PenapisKosongkan semua
Professional Services hasil
Menunjukkan dalam professional services%1!s!.
Azure Carve Out: 10-Day AssessmentHSO HSO's Azure Carve Out assesses your IT environment, network, hardware and security architecture and equips your business with essential tools and a future investment roadmap.
+3
Applicable to:
Data Platform
Migration
Security
1 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield LtdSpartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
+3
Applicable to:
Identity
Migration
Security
2 out of 60
Vulnerability Assessment: 1-Week Assessment伊雲谷數位科技股份有限公司1 week assessment provide a systematic review of weaknesses in cloud computing instances or applications of a company.
+1
Applicable to:
Security
3 out of 60
How to get started with Cloud security in Microsoft Azure: 4h workshopBillennium S.A.4-hour workshop on how to keep your organization secure in the Microsoft Azure environment led by a certified cyber security expert (MVP and MCT).
+1
Applicable to:
Security
4 out of 60
Professional Services Edunao x Azure 1-Day ImplementationEDUNAOEdunao offers Professional Services to improve Learning experience and technologies. Edunao is an Independant Software Vendor (ISV) of Azure-hosted solutions.
+3
Applicable to:
App Modernization
Security
Storage
5 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology HoldingOur offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
+3
Applicable to:
Identity
Security
Storage
6 out of 60
CIS-Based Security Maturity: 1-Day Workshop for Microsoft Azure Security CustomersBlueVoyantA maturity-based, holistic cyber program will improve your security posture, complement your Azure security measures (such as Sentinel and Defender), and better protect your data.
+1
Applicable to:
Security
7 out of 60
ColdFusion App Migration: 4 Week ImplementationMedia3 Technologies, LLCInfrastructure Review, Design, and Deployment
System Migration Services
Security and Azure Service Consumption Optimization
Additional Professional Services
+3
Applicable to:
App Modernization
Migration
Security
8 out of 60
Fast Track Assessment on AzureCLICK2CLOUD INCFast Track Assessment & Industry-Specific Solutions to Transform Your Business
+3
Applicable to:
Analytics
App Modernization
Security
9 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology HoldingGet a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
+3
Applicable to:
Identity
Security
Storage
10 out of 60
Health Check - Strategy Health AssessmentTenthline Inc.This service analyzes Azure deployments for insights into optimizing costs, improving the security posture, and determining any architectural changes according to best practices.
+3
Applicable to:
Analytics
Networking
Security
11 out of 60
Azure Cost-Optimization AssessmentTenthline Inc.Tenthline's cost-optimization assessment evaluates all elements of your cloud infrastructure to identify opportunities for cost reductions in your Azure deployment.
+3
Applicable to:
App Modernization
Migration
Security
12 out of 60
Azure SupportTenthline Inc.24/7 Azure Cloud support for a large-scale full production environment.
+3
Applicable to:
Networking
Security
Storage
13 out of 60
Monitoring ServiceTenthline Inc.Tenthline's Cloud Monitoring solutions provide proactive monitoring, reporting, and support for your applications and hybrid cloud infrastructure to avoid downtime and security issues.
+3
Applicable to:
Analytics
Networking
Security
14 out of 60
BlueVoyant Microsoft Azure for IoT Hub Health Check - 3 Week EngagementBlueVoyantOptimize your Microsoft Azure for IoT Hub to secure your telemetry data and help improve your security posture
+3
Applicable to:
Internet of Things
Networking
Security
15 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
16 out of 60
Managed Services for Microsoft EntraDXCAdvisory and Managed Services for Microsoft Entra
+2
Applicable to:
Identity
Security
17 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
18 out of 60
Azure Migration Services: 12-week Migration ServicesMaureen Data SystemsFull migration service- assessing current environment, configuring Landing Zone, migrating applications with automated tools and scripts, and creating the process for continuous optimization.
+3
Applicable to:
Disaster Recovery
Migration
Security
19 out of 60
Azure Assessment: 2-Day AssessmentQuoStar Solutions LimitedOur team will perform a thorough evaluation of your existing Azure environment and we will provide you with clear guidance on how to implement these improvements.
