Passa al contenuto principale
Marketplace
Invia feedback
Guida e supporto tecnico
Elementi salvati
Piani privati
Accesso in corso, attendi qualche istante...
Tutto
Prodotti
Categorie
Settori
Partner
Filtri
Cancella tutto
Località dell'utente
Località dell'utente
Prodotti (1)
Prodotti (1)
Azzurro (1)
Azzurro (1)
AI & Machine Learning
AI & Machine Learning
Analisi
Analisi
App Modernization
App Modernization
Archive
Archive
Backup
Backup
Big Data
Big Data
Data Platform
Data Platform
DevOps
DevOps
Disaster Recovery
Disaster Recovery
Identity
Identity
Internet of Things
Internet of Things
Migration
Migration
Networking
Networking
Security
Security
Storage
Storage
Dynamics 365
Dynamics 365
Microsoft 365
Microsoft 365
Power Platform
Power Platform
Settori
Settori
Tipo di servizio
Tipo di servizio
Modello di determinazione prezzi
Modello di determinazione prezzi
Servizi di consulenza risultati
Visualizzazione di risultati in servizi di consulenza.
Eviden's Azure Cloud Consulting Services – Landing Zones
Eviden International France - SAS
+2
Applicable to:
Identity
Security
A consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
1 out of 60
Azure Cost-Optimization: 2-Day Assessment
SUMM-IT S.A.
+3
Applicable to:
App Modernization
Migration
Security
Summ-it's 2-day Azure platform cost optimization assessment focuses on analyzing current cloud consumption and identifying opportunities to optimize resources and costs. Ocena optymalizacji kosztów
2 out of 60
Azure Sentinel: 5-Day Implementation
Ibn Technologies Ltd
+1
Applicable to:
Security
The Azure Sentinel Implementation is a comprehensive Professional Services package offered by CloudIBN. This package includes the design, deployment, and fine-tuning of the Azure Sentinel
3 out of 60
Azure Architecture Review: 2-day Assessment
Cloudflight
+3
Applicable to:
App Modernization
Migration
Security
During our 2-day workshop we realize a coherent architecture review of your Azure services. We focus on your "as-is" Azure landscape and will provide an end-to-end review.
4 out of 60
TCS Responsible AI Assessment for Generative AI
TCS - Azure
+3
Applicable to:
Analytics
AI & Machine Learning
Security
TCS offers Responsible AI (RAI) Assessment service to our customers and partners in gauging their Azure Open AI based Gen AI solutions against the core tenets of RAI.
5 out of 60
Managed Services for Azure Network Operation Center
Celebal Technologies Private Limited
+3
Applicable to:
DevOps
Networking
Security
Unleash the Power of Connectivity with CT Managed Services for Azure Network Operation Center
6 out of 60
HCLTech's Cybersecurity Services
HCL America Inc_HCLT
+3
Applicable to:
Backup
Identity
Security
HCLTech is a leading global technology company that helps enterprises reimagine their businesses for the digital age. Secure your cloud journey with HCLTech's comprehensive portfolio of cybersecurity
7 out of 60
Capgemini Managed Security Services with Sentinel for SAP
Capgemini Group
+1
Applicable to:
Security
The solution is focused on providing a clear overview of vulnerabilities present in the complex SAP landscape from different domains.
8 out of 60
LBAN_Secure_Static_Web_Hosting:3Days Implementation
Lotus Beta Analytics
+2
Applicable to:
Security
Storage
Hosting Secure static websites on Azure Storage Accounts involves uploading HTML, CSS, JavaScript, and image files in a container named $web, setting index and error pages and mapping to a domain name
9 out of 60
Microsoft 365 Copilot with OpenAI on Azure Security Assessment - 8 hours workshop
C3IT Software Solutions
+2
Applicable to:
AI & Machine Learning
Security
Microsoft 365 Copilot with OpenAI on Azure Security Assessment - 8 hours workshop where we are providing the roadmap of what can we done in the future
10 out of 60
TCS AI-Driven Well-Architected Assessment
Tata Consultancy Services Ltd.
