FiltresTout effacer
Professional Services résultats
Affichage des résultats dans professional services.
IBM Cloud Security Posture Management for Microsoft AzureIBM Security ServicesAddress cloud security and compliance posture management concerns delivered via Microsoft Azure native security features or via 3rd party solutions in an enterprise or MSSP (as-a-service) approach
+1
Applicable to:
Security
1 out of 60
IBM Rapid Security Assessment for Microsoft AzureIBM Security ServicesUnderstand your organization's current security posture as well as receive customized recommendations to address challenges around vulnerability and risk related to your cloud estate.
+1
Applicable to:
Security
2 out of 60
IBM Cloud Native Security Services for Microsoft AzureIBM Security ServicesSimplify the configuration and management of cloud native security controls . Ensure the proper security controls are in place across your Microsoft Azure environment.
+1
Applicable to:
Security
3 out of 60
IBM X-Force Red Cloud Offensive Testing Services for Microsoft AzureIBM Security ServicesX-Force Red Cloud Testing Security Services offers offensive security services which include penetration testing, vulnerability management services, red teaming, code reviews, and static analysis.
+1
Applicable to:
Security
4 out of 60
IBM Cloud Workload Protection for Microsoft AzureIBM Security ServicesIBM Security’s Cloud Workload Protection services were built to provide assessment, solution design, implementation, and managed security services that will help you to secure your cloud workloads
+1
Applicable to:
Security
5 out of 60
IBM Security Strategy Services for Microsoft AzureIBM Security ServicesDrive your cloud transformation with an integrated security strategy. Our cloud security strategy engagement offering is designed to help you develop security maturity and define the target state
+1
Applicable to:
Security
6 out of 60
Managed Microsoft Sentinel: 1 Year ImplementationCGI Inc.Support your security operations through a managed cloud security service. CGI experts will deploy Microsoft Sentinel, perform alerts monitoring and Incident response utilizing SOAR capabilities.
+1
Applicable to:
Security
7 out of 60
Igel Azure Virtual Desktop As A Service 2-Hours WorkshopTriStratus Ltd.IGEL Technology provides a Linux based “Next generation edge operating system" which is purpose-built for secure access to cloud workspaces such as Azure Virtual Desktops.
+3
Applicable to:
App Modernization
Identity
Security
8 out of 60
DevSecOps: 3-Weeks ImplementationFlexsin Technologies Pvt. Ltd.Continuous Integration/Deployment on Azure for any New or Existing projects to develop, release, and deploy code to achieve the Automate, Autoscaling, and Transparent process.
+3
Applicable to:
DevOps
Disaster Recovery
Security
9 out of 60
IBM Secure Design for Digital Transformation for Microsoft AzureIBM Security ServicesEngage us to adopt a Secure-By-Design culture to drive rapid application deployment that will ensure application security and reduce security defect costs.
+1
Applicable to:
Security
10 out of 60
IBM Threat Management with Microsoft’s SAP Threat Monitoring Solution for Microsoft AzureIBM Security ServicesConsulting and managed security services from IBM Security supporting Microsoft Defender, Azure Sentinel, and the SAP Threat Monitoring solution for Sentinel
+2
Applicable to:
Identity
Security
11 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies ServicesDelivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
+2
Applicable to:
Identity
Security
12 out of 60
Cyber Recovery Implementation Services on Microsoft AzureDell Technologies Advisory, Design, and Deployment services for Dell PowerProtect Cyber Recovery Solution for Microsoft Azure to protect critical data from Ransomware and other destructive Cyberattacks.
+3
Applicable to:
Backup
Disaster Recovery
Security
13 out of 60
How to get started with Cloud security in Microsoft Azure: 4h workshopBillennium S.A.4-hour workshop on how to keep your organization secure in the Microsoft Azure environment led by a certified cyber security expert (MVP and MCT).
+1
Applicable to:
Security
14 out of 60
IBM X-Force Incident Response Retainer Services for Microsoft Azure and hybrid cloudIBM Security ServicesThe IBM Security X-Force Incident Response Retainer provides Azure customers access to a team of IR experts trained to help your organization plan, prepare and respond to threats and data breaches.
+1
Applicable to:
Security
15 out of 60
IBM X-Force Red Vulnerability Management Services for Azure and Hybrid CloudIBM Security ServicesIdentifying, prioritizing and remediating the vulnerabilities that matter most.
+1
Applicable to:
Security
16 out of 60
IBM Protect & Govern Sensitive DataIBM Security ServicesGet ahead of compliance demands and protect against data breaches with secure data across Microsoft Azure and your hybrid cloud environments.
+1
Applicable to:
Security
17 out of 60
ColdFusion App Migration: 4 Week ImplementationMedia3 Technologies, LLCInfrastructure Review, Design, and Deployment
System Migration Services
Security and Azure Service Consumption Optimization
Additional Professional Services
+3
Applicable to:
App Modernization
Migration
Security
18 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private LimitedWe help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
+3
Applicable to:
Identity
Migration
Security
19 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
+3
Applicable to:
Identity
Migration
Security
20 out of 60
Cloud Adoption Framework (CAF) Workshop_3 daysCLICK2CLOUD INC3 days’ workshop helps decision makers align strategies for business, culture, and technical change to achieve desired business outcomes.
