FiltresTout effacer
Professional Services résultats
Affichage des résultats dans professional services.
Cloud Security Approach: 2-months AssessmentPyxisThrough the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
+3
Applicable to:
Analytics
Identity
Security
1 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxisEvolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
+3
Applicable to:
Analytics
Identity
Security
2 out of 60
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
3 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
4 out of 60
Cloud Security Compliance: 4-months AssessmentPyxisThe CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
+3
Applicable to:
Analytics
Identity
Security
5 out of 60
Cloud Security Services: 12-months ImplementationPyxisWe audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
+3
Applicable to:
Analytics
Identity
Security
6 out of 60
Microsoft Sentinel Consulting Services: 12-Months ImplementationForsyte IT SolutionsMicrosoft Sentinel consulting services are designed to get you up and running quickly to maximize your return on investment in Microsoft's advanced security technologies.
+2
Applicable to:
Identity
Security
7 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield LtdSpartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
+3
Applicable to:
Identity
Migration
Security
8 out of 60
SC-100T00: Microsoft Cybersecurity Architect: 4 Days WorkshopNETCOM LEARNINGSC-100T00: Microsoft Cybersecurity Architect course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance
+2
Applicable to:
Identity
Security
9 out of 60
Managed Desktop - 12 Month - Managed Service ImplementationCoretek ServicesComprehensive Managed Desktop Solution Leveraging Microsoft AVD & Windows 365
+2
Applicable to:
Identity
Security
10 out of 60
CoreDefend Managed XDR Microsoft Security SolutionCoretek ServicesA Comprehensive Managed XDR Security Solution Using Microsoft Security Tools to Improve Security Posture
+2
Applicable to:
Identity
Security
11 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies ServicesDelivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
+2
Applicable to:
Identity
Security
12 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.aiImplementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
+1
Applicable to:
Identity
13 out of 60
Purple Team Assessment: 1 Week AssessmentBridewell Consulting LimitedTest your organisation's defensive capabilities by conducting a purple team assessment in collaboration with Bridewell
+3
Applicable to:
Identity
Migration
Security
14 out of 60
Accelerating Cloud Virtual Desktops: 2-Hour WorkshopSlalom ConsultingThis Free Workshop will introduce you to how Azure Virtual Desktops help you embrace a remote workforce while maintaining control through secure workstation experiences on any device.
+3
Applicable to:
Identity
Migration
Networking
15 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology HoldingOur offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
+3
Applicable to:
Identity
Security
Storage
16 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology HoldingGet a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
+3
Applicable to:
Identity
Security
Storage
17 out of 60
Azure Virtual Desktop: 2-Wk ImplementationPetabytz IncStart experiencing the best kind of virtualization with Azure Virtual Desktop in minutes to enable remote work. Provides employees the same experience they would have on a local desktop.
+3
Applicable to:
Identity
Migration
Security
18 out of 60
Defend Against Threats with SIEM Plus XDRBJSS LimitedImprove your security posture and uncover risks that might be harmful to your organisation with BJSS' cyber security workshop: Defend Against Threats with SIEM Plus XDR.
+2
Applicable to:
Identity
Security
19 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam FranceSecure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
+2
Applicable to:
Identity
Networking
20 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
21 out of 60
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to:
App Modernization
Identity
22 out of 60
SAP SuccessFactors and Microsoft Entra ID Integration: 6-wk ImplementationOxford Computer Group LLCEnable User Lifecycle Management by integrating SAP SuccessFactors and Microsoft Entra ID.
+1
Applicable to:
Identity
23 out of 60
Microsoft Security License Utilisation & Commercial Assessment: 2-Week AssessmentBridewell Consulting LimitedProvide an overview of organisations current licensing position, identify what security Microsoft products could be utilised & build an adoption framework
+3
Applicable to:
Identity
Networking
Security
24 out of 60
Managed Services for Microsoft EntraDXCAdvisory and Managed Services for Microsoft Entra
+2
Applicable to:
Identity
Security
25 out of 60
Microsoft Certification Exam Preparation: 8 Hours WorkshopNETCOM LEARNINGThis session helps prepare your teams to pass the Microsoft Certification exams.