+3
Applicable to:
App Modernization
Migration
Security
Assess your workloads continuously and run optimally, using Microsoft Azure Well-Architected best-practices and various technology assessment
11 out of 60
Dell Implementation Services for Microsoft Azure Site Recovery
Dell Technologies Services
+3
Applicable to:
Backup
Disaster Recovery
Security
Dell Services provides advisory and implementation services for Azure cloud customers, enabling organizations to replicate and thus protect critical cloud workloads with time-tested frameworks.
12 out of 60
Wipro Microsoft Copilot for Security Readiness Workshop: 1 day
Wipro Ltd
+2
Applicable to:
AI & Machine Learning
Security
Wipro's Microsoft Copilot’s Security Readiness Workshop will help you demonstrate the value it brings at machine speed & scale and preparing enterprises to embrace Generative AI for Security.
13 out of 60
Azure Virtual Desktop Implementation
Sii Sp. z o.o.
+3
Applicable to:
Migration
Networking
Security
Implementation of Cloud Modern Desktop using Microsoft Azure VDI
14 out of 60
TCS Responsible AI Development Service on Azure OpenAI
TCS - Azure
+3
Applicable to:
Analytics
AI & Machine Learning
Security
TCS through this development service, aims to help enterprises in implementing Responsible AI controls in Azure Open AI based solutions in an efficient and safe manner.
15 out of 60
Cognizant® Cyber Threat Defense powered by Microsoft Sentinel
Cognizant
+1
Applicable to:
Security
Cyber Threat Defense Solution for delivery of AI-driven, automated security operations and continuous compliance across hybrid environments.
16 out of 60
Azure AI-Copilot PoC and Rapid Deployment Program: 4 Weeks - Click2Cloud
CLICK2CLOUD INC
+3
Applicable to:
Analytics
AI & Machine Learning
Security
Embark on a transformative journey with Click2Cloud's Azure AI-Copilot PoC and Rapid Deployment programme.
17 out of 60
Eviden’s Application Transformation Services with Cloud Code Refactor Insights
Eviden International France - SAS
+2
Applicable to:
App Modernization
Security
Eviden’s Application Transformation services invoke code refactoring and configuration automation, leading to cloud readiness for faster release cycles and a consistent deployment process.
18 out of 60
Microsoft Advanced Log Routing Service with ADX
BlueVoyant
+1
Applicable to:
Security
A cost-effective alternative to storing all your logs on Microsoft Sentinel
19 out of 60
PwC Cybersecurity and Risk Capabilities
Pricewaterhousecoopers LLP
+2
Applicable to:
Identity
Security
Reimagine risk and unlock opportunities through a human-led, tech-powered approach.
20 out of 60
Eviden Quality Inspector - Automate your quality control with computer vision
Eviden International France - SAS
+3
Applicable to:
AI & Machine Learning
Data Platform
Security
Quality Inspector automates quality control with computer vision using various devices and processing options.
21 out of 60
Datacentre Infrastructure Consolidation & Management
Global Computing and Telecoms
+2
Applicable to:
Migration
Security
Consolidate and manage datacentre infrastructure efficiently with tailored solutions, scalable to small, medium, and large organizations, optimizing costs and performance.
22 out of 60
Cloud Adoption Framework for Azure
Cloudflight
+3
Applicable to:
App Modernization
Data Platform
Security
A comprehensive solution designed to facilitate your organization´s digital transformation through the Azure Cloud Adoption Framework.
23 out of 60
AIS Health Check: 2-Wk Service
Solidify AB
+3
Applicable to:
Analytics
Networking
Security
The purpose of the service is to improve your Azure integration environment and ensure its reliability, security, and performance.
24 out of 60
BizTalk migration to Azure Integration Services
Solidify AB
+3
Applicable to:
App Modernization
Migration
Security
To migrate existing integrations from your current integration platform to Azure.