+3
Applicable to:
Analytics
Migration
Security
21 out of 60
Verizon Managed SIEMVERIZON COMMUNICATIONS INC.Verizon Managed SIEM for Azure Sentinel; Continuously monitor and triage security incidents from your Azure Sentinel instance.
+1
Applicable to:
Security
22 out of 60
Cognizant® Unified Data Protection Service powered by Microsoft PurviewCognizantCognizant® Unified Data Protection Service powered by Microsoft Purview, secures data, mitigates risks, and ensures compliance via automation.
+1
Applicable to:
Security
23 out of 60
Data Warehouse Migration AssessmentCLICK2CLOUD INCClick2Cloud’s Data Warehouse Migration Assessment helps you create a fact-based roadmap and offers an estimation for the migration of the existing data warehouse to the modern Azure data warehouse.
+2
Applicable to:
Migration
Security
24 out of 60
HCLTech Cloud Data SecurityHCL America Inc_HCLTMaximize cloud security with HCLTech’s data security solutions powered by Microsoft Purview
+1
Applicable to:
Security
25 out of 60
Modern Workplace AssessmentCLICK2CLOUD INCClick2Cloud provides a Modern Workplace Assessment that empowers you to embrace the modern workplace, simplify cloud adoption, and improve employee productivity.
+3
Applicable to:
Migration
Networking
Security
26 out of 60
Managed Services for Microsoft EntraDXCAdvisory and Managed Services for Microsoft Entra
+2
Applicable to:
Identity
Security
27 out of 60
Contract Optimization AssessmentCLICK2CLOUD INCClick2Cloud’s Contract Optimization Assessment provides customers with an understanding of their full Microsoft product deployment and associated licensing contract positions.
+3
Applicable to:
Analytics
Migration
Security
28 out of 60
Managed Detection and Response ServiceNTT LimitedA scalable, cloud-native, security analytics and response platform that provides intelligent security analytics with threat intelligence across the enterprise.
+1
Applicable to:
Security
29 out of 60
Cyber security servicesUAB SOLUTIONLAB PRODUCTIONTo provide excellent cyber security services
+2
Applicable to:
DevOps
Security
30 out of 60
Microsoft Sentinel: 5 Day POC DeploymentWIZARD GROUP LIMITEDExperienced in SIEM and SOC migrations and improvement, Wizard Cyber will take you through a guided Proof of Concept that demonstrates the real value of Microsoft Sentinel,
+1
Applicable to:
Security
31 out of 60
Innovation Anywhere with Azure ARC: 5 Week ImplementationCognizantLeverage Azure Arc to unify management, governance and security of your hybrid, on-premises, datacenter, private and public cloud environments
+2
Applicable to:
Backup
Security
32 out of 60
IntraSenz - Digitally Next Employee Engagement with Microsoft Viva ConnectionTOTAL EBIZ SOLUTIONS PTE. LTD.Fast Track Employee Engagement Experience Using IntraSenz on Viva Connection in 30 Days.
+3
Applicable to:
Migration
Security
Storage
33 out of 60
Teams Solution for Retail FLW Workforce: 2 Wk Proof of ConceptsSaxon Infosystems Private LimitedA Repository of Processes Pre-built for Microsoft Teams for Frontline workers and Supervisors in Retail
+3
Applicable to:
Data Platform
Security
Storage
34 out of 60
ISO 27001 Readiness Assessment for Azure EnvironmentVisionet Systems Inc.Advance confidently towards ISO 27001 certification for your Azure environment with Visionet's readiness assessment. Get a detailed analysis of your infrastructure operations & security policies.
+3
Applicable to:
Backup
Identity
Security
35 out of 60
Fortifying SDLC on Azure with Defender for DevOps: 3-Wks Consulting AssessmentWipro LtdDiscover and evaluate the application security risk posture on Azure with Wipro's Application Security framework leveraging Defender for DevOps
+2
Applicable to:
DevOps
Security
36 out of 60
Cloud Landing Zone with F5: 3-Week POCTrace3, LLCUtilize a customized Azure Landing Zone solution by Trace3 and offer expert support to mitigate the perceived complexities and educate on multi-cloud F5 adoption strategies.
+3
Applicable to:
Migration
Networking
Security
37 out of 60
Azure Landing Zone with CAF guidelines- 10 DaysTELEPERFORMANCEUnlock the full potential of Azure with our Landing Zone offering—a comprehensive, customizable solution designed to streamline your organization's journey to the cloud.
+3
Applicable to:
Migration
Networking
Security
38 out of 60
TCS Smart Migration Services for MicrosoftTata Consultancy Services Ltd.Expedite your organization’s applications migration to cloud platforms.
+3
Applicable to:
App Modernization
Migration
Security
39 out of 60
Avanade Microsoft Fabric Security Assessment & EnablementAvanade, Inc.Secure Microsoft Fabric with Avanade's expertise in assessment and multi-layered security enhancements.
