फ़िल्टरसभी साफ़ करें
Professional Services परिणाम
professional services में परिणाम दिखाना/दिखा रहे हैं.
Cloud Security Approach: 2-months AssessmentPyxisThrough the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
+3
Applicable to:
Analytics
Identity
Security
1 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxisEvolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
+3
Applicable to:
Analytics
Identity
Security
2 out of 60
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
3 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
4 out of 60
Cloud Security Compliance: 4-months AssessmentPyxisThe CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
+3
Applicable to:
Analytics
Identity
Security
5 out of 60
Cloud Security Services: 12-months ImplementationPyxisWe audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
+3
Applicable to:
Analytics
Identity
Security
6 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield LtdSpartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
+3
Applicable to:
Identity
Migration
Security
7 out of 60
Accelerating Cloud Virtual Desktops: 2-Hour WorkshopSlalom ConsultingThis Free Workshop will introduce you to how Azure Virtual Desktops help you embrace a remote workforce while maintaining control through secure workstation experiences on any device.
+3
Applicable to:
Identity
Migration
Networking
8 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology HoldingOur offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
+3
Applicable to:
Identity
Security
Storage
9 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private LimitedWe help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
+3
Applicable to:
Identity
Migration
Security
10 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
+3
Applicable to:
Identity
Migration
Security
11 out of 60
Privileged Identity Management JumpstartSteeves Understand and control privileged accounts with a simple to implement solution
+2
Applicable to:
Identity
Migration
12 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology HoldingGet a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
+3
Applicable to:
Identity
Security
Storage
13 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam FranceSecure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
+2
Applicable to:
Identity
Networking
14 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
15 out of 60
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to:
App Modernization
Identity
16 out of 60
Azure Security Accelerator SuiteNeudesicMitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
+3
Applicable to:
Identity
Networking
Security
17 out of 60
Managed Services for Microsoft EntraDXCAdvisory and Managed Services for Microsoft Entra
+2
Applicable to:
Identity
Security
18 out of 60
Security Discovery: 4-Wk AssessmentProServeITA security discovery & assessment will provide a new understanding of cyber threat trends & let you know where to start. Ensure your business continuity, protect your reputation & instill trust.
+2
Applicable to:
Identity
Security
19 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARSALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
+3
Applicable to:
App Modernization
Identity
Migration
20 out of 60
Security Level Up: 4-Wk ImplementationProServeITBuild your security baseline environment and level it up with the appropriate Microsoft cybersecurity technologies. Ensure your business continuity even after a cyberattack & protect your reputation.
+2
Applicable to:
Identity
Security
21 out of 60
Security Managed Services Consulting: 12-Month ImplementationProServeITEnhance your cybersecurity baseline & take it to a higher standard with appropriate Microsoft cybersecurity technologies. Proactive measures & regular audits will ensure business continuity.
+2
Applicable to:
Identity
Security
22 out of 60
Bulletproof 365 Enterprise: MXDR Service (Sentinel and Defender for Cloud)Bulletproof Solutions Inc.With the combination of SIEM+DfC, Bulletproof 365 Enterprise is a seamless, intelligent end-to-end managed security service for Microsoft-powered organizations in one cost-effective package.
+2
Applicable to:
Identity
Security
23 out of 60
CloudPOS: 4-Week ImplementationMediasoft Data Systems LimitedThe all-in-one cloud-based point-of-sale solution. Boost efficiency, streamline operations, and enhance the customer experience with the user-friendly, secure, and fast software solutions.
+3
Applicable to:
Analytics
Archive
Identity
24 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTDDotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
+3
Applicable to:
App Modernization
Identity
Storage
25 out of 60
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITEDProvide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
+3
Applicable to:
Analytics
Data Platform
Identity
26 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
27 out of 60
Security as a Service: 3-Wk ImplementationA3Cloud SolutionsImprove your security of your solutions and infrastructures in Azure Cloud.
+3
Applicable to:
Identity
Migration
Security
28 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
29 out of 60
Microsoft Intune - Initial Setup for Windows devices: 2-Wk Consulting ServiceIT Partner LLCComprehensive support to customers in their journey of leveraging Microsoft Azure, particularly in getting started with or expanding their utilization of the platform.
+3
Applicable to:
Identity
Migration
Security
30 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
31 out of 60
AVD Cost Optimization ProgramTechPlus TalentAre you looking to maximize the value of your Azure Virtual Desktop (AVD) environment while minimizing costs? Look no further! Tech Plus Talent is thrilled to present our Azure AVD Cost Optimization P
+3
Applicable to:
Backup
Identity
Security
32 out of 60
Microsoft Copilot Readiness AssessmentGC Brokers Inc.Ensure organizational readiness for the release of Microsoft Co-Pilot. Ensure your organization is ready for the adoption of this groundbreaking new technology.
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
33 out of 60
Microsoft Entra Verified ID: 6-week Proof of ConceptOxford Computer Group LLCOxford Computer Group's Microsoft Entra Verified ID Proof of Concept can help you discover the power and benefits of authentic verifiable credentials.
+2
Applicable to:
Identity
Security
34 out of 60
Credential Manager: 5-Day Implementation SolutionCreospark Consulting Services IncThis solution harnesses the capabilities of Dataverse, Power Apps, Power Automate, and Azure Key Vault technologies to redefine how organizations protect sensitive user credentials and information.