+3
Applicable to:
App Modernization
Data Platform
Security
20 out of 60
QuoStar Azure Expert: 1-5 Day consultationQuoStar Solutions LimitedQuoStar's Azure expertscan provide tailored solutions, whether you need advice on industry best practice, troubleshooting or mapping an Azure migration.
+3
Applicable to:
App Modernization
Migration
Security
21 out of 60
Azure Cosmos DatabaseDOTSQUARES TECHNOLOGIES INDIA P LTDAzure Cosmos DB consulting services offer expert guidance in leveraging Microsoft's globally distributed, multi-model database service to design, implement, and optimize scalable and highly available
+3
Applicable to:
Migration
Security
Storage
22 out of 60
QuoStar Azure Readiness Assessment: 3-Day assessmentQuoStar Solutions LimitedUnlock the full potential of Microsoft Azure and optimise your business operations with QuoStar’s Azure Readiness Assessment
+3
Applicable to:
Migration
Networking
Security
23 out of 60
Accelerating Cloud Adoption for Azure efficiently and effectivelyTrianz IT and Cloud Solutions Pvt. LtdTrianz is a cloud migration pioneer and lead the initiatives by leveraging IP led services to automate and fast track the cloud adoption journey.
+3
Applicable to:
Migration
Networking
Security
24 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
25 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
26 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
27 out of 60
Modern workplace Active DirectorySii Sp. z o.o.Modern workplace Active Directory implementation, migration and support
+2
Applicable to:
Identity
Security
28 out of 60
DXC Azure VMware SolutionDXCUnlock innovation and gain a competitive edge with the powerhouse Azure VMware Solution, moving your workloads to a more secure and scalable cloud infrastructure.
+2
Applicable to:
Migration
Security
29 out of 60
IN - Active Directory Risk Assessment with Crowd strikeCrayonUnderstand your Microsoft Azure AD Risk with quick assessment without paying any cost.
+1
Applicable to:
Security
30 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
31 out of 60
Cloud Security Assessment with Cloud Intel - A 4-Week AssessmentCLICK2CLOUD INCSecure Your Cloud Environment with Microsoft 365 Security Tools
Get insights on how Microsoft's next-gen security tools help you protect your cloud assets as part of your long-term business strategy.
+3
Applicable to:
AI & Machine Learning
Data Platform
Security
32 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
33 out of 60
Imperium Azure ConsultingIMPERIUM DYNAMICS LLCExpert guidance to help your business take control of the cloud.
+3
Applicable to:
AI & Machine Learning
Migration
Security
34 out of 60
Avanade Secure Identities and AccessAvanade, Inc.At Avanade we help our customers to evolve their identity strategy to enable trustworthy and interoperable digital identities.
+1
Applicable to:
Security
35 out of 60
KloudIdentity: Application Onboarding to Entra made simple with our SCIM GatewayKloudyNet Technologies SDN BHDKloudIdentity is our proprietary SCIM Gateway to onboard LOB & Cloud applications (including non SCIM compliant), databases and other applications to Microsoft Entra for users and groups provisioning.
+2
Applicable to:
Identity
Security
36 out of 60
myCloudDoor Managed Extended Detection and Response (MXDR)myCloudDoormyCloudDoor Managed Extended Detection & Response service (MXDR) powered by Sentinel and Defender
+1
Applicable to:
Security
37 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoorThis assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
+3
Applicable to:
Identity
Networking
Security
38 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoormyCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
+3
Applicable to:
Identity
Networking
Security
39 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SASUtilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
+2
Applicable to:
Identity
Security
40 out of 60
Eviden's Data Security CSI Engagement 4 Week AssessmentEviden International France - SASElevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
+3
Applicable to:
Analytics
Identity
Security
41 out of 60
Compunnel_Azure_DevOpsCompunnel Software GroupCompunnel's Azure DevOps Services offer a comprehensive suite designed to streamline and optimize the software development process. By integrating these services, businesses can achieve significant im
+3
Applicable to:
Big Data
DevOps
Security
42 out of 60
Eviden's Microsoft Sentinel CSI Engagement 5 WK WorkshopEviden International France - SASIncrease the security of your Microsoft Cloud with our workshop. We deploy Microsoft 365 trial lic, configure Security tools, and conduct threat exploration to discover and mitigate threats actively.
