FiltresTout effacer
Professional Services résultats
Affichage des résultats dans professional services.
Igel Azure Virtual Desktop As A Service 2-Hours WorkshopTriStratus Ltd.IGEL Technology provides a Linux based “Next generation edge operating system" which is purpose-built for secure access to cloud workspaces such as Azure Virtual Desktops.
+3
Applicable to:
App Modernization
Identity
Security
1 out of 60
Cloud Security: 4-Wk ImplementationCampana & Schott GmbHThe Cloud Security services help you to assess your current cloud security posture and to plan and implement continous cloud security improvements based on the Microsoft Security solutions platform
+2
Applicable to:
Identity
Security
2 out of 60
IBM Threat Management with Microsoft’s SAP Threat Monitoring Solution for Microsoft AzureIBM Security ServicesConsulting and managed security services from IBM Security supporting Microsoft Defender, Azure Sentinel, and the SAP Threat Monitoring solution for Sentinel
+2
Applicable to:
Identity
Security
3 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies ServicesDelivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
+2
Applicable to:
Identity
Security
4 out of 60
Azure Cost Optimization: 1 Day WorkshopALEF Distribution RO S.A.Understand, monitor and optimize your cloud spendings in Azure with our "Cost Optimization Workshop".
+3
Applicable to:
Identity
Migration
Security
5 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.aiImplementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
+1
Applicable to:
Identity
6 out of 60
HCLTech Unified Digital AccessHCL America Inc_HCLTHCLTech’s Unified Digital Access solution protects enterprise users and apps from cybersecurity attacks by aiding with right enterprise security posture with easy access to Apps and services.
+1
Applicable to:
Identity
7 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private LimitedWe help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
+3
Applicable to:
Identity
Migration
Security
8 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
+3
Applicable to:
Identity
Migration
Security
9 out of 60
skillup_consulting_openedx_v1Flexible Road LLCOpen edX Learning Management System with Azure.
+3
Applicable to:
Backup
Identity
Storage
10 out of 60
Cloud Discovery AssessmentTEQWERK GmbHGemeinsam zünden wir den Cloud-Turbo für Ihr Unternehmen. Erhalten Sie eine Übersicht über Ihre Infrastruktur, deren Cloud-Anteil und eine Empfehlung zu (Teil-)Migrationen in die Azure-Cloud
+3
Applicable to:
App Modernization
Identity
Migration
11 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam FranceSecure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
+2
Applicable to:
Identity
Networking
12 out of 60
Azure Sentinel 5 hours Online WorkshopCLOUD SERVICESThis 5-hour workshop contains theoretic and practical parts. It is designed to help you to start working with Azure Sentinel
+3
Applicable to:
Disaster Recovery
Identity
Security
13 out of 60
Microsoft Entra Identity & Access Management (IAM) AssessmentiC Consult Gesellschaft für Systemintegration und Kommunikation mbHUnlock the full potential of Microsoft Entra with a tailored IAM assessment and strategic roadmap designed for your unique environment
+3
Applicable to:
Identity
Migration
Security
14 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
15 out of 60
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to:
App Modernization
Identity
16 out of 60
Assesment Azure Base4Base4 Security Chile SPAThe Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
+3
Applicable to:
Analytics
Identity
Security
17 out of 60
Azure Security Accelerator SuiteNeudesicMitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
+3
Applicable to:
Identity
Networking
Security
18 out of 60
Azure Cloud Security ConsultingReply DEThinking of security in cloud can sometimes be overwhelming. We help our customers to address relevant security topics within their cloud infrastructure and/or applications.
+3
Applicable to:
Identity
Networking
Security
19 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARSALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
+3
Applicable to:
App Modernization
Identity
Migration
20 out of 60
CloudPOS: 4-Week ImplementationMediasoft Data Systems LimitedThe all-in-one cloud-based point-of-sale solution. Boost efficiency, streamline operations, and enhance the customer experience with the user-friendly, secure, and fast software solutions.
