FiltrosBorrar todo
Professional Services resultados
Mostrando  resultados en professional services
Cloud Security Approach: 2-months AssessmentPyxisThrough the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
+3
Applicable to: Analytics
Analytics Identity
Identity Security
Security
1 out of 41
Cloud Security Score Improvement: 6-months ImplementationPyxisEvolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
+3
Applicable to: Analytics
Analytics Identity
Identity Security
Security
2 out of 41
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to: Analytics
Analytics Identity
Identity Security
Security
3 out of 41
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to: Analytics
Analytics Identity
Identity Security
Security
4 out of 41
Cloud Security Compliance: 4-months AssessmentPyxisThe CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
+3
Applicable to: Analytics
Analytics Identity
Identity Security
Security
5 out of 41
Cloud Security Services: 12-months ImplementationPyxisWe audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
+3
Applicable to: Analytics
Analytics Identity
Identity Security
Security
6 out of 41
Next Generation SOC: 4Wk ImplementationCOEMServicios profesionales de seguridad para proteger la Infraestructura, redes   y aplicaciones, fomentando el consumo de Azure a través de los diferentes conectores y la retención de la información.
+3
Applicable to: Identity
Identity Networking
Networking Security
Security
7 out of 41
skillup_consulting_openedx_v1Flexible Road LLCOpen edX Learning Management System with Azure.
+3
Applicable to: Backup
Backup Identity
Identity Storage
Storage
8 out of 41
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to: Identity
Identity Security
Security
9 out of 41
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to: App Modernization
App Modernization Identity
Identity
10 out of 41
Assesment Azure Base4Base4 Security Chile SPAThe Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
+3
Applicable to: Analytics
Analytics Identity
Identity Security
Security
11 out of 41
Red Canary Microsoft Sentinel WorkshopRed CanaryGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
+2
Applicable to: Identity
Identity Security
Security
12 out of 41
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to: Identity
Identity Migration
Migration Security
Security
13 out of 41
Sentinel Ready 24x7readymindCombine la experiencia de nuestros profesionales en ciberseguridad con la potencia de Microsoft Sentinel, una plataforma líder en la gestión de información y eventos de seguridad.
+2
Applicable to: Identity
Identity Security
Security
14 out of 41
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to: App Modernization
App Modernization Identity
Identity Storage
Storage
15 out of 41
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to: DevOps
DevOps Identity
Identity Security
Security
16 out of 41
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to: Identity
Identity Networking
Networking Security
Security
17 out of 41
Microsoft Entra: Tu Aliado en SeguridadSuri Services SCImpulsa la seguridad y gestión de tu organización con nuestro programa de implementación de Microsoft Entra.
+2
Applicable to: Identity
Identity Security
Security
18 out of 41
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to: Identity
Identity Security
Security
19 out of 41
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to: Identity
Identity Security
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to: Identity
Identity Security
Security
21 out of 41
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITEDOverwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
+2
Applicable to: Identity
Identity Security
Security
22 out of 41
ManageOps: MultiCloud Infrastructure & Operations SolutionGO TO CLOUD SASOptimice y gestione su infraestructura en la nube de forma estratégica y segura con los Cloud Managed Services de GoToCloud, impulsando el crecimiento y reduciendo costos operativos.
+3
Applicable to: Backup
Backup DevOps
DevOps Identity
Identity
23 out of 41
Cloud Architecture Migration Service上海诺未网络科技有限公司NovaTech offers a one-stop cloud migration and modernization solution for enterprises, helping them reduce costs, improve efficiency, enhance secur
+3
Applicable to: Identity
Identity Migration
Migration Security
Security
24 out of 41
Azure Rights Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Rights Management in their production environment.
+3
Applicable to: App Modernization
App Modernization Identity
Identity Security
Security
25 out of 41
Azure Identity Management: 4 Weeks ImplementationCommunication Square LLC4 week Implementation is designed to help customers fully utilize Azure Identity and Access Management in their existing infrastructure and training.
+3
Applicable to: Data Platform
Data Platform Identity
Identity Storage
Storage
26 out of 41
Azure Identity Management: 2 Week Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see and utilize Azure Identity and Access Management in demo environment.
