Beri maklum balas
Help & support
Item yang Disimpan
Pelan persendirian
Tunggu sebentar, melog masuk anda...
PenapisKosongkan semua

  • Lokasi anda
  • Produk (1)
    • Azure (1)
      • AI & Machine Learning
      • Analitis
      • App Modernization
      • Archive
      • Backup
      • Big Data
      • Data Platform
      • DevOps
      • Disaster Recovery
      • Identity
      • Internet of Things
      • Migration
      • Networking
      • Security
      • Storage
    • Dynamics 365
    • Microsoft 365
    • Power Platform
  • Industri
  • Jenis perkhidmatan
  • Model Harga

Professional Services hasil

Menunjukkan dalam professional services%1!s!.
Microsoft & Multi-Cloud Security Penetration Testing: 5-Day AssessmentBDO LLP
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
CREST certified Ethical Hackers from BDO perform penetration tests on your Microsoft and Multi-Cloud environment and test the setup of Microsoft Azure AD, Defender, Sentinel and Purview.
1 out of 60
SOC de Soluções Microsoft Azure e Microsoft 365Redbelt Security
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Serviços de gerenciamento, operação e resposta a incidentes focado em soluções e ambientes Microsoft.
2 out of 60
Azure Virtual Desktop Assessment: 2 Week AssessmentBig Green IT - Dev
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Azure Virtual Desktop Assessment begins with a comprehensive assessment, during which our team evaluates the existing environment & provides recommendations for performance, scalability & resilience.
3 out of 60
SOC Compliance readiness check: 1-Month Professional ServiceIT Partner LLC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Assess your organization's readiness for SOC compliance, helping identify and address potential control and policy issues to prepare for an official SOC audit effectively.
4 out of 60
Azure Security Assessment: 2 Week AssessmentBig Green IT - Dev
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Every Defender project starts with a thorough assessment where our team evaluates the current setup. Based on this, we offer suggestions to enhance security, performance, and scalability.
5 out of 60
Palo Alto Firewall Deployment: 6-Week ImplementationRSM Product Sales LLC
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Empower your network's security and safeguard your digital landscape with the Palo Alto firewall solution deployed by RSM.
6 out of 60
Azure MFA Quick Start: 2-Week ImplementationAll Covered, a division of Konica Minolta
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
A 2-week consulting implementation that will enhance your organization's identity security capabilities through Azure Multi-Factor Authentication (MFA)
7 out of 60
Okta to Microsoft Entra ID Migration: 3-Wk ImplementationWithum Digital
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
This Okta to Microsoft Entra ID Migration Solution Will Streamline Your Identity Management for Enhanced Security and Cost Reduction
8 out of 60
Eviden's Application Strategy WorkshopEviden International France - SAS
+3
Applicable to:
app-modernization product iconApp Modernizationdata-platform product iconData Platformidentity product iconIdentity
Eviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
9 out of 60
Security Warrior: Managed ServiceTechConnect
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
Our Security Warrior, will give you the visibility and remediation into your Azure security posture to manage the risk through an affordable single pane of glass solution.
10 out of 60
Sentinel Accelerator 4-Wk | Implementation/POCBulletproof Solutions Inc.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Accelerate Sentinel Deployment for clients and Maximize Utilization
11 out of 60
Azure Security Assessment (3 Weeks)Bulletproof Solutions Inc.
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
The offer provides a comprehensive report of security gaps and recommendations for an Azure Environment.
12 out of 60
Azure Well Architected Framework (AWAF) AssessmentNOVENTIQ
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Optimize Azure efficiency and security with our Well-Architected Framework Assessment. Uncover challenges, enhance performance, and fortify your infrastructure for success.
13 out of 60
Security and Compliance AssessmentNOVENTIQ
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Gain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
14 out of 60
Windows Autopilot - Initial Setup: 3-Wk Initial Professional ServiceIT Partner LLC
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Implement Windows Autopilot for seamless device deployment, enabling automated, image-free Windows deployment to PCs worldwide, requiring minimal infrastructure.
15 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
16 out of 60
Virtual Desktop Workshop: Azure & Windows 365 PC - 2 hour WorkshopB&R Business Solutions
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Which is right for my business case Azure Virtual Desktop or Windows 365 PC? The purpose of this workshop is to provide the information you need to make a well informed & confident decision.
17 out of 60
Zero Trust SecuritySentinel Technologies Inc.
+3
Applicable to:
disaster-recovery product iconDisaster Recoveryidentity product iconIdentitysecurity product iconSecurity
76% of organizations have experienced a ransomware attack at some point in the last two years - State of the Phish Report 2023
18 out of 60
Telehealth and Telemedicine Maturity WorkshopSentinel Technologies Inc.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Sentinel's Telehealth & Telemedicine Maturity Workshop analyzes the current status of your distributed care environment and helps you establish a clear strategy for the future.
