FiltriCancella tutto
Professional Services risultati
Visualizzazione di risultati in professional services.
Invillia Secure Governable Data PlatformsInvillia Desenvolvimento de Produtos Digitais LTDASecure, scalable and governable data platform implementation, ensuring compliance, advanced analytics, and full data lifecycle control with Microsoft technologies.
+3
Applicable to:
Analytics
Data Platform
Security
1 out of 60
Azure Security Optimization: 5-Day AssessmentITX360 (Pvt) Ltd.Strengthen your Azure cloud security with ITX360’s 5-day expert assessment. Identify risks, evaluate configurations, and receive actionable recommendations aligned with Zero Trust.
+1
Applicable to:
Security
2 out of 60
Microsoft Purview Migration Accelerator - 1 Week Proof of Concept EngagementMAQ SoftwareTransform your data governance with our 1-Week Proof of Concept Pilot for Microsoft Purview to streamline data governance, enhance security, and ensure compliance.
+3
Applicable to:
Identity
Migration
Security
3 out of 60
Invillia DevSecOps ImplementationInvillia Desenvolvimento de Produtos Digitais LTDASoluções completas de DevSecOps que integram segurança desde o início do desenvolvimento, promovendo automação, compliance contínuo e resposta proativa a incidentes.
+3
Applicable to:
App Modernization
DevOps
Security
4 out of 60
Nimtech Cloud Journey Assessment - NetworkNimtechStart your Azure Cloud Journey with a comprehensive Cloud Adoption Framework (CAF) workshop, tailored to your network infrastructure needs
+2
Applicable to:
Networking
Security
5 out of 60
Software AuditSSA GroupSoftware Audit for custom Azure solutions of any type and complexity
+3
Applicable to:
App Modernization
Migration
Security
6 out of 60
Securing Your CI/CD Pipelines: 1 Month Implementation ProjectFuturice OyFuturice team of certified experts will secure your CI/CD pipelines with Azure DevOps and GitHub Advanced Security.
+2
Applicable to:
DevOps
Security
7 out of 60
Azure Well-Architected Assessment: 1 Month Assessment ProjectFuturice OyFuturice team of certified experts will conduct comprehensive Well-Architected assessment of your Azure workloads.
+3
Applicable to:
Data Platform
DevOps
Security
8 out of 60
Landing zone design and implementation: 3 Months Implementation ProjectFuturice OyFuturice team of certified experts will design and implement your Azure Landing Zone.
+3
Applicable to:
App Modernization
Networking
Security
9 out of 60
Quorum Cyber Security Maturity AssessmentQuorum CyberEvaluate your current cybersecurity posture, identify critical gaps and receive actionable insights tailored to your business needs - ensuring you are prepared, protected, and positioned
+1
Applicable to:
Security
10 out of 60
Quorum Cyber Microsoft Security Copilot - AI Integration SolutionsQuorum CyberEnable AI with Microsoft Security Copilot to enhance threat detection, streamline operations, and boost cybersecurity efficiency.
+1
Applicable to:
Security
11 out of 60
LBAN CloudSecure – Secured by Microsoft Defender for CloudLotus Beta AnalyticsLBAN CloudSecure delivers end-to-end Azure protection with Microsoft Defender for Cloud—boosting security, compliance, and visibility across your cloud workloads.
+2
Applicable to:
Identity
Security
12 out of 60
Windows in Cloud AssessmentTask Systems LimitedUnlock Azure Virtual Desktop Success: Expert-Led WVD Assessment & Migration Blueprint
+3
Applicable to:
Identity
Migration
Security
13 out of 60
Blue Cycle WAF Implementation ServiceBlue Cycle LLCThis consulting service will design, test, and implement an Azure Web Application Firewall in front of One (1) Azure Application.
+3
Applicable to:
DevOps
Networking
Security
14 out of 60
Unlock the Full Potential of Microsoft Copilot with Governed DataCarbon60 Operating Co. LtdC60 Digital and Cyera empower your organization to establish a secure, trusted data foundation, enabling confident and responsible AI adoption that drives tangible business value.
+2
Applicable to:
Data Platform
Security
15 out of 60
IDProof+: High-Assurance Identity for Remote Users with Microsoft Entra Verified IDOxford Computer Group LLCRemote hiring is increasingly targeted by sophisticated scammers. How can you confidently verify the identity of remote candidates?
