Beri maklum balas
Help & support
Item yang Disimpan
Pelan persendirian
Tunggu sebentar, melog masuk anda...
PenapisKosongkan semua

  • Lokasi anda
  • Produk (1)
    • Azure (1)
      • AI & Machine Learning
      • Analitis
      • App Modernization
      • Archive
      • Backup
      • Big Data
      • Data Platform
      • DevOps
      • Disaster Recovery
      • Identity
      • Internet of Things
      • Migration
      • Networking
      • Security
      • Storage
    • Dynamics 365
    • Microsoft 365
    • Power Platform
  • Industri
  • Jenis perkhidmatan
  • Model Harga

Professional Services hasil

Menunjukkan dalam professional services%1!s!.
Secure SAP on Azure : 2-Hrs BriefingTCS - Security
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
2 Hrs briefing on TCS Managed Security services offering leveraging contextual and pre-integrated solution for protecting SAP ecosystem on Azure
1 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield Ltd
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Spartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
2 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Delivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
3 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.ai
+1
Applicable to:
identity product iconIdentity
Implementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
4 out of 60
HCLTech Unified Digital AccessHCL America Inc_HCLT
+1
Applicable to:
identity product iconIdentity
HCLTech’s Unified Digital Access solution protects enterprise users and apps from cybersecurity attacks by aiding with right enterprise security posture with easy access to Apps and services.
5 out of 60
Transition To Cloud: 2-Day WorkshopSaportif Technology QFZ LLC
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Productivity and teamwork are fundamental to build resilience for your people, teams, and organization.
6 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Our offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
7 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private Limited
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
We help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
8 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private Limited
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
We help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
9 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Get a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
10 out of 60
Azure Virtual Desktop: 2-Wk ImplementationPetabytz Inc
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Start experiencing the best kind of virtualization with Azure Virtual Desktop in minutes to enable remote work. Provides employees the same experience they would have on a local desktop.
11 out of 60
skillup_consulting_openedx_v1Flexible Road LLC
+3
Applicable to:
backup product iconBackupidentity product iconIdentitystorage product iconStorage
Open edX Learning Management System with Azure.
12 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitynetworking product iconNetworking
Secure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
13 out of 60
Secure Identities with Cognizant's Next-Gen Microsoft Defender for Identity ServiceCognizant
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Secure your identities with Cognizant’s Next-Gen Identity and Access Management Service, powered by Microsoft Defender for Identity and Azure Active Directory
14 out of 60
Azure Active Directory Migration: 3-Wk AssessmentiC Consult Gesellschaft für Systemintegration und Kommunikation mbH
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
This offer is ideal for customers that want to consolidate grown Identity and Access Management/MFA solutions to reach a best of breed approach for Azure AD infrastructure and Azure AD principles.
15 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Implementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
16 out of 60
ACE AVD: 4-Wk ImplementationDevoteam France
+2
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentity
Azure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
17 out of 60
Assesment Azure Base4Base4 Security Chile SPA
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
18 out of 60
Azure Security Accelerator SuiteNeudesic
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Mitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
19 out of 60
Managed Services for Microsoft EntraDXC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Advisory and Managed Services for Microsoft Entra
20 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POCITC Secure Ltd
+3
Applicable to:
data-platform product iconData Platformidentity product iconIdentitysecurity product iconSecurity
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
21 out of 60
CloudPOS: 4-Week ImplementationMediasoft Data Systems Limited
+3
Applicable to:
analytics product iconAnalyticsarchive product iconArchiveidentity product iconIdentity
The all-in-one cloud-based point-of-sale solution. Boost efficiency, streamline operations, and enhance the customer experience with the user-friendly, secure, and fast software solutions.