19 out of 60
Workshop Threat Protection con Microsoft Sentinel: Blindaje Avanzado contra Amenazas Cibernéticas - 4Wk WorkShopENCAMINA S.L.
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Una inmersión profunda en la estrategia de seguridad, adaptada a tu organización
20 out of 60
External IAM 5 day assessmentCondatis Group Limited
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Condatis is offering an external Identity and Access Management (IAM) assessment focusing on how your organisation secures and manages external identities in your business context.
21 out of 60
Lightstream Comprehensive Azure Core Security AssessmentLightstream
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Lightstream will provide a comprehensive understanding of your Azure security landscape with actionable recommendations.
22 out of 60
KloudIdentity: Application Onboarding to Entra made simple with our SCIM GatewayKloudyNet Technologies SDN BHD
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
KloudIdentity is our proprietary SCIM Gateway to onboard LOB & Cloud applications (including non SCIM compliant), databases and other applications to Microsoft Entra for users and groups provisioning.
23 out of 60
Threat Protection: 5-day EngagementBridewell Consulting Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Mitigate cyber security risks within your Microsoft Azure environments by attending a 5 day workshop with Bridewell.
24 out of 60
Defender For Cloud: 1-Wk Proof of ConceptBridewell Consulting Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Secure your organisation's Azure Cloud workloads by leveraging the expertise of a leading cyber security services provider to review and optimise your implementation of Defender for Cloud.
25 out of 60
Microsoft Entra Verified ID: An Informative Briefing on Key Features and Real-World ApplicationsFormula5
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitysecurity product iconSecurity
Formula5's briefing on Microsoft Entra Verified ID provides organizations with a clear understanding of the fundamental concepts and potential behind Verifiable Credentials.
26 out of 60
Microsoft Entra Products OverviewFormula5
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitysecurity product iconSecurity
Formula5's briefing on Microsoft Entra provides clear overview of available products under Microsoft Entra umbrella.
27 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoor
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
This assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
28 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoor
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
myCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
29 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SAS
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Utilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
30 out of 60
Eviden's Data Security CSI Engagement 4 Week AssessmentEviden International France - SAS
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Elevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
31 out of 60
LogicalisOne: 12-month supportLogicalis, Inc.
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Logicalis One offers on demand Professional Services to support Azure environments by providing certified consultants to define, architect and/or integrate new or existing Azure capabilities.
32 out of 60
Azure AssureManaged Solution
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Harness the power of the cloud, enabling you to concentrate on optimizing your data while entrusting Managed Solution with the responsibility of managing and securing your infrastructure.
33 out of 60
Eviden's Azure Cloud Consulting Services – Landing ZonesEviden International France - SAS
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
A consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
34 out of 60
24x7 SOC Service by IntelequiaIntelequia Technologies
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
24x7 monitoring, protection and automated response to cyberthreats
35 out of 60
Lightstream Complimentary Azure Core Security AssessmentLightstream
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Lightstream will provide a complimentary comprehensive understanding of your Azure security landscape with actionable recommendations.
36 out of 60
Keycloak-3 weeks ImplementationApexon
+3
Applicable to:
analytics product iconAnalyticsdevops product iconDevOpsidentity product iconIdentity
Keycloak is an open-source identity and access management solution. Apexon repackages open source Keycloak and provides one-click deployment with automation and customization.
37 out of 60
HCLTech's Cybersecurity ServicesHCL Technologies Limited.
+3
Applicable to:
backup product iconBackupidentity product iconIdentitysecurity product iconSecurity
HCLTech is a leading global technology company that helps enterprises reimagine their businesses for the digital age. Secure your cloud journey with HCLTech's comprehensive portfolio of cybersecurity
38 out of 60
Apexon Lab-as-a-Service (LaaS) – 4 Weeks - Proof of ConceptApexon
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentityinternet-of-things product iconInternet of Things
Unlock the power of rapid innovation with Apexon LaaS, leveraging Azure AI Services, including Copilot, Azure Open AI, NLP, Vision, Speech, Search, Anomaly Detector and Document Processing.
39 out of 60
DevOps as a Service 6-month agreementIT ITSE S.A.S.
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
Ofrecemos una solución integral para implementar y gestionar prácticas de DevOps en una organización de manera externalizada.
40 out of 60
Workshop for Azure Cost Optimization using FinOpsSii Sp. z o.o.
+2
Applicable to:
devops product iconDevOpsidentity product iconIdentity
Control your costs in the cloud with the FinOps methodology
41 out of 60
Cognizant Cyber Threat Defense, powered by MicrosoftCognizant
+3
Applicable to:
ai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentitysecurity product iconSecurity
Cognizant's Cyber Threat Defense offering provides a set of structured methodologies and tools to assess, migrate, modernize and manage your Security Operations Center (SOC).
42 out of 60
Azure Security Assessment: Initial AuditArchitectnow, LLC
+3
Applicable to:
disaster-recovery product iconDisaster Recoveryidentity product iconIdentitysecurity product iconSecurity
Ensure that your Azure Resources are secure and setup properly! Our team can help with immediate ACTIONABLE recommendations and assistance!
