PenapisKosongkan semua
Professional Services hasil
Menunjukkan dalam professional services%1!s!.
Eviden Quality Inspector - Automate your quality control with computer visionEviden International France - SASQuality Inspector automates quality control with computer vision using various devices and processing options.
+3
Applicable to:
AI & Machine Learning
Data Platform
Security
1 out of 60
Datacentre Infrastructure Consolidation & ManagementGlobal Computing and TelecomsConsolidate and manage datacentre infrastructure efficiently with tailored solutions, scalable to small, medium, and large organizations, optimizing costs and performance.
+2
Applicable to:
Migration
Security
2 out of 60
Cloud Adoption Framework for AzureCloudflightA comprehensive solution designed to facilitate your organization´s digital transformation through the Azure Cloud Adoption Framework.
+3
Applicable to:
App Modernization
Data Platform
Security
3 out of 60
AIS Health Check: 2-Wk ServiceSolidify ABThe purpose of the service is to improve your Azure integration environment and ensure its reliability, security, and performance.
+3
Applicable to:
Analytics
Networking
Security
4 out of 60
BizTalk migration to Azure Integration ServicesSolidify ABTo migrate existing integrations from your current integration platform to Azure.
+3
Applicable to:
App Modernization
Migration
Security
5 out of 60
Hitachi AI Compass for Responsible AIHitachi Digital Services LLCAI Compass is Hitachi Digital Services Responsible AI offering, which enables transparency, security, safety, privacy & trustworthiness in AI applications.
+3
Applicable to:
App Modernization
AI & Machine Learning
Security
6 out of 60
Cloud MigrationSolifyPlanung und Durchführung von VM Migrationen (Lift & Shift) in die Azure Cloud sowie die Bereitstellung der Azure Landing Zone
+3
Applicable to:
Backup
Migration
Security
7 out of 60
GenAI Consulting & Engineering: 6-Wk ImplementationVisionet Systems, IncReimagine your business, IT and boost productivity with GenAI based solutions & practices for your Azure environments.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
8 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
9 out of 60
GCT Azure Sentinel: 12 Month Enablement with ManagementGlobal Computing and TelecomsGCT's Proactive, cloud-native security with threat detection, response ,insights and Management
+3
Applicable to:
Analytics
Migration
Security
10 out of 60
Microsoft Sentinel Design & Deployment AcceleratorThe Partner MastersAccelerate your design, deployment and configuration of Microsoft Sentinel using a templatized best practices approach from Microsoft cyber security experts
+1
Applicable to:
Security
11 out of 60
Copilot for Security: 3-hour introduction workshopWhite Hat IT Security KftRecommended for those who are interested in Copilot for Security. This brief introduction shows the current capabilities and value of Copilot for Security.
+2
Applicable to:
AI & Machine Learning
Security
12 out of 60
Sentinel Engagement WorkshopOrange Cyberdefense GlobalGain a bird’s eye view across your enterprise with SIEM for a modern world.
+1
Applicable to:
Security
13 out of 60
SoftwareOne Managed Extended Detection and Response for Microsoft SentinelSoftwareOneFuture-proof your cyber security with Managed Detection and Response (MDR)
+2
Applicable to:
Analytics
Security
14 out of 60
Fabricator: Unified Workbench for Microsoft FabricTech Mahindra LimitedTechM Fabricator, designed to simplify the journey from data collection to consumption through an intuitive orchestration pipeline and metadata driven automation.
+3
Applicable to:
Analytics
Data Platform
Security
15 out of 60
Azure AD Identity Protection AssessmentAVASOFTOur Azure AD Identity Protection Assessment identifies vulnerabilities and strengthens security. Mitigate risks with advanced threat detection and tailored defense strategies.
+2
Applicable to:
Identity
Security
16 out of 60
Single Sign On (SSO) for Applications using Entra ID by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user access. Simplify authentication with SSO, reduce password fatigue, and enhance security and productivity.
+2
Applicable to:
Identity
Security
17 out of 60
AVASecure 360 - Entra ID Access Management Solutions by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user provisioning, access requests, and reviews. Enhance security, efficiency, and compliance effortlessly.
+2
Applicable to:
Identity
Security
18 out of 60
Microsoft Azure AD AuthenticationAVASOFTStruggling with user access management? Azure AD Authentication automates provisioning, access requests, and reviews, enhancing security, efficiency, and compliance.
+2
Applicable to:
Identity
Security
19 out of 60
Dell Implementation Services for Backup on Microsoft AzureDell Technologies ServicesAttain strategic data protection policy guidance and recommendations.
+2
Applicable to:
Backup
Security
20 out of 60
I-Nxt Virtual DesktopCognizantAccelerate the deployment of a highly scalable, secure and flexible Azure Virtual Desktop (AVD) by utilizing Nerdio Manager for Enterprise.
+2
Applicable to:
Networking
Security
21 out of 60
Security Testing: 2-Week AssessmentELEKSEnsure the protection of your Microsoft Azure/Hybrid infrastructure and Azure-based applications with ELEKS' Security Testing Services.
