फ़िल्टरसभी साफ़ करें
Professional Services परिणाम
professional services में परिणाम दिखाना/दिखा रहे हैं.
TCS Responsible AI Development Service on Azure OpenAITCS - Azure TCS through this development service, aims to help enterprises in implementing Responsible AI controls in Azure Open AI based solutions in an efficient and safe manner.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
1 out of 60
Azure 3D Assessment - Governance - Security - FinOps 3 daysXylosOur Azure assessments provide a comprehensive review of your tenant, delivering findings and recommendations aligned with Microsoft best practices and our expertise.
+3
Applicable to:
Backup
DevOps
Security
2 out of 60
Cognizant Cyber Threat Defense, powered by MicrosoftCognizantCognizant's Cyber Threat Defense offering provides a set of structured methodologies and tools to assess, migrate, modernize and manage your Security Operations Center (SOC).
+3
Applicable to:
AI & Machine Learning
Identity
Security
3 out of 60
Cloud Center of Excellence (CCoE)Ness IsraelWe, Ness Cloud, help CEOs and CTOs to strategize and plan their cloud journey, based on our extensive experience and proficiency, utilizing Azure best practices and prescriptive guidance.
+3
Applicable to:
DevOps
Migration
Security
4 out of 60
Azure AI-Copilot PoC and Rapid Deployment Program: 4 Weeks - Click2CloudCLICK2CLOUD INCEmbark on a transformative journey with Click2Cloud's Azure AI-Copilot PoC and Rapid Deployment programme.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
5 out of 60
Eviden’s Application Transformation Services with Cloud Code Refactor InsightsEviden International France - SASEviden’s Application Transformation services invoke code refactoring and configuration automation, leading to cloud readiness for faster release cycles and a consistent deployment process.
+2
Applicable to:
App Modernization
Security
6 out of 60
Microsoft Advanced Log Routing Service with ADXBlueVoyantA cost-effective alternative to storing all your logs on Microsoft Sentinel
+1
Applicable to:
Security
7 out of 60
PwC Cybersecurity and Risk CapabilitiesPricewaterhousecoopers LLPReimagine risk and unlock opportunities through a human-led, tech-powered approach.
+2
Applicable to:
Identity
Security
8 out of 60
Eviden Quality Inspector - Automate your quality control with computer visionEviden International France - SASQuality Inspector automates quality control with computer vision using various devices and processing options.
+3
Applicable to:
AI & Machine Learning
Data Platform
Security
9 out of 60
NIS2-Toolkit: Road to Compliance in 6 MonthsDTXComprehensive solution combining Azure Cloud Migration, NIS2-compliant best practices, and documentation on how to build NIS2-compliance with "people, process, technology".
+3
Applicable to:
Disaster Recovery
Migration
Security
10 out of 60
Datacentre Infrastructure Consolidation & ManagementGlobal Computing and TelecomsConsolidate and manage datacentre infrastructure efficiently with tailored solutions, scalable to small, medium, and large organizations, optimizing costs and performance.
+2
Applicable to:
Migration
Security
11 out of 60
AIS Health Check: 2-Wk ServiceSolidify ABThe purpose of the service is to improve your Azure integration environment and ensure its reliability, security, and performance.
+3
Applicable to:
Analytics
Networking
Security
12 out of 60
BizTalk migration to Azure Integration ServicesSolidify ABTo migrate existing integrations from your current integration platform to Azure.
+3
Applicable to:
App Modernization
Migration
Security
13 out of 60
Hitachi AI Compass for Responsible AIHitachi Digital Services LLCAI Compass is Hitachi Digital Services Responsible AI offering, which enables transparency, security, safety, privacy & trustworthiness in AI applications.
+3
Applicable to:
App Modernization
AI & Machine Learning
Security
14 out of 60
Cloud MigrationSolifyPlanung und Durchführung von VM Migrationen (Lift & Shift) in die Azure Cloud sowie die Bereitstellung der Azure Landing Zone
+3
Applicable to:
Backup
Migration
Security
15 out of 60
Azure Landing Zone discovery: 5 daysEconocom Products & Solutions BeluxDiscovery of Azure Landing Zone for a new cloud journey and building a High Level Design Document
+3
Applicable to:
DevOps
Identity
Security
16 out of 60
Azure Landing Zone Creation: 4-Wk ImplementationEconocom Products & Solutions BeluxA series of five workshops designed to guide you through the foundational decisions and designs necessary for building a robust Azure Landing Zone.
