applicable to:
Identity
Security
1 out of 23
DXC Defender for Endpoint - ImplementationDXCDXC Managed Endpoint Threat Detection and Response (METDR) hunts for indicators of compromise (IOCs) across organizations' endpoints.
+2
Applicable to:
Identity
Security
2 out of 23
Cloud Security Assessment: 4-6 weeks engagementmnemonicExperience a comprehensive security assessment with mnemonic's full-spectrum cloud security testing, designed to uncover vulnerabilities across your entire cloud footprint.
+3
Applicable to:
Identity
Networking
Security
3 out of 23
Accenture 5G and Intelligent Edge ServicesAccentureAccenture 5G and Intelligent Edge Services
+3
Applicable to:
Identity
Internet of Things
Networking
4 out of 23
Accenture Security ServicesAccentureAccenture Security Services
+3
Applicable to:
Disaster Recovery
Identity
Security
5 out of 23
Azure Well Architected Review: 2 hours BriefingOrange Business - Digital ServicesThis Azure Well Architected briefing will help you get started on maximizing your potential in Azure by assessing against best practices.
+3
Applicable to:
App Modernization
Identity
Security
6 out of 23
Multi-Access Identity Platform 3-month Imp.PredicaManage user access for employees, partners, and customers with a single authentication platform
+3
Applicable to:
Backup
Identity
Security
7 out of 23
Secure External Identities: AD B2C 1-Hr BriefingCondatis Group LimitedCondatis will help you understand the benefits of Azure AD B2C, how B2C helps connect you with customers, citizens and other external identities to build trusted digital relationships.
+1
Applicable to:
Identity
8 out of 23
Azure Security Assessment - 1 month assessmentSela Group (HQ)Improve your Azure security posture by reviewing and assessing your Azure operation. Receive top-notch action plan for improvements
+2
Applicable to:
Identity
Security
9 out of 23
Cloud Exponence:4Week ImplementationTCS - Cloud ExponenceQuick onboarding of Azure cloud operations through Cloud Exponence platform
+3
Applicable to:
DevOps
Identity
Networking
10 out of 23
ACE Enterprise Foundation - 12Wk ImplementationDevoteam Cloudify ASThe ACE Enterprise Foundation is an accelerator for organizations that wish to deploy a Azure Foundation fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework in weeks
+2
Applicable to:
Identity
Networking
11 out of 23
IAM Student Passport: 2-Hr BriefingCondatis Group LimitedOur Student Passport solution leverages decentralized identity technologies to offer education providers optimised student enrolment and movement.
+2
Applicable to:
Identity
Security
12 out of 23
Keep Cloud Under Security - 4 weeks implementationCELLENZAAudit et définition d'un framework de sécurité adaptées au contexte client.
+3
Applicable to:
App Modernization
Identity
Security
13 out of 23
Infosys Cloud Security Services: 9 Week AssessmentInfosys LimitedProvide security and maturity assessment, secure architecture and design, implementation of security controls, monitoring, management, and operations of Azure environment.
+3
Applicable to:
Data Platform
Identity
Security
14 out of 23
Azure Governance: 4-Week AssessmentSoftServe Inc.Get recommendations outlining gaps and areas of improvement based on Cloud Adoption Framework (CAF) Governance best practices.
+3
Applicable to:
Identity
Networking
Security
15 out of 23
Cloud Governance: 8-week AssessmentGofore OyjGofore is an established and diverse IT consultancy with top experts in creating cloud governance models for the Azure cloud platform. We'll transform your business using modern technology solutions.
+3
Applicable to:
App Modernization
DevOps
Identity
16 out of 23
Azure Sentinel Quickstart: 1 Day ImplementationInsight Technology SolutionsInsight's Azure Sentinel Quickstart provides the customer with a configured Azure Sentinel platform on which they can perform their own security analytics function.
+2
Applicable to:
Identity
Security
17 out of 23
Microsoft Security Identity and Compliance : 2-Hrs BriefingTCS - SecurityTCS Managed and Integrated Services for Azure and Microsoft 365 Security, Compliance and Identity products
+3
Applicable to:
Identity
Networking
Security
18 out of 23
IBM Fraud and Abuse Management System on AzureIBM-Alliance-GBS-DTT-Microsoft Partner-USA-NY-Armonk-6418595Our solution is deployed for several states, federal clients, and private companies, successfully detecting income tax fraud, benefits fraud, healthcare fraud, internal fraud and travel & expense frau
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
19 out of 23
Identity and Access Management: 4-Wk ImplementationAlpha Data LLCImplement Identity and Access Management packages along with Single Sign-on capabilities for varying levels of users through Azure
+2
Applicable to:
Identity
Security
20 out of 23
Securing Identities Workshop: 3 DaysInsight Technology SolutionsThe Securing Identities Workshop helps Microsoft customers realize the full value of their Microsoft services investment.
+2
Applicable to:
Identity
Security
21 out of 23
Cloud Security: 2-Wk AssessmentZitecThis 2-week security assessment will provide companies with detailed documentation on vulnerabilities and remediation plan for cloud & hybrid infrastructures.
+3
Applicable to:
DevOps
Identity
Security
22 out of 23
Efficient cloud journey with Azure: 3 hours workshopBouvet Norge ASLet our team of Azure-experts help your enterprise launch a successful Azure cloud initiative so you can quickly realize the benefits and build new digital products and services in the Azure Cloud.
+3
Applicable to:
Identity
Migration
Security
23 out of 23