+3
Applicable to:
DevOps
Networking
Security
22 out of 60
Strengthen Your Azure Security - 3 days Comprehensive Risk AssessmentAVASOFTIdentify and address security gaps in Azure with our Risk Assessment. Gain insights, tailored recommendations, and best practices to strengthen your security and maintain compliance.
+2
Applicable to:
Identity
Security
23 out of 60
On-premises Active Directory Infra AssessmentAVASOFTOur On-Premises AD Infrastructure Assessment identifies vulnerabilities and compliance gaps. Strengthen security and ensure compliance with actionable insights and expert recommendations.
+2
Applicable to:
Identity
Security
24 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
25 out of 60
Dell Implementation Services for Microsoft Defender on CloudDell Technologies ServicesAdvisory and Deployment services aligned to your cloud security objectives, enabling you to gain comprehensive visibility of your cloud security posture across your environments.
+1
Applicable to:
Security
26 out of 60
Azure Cost OptimizationH One (Private) LimitedUnexpectedly high bills can be a frustrating surprise, and Azure billing is no different. Keeping a close watch on your Azure expenditures can help you stay within budget and avoid unnecessary costs.
+3
Applicable to:
Networking
Security
Storage
27 out of 60
API Release Process into Azure API ManagementSolidify ABSetup of API Management and lifecycle processes around APIs
+3
Applicable to:
DevOps
Networking
Security
28 out of 60
SVA Workshop KISARO - Keep it simple Azure Red Hat OpenShiftSVA System Vertrieb Alexander GmbHOpenShift ist für viele Unternehmen die Software der Wahl, um ihre Anwendungen in Azure zu hosten. Unser Workshop bietet Abhilfe, denn er zeigt Einblicke in Aufbau und Betrieb des Openshift-Clusters.
+3
Applicable to:
App Modernization
Data Platform
Security
29 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
31 out of 60
Kyndryl IAM Design and Implementation ServicesKyndryl Inc.Kyndryl IAM Services provide IAM solutions for hybrid and cloud environments using Microsoft Entra. Focus on user authentication, identity governance, and secure access with Zero Trust principles.
+3
Applicable to:
Backup
Identity
Security
32 out of 60
Azure Health CheckWIZARD GROUP LIMITEDThis service guides Azure Deployments to optimise costs, enhance security, and align architecture with industry standards, maximising Azure Cloud Infrastructure benefits
+3
Applicable to:
Networking
Security
Storage
33 out of 60
QA assessmentCiklumAnalyze testing processes & practices.
Get the GAP analysis against a hybrid approach containing practises from TMMi and TPI.
Receive overall maturity evaluation.
+3
Applicable to:
Analytics
DevOps
Security
34 out of 60
Hybrid AD Identity Security AssessmentAVASOFTOur Hybrid AD Identity Security Assessment identifies vulnerabilities and compliance gaps. Fortify your Hybrid AD, enhance security, and ensure compliance with actionable insights.
+2
Applicable to:
Identity
Security
35 out of 60
Azure Zero Trust Assessment: 1 Day WorkshopSlalom ConsultingCreate your Azure security foundation: We will work with your organization's security and infrastructure leaders to create a point-in-time snapshot of where you are in your security journey.
+2
Applicable to:
Identity
Security
36 out of 60
Azure Foundation: 2 Tage Proof of ConceptPublic Cloud Group GmbHDer Azure Foundation Workshop inklusive PoC ist ein intensiver Workshop als Grundlage zur Implementierung von Microsoft Azure in Ihrem Unternehmen.
+2
Applicable to:
Networking
Security
37 out of 60
Setup Azure Landing Zone: 6 weeks ImplementationPeritos SolutionsWe've designed the framework for organizations migrating to Azure. The Azure Landing Zone sets best practices for streamlined, secure, and efficient setups, ideal for confident cloud transitions.
+3
Applicable to:
DevOps
Migration
Security
38 out of 60
Azure Foundation for Enterprises: 3 Monate ImplementierungPublic Cloud Group GmbHDas Azure Foundation for Enterprises-Paket bietet eine umfassende Grundlage für das Enablement von Azure in ihrem Unternehmen.
+2
Applicable to:
Migration
Security
39 out of 60
softip_landing_zoneSOFTIP, a.s.Softip solution using terraform technology can help you quickly deploy an Azure environment that is alligned with CAF, Azure Security Baseline (ASB/MCSB), OWASP, GDPR, and SOFTIP best practises.
+3
Applicable to:
DevOps
Networking
Security
40 out of 60
Azure Security Review: 2-Tages AssessmentPublic Cloud Group GmbHDas Azure Security Review bewertet die Sicherheit und Compliance ihrer Azure-Umgebung, identifiziert Risiken und Schwachstellen, und bietet einen detaillierten Bericht mit Verbesserungsempfehlungen.
+1
Applicable to:
Security
41 out of 60
Intune Assessment - 1 Day WorkshopValtoAn assessment of the Microsoft 365 Intune Environment checking all services within the platform and covering off additional tools available in your organisation to assist with MDM.
