Beri maklum balas
Help & support
Item yang Disimpan
Pelan persendirian
Tunggu sebentar, melog masuk anda...
PenapisKosongkan semua

  • Lokasi anda
  • Produk (1)
    • Azure (1)
      • AI & Machine Learning
      • Analitis
      • App Modernization
      • Archive
      • Backup
      • Big Data
      • Data Platform
      • DevOps
      • Disaster Recovery
      • Identity
      • Internet of Things
      • Migration
      • Networking
      • Security
      • Storage
    • Dynamics 365
    • Microsoft 365
    • Power Platform
  • Industri (1)
    • Pertahanan & Perisikan
    • Edaran
    • Pendidikan
    • Tenaga & Sumber
    • Perkhidmatan Kewangan
    • Kerajaan
      • Operasi & Infrastruktur Kerajaan
      • Kewangan Awam
      • Kesihatan Awam & Perkhidmatan Sosial
      • Keselamatan & Keadilan Awam
    • Penjagaan Kesihatan
    • Hospitaliti & Pelancongan
    • Pengilangan & Mobiliti
    • Bukan untung
    • Professional Services
    • Barangan Runcit & Pengguna
    • Kemampanan
    • Telekomunikasi & Media
  • Jenis perkhidmatan
  • Model Harga

Professional Services hasil

Menunjukkan dalam professional services%1!s!.
Cloud Security Approach: 2-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Through the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
1 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Evolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
2 out of 60
Cloud Security Posture: 2-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
3 out of 60
Cloud Security Deployment: 4-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Implementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
4 out of 60
Cloud Security Compliance: 4-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
5 out of 60
Cloud Security Services: 12-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
We audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
6 out of 60
IAM Architecture 3-Weeks ImplementationToreon CVBA
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Setting up a custom fitting IAM model to give your business the control it needs.
7 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield Ltd
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Spartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
8 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Delivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
9 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.ai
+1
Applicable to:
identity product iconIdentity
Implementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
10 out of 60
Purple Team Assessment: 1 Week AssessmentBridewell Consulting Limited
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Test your organisation's defensive capabilities by conducting a purple team assessment in collaboration with Bridewell
11 out of 60
Microsoft Sentinel Accelerator: 1 hour Automated ImplementationOrganised Computer Systems Limited
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
Use Telefónica Tech’s unique automation approach to rapidly deploy Microsoft Sentinel to Microsoft and T-Tech’s combined best practice standard.
12 out of 60
Accelerating Cloud Virtual Desktops: 2-Hour WorkshopSlalom Consulting
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationnetworking product iconNetworking
This Free Workshop will introduce you to how Azure Virtual Desktops help you embrace a remote workforce while maintaining control through secure workstation experiences on any device.
13 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Our offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
14 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Get a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
15 out of 60
Defend Against Threats with SIEM Plus XDRBJSS Limited
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Improve your security posture and uncover risks that might be harmful to your organisation with BJSS' cyber security workshop: Defend Against Threats with SIEM Plus XDR.
16 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitynetworking product iconNetworking
Secure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
17 out of 60
Microsoft Entra Rapid StartShaping Cloud
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Shaping Cloud Microsoft Entra Rapid Start helps you get going with the Entra product set confidently, swiftly, economically.
18 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Implementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
19 out of 60
ACE AVD: 4-Wk ImplementationDevoteam France
+2
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentity
Azure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
20 out of 60
SAP SuccessFactors and Microsoft Entra ID Integration: 6-wk ImplementationOxford Computer Group LLC
+1
Applicable to:
identity product iconIdentity
Enable User Lifecycle Management by integrating SAP SuccessFactors and Microsoft Entra ID.
21 out of 60
Microsoft Security License Utilisation & Commercial Assessment: 2-Week AssessmentBridewell Consulting Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Provide an overview of organisations current licensing position, identify what security Microsoft products could be utilised & build an adoption framework
22 out of 60
Managed Services for Microsoft EntraDXC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Advisory and Managed Services for Microsoft Entra
23 out of 60
Managed Microsoft XDR - 12 month managed serviceANS Group Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
ANS will manage your Microsoft endpoint & workload protection tooling consisting of Microsoft 365 Defender, Defender for Cloud and Microsoft Sentinel, via our 24x7x365 UK based 3 Tiered SOC
24 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARS
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitymigration product iconMigration
ALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
25 out of 60
Security COE - Managed Service (12 months minimum)ANS Group Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Gain access to highly skilled engineering squads to continually develop, engineer and optimise services across your Azure Security solution suite to drive value rapidly.
26 out of 60
Security ReviewShaping Cloud
+3
Applicable to:
backup product iconBackupidentity product iconIdentitysecurity product iconSecurity
Shaping Cloud will perform a high-level security assessment throughout your organisation's IT infrastructure.
27 out of 60
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITED
+3
Applicable to:
analytics product iconAnalyticsdata-platform product iconData Platformidentity product iconIdentity
Provide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
28 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. Israel
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Accelerate your digital transformation with Cloud and Collaboration tools
29 out of 60
Azure Advanced Security 4-Week ImplementationServent
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Azure Advanced Security is a service provided by Servent to help you take advantage of the multi-layered security provided by Microsoft across datacentres, infrastructure and operations in Azure
30 out of 60
Azure Penetration TestMazzy Technologies Corp.
+3
Applicable to:
data-platform product iconData Platformidentity product iconIdentitysecurity product iconSecurity
This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
31 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Azure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
32 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
