PenapisKosongkan semua
Professional Services hasil
Menunjukkan dalam professional services%1!s!.
Copilot for Security: 3-hour introduction workshopWhite Hat IT Security KftRecommended for those who are interested in Copilot for Security. This brief introduction shows the current capabilities and value of Copilot for Security.
+2
Applicable to:
AI & Machine Learning
Security
1 out of 60
SoftwareOne Managed Extended Detection and Response for Microsoft SentinelSoftwareOneFuture-proof your cyber security with Managed Detection and Response (MDR)
+2
Applicable to:
Analytics
Security
2 out of 60
Fabricator: Unified Workbench for Microsoft FabricTech Mahindra LimitedTechM Fabricator, designed to simplify the journey from data collection to consumption through an intuitive orchestration pipeline and metadata driven automation.
+3
Applicable to:
Analytics
Data Platform
Security
3 out of 60
Azure AD Identity Protection AssessmentAVASOFTOur Azure AD Identity Protection Assessment identifies vulnerabilities and strengthens security. Mitigate risks with advanced threat detection and tailored defense strategies.
+2
Applicable to:
Identity
Security
4 out of 60
Single Sign On (SSO) for Applications using Entra ID by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user access. Simplify authentication with SSO, reduce password fatigue, and enhance security and productivity.
+2
Applicable to:
Identity
Security
5 out of 60
AVASecure 360 - Entra ID Access Management Solutions by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user provisioning, access requests, and reviews. Enhance security, efficiency, and compliance effortlessly.
+2
Applicable to:
Identity
Security
6 out of 60
Microsoft Azure AD AuthenticationAVASOFTStruggling with user access management? Azure AD Authentication automates provisioning, access requests, and reviews, enhancing security, efficiency, and compliance.
+2
Applicable to:
Identity
Security
7 out of 60
Dell Implementation Services for Backup on Microsoft AzureDell Technologies ServicesAttain strategic data protection policy guidance and recommendations.
+2
Applicable to:
Backup
Security
8 out of 60
I-Nxt Virtual DesktopCognizantAccelerate the deployment of a highly scalable, secure and flexible Azure Virtual Desktop (AVD) by utilizing Nerdio Manager for Enterprise.
+2
Applicable to:
Networking
Security
9 out of 60
Security Testing: 2-Week AssessmentELEKSEnsure the protection of your Microsoft Azure/Hybrid infrastructure and Azure-based applications with ELEKS' Security Testing Services.
+3
Applicable to:
DevOps
Networking
Security
10 out of 60
Strengthen Your Azure Security - 3 days Comprehensive Risk AssessmentAVASOFTIdentify and address security gaps in Azure with our Risk Assessment. Gain insights, tailored recommendations, and best practices to strengthen your security and maintain compliance.
+2
Applicable to:
Identity
Security
11 out of 60
On-premises Active Directory Infra AssessmentAVASOFTOur On-Premises AD Infrastructure Assessment identifies vulnerabilities and compliance gaps. Strengthen security and ensure compliance with actionable insights and expert recommendations.
+2
Applicable to:
Identity
Security
12 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
13 out of 60
Dell Implementation Services for Microsoft Defender on CloudDell Technologies ServicesAdvisory and Deployment services aligned to your cloud security objectives, enabling you to gain comprehensive visibility of your cloud security posture across your environments.
+1
Applicable to:
Security
14 out of 60
Azure Cost OptimizationH One (Private) LimitedUnexpectedly high bills can be a frustrating surprise, and Azure billing is no different. Keeping a close watch on your Azure expenditures can help you stay within budget and avoid unnecessary costs.
+3
Applicable to:
Networking
Security
Storage
15 out of 60
API Release Process into Azure API ManagementSolidify ABSetup of API Management and lifecycle processes around APIs
+3
Applicable to:
DevOps
Networking
Security
16 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
18 out of 60
Kyndryl IAM Design and Implementation ServicesKyndryl Inc.Kyndryl IAM Services provide IAM solutions for hybrid and cloud environments using Microsoft Entra. Focus on user authentication, identity governance, and secure access with Zero Trust principles.
