Pateikti atsiliepimą
Help & support
Įrašyti elementai
Privatūs planai
Luktelėkite, prijungiame jus...
FiltraiValyti viską

  • Jūsų vieta
  • Produktai (1)
    • Azure (1)
      • AI & Machine Learning
      • Analizė
      • App Modernization
      • Archive
      • Backup
      • Big Data
      • Data Platform
      • DevOps
      • Disaster Recovery
      • Identity
      • Internet of Things
      • Migration
      • Networking
      • Security
      • Storage
    • „Dynamics 365“
    • Microsoft 365
    • Power Platform
  • Pramonės šakos (1)
    • Gynyba ir žvalgyba
    • Paskirstymas
    • Švietimas
    • Energija ir ištekliai
    • Finansinės paslaugos
      • Banking
      • Draudimas
    • Valstybinės institucijos
    • Sveikatos priežiūra
    • Apgyvendinimo bei maitinimo paslaugos ir kelionės
    • Gamyba ir mobilumas
    • Ne pelno siekianti organizacija
    • Profesionalios paslaugos
    • Mažmeninė prekyba ir bendrojo vartojimo prekės
    • Tvarumas
    • Telekomunikacijos ir medija
  • Paslaugos tipas
  • Įkainių modelis

Rezultatų: Professional Services

Rodomi rezultatai professional services.
Azure Threat Hunting: 6wk AssessmentBridewell Consulting Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
The threat hunt assessment is designed to provide in an accurate representation of an organisations current security posture including highlighting immediate vulnerabilities within Azure.
1 out of 60
Igel Azure Virtual Desktop As A Service 2-Hours WorkshopTriStratus Ltd.
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitysecurity product iconSecurity
IGEL Technology provides a Linux based “Next generation edge operating system" which is purpose-built for secure access to cloud workspaces such as Azure Virtual Desktops.
2 out of 60
Cloud Security Approach: 2-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Through the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
3 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Evolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
4 out of 60
Cloud Security Posture: 2-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
5 out of 60
Cloud Security Deployment: 4-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Implementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
6 out of 60
Cloud Security Compliance: 4-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
7 out of 60
Cloud Security Services: 12-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
We audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
8 out of 60
IAM Architecture 3-Weeks ImplementationToreon CVBA
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Setting up a custom fitting IAM model to give your business the control it needs.
9 out of 60
Azure Security: 2-Day AssessmentExtrinsica Global
+3
Applicable to:
backup product iconBackupidentity product iconIdentitysecurity product iconSecurity
A fast and thorough assessment of your Microsoft Azure configuration security, providing a detailed report including prioritised remediation recommendations based on current security best practice.
10 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield Ltd
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Spartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
11 out of 60
Azure Sentinel: 5-Days Proof of ConceptCloud Nexus
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
See and stop threats before they cause harm with Azure Sentinel. Our proof of concept includes 5 days Professional Services for design, deployment and tuning for your business.
12 out of 60
IBM Threat Management with Microsoft’s SAP Threat Monitoring Solution for Microsoft AzureIBM Security Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Consulting and managed security services from IBM Security supporting Microsoft Defender, Azure Sentinel, and the SAP Threat Monitoring solution for Sentinel
13 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Delivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
14 out of 60
Azure Cost Optimization: 1 Day WorkshopALEF Distribution RO S.A.
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Understand, monitor and optimize your cloud spendings in Azure with our "Cost Optimization Workshop".
15 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.ai
+1
Applicable to:
identity product iconIdentity
Implementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
16 out of 60
Purple Team Assessment: 1 Week AssessmentBridewell Consulting Limited
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Test your organisation's defensive capabilities by conducting a purple team assessment in collaboration with Bridewell
17 out of 60
Sentinel: 3-Day WorkshopBridewell Consulting Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Mitigate threats, and work with Bridewell's leading cloud security specialists to develop a roadmap to drive improvements in your Sentinel deployment.
18 out of 60
HCLTech Unified Digital AccessHCL America Inc_HCLT
+1
Applicable to:
identity product iconIdentity
HCLTech’s Unified Digital Access solution protects enterprise users and apps from cybersecurity attacks by aiding with right enterprise security posture with easy access to Apps and services.
19 out of 60
Microsoft Sentinel Accelerator: 1 hour Automated ImplementationOrganised Computer Systems Limited
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
Use Telefónica Tech’s unique automation approach to rapidly deploy Microsoft Sentinel to Microsoft and T-Tech’s combined best practice standard.