+3
Applicable to:
Identity
Migration
Storage
26 out of 60
Security Discovery: 4-Wk AssessmentProServeITA security discovery & assessment will provide a new understanding of cyber threat trends & let you know where to start. Ensure your business continuity, protect your reputation & instill trust.
+2
Applicable to:
Identity
Security
27 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARSALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
+3
Applicable to:
App Modernization
Identity
Migration
28 out of 60
Security Level Up: 4-Wk ImplementationProServeITBuild your security baseline environment and level it up with the appropriate Microsoft cybersecurity technologies. Ensure your business continuity even after a cyberattack & protect your reputation.
+2
Applicable to:
Identity
Security
29 out of 60
Spyglass Cloud Security: 6-week AssessmentQuisitiveThe Spyglass Cloud Security Assessment is a complete evaluation of your organization’s cloud security posture centered around identity, data, devices, applications, and access.
+3
Applicable to:
Identity
Security
Storage
30 out of 60
Security Managed Services Consulting: 12-Month ImplementationProServeITEnhance your cybersecurity baseline & take it to a higher standard with appropriate Microsoft cybersecurity technologies. Proactive measures & regular audits will ensure business continuity.
+2
Applicable to:
Identity
Security
31 out of 60
Azure Security: 3-week AssessmentQuisitiveA Quisitive Azure Security Assessment offers actionable insight about your cloud security posture, with peace of mind for how your Azure deployment can be made more safe and secure.
+3
Applicable to:
App Modernization
Identity
Security
32 out of 60
Microsoft Sentinel Quick Start: 6-week ImplementationQuisitiveGet ahead with the next generation solution for Security Information and Event Management (SIEM) and Security Orchestration and Automated Remediation (SOAR) with our Microsoft Sentinel Quick Start.
+2
Applicable to:
Identity
Security
33 out of 60
8 wks - Implementacion de Sistemas de Pruebas de vida con reconocimiento facial para Onboarding de clientes o Deteccion de fraude54cuatro MexicoImplemente servicios cognitivos de Azure para evitar el fraude relacionado con la identificación de sus clientes
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
34 out of 60
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITEDProvide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
+3
Applicable to:
Analytics
Data Platform
Identity
35 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
36 out of 60
Azure Security Essentials: 3-Wk ImplementationAgile ITOnboarding Azure for Security and Compliance (Essentials) seeks to reduce the mean time to detection by consolidating logging, analytics, detection, and response into a single cohesive solution
+3
Applicable to:
Identity
Networking
Security
37 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
38 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
39 out of 60
Microsoft Intune - Initial Setup for Windows devices: 2-Wk Consulting ServiceIT Partner LLCComprehensive support to customers in their journey of leveraging Microsoft Azure, particularly in getting started with or expanding their utilization of the platform.
+3
Applicable to:
Identity
Migration
Security
40 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
41 out of 60
Modern workplace Active DirectorySii Sp. z o.o.Modern workplace Active Directory implementation, migration and support
+2
Applicable to:
Identity
Security
42 out of 60
AD Domain Consolidation for Migration to Microsoft Entra ID: 6 wk ImpOxford Computer Group LLCGet started on your journey towards zero trust by consolidating your organization’s Active Directories for better visibility, efficiency, and security.
+3
Applicable to:
Identity
Migration
Security
43 out of 60
Verifiable Credentials with Microsoft Entra Verified ID: full architecture design with initial deploymentFormula5Formula5's Microsoft Entra Verified ID Workshop & POC helps organizations to understand decentralized identity concepts and implement secure identity solutions using Verifiable Credentials.