+2
Applicable to: Identity
Identity Security
Security
27 out of 41
Endpoint Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Device and Application Management solution and train their IT team.
+2
Applicable to: Identity
Identity Security
Security
28 out of 41
Remote Learning Solution: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to re-imagine how your institution approaches secure communication, compliance to industry defined standards and access to data is secure on Microsoft Teams.
+3
Applicable to: Identity
Identity Security
Security Storage
Storage
29 out of 41
Remote Learning Solution: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Teams based Remote Learning Solution in their existing infrastructure and trainings.
+3
Applicable to: Identity
Identity Security
Security Storage
Storage
30 out of 41
Azure Virtual Desktop - 5-week ImplementationSpektra Systems LLCSpektra Systems offers premium consulting & implementation services for Microsoft Azure Virtual Desktop, We provide quality AVD solution with minimal cost, best in class security & productivity.
+3
Applicable to: Identity
Identity Migration
Migration Storage
Storage
31 out of 41
Windows Virtual Desktop: 1-Day AssessmentDigiTechWindows Virtual Desktop Assessment includes comprehensive pre-implementation assessment for WVD requirements and your business needs
+3
Applicable to: Identity
Identity Migration
Migration Storage
Storage
32 out of 41
Azure Virtual Desktop - 2 Wk - Proof of ConceptSenit Consulting S.A.S.Prueba de concepto para Escritorio Virtual de Windows, sobre plataforma Azure, durante dos semanas.
+3
Applicable to: Disaster Recovery
Disaster Recovery Identity
Identity Security
Security
33 out of 41
Web Applications Modernization 1-day AssessmentSela Group (HQ)Web Application Modernization Consultancy is a professional consultancy service for cloud transition without disturbing business continuity.
+3
Applicable to: App Modernization
App Modernization DevOps
DevOps Identity
Identity
34 out of 41
Windows Virtual Desktop: 4-Weeks PoCGO TO CLOUD SASThe Windows Virtual Desktop proof of concept is focused on helping organizations publish their applications and desktops to collaborators in an efficient, fast and SECURE way
+3
Applicable to: App Modernization
App Modernization Identity
Identity Migration
Migration
35 out of 41
Azure Cloud Adoption 4 - Week AssessmentAKAVEIL TECHNOLOGIES INCStrategic Assessment to Migration & Operation
+3
Applicable to: Identity
Identity Migration
Migration Security
Security
36 out of 41
Azure Secure Remote Worker : 3-Wk ImplementationNBConsult Holdings (PTY) LtdWindows Virtual Desktop delivers virtual desktops and apps seamlessly from Azure that can be accessed anywhere anytime and from any device.
+3
Applicable to: Identity
Identity Networking
Networking Security
Security
37 out of 41
cubesys AVD & Windows 365 Managed ServicesCubesys Pty Ltd Australia's leading AVD & Windows 365 specialists now offer a unique managed service for your Cloud-based VDI.  Built specifically to work alongside your existing IT team.
+3
Applicable to: Identity
Identity Migration
Migration Security
Security
38 out of 41
Migración a Azure: Implementación en 15 díasNebulanMigración de los 10 Workload principales como la primera ola para desarrollar un enfoque iterativo de adopción de la nube
+3
Applicable to: Identity
Identity Migration
Migration Security
Security
39 out of 41
AVD/Windows 365 Plan for Success: 3-d AssessmentCubesys Pty Ltd Understand what you need to successfully deploy Azure Virtual Desktop (AVD) and Windows 365. In our unique assessment we will provide budget guidance, evaluate your readiness and build a tailored plan
+3
Applicable to: Identity
Identity Migration
Migration Security
Security
40 out of 41
AVD & Windows 365: 2-Weeks ImplementationCubesys Pty Ltd Work with Australia's leading AVD & Windows 365 partner to implement your AVD & Windows 365 foundations. Whether you're replacing RDS or Citrix, or starting out on your VDI journey
+3
Applicable to: Identity
Identity Migration
Migration Security
Security
41 out of 41