25 out of 60
Cloud Migration
Solify
+3
Applicable to:
Backup
Migration
Security
Planung und Durchführung von VM Migrationen (Lift & Shift) in die Azure Cloud sowie die Bereitstellung der Azure Landing Zone
26 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFT
AVASOFT
+2
Applicable to:
Identity
Security
Entra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
27 out of 60
GCT Azure Sentinel: 12 Month Enablement with Management
Global Computing and Telecoms
+3
Applicable to:
Analytics
Migration
Security
GCT's Proactive, cloud-native security with threat detection, response ,insights and Management
28 out of 60
Microsoft Sentinel Design & Deployment Accelerator
The Tech Mavericks
+1
Applicable to:
Security
Accelerate your design, deployment and configuration of Microsoft Sentinel using a templatized best practices approach from Microsoft cyber security experts
29 out of 60
Copilot for Security: 3-hour introduction workshop
White Hat IT Security Kft
+2
Applicable to:
AI & Machine Learning
Security
Recommended for those who are interested in Copilot for Security. This brief introduction shows the current capabilities and value of Copilot for Security.
30 out of 60
SoftwareOne Managed Extended Detection and Response for Microsoft Sentinel
SoftwareOne
+2
Applicable to:
Analytics
Security
Future-proof your cyber security with Managed Detection and Response (MDR)
31 out of 60
Fabricator: Unified Workbench for Microsoft Fabric
Tech Mahindra Limited
+3
Applicable to:
Analytics
Data Platform
Security
TechM Fabricator, designed to simplify the journey from data collection to consumption through an intuitive orchestration pipeline and metadata driven automation.
32 out of 60
Azure AD Identity Protection Assessment
AVASOFT
+2
Applicable to:
Identity
Security
Our Azure AD Identity Protection Assessment identifies vulnerabilities and strengthens security. Mitigate risks with advanced threat detection and tailored defense strategies.
33 out of 60
Single Sign On (SSO) for Applications using Entra ID by AVASOFT
AVASOFT
+2
Applicable to:
Identity
Security
Automated Identity & Access Management with Azure AD streamlines user access. Simplify authentication with SSO, reduce password fatigue, and enhance security and productivity.
34 out of 60
AVASecure 360 - Entra ID Access Management Solutions by AVASOFT
AVASOFT
+2
Applicable to:
Identity
Security
Automated Identity & Access Management with Azure AD streamlines user provisioning, access requests, and reviews. Enhance security, efficiency, and compliance effortlessly.
35 out of 60
Microsoft Azure AD Authentication
AVASOFT
+2
Applicable to:
Identity
Security
Struggling with user access management? Azure AD Authentication automates provisioning, access requests, and reviews, enhancing security, efficiency, and compliance.
36 out of 60
Dell Implementation Services for Backup on Microsoft Azure
Dell Technologies Services
+2
Applicable to:
Backup
Security
Attain strategic data protection policy guidance and recommendations.
37 out of 60
I-Nxt Virtual Desktop
Cognizant
+2
Applicable to:
Networking
Security
Accelerate the deployment of a highly scalable, secure and flexible Azure Virtual Desktop (AVD) by utilizing Nerdio Manager for Enterprise.
38 out of 60
Security Testing: 2-Week Assessment
ELEKS
+3
Applicable to:
DevOps
Networking
Security
Ensure the protection of your Microsoft Azure/Hybrid infrastructure and Azure-based applications with ELEKS' Security Testing Services.
39 out of 60
Strengthen Your Azure Security - 3 days Comprehensive Risk Assessment
AVASOFT
+2
Applicable to:
Identity
Security
Identify and address security gaps in Azure with our Risk Assessment. Gain insights, tailored recommendations, and best practices to strengthen your security and maintain compliance.
40 out of 60
On-premises Active Directory Infra Assessment
AVASOFT
+2
Applicable to:
Identity
Security
Our On-Premises AD Infrastructure Assessment identifies vulnerabilities and compliance gaps. Strengthen security and ensure compliance with actionable insights and expert recommendations.
41 out of 60
Dell Implementation Services for Microsoft Azure Network Security
Dell Technologies Services
+3
Applicable to:
Identity
Networking
Security
With Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
42 out of 60
Dell Implementation Services for Microsoft Defender on Cloud
Dell Technologies Services
+1
Applicable to:
Security
Advisory and Deployment services aligned to your cloud security objectives, enabling you to gain comprehensive visibility of your cloud security posture across your environments.
43 out of 60
Azure Cost Optimization
H One (Private) Limited
+3
Applicable to:
Networking
Security
Storage
Unexpectedly high bills can be a frustrating surprise, and Azure billing is no different. Keeping a close watch on your Azure expenditures can help you stay within budget and avoid unnecessary costs.