+3
Applicable to:
Analytics
Archive
Identity
21 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTDDotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
+3
Applicable to:
App Modernization
Identity
Storage
22 out of 60
Security: 2-day Azure Security WorkshopReply DESecurity in the cloud can be a challenge! Get yourself ready for securing your cloud applications and data in Azure by attending a 2 day workshop led by our cloud security experts.
+3
Applicable to:
Identity
Networking
Security
23 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
24 out of 60
Azure AD Integration for SAP Cloud Products and SAP IAS: 4-hour WorkshopQ_PERIOR AGAssessment of feasibility and benefits of Azure AD integration for SAP Cloud Products
+3
Applicable to:
App Modernization
Identity
Security
25 out of 60
Security as a Service: 3-Wk ImplementationA3Cloud SolutionsImprove your security of your solutions and infrastructures in Azure Cloud.
+3
Applicable to:
Identity
Migration
Security
26 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
27 out of 60
AzERE - Azure Emergency Response Environment | Implementation 1 Weekglueckkanja AGAzure Emergency Response Environment, or AzERE, provides a disaster recovery infrastructure for business-critical tools and services to recover automatically in the event of a worst-case scenario
+2
Applicable to:
Backup
Identity
28 out of 60
Cloud Security Workshop: 2 half-days workshopMallow OyWe'll check your Azure environment for security issues and suggest remedies for them
+3
Applicable to:
App Modernization
Identity
Security
29 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
30 out of 60
Modern workplace Active DirectorySii Sp. z o.o.Modern workplace Active Directory implementation, migration and support
+2
Applicable to:
Identity
Security
31 out of 60
Detection & Response Services (MXDR)Cloud LifeCloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
+3
Applicable to:
AI & Machine Learning
Identity
Security
32 out of 60
Sentinel-as-a-ServiceCloud LifeCloud Life delivers an innovative cloud-based AI and ML-enhanced Sentinel-as-a-Service, empowering your team with managed SIEM/SOAR capabilities using optimum Microsoft MXDR Services
+3
Applicable to:
AI & Machine Learning
Identity
Security
33 out of 60
ISO 27001 Readiness Assessment for Azure EnvironmentVisionet Systems Inc.Advance confidently towards ISO 27001 certification for your Azure environment with Visionet's readiness assessment. Get a detailed analysis of your infrastructure operations & security policies.
+3
Applicable to:
Backup
Identity
Security
34 out of 60
Microsoft & Multi-Cloud Security Penetration Testing: 5-Day AssessmentBDO LLPCREST certified Ethical Hackers from BDO perform penetration tests on your Microsoft and Multi-Cloud environment and test the setup of Microsoft Azure AD, Defender, Sentinel and Purview.
+3
Applicable to:
Identity
Security
Storage
35 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
36 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
+2
Applicable to:
Identity
Security
37 out of 60
ALIANDO Managed Extended Detection and Response (MXDR)myCloudDoorALIANDO Managed Extended Detection & Response service (MXDR) powered by Sentinel and Defender
+3
Applicable to:
Identity
Networking
Security
38 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoorThis assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
+3
Applicable to:
Identity
Networking
Security
39 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoormyCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
+3
Applicable to:
Identity
Networking
Security
40 out of 60
Data Governance AssessmentKI group GmbHThe Data Governance Assessment guarantees transparency regarding who, when, and how data can be utilized in your organization.