+1
Applicable to:
Security
43 out of 60
Eviden's Azure Cloud Consulting Services – Landing ZonesEviden International France - SASA consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
+2
Applicable to:
Identity
Security
44 out of 60
Capgemini Managed Security Services with Sentinel for SAPCapgemini GroupThe solution is focused on providing a clear overview of vulnerabilities present in the complex SAP landscape from different domains.
+1
Applicable to:
Security
45 out of 60
Dell Implementation Services for Microsoft Azure Site RecoveryDell Technologies ServicesDell Services provides advisory and implementation services for Azure cloud customers, enabling organizations to replicate and thus protect critical cloud workloads with time-tested frameworks.
+3
Applicable to:
Backup
Disaster Recovery
Security
46 out of 60
Eviden’s Application Transformation Services with Cloud Code Refactor InsightsEviden International France - SASEviden’s Application Transformation services invoke code refactoring and configuration automation, leading to cloud readiness for faster release cycles and a consistent deployment process.
+2
Applicable to:
App Modernization
Security
47 out of 60
GCT Azure Sentinel: 12 Month Enablement with ManagementGlobal Computing and TelecomsGCT's Proactive, cloud-native security with threat detection, response ,insights and Management
+3
Applicable to:
Analytics
Migration
Security
48 out of 60
SoftwareOne Managed Extended Detection and Response for Microsoft SentinelSoftwareOneFuture-proof your cyber security with Managed Detection and Response (MDR)
+2
Applicable to:
Analytics
Security
49 out of 60
Dell Implementation Services for Backup on Microsoft AzureDell Technologies ServicesAttain strategic data protection policy guidance and recommendations.
+2
Applicable to:
Backup
Security
50 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
51 out of 60
Azure Cost OptimizationH One (Private) LimitedUnexpectedly high bills can be a frustrating surprise, and Azure billing is no different. Keeping a close watch on your Azure expenditures can help you stay within budget and avoid unnecessary costs.
+3
Applicable to:
Networking
Security
Storage
52 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
54 out of 60
Setup Azure Landing Zone: 6 weeks ImplementationPeritos SolutionsWe've designed the framework for organizations migrating to Azure. The Azure Landing Zone sets best practices for streamlined, secure, and efficient setups, ideal for confident cloud transitions.
+3
Applicable to:
DevOps
Migration
Security
55 out of 60
softip_landing_zoneSOFTIP, a.s.Softip solution using terraform technology can help you quickly deploy an Azure environment that is alligned with CAF, Azure Security Baseline (ASB/MCSB), OWASP, GDPR, and SOFTIP best practises.
+3
Applicable to:
DevOps
Networking
Security
56 out of 60
DXC's Microsoft Copilot for Security Readiness AssessmentDXCMicrosoft’s Copilot for Security is a disruptive generative AI technology designed to enhance security operations.
+1
Applicable to:
Security
57 out of 60
Migration to Azure VMware: 8 weeks AssessmentElitmind SPAssessment specifies the scope and methodology for assessing your organization's current on-premises VMware environment to facilitate a smooth migration to AVS in the Azure Cloud.
+3
Applicable to:
Migration
Networking
Security
58 out of 60
Eviden's Confidential Data Room 6 to 12 Weeks POCEviden International France - SASEviden's Confidential Data Room is a solution that allows companies to share and analyze data securely, even under strict data privacy regulations.
+3
Applicable to:
Analytics
Data Platform
Security
59 out of 60
Unisys Well-Architected ReviewUnisys Corp / Blue BellUnisys offers a comprehensive assessment process for Azure workloads, guided by certified architects. During your review, leverage this expertise to evaluate your adoption of best practices.
+2
Applicable to:
Migration
Security
60 out of 60