44 out of 60
API Release Process into Azure API Management
Solidify AB
+3
Applicable to:
DevOps
Networking
Security
Setup of API Management and lifecycle processes around APIs
45 out of 60
Seamless social app identity integration
AVASOFT
+2
Applicable to:
Identity
Security
Our solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
46 out of 60
Enterprise App Integration with Microsoft My Apps Portal
AVASOFT
+2
Applicable to:
Identity
Security
Our solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
47 out of 60
Kyndryl IAM Design and Implementation Services
Kyndryl Inc.
+3
Applicable to:
Backup
Identity
Security
Kyndryl IAM Services provide IAM solutions for hybrid and cloud environments using Microsoft Entra. Focus on user authentication, identity governance, and secure access with Zero Trust principles.
48 out of 60
Azure Health Check
WIZARD GROUP LIMITED
+3
Applicable to:
Networking
Security
Storage
This service guides Azure Deployments to optimise costs, enhance security, and align architecture with industry standards, maximising Azure Cloud Infrastructure benefits
49 out of 60
QA assessment
Ciklum
+3
Applicable to:
Analytics
DevOps
Security
Analyze testing processes & practices. Get the GAP analysis against a hybrid approach containing practises from TMMi and TPI. Receive overall maturity evaluation.
50 out of 60
Hybrid AD Identity Security Assessment
AVASOFT
+2
Applicable to:
Identity
Security
Our Hybrid AD Identity Security Assessment identifies vulnerabilities and compliance gaps. Fortify your Hybrid AD, enhance security, and ensure compliance with actionable insights.
51 out of 60
Setup Azure Landing Zone: 6 weeks Implementation
Peritos Solutions
+3
Applicable to:
DevOps
Migration
Security
We've designed the framework for organizations migrating to Azure. The Azure Landing Zone sets best practices for streamlined, secure, and efficient setups, ideal for confident cloud transitions.
52 out of 60
softip_landing_zone
SOFTIP, a.s.
+3
Applicable to:
DevOps
Networking
Security
Softip solution using terraform technology can help you quickly deploy an Azure environment that is alligned with CAF, Azure Security Baseline (ASB/MCSB), OWASP, GDPR, and SOFTIP best practises.
53 out of 60
Intune Assessment - 1 Day Workshop
Valto
+3
Applicable to:
Backup
Networking
Security
An assessment of the Microsoft 365 Intune Environment checking all services within the platform and covering off additional tools available in your organisation to assist with MDM.
54 out of 60
Infrastructure Migration to Azure with Click2Cloud - An AMM Partner
CLICK2CLOUD INC
+3
Applicable to:
Migration
Security
Storage
Migrate your infrastructure workload to Azure Cloud with Click2Cloud’s Migration and Modernization service offerings, ensuring a seamless transition, optimization, and support.
55 out of 60
Cognizant offering for Oracle Database@Azure
Cognizant
+3
Applicable to:
Migration
Networking
Security
Migrate your critical Oracle workloads to Azure leveraging Cognizant’s expertise in Discovery, Analysis, Sizing, Oracle license management and migration of Oracle Databases to Oracle Database@Azure
56 out of 60
DXC's Microsoft Copilot for Security Readiness Assessment
DXC
+1
Applicable to:
Security
Microsoft’s Copilot for Security is a disruptive generative AI technology designed to enhance security operations.
57 out of 60
Traceability and Verification System: 0.5-day Briefing
Reply
+3
Applicable to:
App Modernization
Big Data
Security
Join us for a half-day briefing on Solidsoft Reply's Traceability and Verification System (TRVST), our innovative solution to combating the proliferation of falsified medicines.
58 out of 60
Migration to Azure VMware: 8 weeks Assessment
Elitmind SP
+3
Applicable to:
Migration
Networking
Security
Assessment specifies the scope and methodology for assessing your organization's current on-premises VMware environment to facilitate a smooth migration to AVS in the Azure Cloud.
59 out of 60
3-Week Security Baseline Assessment
Avertium, LLC
+1
Applicable to:
Security
Organizations that lack the resources to accurately assess their security deployments will benefit from this in-depth assessment.
60 out of 60
Indietro
3
4
5
6
7
Avanti