+3
Applicable to:
Backup
Identity
Security
19 out of 60
Azure Health CheckWIZARD GROUP LIMITEDThis service guides Azure Deployments to optimise costs, enhance security, and align architecture with industry standards, maximising Azure Cloud Infrastructure benefits
+3
Applicable to:
Networking
Security
Storage
20 out of 60
QA assessmentCiklumAnalyze testing processes & practices.
Get the GAP analysis against a hybrid approach containing practises from TMMi and TPI.
Receive overall maturity evaluation.
+3
Applicable to:
Analytics
DevOps
Security
21 out of 60
Hybrid AD Identity Security AssessmentAVASOFTOur Hybrid AD Identity Security Assessment identifies vulnerabilities and compliance gaps. Fortify your Hybrid AD, enhance security, and ensure compliance with actionable insights.
+2
Applicable to:
Identity
Security
22 out of 60
Art of Prompts powered by "Microsoft Copilot for Security"Paramount Computer Systems LLCAdopt “Microsoft Copilot for Security” swiftly leveraging the deep expertise of Paramount Cyber Security Consultants with the side-by-side guidance and training on Copilot for Security.
+2
Applicable to:
AI & Machine Learning
Security
23 out of 60
Setup Azure Landing Zone: 6 weeks ImplementationPeritos SolutionsWe've designed the framework for organizations migrating to Azure. The Azure Landing Zone sets best practices for streamlined, secure, and efficient setups, ideal for confident cloud transitions.
+3
Applicable to:
DevOps
Migration
Security
24 out of 60
softip_landing_zoneSOFTIP, a.s.Softip solution using terraform technology can help you quickly deploy an Azure environment that is alligned with CAF, Azure Security Baseline (ASB/MCSB), OWASP, GDPR, and SOFTIP best practises.
+3
Applicable to:
DevOps
Networking
Security
25 out of 60
Intune Assessment - 1 Day WorkshopValtoAn assessment of the Microsoft 365 Intune Environment checking all services within the platform and covering off additional tools available in your organisation to assist with MDM.
+3
Applicable to:
Backup
Networking
Security
26 out of 60
Infrastructure Migration to Azure with Click2Cloud - An AMM PartnerCLICK2CLOUD INCMigrate your infrastructure workload to Azure Cloud with Click2Cloud’s Migration and Modernization service offerings, ensuring a seamless transition, optimization, and support.
+3
Applicable to:
Migration
Security
Storage
27 out of 60
Cognizant offering for Oracle Database@AzureCognizantMigrate your critical Oracle workloads to Azure leveraging Cognizant’s expertise in Discovery, Analysis, Sizing, Oracle license management and migration of Oracle Databases to Oracle Database@Azure
+3
Applicable to:
Migration
Networking
Security
28 out of 60
DXC's Microsoft Copilot for Security Readiness AssessmentDXCMicrosoft’s Copilot for Security is a disruptive generative AI technology designed to enhance security operations.
+1
Applicable to:
Security
29 out of 60
Traceability and Verification System: 0.5-day BriefingReplyJoin us for a half-day briefing on Solidsoft Reply's Traceability and Verification System (TRVST), our innovative solution to combating the proliferation of falsified medicines.
+3
Applicable to:
App Modernization
Big Data
Security
30 out of 60
Migration to Azure VMware: 8 weeks AssessmentElitmind SPAssessment specifies the scope and methodology for assessing your organization's current on-premises VMware environment to facilitate a smooth migration to AVS in the Azure Cloud.
+3
Applicable to:
Migration
Networking
Security
31 out of 60
3-Week Security Baseline AssessmentAvertium, LLCOrganizations that lack the resources to accurately assess their security deployments will benefit from this in-depth assessment.
