Invia feedback
Help & support
Elementi salvati
Piani privati
Accesso in corso, attendi qualche istante...
FiltriCancella tutto

  • Località dell'utente
  • Prodotti (1)
    • Azzurro (1)
      • AI & Machine Learning
      • Analisi
      • App Modernization
      • Archive
      • Backup
      • Big Data
      • Data Platform
      • DevOps
      • Disaster Recovery
      • Identity
      • Internet of Things
      • Migration
      • Networking
      • Security
      • Storage
    • Dynamics 365
    • Microsoft 365
    • Power Platform
  • Settori (1)
    • Difesa e intelligence
    • Distribuzione
    • Istruzione
    • Energia e risorse
    • Servizi finanziari
    • Enti pubblici
    • Sanità
      • Life Sciences
      • Pagatore
      • Provider
    • Accoglienza e viaggi
    • Produzione e mobilità
    • Organizzazioni no profit
    • Servizi professionali
    • Vendita al dettaglio e beni di consumo
    • Sostenibilità
    • Telecomunicazioni e media
  • Tipo di servizio
  • Modello di determinazione prezzi

Professional Services risultati

Visualizzazione di risultati in professional services.
Cloud Security Posture: 2-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
1 out of 60
Cloud Security Deployment: 4-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Implementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
2 out of 60
Cloud Security Compliance: 4-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
3 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield Ltd
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Spartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
4 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Delivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
5 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.ai
+1
Applicable to:
identity product iconIdentity
Implementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
6 out of 60
Modern Authentication: 2 Days ImplementationVigilant.IT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
One of the most vulnerable elements in your environment is the security of staff mobile devices
7 out of 60
HCLTech Unified Digital AccessHCL America Inc_HCLT
+1
Applicable to:
identity product iconIdentity
HCLTech’s Unified Digital Access solution protects enterprise users and apps from cybersecurity attacks by aiding with right enterprise security posture with easy access to Apps and services.
8 out of 60
Accelerating Cloud Virtual Desktops: 2-Hour WorkshopSlalom Consulting
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationnetworking product iconNetworking
This Free Workshop will introduce you to how Azure Virtual Desktops help you embrace a remote workforce while maintaining control through secure workstation experiences on any device.
9 out of 60
Azure Governance Assessment - 1 DayInde
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
1 Day Governance Assessment to review and provide recommendations to improve your Azure governance level
10 out of 60
skillup_consulting_openedx_v1Flexible Road LLC
+3
Applicable to:
backup product iconBackupidentity product iconIdentitystorage product iconStorage
Open edX Learning Management System with Azure.
11 out of 60
Defend Against Threats with SIEM Plus XDRBJSS Limited
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Improve your security posture and uncover risks that might be harmful to your organisation with BJSS' cyber security workshop: Defend Against Threats with SIEM Plus XDR.
12 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitynetworking product iconNetworking
Secure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
13 out of 60
Assesment Azure Base4Base4 Security Chile SPA
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
14 out of 60
Security - Sentinel- 4 week ImplementationLinktech Australia
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
This engagement is an accelerated program that will help your organisation implement and take full advantage of Microsoft Sentinel to review and manage the detect and response capabilities.
15 out of 60
Azure Security Accelerator SuiteNeudesic
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Mitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
16 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitystorage product iconStorage
DotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
17 out of 60
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITED
+3
Applicable to:
analytics product iconAnalyticsdata-platform product iconData Platformidentity product iconIdentity
Provide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
18 out of 60
Red Canary Microsoft Sentinel WorkshopRed Canary
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Get an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
19 out of 60
Azure Penetration TestMazzy Technologies Corp.
+3
Applicable to:
data-platform product iconData Platformidentity product iconIdentitysecurity product iconSecurity
This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
20 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Azure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
21 out of 60
Microsoft Intune - Initial Setup for Windows devices: 2-Wk Consulting ServiceIT Partner LLC
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Comprehensive support to customers in their journey of leveraging Microsoft Azure, particularly in getting started with or expanding their utilization of the platform.
22 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
23 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland Oy
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitystorage product iconStorage
Azure Virtual Desktop is not a turnkey service – who is going to run it for you?