+2
Applicable to:
Identity
Security
16 out of 60
IBM Technology Expert Labs EXPERTISE CONNECT for QRadar Suite OfferingIBM SoftwareIBM Expertise Connect for QRadar Suite monthly subscription based, fixed priced, part number offering allows you to access a "just in time" technical consultant to advise and consult.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
17 out of 60
Microsoft Sentinel ConfigurationTechNet UC LLCTechNet UC is proud to offer a comprehensive configuration service for Microsoft Sentinel, designed to optimize your security operations and enhance threat detection capabilities.
+3
Applicable to:
Analytics
Disaster Recovery
Security
18 out of 60
Access Management AppExponential Digital Solutions Private LimitedA solution designed to automate the quarterly review of access privileges, ensuring seamless governance, improved efficiency, and enhanced security.
+3
Applicable to:
App Modernization
Identity
Security
19 out of 60
Identity Management AssessmentTTEC DigitalStrengthen security and streamline access across your organization with modern identity solutions. Assess your identity environment and get a modernization plan using Microsoft Entra ID, Conditional A
+2
Applicable to:
Identity
Security
20 out of 60
Azure Landing Zone Health CheckTTEC DigitalAccelerate secure cloud adoption with a scalable foundation. Evaluate your Azure environment and receive a tailored Landing Zone blueprint aligned to Microsoft’s Cloud Adoption Framework.
+2
Applicable to:
Networking
Security
21 out of 60
Microsoft Entra Privileged Identity Management ConfigurationTechNet UC LLCConfigure Microsoft Entra PIM to enforce least privilege, enable just-in-time access, and reduce risk with real-time auditing, approval workflows, and Conditional Access integration.
+3
Applicable to:
Analytics
Identity
Security
22 out of 60
Amdocs Cloud Development Environment SolutionAmdocsReimagine DevX by using Amdocs Cloud Development Environment to securely provision any infrastructure, AI agent, OS, or IDE — from VMs to Kubernetes, Jupyter to VS Code.
+3
Applicable to:
DevOps
Migration
Security
23 out of 60
Microsoft Copilot for Security Workshop by OnevinnOnevinn ABIn this expert-led workshop, you’ll learn how to use generative AI to strengthen your security posture, empower your security teams, and make data-driven decisions faster.
+3
Applicable to:
AI & Machine Learning
Identity
Security
24 out of 60
Modern DevOps with GitHub On AzureInfoMagnus LLC Adopt Modern DevOps with GitHub on Azure—streamline CI/CD, enhance security, and accelerate releases with tailored strategies, expert guidance, and ongoing transformation support.
+3
Applicable to:
DevOps
Migration
Security
25 out of 60
GitHub Advanced Security (GHAS) Suite of Services.InfoMagnus LLC End-to-end GitHub Advanced Security services: POC, POV, Azure DevOps integration, and tailored adoption. Protect your code, ensure compliance, and embed security into DevOps workflows.
+3
Applicable to:
DevOps
Migration
Security
26 out of 60
GitHub Migration WorkshopInfoMagnus LLC A 3-day, hands-on GitHub Migration Workshop equipping teams with strategies, tools, and repeatable processes for seamless VCS-to-Git transitions. Offers post-workshop office hours for ongoing support.
+3
Applicable to:
DevOps
Migration
Security
27 out of 60
GitHub API TrainingInfoMagnus LLC In this hands-on training, participants learn to use the GitHub REST and GraphQL APIs, Octokit, and webhooks to create integrations that automate and enhance Microsoft Azure-based DevOps pipelines.
+3
Applicable to:
DevOps
Migration
Security
28 out of 60
GitHub Advisory ServicesInfoMagnus LLC On-demand GitHub advisory to optimize Azure-integrated DevOps workflows aligning strategy, security, and collaboration to extend Microsoft cloud adoption and value.
+3
Applicable to:
DevOps
Migration
Security
29 out of 60
GitHub for DevelopersInfoMagnus LLC In this two-day, instructor-led workshop, developers learn to use Git and GitHub for building, collaborating, and managing code in Azure-based workflows.
+3
Applicable to:
DevOps
Migration
Security
30 out of 60
Data Security & DLP Workshop: 1-Day Strategic WorkshopAtmoseraIdentify sensitive data risks and strengthen protection with a Microsoft Purview-led workshop.
+3
Applicable to:
Data Platform
Disaster Recovery
Security
31 out of 60
Github Actions TrainingInfoMagnus LLC In this workshop, participants learn how to use GitHub Actions to automate build, test, and deployment pipelines for Microsoft Azure environments.
