FiltriCancella tutto
Professional Services risultati
Visualizzazione di risultati in professional services.
Well-Architected Security Assessment (7-day)DexMachValidate your cloud app workloads against best practices and Well-Architected principles. Improve your security posture and gain visibility through insightful reports with recommendations.
+2
Applicable to:
Identity
Security
1 out of 43
EPAM Azure Security: 4 Days WorkshopEPAM SystemsThis holistic workshop will give your team the tools they need to ensure that their Azure cloud workloads meet modern security needs.
+3
Applicable to:
Identity
Networking
Security
2 out of 43
PwC SOC Optimisation: 8-Wk ImplementationPricewaterhouseCoopers UKImprove your ability to detect and respond to cyber attacks using your Microsoft security solutions
+3
Applicable to:
Identity
Internet of Things
Security
3 out of 43
Secure Cloud Shield: 4-Wk ImplementationPricewaterhouseCoopers UKDesign and configure security controls for clients undergoing digital transformation using Microsoft Azure security services.
+3
Applicable to:
Identity
Internet of Things
Security
4 out of 43
Avanade Multi-Cloud SecurityAvanade, Inc.With Avanade's Multi-Cloud Security offering, you can confidently embrace the cloud while maintaining a strong security posture.
+3
Applicable to:
Identity
Networking
Security
5 out of 43
Digital Trusted Identity Advisory: 2-week WorkshopNTT DATA Inc.Identity and Access Management (IAM) Azure AD Advisory 2-week Workshop helps determine how IAM can address key security challenges and enable your adaptive workforce as a dynamic workplace.
+2
Applicable to:
Identity
Security
6 out of 43
Azure Sentinel 3-Day WorkshopZIAASMicrosoft Funded Consultancy 3-Day Workshop for Azure Sentinel
+3
Applicable to:
AI & Machine Learning
Identity
Security
7 out of 43
WVD Horizon Migration - 3 Weeks ImplementationGreeneris Sp. z o.o.Greeneris will help you implement the Windows Virtual Desktops environment along with the Horizon control and management system
+3
Applicable to:
Disaster Recovery
Identity
Migration
8 out of 43
Hybrid Cloud Security Workshop - 3 WeeksIngram Micro India Private LimitedThe engagement involves showcasing in customer’s production environment Azure defender features, discovering real threats to selected hybrid workloads, and analyzing security vulnerabilities.
+3
Applicable to:
Big Data
Identity
Security
9 out of 43
Azure Well-Architected Review 2-Day AssessmentSoftServe Inc.Quickly assess your workload/solution against Azure best practices and industry standards and get actionable recommendations.
+3
Applicable to:
App Modernization
Identity
Security
10 out of 43
Azure Secure Remote Worker : 3-Wk ImplementationNBConsult Holdings (PTY) LtdWindows Virtual Desktop delivers virtual desktops and apps seamlessly from Azure that can be accessed anywhere anytime and from any device.
+3
Applicable to:
Identity
Networking
Security
11 out of 43
Azure Security: 1-Week AssessmentForteventoWe will make sure that you have enabled most critical security settings and your Azure environment is properly protected against attacks.
+3
Applicable to:
Identity
Networking
Security
12 out of 43
VDI inventCloud: 2-WK ImplementationINVENTCLOUD TECNOLOGIA LTDASolução Desktop inteligente para gestão de ambiente empresarial eficiente.
+3
Applicable to:
App Modernization
Identity
Security
13 out of 43
Managed Security Services- 1 Week AssessmentCloud4C Services Pvt LtdAvail Cloud4C’s in-depth cybersecurity assessment services to track organizational risk loopholes and vulnerabilities and develop a fail-proof blueprint for Risk Management.
+2
Applicable to:
Identity
Security
14 out of 43
COMPASS-Cloud Security Assessment: 4-Wk AssessmentTech Mahindra LimitedThe Cloud Security Assessment Solution provides a comprehensive approach in evaluation of pre migration security landscape, roadmap for secure implementation of target security landscape.
+3
Applicable to:
Identity
Networking
Security
15 out of 43
AVD Services: 3Wk Implementation & Managed ServiceTech Mahindra LimitedAccelerate your Digital Workspace Adoption with Tech Mahindra's Azure Virtual Desktop Services
+3
Applicable to:
App Modernization
Identity
Migration
16 out of 43
Azure HCI Stack Solution: 3-Wk ImplementationTech Mahindra LimitedTech Mahindra is Certified Cloud Adoption Framework (CAF) Ready Partner, and our Azure Cloud offerings are aligned to CAF
+3
Applicable to:
App Modernization
Identity
Migration
17 out of 43
Azure Landing Zone Design: 1-Week WorkshopLiveRoute FZ-LLCEngagement for designing Enterprise Scale (CAF and WAF compliant) landing zone design and high level plan as per your organizational structure and IT application needs.
+3
Applicable to:
Identity
Migration
Networking
18 out of 43
Cryptographic Risk AssessmentEntrustGet an assessment of the cryptographic health of your Microsoft environment: Azure, ADCS, InTune, Windows
+2
Applicable to:
Identity
Security
19 out of 43
cubesys AVD & Windows 365 Managed ServicesCubesys Pty Ltd Australia's leading AVD & Windows 365 specialists now offer a unique managed service for your Cloud-based VDI. Built specifically to work alongside your existing IT team.