20 out of 60
Accelerating Cloud Virtual Desktops: 2-Hour WorkshopSlalom Consulting
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationnetworking product iconNetworking
This Free Workshop will introduce you to how Azure Virtual Desktops help you embrace a remote workforce while maintaining control through secure workstation experiences on any device.
21 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Our offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
22 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Get a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
23 out of 60
skillup_consulting_openedx_v1Flexible Road LLC
+3
Applicable to:
backup product iconBackupidentity product iconIdentitystorage product iconStorage
Open edX Learning Management System with Azure.
24 out of 60
Defend Against Threats with SIEM Plus XDRBJSS Limited
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Improve your security posture and uncover risks that might be harmful to your organisation with BJSS' cyber security workshop: Defend Against Threats with SIEM Plus XDR.
25 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitynetworking product iconNetworking
Secure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
26 out of 60
Microsoft Entra Rapid StartShaping Cloud
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Shaping Cloud Microsoft Entra Rapid Start helps you get going with the Entra product set confidently, swiftly, economically.
27 out of 60
Azure Active Directory Migration: 3-Wk AssessmentiC Consult Gesellschaft für Systemintegration und Kommunikation mbH
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
This offer is ideal for customers that want to consolidate grown Identity and Access Management/MFA solutions to reach a best of breed approach for Azure AD infrastructure and Azure AD principles.
28 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Implementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
29 out of 60
ACE AVD: 4-Wk ImplementationDevoteam France
+2
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentity
Azure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
30 out of 60
SAP SuccessFactors and Microsoft Entra ID Integration: 6-wk ImplementationOxford Computer Group LLC
+1
Applicable to:
identity product iconIdentity
Enable User Lifecycle Management by integrating SAP SuccessFactors and Microsoft Entra ID.
31 out of 60
Assesment Azure Base4Base4 Security Chile SPA
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
32 out of 60
Microsoft Security License Utilisation & Commercial Assessment: 2-Week AssessmentBridewell Consulting Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Provide an overview of organisations current licensing position, identify what security Microsoft products could be utilised & build an adoption framework
33 out of 60
Azure Security Accelerator SuiteNeudesic
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Mitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
34 out of 60
Managed Services for Microsoft EntraDXC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Advisory and Managed Services for Microsoft Entra
35 out of 60
Managed Microsoft XDR - 12 month managed serviceANS Group Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
ANS will manage your Microsoft endpoint & workload protection tooling consisting of Microsoft 365 Defender, Defender for Cloud and Microsoft Sentinel, via our 24x7x365 UK based 3 Tiered SOC
36 out of 60
Security COE - Managed Service (12 months minimum)ANS Group Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Gain access to highly skilled engineering squads to continually develop, engineer and optimise services across your Azure Security solution suite to drive value rapidly.
37 out of 60
Security ReviewShaping Cloud
+3
Applicable to:
backup product iconBackupidentity product iconIdentitysecurity product iconSecurity
Shaping Cloud will perform a high-level security assessment throughout your organisation's IT infrastructure.
38 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitystorage product iconStorage
DotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
39 out of 60
Fintech Azure Landing Zone Accelerator: 5 week ImplementationYobah Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Defining an enterprise landing zone for your Azure environment, tailored with financial services in mind.
40 out of 60
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITED
+3
Applicable to:
analytics product iconAnalyticsdata-platform product iconData Platformidentity product iconIdentity
Provide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
41 out of 60
Red Canary Microsoft Sentinel WorkshopRed Canary
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Get an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
42 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. Israel
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Accelerate your digital transformation with Cloud and Collaboration tools
43 out of 60
Security as a Service: 3-Wk ImplementationA3Cloud Solutions
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Improve your security of your solutions and infrastructures in Azure Cloud.
44 out of 60
Azure Penetration TestMazzy Technologies Corp.