+3
Applicable to:
DevOps
Migration
Security
32 out of 60
Azure Migration Jumpstart: 1-Week Strategic WorkshopAtmoseraNo-cost AVS migration to validate Azure value and accelerate cloud modernization.
+2
Applicable to:
Migration
Security
33 out of 60
Cloud Security Posture ManagementTELEPERFORMANCECloud Security Posture Management (CSPM) aims to continuously monitor, assess, and improve the security configuration of cloud environments to prevent breaches, ensure compliance, and reduce risk.
+2
Applicable to:
Identity
Security
34 out of 60
Secure Automation with Azure DevOps & GitHubBDOTransform the way you manage your digital estate & application workloads with automation powered by Azure DevOps & GitHub
+3
Applicable to:
App Modernization
DevOps
Security
35 out of 60
Modernize Your Legacy Software with AIiFour Technolab Private LimitedIn this session we will explore how intelligence automation, predictive analytics and conversational AI can breathe new life into your software and create a practical future ready modernization plan.
+3
Applicable to:
AI & Machine Learning
Migration
Security
36 out of 60
Comprehensive IT Security AssessmentiLink Systems, Inc.Assess and strengthen your organization's security posture by uncovering vulnerabilities, mitigating risks, and building resilience against evolving cyber threats across cloud and hybrid environments.
+1
Applicable to:
Security
37 out of 60
AI Chatbot for Patient Support – 2-Week MVP BuildiFour Technolab Private LimitedIn just 2 weeks, we’ll help you launch a secure, HIPAA-compliant chatbot that’s simple, smart, and built for growth.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
38 out of 60
Azure & Microsoft 365 Licensing Audit - 2-Hour Cost Optimization ReviewiFour Technolab Private LimitedOur 2-Hour Azure and Microsoft 365 Licensing Audit is designed to quickly uncover hidden savings, optimize your license usage and make your setup aligns with compliance needs.
+3
Applicable to:
Analytics
Migration
Security
39 out of 60
NIS2 Rapid Readiness Check for AzureFuture Processing S.A.Free, one-day Azure security assessment for NIS2 compliance. Identify IAM, storage, and network risks with expert recommendations from Future Processing cybersecurity specialists.
+3
Applicable to:
App Modernization
Disaster Recovery
Security
40 out of 60
Ctelecoms Secure Multi-Cloud Environments WorkshopConsolidated Telecoms (Ctelecoms)Secure Multi-Cloud Environments Workshop to gain insights on active threats and vulnerabilities related to our hybrid and multi-cloud workloads by using Microsoft Defender for Cloud.
+2
Applicable to:
Networking
Security
41 out of 60
AI Ignition - (not MarketPlace transactable)OBT Live AI Ignition - Rapidly deploy secure and scalable AI solutions with measurable business impact in weeks
+3
Applicable to:
Analytics
AI & Machine Learning
Security
42 out of 60
LBA KubeXpress - Fast track AKS DeploymentLotus Beta AnalyticsLBA KubeXpress rapidly deploys secure, production-ready AKS clusters—accelerating your journey to containerized workloads on Azure.
+3
Applicable to:
App Modernization
DevOps
Security
43 out of 60
IBM Technology Expert Labs ADVISE Auatomation Hashicorp non-SaaS and SaaS Offerings CONTACT MEIBM SoftwareBM Technology Expert Labs ADVISE Hashicorp remotely delivered, no "hands on keyboard", comprehensive product-oriented professional services offerings for non-SaaS and SaaS products.
+2
Applicable to:
Disaster Recovery
Security
44 out of 60
Cloud4C Advanced Network Security and AccessCloud4C Services Pte LtdCloud4C’s Advanced Network Security and Access protects cloud perimeters with Azure Firewall, WAF, DDoS, Front Door, Bastion, and Zero Trust controls for secure, resilient, and compliant connectivity.