+1
Applicable to:
Security
32 out of 60
Eviden's Smart Factory 3-Weeks AssessmentEviden International France - SASThe solutions lead to reductions in inventory-holding costs, increased labor productivity, reduced machine downtime, throughput increase, improved forecasting accuracy, cost-of-quality improvements
+3
Applicable to:
Analytics
AI & Machine Learning
Security
33 out of 60
HITRUST Certification e1, i1 or r2Avertium, LLCSimplify the HITRUST certification experience, unburden your teams, and get a clear and actionable roadmap that builds towards a mature security posture.
+1
Applicable to:
Security
34 out of 60
HIPAA Compliance Risk Assessment & Gap AnalysisAvertium, LLCAvertium’s team of healthcare and security consultants apply their deep knowledge of compliance to the way you do business.
+2
Applicable to:
Identity
Security
35 out of 60
Penetration Testing: 4 weeks AssessmentCiklumBlack-box or grey box-oriented penetration testing that simulates real-world attacks to identify vulnerabilities in your systems, networks, and applications.
+2
Applicable to:
Analytics
Security
36 out of 60
Eviden's Confidential Data Room 6 to 12 Weeks POCEviden International France - SASEviden's Confidential Data Room is a solution that allows companies to share and analyze data securely, even under strict data privacy regulations.
+3
Applicable to:
Analytics
Data Platform
Security
37 out of 60
Unisys Well-Architected ReviewUnisys Corp / Blue BellUnisys offers a comprehensive assessment process for Azure workloads, guided by certified architects. During your review, leverage this expertise to evaluate your adoption of best practices.
+2
Applicable to:
Migration
Security
38 out of 60
Microsoft 365 Managed Cloud Virtual Machine ServiceT-Systems International With the “Microsoft 365 Cloud Virtual Machine Service – Azure Virtual Desktop” product, Telekom provides operational and configuration services
+3
Applicable to:
Identity
Networking
Security
39 out of 60
Eviden Cloud GenOps on Azure : 3-6 months ImplementationEviden International France - SASEviden's new Cloud GenOps offering enables organizations to fully integrate artificial intelligence (AI) in under 10 months. This solution addresses challenges such as scaling AI models, data security
+1
Applicable to:
Security
40 out of 60
Consult Risk and Compliance ServiceKyndryl Inc.Kyndryl Consult's Risk and Compliance service aids compliance journey, offering over 360 templates, tailored assessments, and expert guidance to mitigate risk.
+3
Applicable to:
Backup
Disaster Recovery
Security
41 out of 60
Security Information and Event Management (SIEM) MigrationKyndryl Inc.Kyndryl SIEM Migration service transitions legacy SIEMs to Microsoft Sentinel, ensuring comprehensive coverage for both on premise and cloud assets. Services include discovery, design, implementation.
+3
Applicable to:
Disaster Recovery
Identity
Security
42 out of 60
Azure Landing Zone Deployment ServiceLotus Beta AnalyticsThe "Azure Landing Zone Deployment Service" simplifies setting up secure, compliant Azure environments with pre-configured templates, ensuring a solid foundation for cloud operations and governance.
+2
Applicable to:
Identity
Security
43 out of 60
Azure Landing Zone DeploymentCloudGate LLCAzure Landing Zone Deployment Service – Build a Scalable, Secure, and Compliant Foundation for Your Cloud Environment
+2
Applicable to:
Migration
Security
44 out of 60
Azure Optimization AssessmentCloudGate LLCAzure Optimization Assessment – Maximize Efficiency and Reduce Costs in Your Azure Environment
+2
Applicable to:
Networking
Security
45 out of 60
Azure Cloud Security Assessment - 1W AssessmentCloudGate LLCOur Cloud Security Assessment Service is designed to help you identify, evaluate, and mitigate potential security risks within your cloud environment.