43 out of 60
Azure Governance Workshop: 5-Day WorkshopeGroup Enabling Technologies
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Learn how to create, enforce, and audit Microsoft Azure Policies
44 out of 60
PwC Cybersecurity and Risk CapabilitiesPricewaterhousecoopers LLP
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Reimagine risk and unlock opportunities through a human-led, tech-powered approach.
45 out of 60
Digital BackpackTelelink Business Services EAD
+1
Applicable to:
identity product iconIdentity
The Digital Backpack is an expansive learning platform that supports various teaching models—remote, in-person, and hybrid.
46 out of 60
AI Assessment: Quality Improvement and Defect DetectionEduFin IT, Inc. d/b/a Brightpoint Infotech
+3
Applicable to:
ai-plus-machine-learning product iconAI & Machine Learningdevops product iconDevOpsidentity product iconIdentity
AI assessment for quality improvement and defect detection using AI. We assist in seamlessly integrating Azure services, this assessment identifies areas for improvement in your manufactring process
47 out of 60
Azure Cloud 5-Week AssessmentVigilant Technologies
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
We offer an Azure Cloud Assessment to help your organization plan and prepare for a move to the Azure cloud, or scan and provide feedback on existing Azure deployments.
48 out of 60
Formula5's Azure AD B2C 2-Wk AcceleratorFormula5
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitysecurity product iconSecurity
Formula5's Azure B2C Accelerator helps organizations build secure and legally compliant identity platforms to secure access to applications and resources.
49 out of 60
External Identities Hub Architecture 2-Week PoCFormula5
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
Leverage our package of architecture design, initial scripts, and source code to boost of your modern CIAM platform development, using Microsoft Entra and Azure services.
50 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Entra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
51 out of 60
通天云云迁移方案北京通天云计算有限公司
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
云咨询/云化评估/云规划设计/云迁移/云创新
52 out of 60
Azure AD Identity Protection AssessmentAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Our Azure AD Identity Protection Assessment identifies vulnerabilities and strengthens security. Mitigate risks with advanced threat detection and tailored defense strategies.
53 out of 60
Single Sign On (SSO) for Applications using Entra ID by AVASOFTAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Automated Identity & Access Management with Azure AD streamlines user access. Simplify authentication with SSO, reduce password fatigue, and enhance security and productivity.
54 out of 60
AVASecure 360 - Entra ID Access Management Solutions by AVASOFTAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Automated Identity & Access Management with Azure AD streamlines user provisioning, access requests, and reviews. Enhance security, efficiency, and compliance effortlessly.
55 out of 60
Microsoft Azure AD AuthenticationAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Struggling with user access management? Azure AD Authentication automates provisioning, access requests, and reviews, enhancing security, efficiency, and compliance.
56 out of 60
Strengthen Your Azure Security - 3 days Comprehensive Risk AssessmentAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Identify and address security gaps in Azure with our Risk Assessment. Gain insights, tailored recommendations, and best practices to strengthen your security and maintain compliance.
57 out of 60
On-premises Active Directory Infra AssessmentAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Our On-Premises AD Infrastructure Assessment identifies vulnerabilities and compliance gaps. Strengthen security and ensure compliance with actionable insights and expert recommendations.
58 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies Services
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
With Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
59 out of 60
Seamless social app identity integrationAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Our solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
60 out of 60
  • Sebelumnya
  • 1
  • 2
  • 3
  • 4
  • 5
  • Seterusnya
Tentang Marketplace
  • Mengapa Microsoft Marketplace
  • Blog
  • Kisah pelanggan
Untuk pelanggan
  • Waktu pejabat
  • Panduan untuk bermula
  • Dokumentasi teknikal
  • Tawaran peribadi
  • Komitmen penggunaan Microsoft Azure
  • Pengebilan dan invois
Untuk rakan kongsi
  • Menjadi rakan kongsi
  • Dapatkan senarai
  • Dapatkan sokongan pemasaran
  • Dokumentasi teknikal
  • Panduan langkah demi langkah untuk membina, menerbitkan, dan menjual
  • Menjadi layak untuk jualan bersama
  • Marketplace Community untuk Rakan Kongsi
  • Jualan Marketplace yang dipimpin oleh saluran
  • Tawaran persendirian pelbagai pihak untuk rakan kongsi saluran
Perniagaan
  • Microsoft Cloud
  • Keselamatan Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Melayu (Malaysia) Ikon Pilih Keluar Pilihan Privasi Anda Pilihan Privasi Anda Privasi Kesihatan Pengguna
  • Peta laman
  • Hubungi Kami
  • Privasi & Kuki
  • Terma Penggunaan
  • Tanda dagangan
  • Perihal iklan kami
  • Uruskan kuki
  • © Microsoft 2025