22 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitystorage product iconStorage
DotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
23 out of 60
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITED
+3
Applicable to:
analytics product iconAnalyticsdata-platform product iconData Platformidentity product iconIdentity
Provide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
24 out of 60
Red Canary Microsoft Sentinel WorkshopRed Canary
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Get an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
25 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. Israel
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Accelerate your digital transformation with Cloud and Collaboration tools
26 out of 60
Azure Penetration TestMazzy Technologies Corp.
+3
Applicable to:
data-platform product iconData Platformidentity product iconIdentitysecurity product iconSecurity
This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
27 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Azure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
28 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
29 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland Oy
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitystorage product iconStorage
Azure Virtual Desktop is not a turnkey service – who is going to run it for you?
30 out of 60
Modern workplace Active DirectorySii Sp. z o.o.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Modern workplace Active Directory implementation, migration and support
31 out of 60
Enterprise - Zero Trust Strategy & Journey MapJohn Keells Information Technology Pvt Ltd
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Organizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid & multi-cloud workplace, and ensures cyber security assurance.
32 out of 60
Detection & Response Services (MXDR)Cloud Life
+3
Applicable to:
ai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentitysecurity product iconSecurity
Cloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
33 out of 60
Sentinel-as-a-ServiceCloud Life
+3
Applicable to:
ai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentitysecurity product iconSecurity
Cloud Life delivers an innovative cloud-based AI and ML-enhanced Sentinel-as-a-Service, empowering your team with managed SIEM/SOAR capabilities using optimum Microsoft MXDR Services
34 out of 60
Brillio Open Banking SolutionBrillio
+3
Applicable to:
data-platform product iconData Platformidentity product iconIdentitysecurity product iconSecurity
A robust, scalable, and secure solution that is designed to address the ever-evolving regulatory landscape and empower financial institutions to stay ahead in this new era of banking.
35 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta Analytics
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
This solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
36 out of 60
Microsoft Sentinel DeploymentBlazeClan Technologies Pvt. Ltd
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Blazeclan offers Microsoft Sentinel deployment, integration, configuration and optimization in the customer's environment seamlessly.
37 out of 60
Azure Well Architected Review - 5 Days AssessmentBlazeClan Technologies Pvt. Ltd
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationnetworking product iconNetworking
Blazeclan offers Azure Well Architected Review to help customers assess the environment for reliability, cost management, operational excellence, security and performance efficiency.
38 out of 60
Eviden's Application Strategy WorkshopEviden International France - SAS
+3
Applicable to:
app-modernization product iconApp Modernizationdata-platform product iconData Platformidentity product iconIdentity
Eviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
39 out of 60
Azure Well Architected Framework (AWAF) AssessmentNOVENTIQ
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Optimize Azure efficiency and security with our Well-Architected Framework Assessment. Uncover challenges, enhance performance, and fortify your infrastructure for success.
40 out of 60
Security and Compliance AssessmentNOVENTIQ
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Gain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
41 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
42 out of 60
Workshop Threat Protection con Microsoft Sentinel: Blindaje Avanzado contra Amenazas Cibernéticas - 4Wk WorkShopENCAMINA S.L.
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Una inmersión profunda en la estrategia de seguridad, adaptada a tu organización
43 out of 60
KloudIdentity: Application Onboarding to Entra made simple with our SCIM GatewayKloudyNet Technologies SDN BHD
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
KloudIdentity is our proprietary SCIM Gateway to onboard LOB & Cloud applications (including non SCIM compliant), databases and other applications to Microsoft Entra for users and groups provisioning.
44 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoor
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
This assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
45 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoor
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
myCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
46 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SAS
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Utilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
47 out of 60
Eviden's Data Security CSI Engagement 4 Week AssessmentEviden International France - SAS
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Elevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
48 out of 60
Eviden's Azure Cloud Consulting Services – Landing ZonesEviden International France - SAS
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
A consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
49 out of 60
Keycloak-3 weeks ImplementationApexon
+3
Applicable to:
analytics product iconAnalyticsdevops product iconDevOpsidentity product iconIdentity
Keycloak is an open-source identity and access management solution. Apexon repackages open source Keycloak and provides one-click deployment with automation and customization.