+3
Applicable to:
Big Data
Data Platform
Security
40 out of 60
Skygrade Application Modernization Service for Microsoft Azure: 10 Week ImplementationCognizantCognizant Skygrade is a packaged solution enabling organizations to transform hybrid and multi-cloud estates, at enterprise scale, backed by Cognizant and powered by Azure services and accelerators.
+3
Applicable to:
App Modernization
DevOps
Security
41 out of 60
Azure Cloud Security AssessmentIntelliasComprehensive information security and compliance service, which comprises two levels of analysis with the findings obtained being progressively more detailed.
+1
Applicable to:
Security
42 out of 60
Azure Sentinel: 5-Day ImplementationIbn Technologies LtdThe Azure Sentinel Implementation is a comprehensive Professional Services package offered by CloudIBN. This package includes the design, deployment, and fine-tuning of the Azure Sentinel
+1
Applicable to:
Security
43 out of 60
TCS Responsible AI Assessment for Generative AITCS - Azure TCS offers Responsible AI (RAI) Assessment service to our customers and partners in gauging their Azure Open AI based Gen AI solutions against the core tenets of RAI.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
44 out of 60
Capgemini Managed Security Services with Sentinel for SAPCapgemini GroupThe solution is focused on providing a clear overview of vulnerabilities present in the complex SAP landscape from different domains.
+1
Applicable to:
Security
45 out of 60
TCS AI-Driven Well-Architected AssessmentTata Consultancy Services Ltd.Assess your workloads continuously and run optimally, using Microsoft Azure Well-Architected best-practices and various technology assessment
+3
Applicable to:
App Modernization
Migration
Security
46 out of 60
Cognizant® Cyber Threat Defense powered by Microsoft SentinelCognizantCyber Threat Defense Solution for delivery of AI-driven, automated security operations and continuous compliance across hybrid environments.
+1
Applicable to:
Security
47 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
48 out of 60
I-Nxt Virtual DesktopCognizantAccelerate the deployment of a highly scalable, secure and flexible Azure Virtual Desktop (AVD) by utilizing Nerdio Manager for Enterprise.
+2
Applicable to:
Networking
Security
49 out of 60
Dell Implementation Services for Microsoft Defender on CloudDell Technologies ServicesAdvisory and Deployment services aligned to your cloud security objectives, enabling you to gain comprehensive visibility of your cloud security posture across your environments.
+1
Applicable to:
Security
50 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
QA assessmentCiklumAnalyze testing processes & practices.
Get the GAP analysis against a hybrid approach containing practises from TMMi and TPI.
Receive overall maturity evaluation.
+3
Applicable to:
Analytics
DevOps
Security
52 out of 60
Penetration Testing: 4 weeks AssessmentCiklumBlack-box or grey box-oriented penetration testing that simulates real-world attacks to identify vulnerabilities in your systems, networks, and applications.
+2
Applicable to:
Analytics
Security
53 out of 60
Eviden's Confidential Data Room 6 to 12 Weeks POCEviden International France - SASEviden's Confidential Data Room is a solution that allows companies to share and analyze data securely, even under strict data privacy regulations.
+3
Applicable to:
Analytics
Data Platform
Security
54 out of 60
Unisys Well-Architected ReviewUnisys Corp / Blue BellUnisys offers a comprehensive assessment process for Azure workloads, guided by certified architects. During your review, leverage this expertise to evaluate your adoption of best practices.
+2
Applicable to:
Migration
Security
55 out of 60
Security Information and Event Management (SIEM) MigrationKyndryl Inc.Kyndryl SIEM Migration service transitions legacy SIEMs to Microsoft Sentinel, ensuring comprehensive coverage for both on premise and cloud assets. Services include discovery, design, implementation.
+3
Applicable to:
Disaster Recovery
Identity
Security
56 out of 60
Azure Landing Zone Deployment ServiceLotus Beta AnalyticsThe "Azure Landing Zone Deployment Service" simplifies setting up secure, compliant Azure environments with pre-configured templates, ensuring a solid foundation for cloud operations and governance.
+2
Applicable to:
Identity
Security
57 out of 60
Azure to Sophos/FortiGate VPN SetupLotus Beta AnalyticsSeamlessly connect your Azure environment to Sophos or FortiGate firewalls with our expert VPN setup service, ensuring secure, reliable site-to-site or point-to-site connectivity for your enterprise.
+2
Applicable to:
Networking
Security
58 out of 60
Unisys Attack Surface DiscoveryUnisys Corp / Blue BellNavigate your attack surface with an adversary's eye. With Unisys Attack Surface Discovery, you can outsmart threats and outpace risks.
+1
Applicable to:
Security
59 out of 60
Microsoft Entra ID Conditional Access: 10-Day ImplementationWIZARD GROUP LIMITEDdesigned to quickly and effectively deploy Entra ID Conditional Access policies to enhance your organisation's security posture
+3
Applicable to:
Identity
Migration
Security
60 out of 60