+3
Applicable to:
data-platform product iconData Platformidentity product iconIdentitysecurity product iconSecurity
This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
45 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Azure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
46 out of 60
Cloud Security Workshop: 2 half-days workshopMallow Oy
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitysecurity product iconSecurity
We'll check your Azure environment for security issues and suggest remedies for them
47 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
48 out of 60
Modern workplace Active DirectorySii Sp. z o.o.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Modern workplace Active Directory implementation, migration and support
49 out of 60
Detection & Response Services (MXDR)Cloud Life
+3
Applicable to:
ai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentitysecurity product iconSecurity
Cloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
50 out of 60
Managed Azure Virtual Desktop (Base) - 12 month Managed ServiceANS Group Limited
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Provide, manage and control secure modern workplaces with Managed Azure Virtual Desktop from ANS
51 out of 60
Sentinel-as-a-ServiceCloud Life
+3
Applicable to:
ai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentitysecurity product iconSecurity
Cloud Life delivers an innovative cloud-based AI and ML-enhanced Sentinel-as-a-Service, empowering your team with managed SIEM/SOAR capabilities using optimum Microsoft MXDR Services
52 out of 60
Brillio Open Banking SolutionBrillio
+3
Applicable to:
data-platform product iconData Platformidentity product iconIdentitysecurity product iconSecurity
A robust, scalable, and secure solution that is designed to address the ever-evolving regulatory landscape and empower financial institutions to stay ahead in this new era of banking.
53 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta Analytics
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
This solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
54 out of 60
ISO 27001 Readiness Assessment for Azure EnvironmentVisionet Systems Inc.
+3
Applicable to:
backup product iconBackupidentity product iconIdentitysecurity product iconSecurity
Advance confidently towards ISO 27001 certification for your Azure environment with Visionet's readiness assessment. Get a detailed analysis of your infrastructure operations & security policies.
55 out of 60
Azure Security Assessment – by NIST 800-53Visionet Systems Inc.
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Harness Visionet's expertise to secure and optimize your Azure environment with our Security Assessment service grounded in NIST 800-53 Rev 4 best practices.
56 out of 60
Azure Active Directory B2C - Assess & PlanShaping Cloud
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Azure Active Directory B2C provides business-to-customer identity as a service. We can design, develop & implement a customer identity & access management solution based in Azure Active Directory B2C.
57 out of 60
Microsoft & Multi-Cloud Security Penetration Testing: 5-Day AssessmentBDO LLP
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
CREST certified Ethical Hackers from BDO perform penetration tests on your Microsoft and Multi-Cloud environment and test the setup of Microsoft Azure AD, Defender, Sentinel and Purview.
58 out of 60
Eviden's Application Strategy WorkshopEviden International France - SAS
+3
Applicable to:
app-modernization product iconApp Modernizationdata-platform product iconData Platformidentity product iconIdentity
Eviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
59 out of 60
Security Warrior: Managed ServiceTechConnect
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
Our Security Warrior, will give you the visibility and remediation into your Azure security posture to manage the risk through an affordable single pane of glass solution.
60 out of 60
  • 1
  • 2
  • 3
  • 4
  • 5
  • Pirmyn
Apie parduotuvę
  • Kodėl verta naudoti „Microsoft“ parduotuvę
  • Tinklaraščiai
  • Klientų istorijos
Klientams
  • Darbo valandos
  • Darbo pradžios vadovas
  • Techninė dokumentacija
  • Privatūs pasiūlymai
  • „Microsoft Azure“ vartojimo įsipareigojimas
  • Atsiskaitymas ir SF išrašymas
Partneriams
  • Tapkite partneriu
  • Būkite įtraukti
  • Gaukite rinkodaros palaikymą
  • Techninė dokumentacija
  • Nuoseklūs nurodymai, kaip kurti, publikuoti ir parduoti
  • Atitikite bendro pardavimo reikalavimus
  • Parduotuvės bendruomenė partneriams
  • Kanalo valdomas parduotuvės pardavimas
  • Kelių dalių privatūs pasiūlymai kanalo partneriams
Verslas
  • „Microsoft“ debesis
  • „Microsoft“ sauga
  • „Azure”
  • „Dynamics 365“
  • „Microsoft 365“
  • „Microsoft Advertising“
  • Microsoft 365 Copilot
  • „Microsoft Teams“
Įmonė
  • Karjera
  • Apie „Microsoft“
  • „Microsoft“ privatumas
  • Investuotojai
  • Tvarumas
Lietuvių (Lietuva) Jūsų privatumo pasirinkimų atsisakymo piktograma Jūsų privatumo pasirinkimai Vartotojų sveikatos privatumas
  • Svetainės struktūra
  • Susisiekite su mumis
  • Privatumas ir slapukai
  • Naudojimo sąlygos
  • Prekių ženklai
  • Apie mūsų skelbimus
  • Valdyti slapukus
  • © Microsoft 2025