FiltridTühjenda kõik
Professional Services tulemust
Kuvatud on tulemust asukohas professional services.
Cloud Security Score Improvement: 6-months ImplementationPyxisEvolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
+3
Applicable to:
Analytics
Identity
Security
1 out of 60
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
2 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
3 out of 60
Cloud Security Services: 12-months ImplementationPyxisWe audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
+3
Applicable to:
Analytics
Identity
Security
4 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield LtdSpartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
+3
Applicable to:
Identity
Migration
Security
5 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.aiImplementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
+1
Applicable to:
Identity
6 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology HoldingOur offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
+3
Applicable to:
Identity
Security
Storage
7 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology HoldingGet a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
+3
Applicable to:
Identity
Security
Storage
8 out of 60
Azure Virtual Desktop: 2-Wk ImplementationPetabytz IncStart experiencing the best kind of virtualization with Azure Virtual Desktop in minutes to enable remote work. Provides employees the same experience they would have on a local desktop.
+3
Applicable to:
Identity
Migration
Security
9 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam FranceSecure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
+2
Applicable to:
Identity
Networking
10 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
11 out of 60
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to:
App Modernization
Identity
12 out of 60
Managed Services for Microsoft EntraDXCAdvisory and Managed Services for Microsoft Entra
+2
Applicable to:
Identity
Security
13 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARSALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
+3
Applicable to:
App Modernization
Identity
Migration
14 out of 60
Azure Virtual Desktop 1-Day AssessmentREDINGTON GULF FZE - HQAssess and Design Azure Virtual Desktop Solution to get Organization Up and Running with AVD
+3
Applicable to:
Identity
Migration
Security
15 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
16 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
17 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
18 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
19 out of 60
Modern workplace Active DirectorySii Sp. z o.o.Modern workplace Active Directory implementation, migration and support
+2
Applicable to:
Identity
Security
20 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
21 out of 60
Windows 365 Cloud PC - 4Wk DeploymentBespin Global MEA, an e& enterprise CompanyWindows 365: Elevate Your Workforce Experience with Azure Cloud PC
+3
Applicable to:
Identity
Networking
Security
22 out of 60
Eviden's Application Strategy WorkshopEviden International France - SASEviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
+3
Applicable to:
App Modernization
Data Platform
Identity
23 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
24 out of 60
External IAM 5 day assessmentCondatis Group LimitedCondatis is offering an external Identity and Access Management (IAM) assessment focusing on how your organisation secures and manages external identities in your business context.
+2
Applicable to:
Identity
Security
25 out of 60
KloudIdentity: Application Onboarding to Entra made simple with our SCIM GatewayKloudyNet Technologies SDN BHDKloudIdentity is our proprietary SCIM Gateway to onboard LOB & Cloud applications (including non SCIM compliant), databases and other applications to Microsoft Entra for users and groups provisioning.
+2
Applicable to:
Identity
Security
26 out of 60
ALIANDO Managed Extended Detection and Response (MXDR)myCloudDoorALIANDO Managed Extended Detection & Response service (MXDR) powered by Sentinel and Defender
+3
Applicable to:
Identity
Networking
Security
27 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoorThis assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
+3
Applicable to:
Identity
Networking
Security
28 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoormyCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
+3
Applicable to:
Identity
Networking
Security
29 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SASUtilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
+2
Applicable to:
Identity
Security
30 out of 60
Eviden's Data Security CSI Engagement 4 Week AssessmentEviden International France - SASElevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
+3
Applicable to:
Analytics
Identity
Security
31 out of 60
Eviden's Azure Cloud Consulting Services – Landing ZonesEviden International France - SASA consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
+2
Applicable to:
Identity
Security
32 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
33 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
35 out of 60
MIM Migration To Entra ID Assessment: 8-Wk AssessmentModern 42Microsoft Identity Manager Current state assessment and transition plan to Microsoft Entra ID
+2
Applicable to:
Identity
Security
36 out of 60
Modern Cloud Security: Expert Guidance for Microsoft Defender for CloudLiveRoute FZ-LLCOur consulting service offers customized security solutions, hands-on deployment assistance, and ongoing optimization to keep your cloud environment secure and compliant with industry standards.
+3
Applicable to:
Analytics
Identity
Security
37 out of 60
Well Architectured FrameWork Review by NessNess IsraelStrengthen Your Cloud Architecture with Ness Cloud. Get tailored recommendations for Operational Excellence, Security, Reliability, Performance Efficiency, Cost Optimization, and Sustainability.
+3
Applicable to:
DevOps
Identity
Security
38 out of 60
Cloud Security Assessment By NessNess IsraelEnhance Your Cloud Security with Ness Cloud. Our assessment uncovers vulnerabilities, misconfigurations, and weaknesses, offering customized recommendations to strengthen your cloud environment.
+3
Applicable to:
Identity
Migration
Security
39 out of 60
Landing Zone Setup by NessNess IsraelEstablish a Secure Foundation with Ness. Our Landing Zone Setup ensures a compliant, secure and scalable Azure environment for your workloads.
+3
Applicable to:
DevOps
Identity
Migration
40 out of 60
Front Door Implementation by NessNess IsraelOptimize your site and app performance and resilience. The Front Door Implementation by Ness Cloud ensures efficient and secure content delivery for your applications and reduced server loads.