+3
Applicable to:
Backup
Identity
Security
35 out of 60
User Profile Manager: 5-Day Implementation SolutionCreospark Consulting Services IncThis solution offers users a window into their access privileges, allowing them to effortlessly navigate their information and files.
+2
Applicable to:
Archive
Identity
36 out of 60
Microsoft & Multi-Cloud Security Penetration Testing: 5-Day AssessmentBDO LLPCREST certified Ethical Hackers from BDO perform penetration tests on your Microsoft and Multi-Cloud environment and test the setup of Microsoft Azure AD, Defender, Sentinel and Purview.
+3
Applicable to:
Identity
Security
Storage
37 out of 60
Azure Security Assessment (3 Weeks)Bulletproof Solutions Inc.The offer provides a comprehensive report of security gaps and recommendations for an Azure Environment.
+3
Applicable to:
Identity
Security
Storage
38 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
39 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
+2
Applicable to:
Identity
Security
40 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoormyCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
+3
Applicable to:
Identity
Networking
Security
41 out of 60
24x7 SOC Service by IntelequiaIntelequia Technologies24x7 monitoring, protection and automated response to cyberthreats
+3
Applicable to:
Analytics
Identity
Security
42 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
43 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
44 out of 60
Microsoft 365 Managed Cloud Virtual Machine ServiceT-Systems International With the “Microsoft 365 Cloud Virtual Machine Service – Azure Virtual Desktop” product, Telekom provides operational and configuration services
+3
Applicable to:
Identity
Networking
Security
45 out of 60
Azure Landing Zone Deployment ServiceLotus Beta AnalyticsThe "Azure Landing Zone Deployment Service" simplifies setting up secure, compliant Azure environments with pre-configured templates, ensuring a solid foundation for cloud operations and governance.
+2
Applicable to:
Identity
Security
46 out of 60
Microsoft Purview Data Governance Consulting & ImplementationKanerikaElevate Data Governance with Kanerika’s Superior Microsoft Purview Implementation Services
+3
Applicable to:
Data Platform
Identity
Security
47 out of 60
BSE Azure Securite 1 day BrieffingProjetlysSécurisez vos données sous Azure et restez en conformité dans un paysage en constante évolution.
+2
Applicable to:
Identity
Security
48 out of 60
Strengthen your Security with AI: Copilot for Security PoCPatriot Consulting Technology Group LLCReadiness Check as we review your existing Defender XDR, Entra ID, Purview & Intune environment
+3
Applicable to:
AI & Machine Learning
Identity
Security
49 out of 60
Copilot for Security Readiness AssessmentAvertium, LLCCopilot for Security readiness assessment will prepare you to defend beyond machine speed.
+2
Applicable to:
Identity
Security
50 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITEDOverwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
+2
Applicable to:
Identity
Security
51 out of 60
Microsoft Entra Private Access - Proof of Concept (PoC)Onevinn ABMicrosoft Entra Private Access, is a cutting-edge Security Service Edge (SSE) solution designed to provide secure, seamless access to private applications and resourses.
+2
Applicable to:
Identity
Security
52 out of 60
Microsoft Entra ID Conditional Access: 10-Day ImplementationWIZARD GROUP LIMITEDdesigned to quickly and effectively deploy Entra ID Conditional Access policies to enhance your organisation's security posture
+3
Applicable to:
Identity
Migration
Security
53 out of 60
Microsoft Purview: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur implementation service aims to streamline the deployment of Microsoft Purview, ensuring that your organization can leverage its full capabilities to make informed decisions
+3
Applicable to:
Identity
Migration
Security
54 out of 60
Microsoft Entra : Quick Start AcceleratorWIZARD GROUP LIMITEDThis service ensures that your organization can quickly leverage the full capabilities of Microsoft Entra ID to enhance security and streamline access management
+3
Applicable to:
Identity
Migration
Security
55 out of 60
Microsoft Purview Quickstart Accelerator Implementation with Wizard CyberWIZARD GROUP LIMITEDThis service ensures that your organization can quickly harness the power of Microsoft Purview to manage and govern your data effectively
+3
Applicable to:
Identity
Migration
Security
56 out of 60
Kanerika Foundation Pack on Microsoft Purview: ImplementationKanerikaKanerika’s Foundation Pack is designed to help organizations kickstart their Data Governance and Compliance implementation effectively
+3
Applicable to:
Big Data
Identity
Security
57 out of 60
Managed XDR Defense for Commercial, GCC, GCCHRSM Product Sales LLCDefend your organization with managed threat detection and response services, emphasizing 24x7 security, automation, and integrated threat intelligence
+3
Applicable to:
Data Platform
Identity
Security
58 out of 60
Azure Virtual Desktop in 30: Six (6)-Week ImplementationLong View SystemsEnhance remote work capabilities and reduce IT infrastructure costs with Azure Virtual Desktop (AVD).
+3
Applicable to:
Identity
Networking
Security
59 out of 60
Active Directory: Free Security and Performance AssessmentMismo Systems Private LimitedWe help you assess your Active Directory environment for security, health, performance, and upgrade readiness, identifying gaps and providing remediation recommendations based on best practices.
+1
Applicable to:
Identity
60 out of 60