FiltriNotīrīt visu
Professional Services rezultāti
Tiek rādīti rezultāti šeit: professional services.
Windows Virtual Desktop: 4-Weeks PoCGO TO CLOUD SASThe Windows Virtual Desktop proof of concept is focused on helping organizations publish their applications and desktops to collaborators in an efficient, fast and SECURE way
+3
Applicable to:
App Modernization
Identity
Migration
1 out of 26
Azure Cloud Adoption 4 - Week AssessmentAKAVEIL TECHNOLOGIES INCStrategic Assessment to Migration & Operation
+3
Applicable to:
Identity
Migration
Security
2 out of 26
Cloud Governance: 10-Weeks assessmentPrisma Soluciones Tecnologicas SRLGovernance and financial management for the cloud data center
+2
Applicable to:
Backup
Identity
3 out of 26
Azure Sentinel 3-Day WorkshopZIAASMicrosoft Funded Consultancy 3-Day Workshop for Azure Sentinel
+3
Applicable to:
AI & Machine Learning
Identity
Security
4 out of 26
WVD Horizon Migration - 3 Weeks ImplementationGreeneris Sp. z o.o.Greeneris will help you implement the Windows Virtual Desktops environment along with the Horizon control and management system
+3
Applicable to:
Disaster Recovery
Identity
Migration
5 out of 26
Security Scan Pack: 2-Days AssessmentAgileThoughtSecurity Scan Pack reduces vulnerability gaps to prevent information breaches, identity theft, and fraud.
+3
Applicable to:
Identity
Networking
Security
6 out of 26
Hybrid Cloud Security Workshop - 3 WeeksIngram Micro India Private LimitedThe engagement involves showcasing in customer’s production environment Azure defender features, discovering real threats to selected hybrid workloads, and analyzing security vulnerabilities.
+3
Applicable to:
Big Data
Identity
Security
7 out of 26
Azure Secure Remote Worker : 3-Wk ImplementationNBConsult Holdings (PTY) LtdWindows Virtual Desktop delivers virtual desktops and apps seamlessly from Azure that can be accessed anywhere anytime and from any device.
+3
Applicable to:
Identity
Networking
Security
8 out of 26
Azure Security: 1-Week AssessmentForteventoWe will make sure that you have enabled most critical security settings and your Azure environment is properly protected against attacks.
+3
Applicable to:
Identity
Networking
Security
9 out of 26
Managed Security Services- 1 Week AssessmentCloud4C Services Pvt LtdAvail Cloud4C’s in-depth cybersecurity assessment services to track organizational risk loopholes and vulnerabilities and develop a fail-proof blueprint for Risk Management.
+2
Applicable to:
Identity
Security
10 out of 26
COMPASS-Cloud Security Assessment: 4-Wk AssessmentTech Mahindra LimitedThe Cloud Security Assessment Solution provides a comprehensive approach in evaluation of pre migration security landscape, roadmap for secure implementation of target security landscape.
+3
Applicable to:
Identity
Networking
Security
11 out of 26
AVD Services: 3Wk Implementation & Managed ServiceTech Mahindra LimitedAccelerate your Digital Workspace Adoption with Tech Mahindra's Azure Virtual Desktop Services
+3
Applicable to:
App Modernization
Identity
Migration
12 out of 26
Azure HCI Stack Solution: 3-Wk ImplementationTech Mahindra LimitedTech Mahindra is Certified Cloud Adoption Framework (CAF) Ready Partner, and our Azure Cloud offerings are aligned to CAF
+3
Applicable to:
App Modernization
Identity
Migration
13 out of 26
Azure Landing Zone Design: 1-Week WorkshopLiveRoute FZ-LLCEngagement for designing Enterprise Scale (CAF and WAF compliant) landing zone design and high level plan as per your organizational structure and IT application needs.
+3
Applicable to:
Identity
Migration
Networking
14 out of 26
Migración a Azure: Implementación en 15 díasNebulanMigración de los 10 Workload principales como la primera ola para desarrollar un enfoque iterativo de adopción de la nube
+3
Applicable to:
Identity
Migration
Security
15 out of 26
Azure Virtual Desktop: 5-Day Proof of ConceptYork Telecom CorpYorktel will provide a 5 day proof of concept for deploying Azure Virtual Desktops managed by Nerdio for Enterprise. The POC will demonstrate how to deploy and manage AVD.
+3
Applicable to:
Backup
Identity
Security
16 out of 26
DXC Defender for Endpoint - ImplementationDXCDXC Managed Endpoint Threat Detection and Response (METDR) hunts for indicators of compromise (IOCs) across organizations' endpoints.
+2
Applicable to:
Identity
Security
17 out of 26
Accenture 5G and Intelligent Edge ServicesAccentureAccenture 5G and Intelligent Edge Services
+3
Applicable to:
Identity
Internet of Things
Networking
18 out of 26
Accenture Security ServicesAccentureAccenture Security Services
+3
Applicable to:
Disaster Recovery
Identity
Security
19 out of 26
Azure Security Assessment - 1 month assessmentSela Group (HQ)Improve your Azure security posture by reviewing and assessing your Azure operation. Receive top-notch action plan for improvements
+2
Applicable to:
Identity
Security
20 out of 26
ACE Enterprise Foundation - 12Wk ImplementationDevoteam Cloudify ASThe ACE Enterprise Foundation is an accelerator for organizations that wish to deploy a Azure Foundation fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework in weeks
+2
Applicable to:
Identity
Networking
21 out of 26
Keep Cloud Under Security - 4 weeks implementationCELLENZAAudit et définition d'un framework de sécurité adaptées au contexte client.
+3
Applicable to:
App Modernization
Identity
Security
22 out of 26
Infosys Cloud Security Services: 9 Week AssessmentInfosys LimitedProvide security and maturity assessment, secure architecture and design, implementation of security controls, monitoring, management, and operations of Azure environment.
+3
Applicable to:
Data Platform
Identity
Security
23 out of 26
IBM Fraud and Abuse Management System on AzureIBM-Alliance-GBS-DTT-Microsoft Partner-USA-NY-Armonk-6418595Our solution is deployed for several states, federal clients, and private companies, successfully detecting income tax fraud, benefits fraud, healthcare fraud, internal fraud and travel & expense frau
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
24 out of 26
Identity and Access Management: 4-Wk ImplementationAlpha Data LLCImplement Identity and Access Management packages along with Single Sign-on capabilities for varying levels of users through Azure
+2
Applicable to:
Identity
Security
25 out of 26
Cloud Security: 1-Wk AssessmentZitecThis one week security assessment will provide companies with detailed documentation on vulnerabilities and remediation plan for cloud & hybrid infrastructures.
+3
Applicable to:
DevOps
Identity
Security
26 out of 26