+3
Applicable to:
Identity
Networking
Security
45 out of 60
Cloud4C Microsoft Sentinel Enterprise DeploymentCloud4C Services Pte LtdCloud4C’s Microsoft Sentinel Enterprise Deployment accelerates SIEM adoption with structured rollout, customization, training, and optimization for enterprise-scale threat detection and response
+3
Applicable to:
Analytics
Migration
Security
46 out of 60
Cloud4C External Attack Surface Assessment (EASM + MDTI)Cloud4C Services Pte LtdCloud4C’s External Attack Surface Assessment uses Microsoft Defender EASM + MDTI to uncover shadow IT, misconfigurations, CVEs, and risks, delivering dashboards and remediation plans
+3
Applicable to:
Identity
Networking
Security
47 out of 60
Cloud4C Entra Governance & Compliance SuiteCloud4C Services Pte LtdCloud4C’s Entra Governance & Compliance Suite delivers identity governance, protection, and privileged access management with audit-ready workflows to strengthen compliance and reduce insider risks
+3
Applicable to:
Analytics
Identity
Security
48 out of 60
Cloud4C Zero Trust Readiness and StrategyCloud4C Services Pte LtdCloud4C’s Zero Trust Readiness and Strategy delivers maturity assessment, tailored architecture, and phased rollout planning with Microsoft Defender integrations for secure Zero Trust transformation
+3
Applicable to:
Identity
Networking
Security
49 out of 60
Cloud4C Security Posture AssessmentCloud4C Services Pte LtdCloud4C’s Security Posture Assessment delivers Zero Trust–aligned advisory with Secure Score reviews, Defender telemetry, workshops, and board-ready reporting to strengthen enterprise security.
+3
Applicable to:
Identity
Networking
Security
50 out of 60
Cloud4C OT & IoT Security AssessmentCloud4C Services Pte LtdThis assessment leverages Microsoft Defender for IoT to map assets, model threats, and deliver vulnerability reports with a remediation roadmap for industrial and connected environments.
+3
Applicable to:
Identity
Networking
Security
51 out of 60
Cloud4C Microsoft Cloud Security – Enterprise SuiteCloud4C Services Pte LtdCloud4C’s Microsoft Cloud Security – Enterprise Suite delivers unified protection with CNAPP, DevSecOps, WAF/DDoS, data security, and confidential computing in one enterprise-grade Zero Trust package.
+3
Applicable to:
Identity
Networking
Security
52 out of 60
Cloud4C Developer & DevOps Security BundleCloud4C Services Pte LtdCloud4C’s Developer & DevOps Security Bundle secures applications, workloads, and CI/CD pipelines with Entra Workload ID, PIM, and Conditional Access, supported by developer-focused onboarding.
+3
Applicable to:
DevOps
Identity
Security
53 out of 60
Cloud4C Confidential & Identity-Aware ComputingCloud4C Services Pte LtdCloud4C’s Confidential & Identity-Aware Computing secures data-in-use with Azure Confidential VMs, Managed HSM, Key Vault, and encryption policies for privacy-preserving, compliance-ready workloads.
+3
Applicable to:
Identity
Networking
Security
54 out of 60
Cloud4C Microsoft Copilot for Security –Readiness AssessmentCloud4C Services Pte LtdCloud4C’s Microsoft Copilot for Security Readiness Assessment identifies gaps, delivers recommendations, and builds a roadmap for smooth adoption of AI-driven security operations
+3
Applicable to:
AI & Machine Learning
Identity
Security
55 out of 60
Cloud4C Awareness Training + Incident WorkshopCloud4C Services Pte LtdThis readiness workshop delivers security training, phishing simulations, and tabletop incident response exercises to build employee resilience and organizational preparedness
+3
Applicable to:
Identity
Networking
Security
56 out of 60
Cloud4C Azure Identity Foundation AcceleratorCloud4C Services Pte LtdCloud4C’s Entra Zero Trust Starter Pack delivers identity, conditional access, privileged identity management, and secure private access to help organizations launch their Zero Trust journey
+3
Applicable to:
Identity
Networking
Security
57 out of 60
Cloud4C Microsoft Purview Data Protection OfferingCloud4C Services Pte LtdCloud4C’s Microsoft Purview Data Protection unifies discovery, classification, and compliance with AI-driven governance to prevent data loss and risks across Microsoft 365, Azure, and hybrid estates
+3
Applicable to:
Analytics
Identity
Security
58 out of 60
Cloud4C Defender for Office 365 Deployment OfferingCloud4C Services Pte LtdCloud4C’s Defender for Office 365 Deployment secures email and collaboration tools with expert setup, testing, and best practices to reduce threats, boost trust, and ensure compliant communication
+3
Applicable to:
Analytics
Identity
Security
59 out of 60
Cloud4C Intune Endpoint Compliance & Security Suite OfferingCloud4C Services Pte LtdCloud4C’s Intune Endpoint Compliance & Security Suite secures devices, enforces compliance, and streamlines endpoint management with Microsoft Intune, Defender for Endpoint, and Entra ID integration.
+3
Applicable to:
Analytics
Identity
Security
60 out of 60