+1
Applicable to:
Security
46 out of 60
Enablement Solution for Azure Arc: 2-Weeks ImplementationCloudGate LLCUnlock the full potential of your hybrid cloud environment with our Azure Arc Implementation Service. Designed to extend Azure management and governance to on-premises and multi-cloud workloads.
+1
Applicable to:
Security
47 out of 60
Migration to Microsoft Azure: 8 weeks assessmentElitmind SPTransform Your IT Landscape: Comprehensive Assessment, Strategic Planning, and Effortless Migration to Azure Cloud!
+3
Applicable to:
Migration
Networking
Security
48 out of 60
Application Modernization Assessment - 2 Weeks AssessmentCloudGate LLCGet ready to modernize your legacy applications and migrate them to Azure.
+2
Applicable to:
Migration
Security
49 out of 60
Azure to Sophos/FortiGate VPN SetupLotus Beta AnalyticsSeamlessly connect your Azure environment to Sophos or FortiGate firewalls with our expert VPN setup service, ensuring secure, reliable site-to-site or point-to-site connectivity for your enterprise.
+2
Applicable to:
Networking
Security
50 out of 60
Kyndryl Managed Extended Detection and Response (XDR)Kyndryl Inc.Kyndryl helps customers extend their protection beyond just endpoints to cover all assets, including email, identity, SaaS applications, cloud infrastructure, and data.
+3
Applicable to:
Disaster Recovery
Identity
Security
51 out of 60
ReportGen: 5-Hrs ImplementationSystems LtdThis offer will help you to get emails shift summary automatically
+3
Applicable to:
Identity
Networking
Security
52 out of 60
LTIMindtree Infrastructure T-Spin Hop on to the Azure CloudLTIMindtree LimitedT-Spin Hop on to the Azure cloud - a structured Framework to support banks for adopting Azure cloud for hosting their Temenos Core Banking ecosystem on the Azure Cloud
+3
Applicable to:
App Modernization
Networking
Security
53 out of 60
Xoriant VMWare migration with Matilda Cloud_8 Week implementationXoriant CorporationAutomate VMware workload migrations to Azure Cloud Native Compute, optimizing performance and cost while ensuring secure, efficient transitions with minimal disruption.
+2
Applicable to:
Migration
Security
54 out of 60
Skytap Rapid Assessment for Microsoft AzureKyndryl Inc.Kyndryl and Microsoft offer a comprehensive solution to help businesses modernize their applications and infrastructure, ensuring competitiveness in today's fast-evolving digital landscape.
+3
Applicable to:
Analytics
Disaster Recovery
Security
55 out of 60
Azure Infrastructure Readiness - 7-Day AssessmentREDINGTON GULF FZE - HQAssess and Evaluate existing Infrastructure Readiness - Migration Strategy, Right sizing, cost estimate, security, IaaS, PaaS
+3
Applicable to:
Disaster Recovery
Migration
Security
56 out of 60
Unisys Attack Surface DiscoveryUnisys Corp / Blue BellNavigate your attack surface with an adversary's eye. With Unisys Attack Surface Discovery, you can outsmart threats and outpace risks.
+1
Applicable to:
Security
57 out of 60
Cognizant’s Quick Start Offering for Microsoft PurviewCognizantCognizant’s Quick Start Offering for Microsoft Purview provides a rapid, industry-specific data governance assessment and PoC, enhancing data management, compliance, and operational efficiency
+3
Applicable to:
Data Platform
Migration
Security
58 out of 60
Copilot for Security Readiness AssessmentAvertium, LLCCopilot for Security readiness assessment will prepare you to defend beyond machine speed.
+2
Applicable to:
Identity
Security
59 out of 60
Microsoft Azure Cloud FinOps Services Assessment.YASH TechnologiesYash Microsoft Azure Cloud FinOps services is an operational framework and cultural shift that brings technology finance and business together to drive financial accountability and business value.
+2
Applicable to:
DevOps
Security
60 out of 60