+3
Applicable to:
Backup
Networking
Security
42 out of 60
Infrastructure Migration to Azure with Click2Cloud - An AMM PartnerCLICK2CLOUD INCMigrate your infrastructure workload to Azure Cloud with Click2Cloud’s Migration and Modernization service offerings, ensuring a seamless transition, optimization, and support.
+3
Applicable to:
Migration
Security
Storage
43 out of 60
Basic Azure Infrastructure Workshop: eintägiger WorkshopFellowmind Germany GmbHErleben Sie die Zukunft der IT mit Azure Cloud – effizient, kostensparend und flexibel. Lassen Sie sich von unseren Experten durch den digitalen Wandel führen!
+2
Applicable to:
Migration
Security
44 out of 60
Cognizant offering for Oracle Database@AzureCognizantMigrate your critical Oracle workloads to Azure leveraging Cognizant’s expertise in Discovery, Analysis, Sizing, Oracle license management and migration of Oracle Databases to Oracle Database@Azure
+3
Applicable to:
Migration
Networking
Security
45 out of 60
Rackspace Managed XDR powered by Microsoft SentinelRackspaceSecure your digital assets with Rackspace Managed XDR, blending Microsoft Sentinel, advanced threat detection, SOC analysts, and AI-driven response.
+1
Applicable to:
Security
46 out of 60
DXC's Microsoft Copilot for Security Readiness AssessmentDXCMicrosoft’s Copilot for Security is a disruptive generative AI technology designed to enhance security operations.
+1
Applicable to:
Security
47 out of 60
Azure Arc Jump Start WorkshopT-Systems International We are excited to offer a 2 day workshop on Azure Arc, designed to help you seamlessly manage and secure your diverse IT environment across on-premises and multi-cloud platforms.
+2
Applicable to:
Backup
Security
48 out of 60
Traceability and Verification System: 0.5-day BriefingReplyJoin us for a half-day briefing on Solidsoft Reply's Traceability and Verification System (TRVST), our innovative solution to combating the proliferation of falsified medicines.
+3
Applicable to:
App Modernization
Big Data
Security
49 out of 60
Migration to Azure VMware: 8 weeks AssessmentElitmind SPAssessment specifies the scope and methodology for assessing your organization's current on-premises VMware environment to facilitate a smooth migration to AVS in the Azure Cloud.
+3
Applicable to:
Migration
Networking
Security
50 out of 60
3-Week Security Baseline AssessmentAvertium, LLCOrganizations that lack the resources to accurately assess their security deployments will benefit from this in-depth assessment.
+1
Applicable to:
Security
51 out of 60
Eviden's Smart Factory 3-Weeks AssessmentEviden International France - SASThe solutions lead to reductions in inventory-holding costs, increased labor productivity, reduced machine downtime, throughput increase, improved forecasting accuracy, cost-of-quality improvements
+3
Applicable to:
Analytics
AI & Machine Learning
Security
52 out of 60
HITRUST Certification e1, i1 or r2Avertium, LLCSimplify the HITRUST certification experience, unburden your teams, and get a clear and actionable roadmap that builds towards a mature security posture.
+1
Applicable to:
Security
53 out of 60
HIPAA Compliance Risk Assessment & Gap AnalysisAvertium, LLCAvertium’s team of healthcare and security consultants apply their deep knowledge of compliance to the way you do business.
+2
Applicable to:
Identity
Security
54 out of 60
Microsoft Azure Cloud Migration: 6 weeks Assessmentinovex GmbHEvaluate the feasibility and effort of an Azure Cloud Migration and map out the necessary steps for a successful migration
+3
Applicable to:
Data Platform
Migration
Security
55 out of 60
Application Migration to Microsoft Entra ID: 12-Wk ImplementationModern 42Migrate and onboard your SSO enabled apps to Microsoft Entra ID from your existing Identity Platform (ADFS, Okta, Ping)
+1
Applicable to:
Security
56 out of 60
Penetration Testing: 4 weeks AssessmentCiklumBlack-box or grey box-oriented penetration testing that simulates real-world attacks to identify vulnerabilities in your systems, networks, and applications.
+2
Applicable to:
Analytics
Security
57 out of 60
Eviden's Confidential Data Room 6 to 12 Weeks POCEviden International France - SASEviden's Confidential Data Room is a solution that allows companies to share and analyze data securely, even under strict data privacy regulations.
+3
Applicable to:
Analytics
Data Platform
Security
58 out of 60
Azure Landing Zone "Out of the Box": 5-Tages ImplementierungPublic Cloud Group GmbHDie Azure Landing Zone ist eine vorkonfigurierte Azure-Umgebung mit allen Komponenten und Best Practices für eine sichere und skalierbare Infrastruktur.
+2
Applicable to:
Migration
Security
59 out of 60
Unisys Well-Architected ReviewUnisys Corp / Blue BellUnisys offers a comprehensive assessment process for Azure workloads, guided by certified architects. During your review, leverage this expertise to evaluate your adoption of best practices.
+2
Applicable to:
Migration
Security
60 out of 60