+3
Applicable to:
Analytics
Data Platform
Identity
41 out of 60
24x7 SOC Service by IntelequiaIntelequia Technologies24x7 monitoring, protection and automated response to cyberthreats
+3
Applicable to:
Analytics
Identity
Security
42 out of 60
Workshop for Azure Cost Optimization using FinOpsSii Sp. z o.o.Control your costs in the cloud with the FinOps methodology
+2
Applicable to:
DevOps
Identity
43 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
44 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
45 out of 60
Migration vers AzureProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans votre migration vers Azure
+3
Applicable to:
Identity
Migration
Security
46 out of 60
Microsoft 365 Managed Cloud Virtual Machine ServiceT-Systems International With the “Microsoft 365 Cloud Virtual Machine Service – Azure Virtual Desktop” product, Telekom provides operational and configuration services
+3
Applicable to:
Identity
Networking
Security
47 out of 60
Security Information and Event Management (SIEM) MigrationKyndryl Inc.Kyndryl SIEM Migration service transitions legacy SIEMs to Microsoft Sentinel, ensuring comprehensive coverage for both on premise and cloud assets. Services include discovery, design, implementation.
+3
Applicable to:
Disaster Recovery
Identity
Security
48 out of 60
Entra Assessment: - 3 Wk AssessmentiC Consult GmbHThis offer is perfect for customers looking to streamline their Identity and Access Management/MFA solutions, aiming to achieve a best-of-breed approach for Azure infrastructure and Entra principles.
+3
Applicable to:
Identity
Migration
Security
49 out of 60
Azure Network Architecture ReviewmnemonicAccelerate your cloud journey and improve network security with mnemonic’s Azure Networking Architecture Review, designed to help you adopt and optimise Microsoft Azure’s networking services.
+3
Applicable to:
Identity
Networking
Security
50 out of 60
Cloud Enabler for Hybrid CloudDevoteam SACloud Enabler for Hybrid Cloud offers seamless hybrid IT management via an automated Single Control Plane, streamlining operations across on-premises and multi-cloud, boosting visibility and agility.
+3
Applicable to:
App Modernization
DevOps
Identity
51 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITEDOverwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
+2
Applicable to:
Identity
Security
52 out of 60
Microsoft Entra Private Access - Proof of Concept (PoC)Onevinn ABMicrosoft Entra Private Access, is a cutting-edge Security Service Edge (SSE) solution designed to provide secure, seamless access to private applications and resourses.
+2
Applicable to:
Identity
Security
53 out of 60
Microsoft Purview Quickstart Accelerator Implementation with Wizard CyberWIZARD GROUP LIMITEDThis service ensures that your organization can quickly harness the power of Microsoft Purview to manage and govern your data effectively
+3
Applicable to:
Identity
Migration
Security
54 out of 60
Active Directory: Free Security and Performance AssessmentMismo Systems Private LimitedWe help you assess your Active Directory environment for security, health, performance, and upgrade readiness, identifying gaps and providing remediation recommendations based on best practices.
+1
Applicable to:
Identity
55 out of 60
Active Directory Comprehensive Review: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Active Directory environment for security, health, performance, and upgrade readiness, identifying gaps and providing remediation recommendations based on best practices.
+1
Applicable to:
Identity
56 out of 60
Microsoft Identity Security Posture-4h assessmentReplyAssessment of Microsoft Cloud or Hybrid Identity and Access Management Solution Security Posture
+2
Applicable to:
Identity
Security
57 out of 60
Implementation of Microsoft Entra ID IntegrationITX360 (Pvt) Ltd.Enhance security and simplify access with Microsoft Entra ID Integration, featuring SSO, MFA, passwordless login, and role-based access
+2
Applicable to:
Identity
Security
58 out of 60
Azure Virtual Desktop & Productivity 2 Week ImplementationAKAVEIL TECHNOLOGIES INCAzure Virtual Desktop provides secure, remote access to desktops and apps, simplifying traditional VDI management through a fully managed, cloud-based solution.
+3
Applicable to:
Identity
Migration
Security
59 out of 60
Azure Virtual Desktop & Productivity 2 Week Implementation for Law Firms and Legal TeamsAKAVEIL TECHNOLOGIES INCAzure Virtual Desktop provides secure, remote access to desktops and apps, simplifying traditional VDI management through a fully managed, cloud-based solution.
+3
Applicable to:
Identity
Migration
Security
60 out of 60