+3
Applicable to:
DevOps
Networking
Security
17 out of 60
SIEM Security - Implementation (30 days)Inetum (HO)Inetum provides robust SIEM solutions tailored to each customer’s needs. Our cloud-native Microsoft Sentinel integrates AI and complies with European standards and workshops
+3
Applicable to:
Disaster Recovery
Identity
Security
18 out of 60
Cyber Threats Security - Implementation (30 days)Inetum (HO)Inetum's Cyber Threats offering provides a comprehensive approach to strengthening the security of your IT environment and detecting potential threats at an early stage
+2
Applicable to:
Disaster Recovery
Security
19 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
20 out of 60
GCT Azure Sentinel: 12 Month Enablement with ManagementGlobal Computing and TelecomsGCT's Proactive, cloud-native security with threat detection, response ,insights and Management
+3
Applicable to:
Analytics
Migration
Security
21 out of 60
Data Architecture and Governance journeySavacoOur data and governance journey helps organizations in deriving value from their data assets. It enhances decision-making, reduces costs linked to poor data quality, ensures regulatory compliance, etc
+3
Applicable to:
Archive
Data Platform
Security
22 out of 60
Microsoft Sentinel Design & Deployment AcceleratorThe Partner MastersAccelerate your design, deployment and configuration of Microsoft Sentinel using a templatized best practices approach from Microsoft cyber security experts
+1
Applicable to:
Security
23 out of 60
Copilot for Security: 3-hour introduction workshopWhite Hat IT Security KftRecommended for those who are interested in Copilot for Security. This brief introduction shows the current capabilities and value of Copilot for Security.
+2
Applicable to:
AI & Machine Learning
Security
24 out of 60
Sentinel Engagement WorkshopOrange Cyberdefense GlobalGain a bird’s eye view across your enterprise with SIEM for a modern world.
+1
Applicable to:
Security
25 out of 60
SoftwareOne Managed Extended Detection and Response for Microsoft SentinelSoftwareOneFuture-proof your cyber security with Managed Detection and Response (MDR)
+2
Applicable to:
Analytics
Security
26 out of 60
Azure AD Identity Protection AssessmentAVASOFTOur Azure AD Identity Protection Assessment identifies vulnerabilities and strengthens security. Mitigate risks with advanced threat detection and tailored defense strategies.
+2
Applicable to:
Identity
Security
27 out of 60
Single Sign On (SSO) for Applications using Entra ID by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user access. Simplify authentication with SSO, reduce password fatigue, and enhance security and productivity.
+2
Applicable to:
Identity
Security
28 out of 60
AVASecure 360 - Entra ID Access Management Solutions by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user provisioning, access requests, and reviews. Enhance security, efficiency, and compliance effortlessly.
+2
Applicable to:
Identity
Security
29 out of 60
Microsoft Azure AD AuthenticationAVASOFTStruggling with user access management? Azure AD Authentication automates provisioning, access requests, and reviews, enhancing security, efficiency, and compliance.
+2
Applicable to:
Identity
Security
30 out of 60
Dell Implementation Services for Backup on Microsoft AzureDell Technologies ServicesAttain strategic data protection policy guidance and recommendations.
+2
Applicable to:
Backup
Security
31 out of 60
I-Nxt Virtual DesktopCognizantAccelerate the deployment of a highly scalable, secure and flexible Azure Virtual Desktop (AVD) by utilizing Nerdio Manager for Enterprise.
+2
Applicable to:
Networking
Security
32 out of 60
Security Testing: 2-Week AssessmentELEKSEnsure the protection of your Microsoft Azure/Hybrid infrastructure and Azure-based applications with ELEKS' Security Testing Services.
+3
Applicable to:
DevOps
Networking
Security
33 out of 60
Strengthen Your Azure Security - 3 days Comprehensive Risk AssessmentAVASOFTIdentify and address security gaps in Azure with our Risk Assessment. Gain insights, tailored recommendations, and best practices to strengthen your security and maintain compliance.
+2
Applicable to:
Identity
Security
34 out of 60
On-premises Active Directory Infra AssessmentAVASOFTOur On-Premises AD Infrastructure Assessment identifies vulnerabilities and compliance gaps. Strengthen security and ensure compliance with actionable insights and expert recommendations.
+2
Applicable to:
Identity
Security
35 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
36 out of 60
Dell Implementation Services for Microsoft Defender on CloudDell Technologies ServicesAdvisory and Deployment services aligned to your cloud security objectives, enabling you to gain comprehensive visibility of your cloud security posture across your environments.
+1
Applicable to:
Security
37 out of 60
Azure Cost OptimizationH One (Private) LimitedUnexpectedly high bills can be a frustrating surprise, and Azure billing is no different. Keeping a close watch on your Azure expenditures can help you stay within budget and avoid unnecessary costs.