+3
Applicable to:
DevOps
Identity
Security
41 out of 60
Azure Landing Zone Deployment ServiceLotus Beta AnalyticsThe "Azure Landing Zone Deployment Service" simplifies setting up secure, compliant Azure environments with pre-configured templates, ensuring a solid foundation for cloud operations and governance.
+2
Applicable to:
Identity
Security
42 out of 60
ReportGen: 5-Hrs ImplementationSystems LtdThis offer will help you to get emails shift summary automatically
+3
Applicable to:
Identity
Networking
Security
43 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITEDOverwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
+2
Applicable to:
Identity
Security
44 out of 60
Microsoft Entra Private Access - Proof of Concept (PoC)Onevinn ABMicrosoft Entra Private Access, is a cutting-edge Security Service Edge (SSE) solution designed to provide secure, seamless access to private applications and resourses.
+2
Applicable to:
Identity
Security
45 out of 60
Hybrid Setup for Azure VMware SolutionLiveRoute FZ-LLCLiveRoute team of consultants and architects will do the consulting and Implementation for Hybrid setup
+2
Applicable to:
Identity
Migration
46 out of 60
Microsoft Entra Verified ID: 3-8 Day WorkshopCondatis Group LimitedAn immersive 3-8 day workshop designed to provide a deep dive into Microsoft Entra Verified ID.
+1
Applicable to:
Identity
47 out of 60
Microsoft Entra Verified ID: POCCondatis Group LimitedCondatis is offering a Microsoft Entra Verified ID Proof of Concept demonstrating how your organisation can leverage digital identity credentials to streamline onboarding and secure access.
+1
Applicable to:
Identity
48 out of 60
Microsoft Entra ID WorkshopCondatis Group LimitedAn immersive 3 - 8 day workshop designed to provide a deep dive into Microsoft Entra ID.
+1
Applicable to:
Identity
49 out of 60
Microsoft Entra ID Governance: 3 - 8 Day WorkshopCondatis Group LimitedAn immersive 3-8 day workshop designed to provide a deep dive into Microsoft Entra ID Governance.
+1
Applicable to:
Identity
50 out of 60
Microsoft Entra ID: POCCondatis Group LimitedCondatis is offering a Microsoft Entra ID Proof of Concept demonstrating how your organisation can strengthen security and unify identity management.
+1
Applicable to:
Identity
51 out of 60
Microsoft Entra ID Governance: POCCondatis Group LimitedCondatis is offering a Microsoft Entra ID Governance Proof of Concept to demonstrate how organisations can improve operations and empower teams.
+1
Applicable to:
Identity
52 out of 60
LBAN CloudSecure – Secured by Microsoft Defender for CloudLotus Beta AnalyticsLBAN CloudSecure delivers end-to-end Azure protection with Microsoft Defender for Cloud—boosting security, compliance, and visibility across your cloud workloads.
+2
Applicable to:
Identity
Security
53 out of 60
Windows in Cloud AssessmentTask Systems LimitedUnlock Azure Virtual Desktop Success: Expert-Led WVD Assessment & Migration Blueprint
+3
Applicable to:
Identity
Migration
Security
54 out of 60
Cloud4C Advanced Network Security and AccessCloud4C Services Pte LtdCloud4C’s Advanced Network Security and Access protects cloud perimeters with Azure Firewall, WAF, DDoS, Front Door, Bastion, and Zero Trust controls for secure, resilient, and compliant connectivity.
+3
Applicable to:
Identity
Networking
Security
55 out of 60
Cloud4C External Attack Surface Assessment (EASM + MDTI)Cloud4C Services Pte LtdCloud4C’s External Attack Surface Assessment uses Microsoft Defender EASM + MDTI to uncover shadow IT, misconfigurations, CVEs, and risks, delivering dashboards and remediation plans
+3
Applicable to:
Identity
Networking
Security
56 out of 60
Cloud4C Entra Governance & Compliance SuiteCloud4C Services Pte LtdCloud4C’s Entra Governance & Compliance Suite delivers identity governance, protection, and privileged access management with audit-ready workflows to strengthen compliance and reduce insider risks
+3
Applicable to:
Analytics
Identity
Security
57 out of 60
Cloud4C Zero Trust Readiness and StrategyCloud4C Services Pte LtdCloud4C’s Zero Trust Readiness and Strategy delivers maturity assessment, tailored architecture, and phased rollout planning with Microsoft Defender integrations for secure Zero Trust transformation
+3
Applicable to:
Identity
Networking
Security
58 out of 60
Cloud4C Security Posture AssessmentCloud4C Services Pte LtdCloud4C’s Security Posture Assessment delivers Zero Trust–aligned advisory with Secure Score reviews, Defender telemetry, workshops, and board-ready reporting to strengthen enterprise security.
+3
Applicable to:
Identity
Networking
Security
59 out of 60
Cloud4C OT & IoT Security AssessmentCloud4C Services Pte LtdThis assessment leverages Microsoft Defender for IoT to map assets, model threats, and deliver vulnerability reports with a remediation roadmap for industrial and connected environments.
+3
Applicable to:
Identity
Networking
Security
60 out of 60