24 out of 60
Modern workplace Active DirectorySii Sp. z o.o.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Modern workplace Active Directory implementation, migration and support
25 out of 60
Detection & Response Services (MXDR)Cloud Life
+3
Applicable to:
ai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentitysecurity product iconSecurity
Cloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
26 out of 60
Sentinel-as-a-ServiceCloud Life
+3
Applicable to:
ai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentitysecurity product iconSecurity
Cloud Life delivers an innovative cloud-based AI and ML-enhanced Sentinel-as-a-Service, empowering your team with managed SIEM/SOAR capabilities using optimum Microsoft MXDR Services
27 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta Analytics
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
This solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
28 out of 60
Cloud Realisation: 4-Hour WorkshopQUORUM SYSTEMS PTY LTD
+3
Applicable to:
disaster-recovery product iconDisaster Recoveryidentity product iconIdentitymigration product iconMigration
Begin your Cloud Transformation Journey
29 out of 60
Microsoft & Multi-Cloud Security Penetration Testing: 5-Day AssessmentBDO LLP
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
CREST certified Ethical Hackers from BDO perform penetration tests on your Microsoft and Multi-Cloud environment and test the setup of Microsoft Azure AD, Defender, Sentinel and Purview.
30 out of 60
Eviden's Application Strategy WorkshopEviden International France - SAS
+3
Applicable to:
app-modernization product iconApp Modernizationdata-platform product iconData Platformidentity product iconIdentity
Eviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
31 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
32 out of 60
KloudIdentity: Application Onboarding to Entra made simple with our SCIM GatewayKloudyNet Technologies SDN BHD
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
KloudIdentity is our proprietary SCIM Gateway to onboard LOB & Cloud applications (including non SCIM compliant), databases and other applications to Microsoft Entra for users and groups provisioning.
33 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SAS
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Utilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
34 out of 60
Eviden's Data Security CSI Engagement 4 Week AssessmentEviden International France - SAS
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Elevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
35 out of 60
Eviden's Azure Cloud Consulting Services – Landing ZonesEviden International France - SAS
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
A consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
36 out of 60
HCLTech's Cybersecurity ServicesHCL Technologies Limited.
+3
Applicable to:
backup product iconBackupidentity product iconIdentitysecurity product iconSecurity
HCLTech is a leading global technology company that helps enterprises reimagine their businesses for the digital age. Secure your cloud journey with HCLTech's comprehensive portfolio of cybersecurity
37 out of 60
Workshop for Azure Cost Optimization using FinOpsSii Sp. z o.o.
+2
Applicable to:
devops product iconDevOpsidentity product iconIdentity
Control your costs in the cloud with the FinOps methodology
38 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Entra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
39 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies Services
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
With Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
40 out of 60
Seamless social app identity integrationAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Our solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
41 out of 60
Enterprise App Integration with Microsoft My Apps PortalAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Our solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
42 out of 60
Azure Zero Trust Assessment: 1 Day WorkshopSlalom Consulting
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Create your Azure security foundation: We will work with your organization's security and infrastructure leaders to create a point-in-time snapshot of where you are in your security journey.
43 out of 60
HIPAA Compliance Risk Assessment & Gap AnalysisAvertium, LLC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Avertium’s team of healthcare and security consultants apply their deep knowledge of compliance to the way you do business.
44 out of 60
Microsoft Purview Information Protection: 12-Wk ImplementationUNIFY Solutions Pty. Ltd.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
UNIFY Solutions will deploy Microsoft Purview Information Protection to proactively protect and monitor your information as it moves between users and devices within your organisation and externally.
45 out of 60
MIM Migration To Entra ID Assessment: 8-Wk AssessmentModern 42
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Microsoft Identity Manager Current state assessment and transition plan to Microsoft Entra ID
46 out of 60
Microsoft Purview Services from UNIFY SolutionsUNIFY Solutions Pty. Ltd.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Comprehensive Microsoft Purview Services for data governance and security
47 out of 60
Microsoft Endpoint Security Services: 4-Wk ImplementationUNIFY Solutions Pty. Ltd.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Comprehensive Microsoft Endpoint Security services, providing enterprise data safety, regulatory compliance, and operational continuity.