33 out of 60
Modern workplace Active DirectorySii Sp. z o.o.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Modern workplace Active Directory implementation, migration and support
34 out of 60
Managed Azure Virtual Desktop (Base) - 12 month Managed ServiceANS Group Limited
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Provide, manage and control secure modern workplaces with Managed Azure Virtual Desktop from ANS
35 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta Analytics
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
This solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
36 out of 60
Azure Active Directory B2C - Assess & PlanShaping Cloud
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Azure Active Directory B2C provides business-to-customer identity as a service. We can design, develop & implement a customer identity & access management solution based in Azure Active Directory B2C.
37 out of 60
Eviden's Application Strategy WorkshopEviden International France - SAS
+3
Applicable to:
app-modernization product iconApp Modernizationdata-platform product iconData Platformidentity product iconIdentity
Eviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
38 out of 60
Security Warrior: Managed ServiceTechConnect
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
Our Security Warrior, will give you the visibility and remediation into your Azure security posture to manage the risk through an affordable single pane of glass solution.
39 out of 60
Security and Compliance AssessmentNOVENTIQ
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Gain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
40 out of 60
External IAM 5 day assessmentCondatis Group Limited
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Condatis is offering an external Identity and Access Management (IAM) assessment focusing on how your organisation secures and manages external identities in your business context.
41 out of 60
KloudIdentity: Application Onboarding to Entra made simple with our SCIM GatewayKloudyNet Technologies SDN BHD
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
KloudIdentity is our proprietary SCIM Gateway to onboard LOB & Cloud applications (including non SCIM compliant), databases and other applications to Microsoft Entra for users and groups provisioning.
42 out of 60
Defender For Cloud: 1-Wk Proof of ConceptBridewell Consulting Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Secure your organisation's Azure Cloud workloads by leveraging the expertise of a leading cyber security services provider to review and optimise your implementation of Defender for Cloud.
43 out of 60
ALIANDO Managed Extended Detection and Response (MXDR)myCloudDoor
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
ALIANDO Managed Extended Detection & Response service (MXDR) powered by Sentinel and Defender
44 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoor
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
This assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
45 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoor
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
myCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
46 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SAS
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Utilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
47 out of 60
Eviden's Data Security CSI Engagement 4 Week AssessmentEviden International France - SAS
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Elevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
48 out of 60
Eviden's Azure Cloud Consulting Services – Landing ZonesEviden International France - SAS
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
A consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
49 out of 60
24x7 SOC Service by IntelequiaIntelequia Technologies
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
24x7 monitoring, protection and automated response to cyberthreats
50 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies Services
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
With Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
51 out of 60
Seamless social app identity integrationAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Our solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
52 out of 60
Enterprise App Integration with Microsoft My Apps PortalAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Our solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
53 out of 60
MIM Migration To Entra ID Assessment: 8-Wk AssessmentModern 42
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Microsoft Identity Manager Current state assessment and transition plan to Microsoft Entra ID
54 out of 60
Well Architectured FrameWork Review by NessNess Israel
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
Strengthen Your Cloud Architecture with Ness Cloud. Get tailored recommendations for Operational Excellence, Security, Reliability, Performance Efficiency, Cost Optimization, and Sustainability.
55 out of 60
Cloud Security Assessment By NessNess Israel
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Enhance Your Cloud Security with Ness Cloud. Our assessment uncovers vulnerabilities, misconfigurations, and weaknesses, offering customized recommendations to strengthen your cloud environment.
56 out of 60
Cloud Architect Review by NessNess Israel
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
Optimize Your Cloud Architecture with Ness. Our Cloud Architect Review provides a comprehensive analysis of your cloud setup, ensuring it is efficient, reliable, and cost-effective.
57 out of 60
Landing Zone Setup by NessNess Israel
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitymigration product iconMigration
Establish a Secure Foundation with Ness. Our Landing Zone Setup ensures a compliant, secure and scalable Azure environment for your workloads.
58 out of 60
Front Door Implementation by NessNess Israel
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
Optimize your site and app performance and resilience. The Front Door Implementation by Ness Cloud ensures efficient and secure content delivery for your applications and reduced server loads.
59 out of 60
Azure Landing Zone Deployment ServiceLotus Beta Analytics
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
The "Azure Landing Zone Deployment Service" simplifies setting up secure, compliant Azure environments with pre-configured templates, ensuring a solid foundation for cloud operations and governance.
60 out of 60
  • 1
  • 2
  • 3
  • Seterusnya
Tentang Marketplace
  • Mengapa Microsoft Marketplace
  • Blog
  • Kisah pelanggan
Untuk pelanggan
  • Waktu pejabat
  • Panduan untuk bermula
  • Dokumentasi teknikal
  • Tawaran peribadi
  • Komitmen penggunaan Microsoft Azure
  • Pengebilan dan invois
Untuk rakan kongsi
  • Menjadi rakan kongsi
  • Dapatkan senarai
  • Dapatkan sokongan pemasaran
  • Dokumentasi teknikal
  • Panduan langkah demi langkah untuk membina, menerbitkan, dan menjual
  • Menjadi layak untuk jualan bersama
  • Marketplace Community untuk Rakan Kongsi
  • Jualan Marketplace yang dipimpin oleh saluran
  • Tawaran persendirian pelbagai pihak untuk rakan kongsi saluran
Perniagaan
  • Microsoft Cloud
  • Keselamatan Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Melayu (Malaysia) Ikon Pilih Keluar Pilihan Privasi Anda Pilihan Privasi Anda Privasi Kesihatan Pengguna
  • Peta laman
  • Hubungi Kami
  • Privasi & Kuki
  • Terma Penggunaan
  • Tanda dagangan
  • Perihal iklan kami
  • Uruskan kuki
  • © Microsoft 2025