50 out of 60
HCLTech's Cybersecurity ServicesHCL Technologies Limited.
+3
Applicable to:
backup product iconBackupidentity product iconIdentitysecurity product iconSecurity
HCLTech is a leading global technology company that helps enterprises reimagine their businesses for the digital age. Secure your cloud journey with HCLTech's comprehensive portfolio of cybersecurity
51 out of 60
Apexon Lab-as-a-Service (LaaS) – 4 Weeks - Proof of ConceptApexon
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentityinternet-of-things product iconInternet of Things
Unlock the power of rapid innovation with Apexon LaaS, leveraging Azure AI Services, including Copilot, Azure Open AI, NLP, Vision, Speech, Search, Anomaly Detector and Document Processing.
52 out of 60
Cognizant Cyber Threat Defense, powered by MicrosoftCognizant
+3
Applicable to:
ai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentitysecurity product iconSecurity
Cognizant's Cyber Threat Defense offering provides a set of structured methodologies and tools to assess, migrate, modernize and manage your Security Operations Center (SOC).
53 out of 60
PwC Cybersecurity and Risk CapabilitiesPricewaterhousecoopers LLP
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Reimagine risk and unlock opportunities through a human-led, tech-powered approach.
54 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Entra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
55 out of 60
Azure AD Identity Protection AssessmentAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Our Azure AD Identity Protection Assessment identifies vulnerabilities and strengthens security. Mitigate risks with advanced threat detection and tailored defense strategies.
56 out of 60
Single Sign On (SSO) for Applications using Entra ID by AVASOFTAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Automated Identity & Access Management with Azure AD streamlines user access. Simplify authentication with SSO, reduce password fatigue, and enhance security and productivity.
57 out of 60
AVASecure 360 - Entra ID Access Management Solutions by AVASOFTAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Automated Identity & Access Management with Azure AD streamlines user provisioning, access requests, and reviews. Enhance security, efficiency, and compliance effortlessly.
58 out of 60
Microsoft Azure AD AuthenticationAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Struggling with user access management? Azure AD Authentication automates provisioning, access requests, and reviews, enhancing security, efficiency, and compliance.
59 out of 60
Strengthen Your Azure Security - 3 days Comprehensive Risk AssessmentAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Identify and address security gaps in Azure with our Risk Assessment. Gain insights, tailored recommendations, and best practices to strengthen your security and maintain compliance.
60 out of 60
  • 1
  • 2
  • 3
  • 4
  • Seterusnya
Tentang Marketplace
  • Mengapa Microsoft Marketplace
  • Blog
  • Kisah pelanggan
Untuk pelanggan
  • Waktu pejabat
  • Panduan untuk bermula
  • Dokumentasi teknikal
  • Tawaran peribadi
  • Komitmen penggunaan Microsoft Azure
  • Pengebilan dan invois
Untuk rakan kongsi
  • Menjadi rakan kongsi
  • Dapatkan senarai
  • Dapatkan sokongan pemasaran
  • Dokumentasi teknikal
  • Panduan langkah demi langkah untuk membina, menerbitkan, dan menjual
  • Menjadi layak untuk jualan bersama
  • Marketplace Community untuk Rakan Kongsi
  • Jualan Marketplace yang dipimpin oleh saluran
  • Tawaran persendirian pelbagai pihak untuk rakan kongsi saluran
Perniagaan
  • Microsoft Cloud
  • Keselamatan Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Melayu (Malaysia) Ikon Pilih Keluar Pilihan Privasi Anda Pilihan Privasi Anda Privasi Kesihatan Pengguna
  • Peta laman
  • Hubungi Kami
  • Privasi & Kuki
  • Terma Penggunaan
  • Tanda dagangan
  • Perihal iklan kami
  • Uruskan kuki
  • © Microsoft 2025