48 out of 60
Microsoft Entra Deployment: 12-Wk ImplementationUNIFY Solutions Pty. Ltd.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Comprehensive Microsoft Entra Design, Migrate, and Deploy Services.
49 out of 60
Security Information and Event Management (SIEM) MigrationKyndryl Inc.
+3
Applicable to:
disaster-recovery product iconDisaster Recoveryidentity product iconIdentitysecurity product iconSecurity
Kyndryl SIEM Migration service transitions legacy SIEMs to Microsoft Sentinel, ensuring comprehensive coverage for both on premise and cloud assets. Services include discovery, design, implementation.
50 out of 60
ACSC Essential Eight Maturity AssessmentCanon Business Services ANZ
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Boost your cybersecurity with our Essential Eight Maturity Assessment! Based on ACSC best practices, this evaluation strengthens your defenses and keeps you ahead of threats.
51 out of 60
Accelerate your Cloud Security with Microsoft Defender and SentinelCanon Business Services ANZ
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Our Microsoft Cloud Security Accelerator package is designed to rapidly enhance your security posture, empowering you to efficiently monitor and manage security events.
52 out of 60
Microsoft Sentinel Security Consulting ServiceCanon Business Services ANZ
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Partner with us to integrate seamlessly into your security team. Deploying Microsoft Sentinel will swiftly enhance your security, enabling efficient monitoring and management of incidents.
53 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITED
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Overwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
54 out of 60
Microsoft Entra ID Conditional Access: 10-Day ImplementationWIZARD GROUP LIMITED
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
designed to quickly and effectively deploy Entra ID Conditional Access policies to enhance your organisation's security posture
55 out of 60
Microsoft Purview: 4-8 Week ImplementationWIZARD GROUP LIMITED
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Our implementation service aims to streamline the deployment of Microsoft Purview, ensuring that your organization can leverage its full capabilities to make informed decisions
56 out of 60
Microsoft Entra : Quick Start AcceleratorWIZARD GROUP LIMITED
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
This service ensures that your organization can quickly leverage the full capabilities of Microsoft Entra ID to enhance security and streamline access management
57 out of 60
LTIMindtree Security Identity Assessment As A ServiceLTIMindtree Limited
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
This LTIMindtree offering provides the detailed overview of assessment activities and outcomes tailored for Identity services
58 out of 60
QServices AI-Powered SaaS AutomationQ SERVICES INC
+3
Applicable to:
app-modernization product iconApp Modernizationai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentity
AI-powered SaaS platform for customer support, workflow automation, and efficiency boost.
59 out of 60
Microsoft Identity Security Posture-4h assessmentReply
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Assessment of Microsoft Cloud or Hybrid Identity and Access Management Solution Security Posture
60 out of 60
  • 1
  • 2
  • 3
  • Avanti
Informazioni sul Marketplace
  • Perché scegliere Microsoft Marketplace
  • Blog
  • Storie dei clienti
Per i clienti
  • Orario d’ufficio
  • Guida introduttiva
  • Documentazione tecnica
  • Offerte private
  • Microsoft Azure Consumption Commitment
  • Fatturazione
Per i partner
  • Diventa un partner
  • Entra a far parte della directory
  • Ottieni supporto marketing
  • Documentazione tecnica
  • Istruzioni passo-passo per creare, pubblicare e vendere
  • Diventa idoneo al co-selling
  • Community del Marketplace per i partner
  • Vendite del Marketplace guidate dal canale
  • Offerte private di più parti per i partner di canale
Aziende
  • Microsoft Cloud
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft 365 Copilot
  • Microsoft Teams
  • Piccole imprese
Azienda
  • Opportunità di carriera
  • Informazioni su Microsoft
  • Notizie aziendali
  • Privacy in Microsoft
  • Investitori
  • Accessibilità
  • Sostenibilità
Italiano (Italia) Icona di rifiuto esplicito delle scelte di privacy Le tue scelte sulla privacy Privacy per l'integrità dei consumer
  • Sitemap
  • Contact Us
  • Privacy e cookie
  • Termini d'uso
  • Marchi
  • Informazioni sugli annunci
  • Gestisci i cookie
  • © Microsoft 2025