+3
Applicable to:
Identity
Migration
Security
20 out of 43
AVD/Windows 365 Plan for Success: 3-d AssessmentCubesys Pty Ltd Understand what you need to successfully deploy Azure Virtual Desktop (AVD) and Windows 365. In our unique assessment we will provide budget guidance, evaluate your readiness and build a tailored plan
+3
Applicable to:
Identity
Migration
Security
21 out of 43
AVD & Windows 365: 2-Weeks ImplementationCubesys Pty Ltd Work with Australia's leading AVD & Windows 365 partner to implement your AVD & Windows 365 foundations. Whether you're replacing RDS or Citrix, or starting out on your VDI journey
+3
Applicable to:
Identity
Migration
Security
22 out of 43
Azure Virtual Desktop: 5-Day Proof of ConceptYork Telecom CorpYorktel will provide a 5 day proof of concept for deploying Azure Virtual Desktops managed by Nerdio for Enterprise. The POC will demonstrate how to deploy and manage AVD.
+3
Applicable to:
Backup
Identity
Security
23 out of 43
DXC Defender for Endpoint - ImplementationDXCDXC Managed Endpoint Threat Detection and Response (METDR) hunts for indicators of compromise (IOCs) across organizations' endpoints.
+2
Applicable to:
Identity
Security
24 out of 43
Accenture 5G and Intelligent Edge ServicesAccentureAccenture 5G and Intelligent Edge Services
+3
Applicable to:
Identity
Internet of Things
Networking
25 out of 43
Accenture Security ServicesAccentureAccenture Security Services
+3
Applicable to:
Disaster Recovery
Identity
Security
26 out of 43
Azure Security Assessment - 1 month assessmentSela Group (HQ)Improve your Azure security posture by reviewing and assessing your Azure operation. Receive top-notch action plan for improvements
+2
Applicable to:
Identity
Security
27 out of 43
Cloud Exponence:4Week ImplementationTCS - Cloud ExponenceQuick onboarding of Azure cloud operations through Cloud Exponence platform
+3
Applicable to:
DevOps
Identity
Networking
28 out of 43
Security Managed ServicesFCamara Consultoria e FormaçãoSolução flexível e personalizada para gestão do seu ambiente de infraestrutura e serviços na Nuvem
+2
Applicable to:
Identity
Security
29 out of 43
Securing Azure and Azure AD: 1-Hr BriefingBJSS LimitedProvide a briefing to aid your organisation on the best practices for securing your Azure investment
+2
Applicable to:
Identity
Security
30 out of 43
Citrix Desktop on Azure: 2-Wk ImplementationUni Systems S.M.S.A.Uni Systems can provide you with simple virtual client services on Azure infrastructure.
+3
Applicable to:
App Modernization
Identity
Security
31 out of 43
ACE Enterprise Foundation - 12Wk ImplementationDevoteam Cloudify ASThe ACE Enterprise Foundation is an accelerator for organizations that wish to deploy a Azure Foundation fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework in weeks
+2
Applicable to:
Identity
Networking
32 out of 43
Introduction to Zero Trust: 1-Hr BriefingBJSS LimitedProvide a briefing to aid your organisation on Zero Trust principles and securing your Azure investment
+2
Applicable to:
Identity
Security
33 out of 43
Keep Cloud Under Security - 4 weeks implementationCELLENZAAudit et définition d'un framework de sécurité adaptées au contexte client.
+3
Applicable to:
App Modernization
Identity
Security
34 out of 43
Infosys Cloud Security Services: 9 Week AssessmentInfosys LimitedProvide security and maturity assessment, secure architecture and design, implementation of security controls, monitoring, management, and operations of Azure environment.
+3
Applicable to:
Data Platform
Identity
Security
35 out of 43
Azure Governance: 4-Week AssessmentSoftServe Inc.Get recommendations outlining gaps and areas of improvement based on Cloud Adoption Framework (CAF) Governance best practices.
+3
Applicable to:
Identity
Networking
Security
36 out of 43
Azure Sentinel Quickstart: 1 Day ImplementationInsight Technology SolutionsInsight's Azure Sentinel Quickstart provides the customer with a configured Azure Sentinel platform on which they can perform their own security analytics function.
+2
Applicable to:
Identity
Security
37 out of 43
IBM Fraud and Abuse Management System on AzureIBM-Alliance-GBS-DTT-Microsoft Partner-USA-NY-Armonk-6418595Our solution is deployed for several states, federal clients, and private companies, successfully detecting income tax fraud, benefits fraud, healthcare fraud, internal fraud and travel & expense frau
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
38 out of 43
Identity and Access Management: 4-Wk ImplementationAlpha Data LLCImplement Identity and Access Management packages along with Single Sign-on capabilities for varying levels of users through Azure
+2
Applicable to:
Identity
Security
39 out of 43
Identity, Governance and Security Assessment - 2 week AssessmentPlain ConceptsProtect Your Investment - This Assessment is an in-depth evaluation of the management of access and identify in your organization. We will perform a complete gap analysis of your access security.
+2
Applicable to:
Identity
Security
40 out of 43
Securing Identities Workshop: 3 DaysInsight Technology SolutionsThe Securing Identities Workshop helps Microsoft customers realize the full value of their Microsoft services investment.
+2
Applicable to:
Identity
Security
41 out of 43
Cloud Security: 1-Wk AssessmentZitecThis one week security assessment will provide companies with detailed documentation on vulnerabilities and remediation plan for cloud & hybrid infrastructures.
+3
Applicable to:
DevOps
Identity
Security
42 out of 43
Cloud Security: 2-Wk AssessmentZitecThis 2-week security assessment will provide companies with detailed documentation on vulnerabilities and remediation plan for cloud & hybrid infrastructures.
+3
Applicable to:
DevOps
Identity
Security
43 out of 43