+2
Applicable to:
Identity
Security
44 out of 60
Azure Single Sign-On: 3-Day Azure Single Sign-On (SSO) with a third-party applicationIT Partner LLCSingle sign-on (SSO) means that users do not need to sign in to every , they log into Azure AD once, and these credentials are used for other applications such as Sales Force, Slack, Zendesk, etc.
+3
Applicable to:
App Modernization
Identity
Security
45 out of 60
FinOps Adoption ServicesSoftchoiceAttain financial control over your Azure environment to realize your investment in cloud workloads
+2
Applicable to:
Analytics
Identity
46 out of 60
Microsoft Copilot Readiness AssessmentGC Brokers Inc.Ensure organizational readiness for the release of Microsoft Co-Pilot. Ensure your organization is ready for the adoption of this groundbreaking new technology.
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
47 out of 60
Microsoft Entra Verified ID: 6-week Proof of ConceptOxford Computer Group LLCOxford Computer Group's Microsoft Entra Verified ID Proof of Concept can help you discover the power and benefits of authentic verifiable credentials.
+2
Applicable to:
Identity
Security
48 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
49 out of 60
Azure Virtual Desktop Secure Platform designed by CloudAstro - Revolutionize Your Workplace (4 Days - Workshop)CloudAstro GmbHEmbrace the future with AVD Secure Platform, where mobility meets cutting-edge security for all industries.
+3
Applicable to:
DevOps
Identity
Security
50 out of 60
Rapid Cyberattack Assessment Workshop (Full - On-site)IT Partner LLCThe goal of this service is to help businesses identify and address potential vulnerabilities to rapid cyberattacks, enhancing their cybersecurity defenses using Microsoft technologies.
+3
Applicable to:
Backup
Identity
Security
51 out of 60
Microsoft Intune setup: 4-Wk ImplementationExodus Integrity Services, Inc.Effortlessly implement Microsoft Intune: Seamless MDM, MAM, app deployment & security settings. Tailored setup for streamlined device management.
+3
Applicable to:
Identity
Networking
Security
52 out of 60
Azure Virtual Desktop Assessment: 2 Week AssessmentBig Green IT - DevAzure Virtual Desktop Assessment begins with a comprehensive assessment, during which our team evaluates the existing environment & provides recommendations for performance, scalability & resilience.
+3
Applicable to:
Identity
Networking
Security
53 out of 60
SOC Compliance readiness check: 1-Month Professional ServiceIT Partner LLCAssess your organization's readiness for SOC compliance, helping identify and address potential control and policy issues to prepare for an official SOC audit effectively.
+2
Applicable to:
Identity
Security
54 out of 60
Azure Security Assessment: 2 Week AssessmentBig Green IT - DevEvery Defender project starts with a thorough assessment where our team evaluates the current setup. Based on this, we offer suggestions to enhance security, performance, and scalability.
+3
Applicable to:
Identity
Security
Storage
55 out of 60
Eviden's Application Strategy WorkshopEviden International France - SASEviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
+3
Applicable to:
App Modernization
Data Platform
Identity
56 out of 60
Security Warrior: Managed ServiceTechConnectOur Security Warrior, will give you the visibility and remediation into your Azure security posture to manage the risk through an affordable single pane of glass solution.
+3
Applicable to:
DevOps
Identity
Security
57 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
58 out of 60
Windows Autopilot - Initial Setup: 3-Wk Initial Professional ServiceIT Partner LLCImplement Windows Autopilot for seamless device deployment, enabling automated, image-free Windows deployment to PCs worldwide, requiring minimal infrastructure.
+3
Applicable to:
Identity
Migration
Security
59 out of 60
External IAM 5 day assessmentCondatis Group LimitedCondatis is offering an external Identity and Access Management (IAM) assessment focusing on how your organisation secures and manages external identities in your business context.
+2
Applicable to:
Identity
Security
60 out of 60