+3
Applicable to:
Networking
Security
Storage
38 out of 60
ConXioN Cloud Center of Excellence - Infra/Network Monitoring & Azure X-RayConXioN BVConXioN offers a Cloud Center of Excellence to help customers effectively integrate and implement Azure within their organization
+3
Applicable to:
Backup
Networking
Security
39 out of 60
API Release Process into Azure API ManagementSolidify ABSetup of API Management and lifecycle processes around APIs
+3
Applicable to:
DevOps
Networking
Security
40 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
42 out of 60
Kyndryl IAM Design and Implementation ServicesKyndryl Inc.Kyndryl IAM Services provide IAM solutions for hybrid and cloud environments using Microsoft Entra. Focus on user authentication, identity governance, and secure access with Zero Trust principles.
+3
Applicable to:
Backup
Identity
Security
43 out of 60
Azure Health CheckWIZARD GROUP LIMITEDThis service guides Azure Deployments to optimise costs, enhance security, and align architecture with industry standards, maximising Azure Cloud Infrastructure benefits
+3
Applicable to:
Networking
Security
Storage
44 out of 60
QA assessmentCiklumAnalyze testing processes & practices.
Get the GAP analysis against a hybrid approach containing practises from TMMi and TPI.
Receive overall maturity evaluation.
+3
Applicable to:
Analytics
DevOps
Security
45 out of 60
Hybrid AD Identity Security AssessmentAVASOFTOur Hybrid AD Identity Security Assessment identifies vulnerabilities and compliance gaps. Fortify your Hybrid AD, enhance security, and ensure compliance with actionable insights.
+2
Applicable to:
Identity
Security
46 out of 60
Setup Azure Landing Zone: 6 weeks ImplementationPeritos SolutionsWe've designed the framework for organizations migrating to Azure. The Azure Landing Zone sets best practices for streamlined, secure, and efficient setups, ideal for confident cloud transitions.
+3
Applicable to:
DevOps
Migration
Security
47 out of 60
Gouvernance de vos environnements AzureProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans la gouvernances de vos environnements Azure
+3
Applicable to:
Analytics
Security
Storage
48 out of 60
Optimisez vos coûts AzureProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans l'optimisation des coûts sur Azure
+2
Applicable to:
Security
Storage
49 out of 60
Migration vers AzureProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans votre migration vers Azure
+3
Applicable to:
Identity
Migration
Security
50 out of 60
softip_landing_zoneSOFTIP, a.s.Softip solution using terraform technology can help you quickly deploy an Azure environment that is alligned with CAF, Azure Security Baseline (ASB/MCSB), OWASP, GDPR, and SOFTIP best practises.
+3
Applicable to:
DevOps
Networking
Security
51 out of 60
Intune Assessment - 1 Day WorkshopValtoAn assessment of the Microsoft 365 Intune Environment checking all services within the platform and covering off additional tools available in your organisation to assist with MDM.
+3
Applicable to:
Backup
Networking
Security
52 out of 60
Infrastructure Migration to Azure with Click2Cloud - An AMM PartnerCLICK2CLOUD INCMigrate your infrastructure workload to Azure Cloud with Click2Cloud’s Migration and Modernization service offerings, ensuring a seamless transition, optimization, and support.
+3
Applicable to:
Migration
Security
Storage
53 out of 60
Data Security - Implementation (30 days)Inetum (HO)Inetum offer comprehensive solutions for protecting, classifying and managing data, while complying with European confidentiality standards.
+2
Applicable to:
Big Data
Security
54 out of 60
Endpoint Security - Implementation (30 days)Inetum (HO)Inetum's offering focuses on endpoint security using Microsoft Intune. It combines essential elements to ensure device protection and compliance, while integrating artificial intelligence features.
+2
Applicable to:
Identity
Security
55 out of 60
Identity Protection - Implementation (30 days)Inetum (HO)A comprehensive approach to protecting user identities, guaranteeing data confidentiality, and preventing potential threats with Inetum
+2
Applicable to:
Identity
Security
56 out of 60
Cognizant offering for Oracle Database@AzureCognizantMigrate your critical Oracle workloads to Azure leveraging Cognizant’s expertise in Discovery, Analysis, Sizing, Oracle license management and migration of Oracle Databases to Oracle Database@Azure
+3
Applicable to:
Migration
Networking
Security
57 out of 60
Rackspace Managed XDR powered by Microsoft SentinelRackspaceSecure your digital assets with Rackspace Managed XDR, blending Microsoft Sentinel, advanced threat detection, SOC analysts, and AI-driven response.
+1
Applicable to:
Security
58 out of 60
DXC's Microsoft Copilot for Security Readiness AssessmentDXCMicrosoft’s Copilot for Security is a disruptive generative AI technology designed to enhance security operations.
+1
Applicable to:
Security
59 out of 60
Traceability and Verification System: 0.5-day BriefingReplyJoin us for a half-day briefing on Solidsoft Reply's Traceability and Verification System (TRVST), our innovative solution to combating the proliferation of falsified medicines.
+3
Applicable to:
App Modernization
Big Data
Security
60 out of 60