PenapisKosongkan semua
Professional Services hasil
Menunjukkan dalam professional services%1!s!.
IBM Cloud Security Posture Management for Microsoft AzureIBM Security ServicesAddress cloud security and compliance posture management concerns delivered via Microsoft Azure native security features or via 3rd party solutions in an enterprise or MSSP (as-a-service) approach
+1
Applicable to:
Security
1 out of 60
IBM Rapid Security Assessment for Microsoft AzureIBM Security ServicesUnderstand your organization's current security posture as well as receive customized recommendations to address challenges around vulnerability and risk related to your cloud estate.
+1
Applicable to:
Security
2 out of 60
IBM Cloud Native Security Services for Microsoft AzureIBM Security ServicesSimplify the configuration and management of cloud native security controls . Ensure the proper security controls are in place across your Microsoft Azure environment.
+1
Applicable to:
Security
3 out of 60
IBM Cloud Workload Protection for Microsoft AzureIBM Security ServicesIBM Security’s Cloud Workload Protection services were built to provide assessment, solution design, implementation, and managed security services that will help you to secure your cloud workloads
+1
Applicable to:
Security
4 out of 60
IBM Security Strategy Services for Microsoft AzureIBM Security ServicesDrive your cloud transformation with an integrated security strategy. Our cloud security strategy engagement offering is designed to help you develop security maturity and define the target state
+1
Applicable to:
Security
5 out of 60
DevSecOps: 3-Weeks ImplementationFlexsin Technologies Pvt. Ltd.Continuous Integration/Deployment on Azure for any New or Existing projects to develop, release, and deploy code to achieve the Automate, Autoscaling, and Transparent process.
+3
Applicable to:
DevOps
Disaster Recovery
Security
6 out of 60
Cyber Recovery Implementation Services on Microsoft AzureDell Technologies Advisory, Design, and Deployment services for Dell PowerProtect Cyber Recovery Solution for Microsoft Azure to protect critical data from Ransomware and other destructive Cyberattacks.
+3
Applicable to:
Backup
Disaster Recovery
Security
7 out of 60
How to get started with Cloud security in Microsoft Azure: 4h workshopBillennium S.A.4-hour workshop on how to keep your organization secure in the Microsoft Azure environment led by a certified cyber security expert (MVP and MCT).
+1
Applicable to:
Security
8 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private LimitedWe help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
+3
Applicable to:
Identity
Migration
Security
9 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
+3
Applicable to:
Identity
Migration
Security
10 out of 60
Cloud Adoption Framework (CAF) Workshop_3 daysCLICK2CLOUD INC3 days’ workshop helps decision makers align strategies for business, culture, and technical change to achieve desired business outcomes.
+3
Applicable to:
Analytics
Migration
Security
11 out of 60
Verizon Managed SIEMVERIZON COMMUNICATIONS INC.Verizon Managed SIEM for Azure Sentinel; Continuously monitor and triage security incidents from your Azure Sentinel instance.
+1
Applicable to:
Security
12 out of 60
Data Warehouse Migration AssessmentCLICK2CLOUD INCClick2Cloud’s Data Warehouse Migration Assessment helps you create a fact-based roadmap and offers an estimation for the migration of the existing data warehouse to the modern Azure data warehouse.
+2
Applicable to:
Migration
Security
13 out of 60
Managed Detection and Response ServiceNTT LimitedA scalable, cloud-native, security analytics and response platform that provides intelligent security analytics with threat intelligence across the enterprise.
+1
Applicable to:
Security
14 out of 60
Cyber security servicesUAB SOLUTIONLAB PRODUCTIONTo provide excellent cyber security services
+2
Applicable to:
DevOps
Security
15 out of 60
Microsoft Sentinel: 5 Day POC DeploymentWIZARD GROUP LIMITEDExperienced in SIEM and SOC migrations and improvement, Wizard Cyber will take you through a guided Proof of Concept that demonstrates the real value of Microsoft Sentinel,
+1
Applicable to:
Security
16 out of 60
Innovation Anywhere with Azure ARC: 5 Week ImplementationCognizantLeverage Azure Arc to unify management, governance and security of your hybrid, on-premises, datacenter, private and public cloud environments
+2
Applicable to:
Backup
Security
17 out of 60
IntraSenz - Digitally Next Employee Engagement with Microsoft Viva ConnectionTOTAL EBIZ SOLUTIONS PTE. LTD.Fast Track Employee Engagement Experience Using IntraSenz on Viva Connection in 30 Days.
+3
Applicable to:
Migration
Security
Storage
18 out of 60
Teams Solution for Retail FLW Workforce: 2 Wk Proof of ConceptsSaxon Infosystems Private LimitedA Repository of Processes Pre-built for Microsoft Teams for Frontline workers and Supervisors in Retail
+3
Applicable to:
Data Platform
Security
Storage
19 out of 60
ISO 27001 Readiness Assessment for Azure EnvironmentVisionet Systems Inc.Advance confidently towards ISO 27001 certification for your Azure environment with Visionet's readiness assessment. Get a detailed analysis of your infrastructure operations & security policies.
+3
Applicable to:
Backup
Identity
Security
20 out of 60
Fortifying SDLC on Azure with Defender for DevOps: 3-Wks Consulting AssessmentWipro LtdDiscover and evaluate the application security risk posture on Azure with Wipro's Application Security framework leveraging Defender for DevOps
+2
Applicable to:
DevOps
Security
21 out of 60
Cloud Landing Zone with F5: 3-Week POCTrace3, LLCUtilize a customized Azure Landing Zone solution by Trace3 and offer expert support to mitigate the perceived complexities and educate on multi-cloud F5 adoption strategies.
+3
Applicable to:
Migration
Networking
Security
22 out of 60
Azure Sentinel: 5-Day ImplementationIbn Technologies LtdThe Azure Sentinel Implementation is a comprehensive Professional Services package offered by CloudIBN. This package includes the design, deployment, and fine-tuning of the Azure Sentinel
+1
Applicable to:
Security
23 out of 60
TCS Responsible AI Assessment for Generative AITCS - Azure TCS offers Responsible AI (RAI) Assessment service to our customers and partners in gauging their Azure Open AI based Gen AI solutions against the core tenets of RAI.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
24 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
25 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Unisys Well-Architected ReviewUnisys Corp / Blue BellUnisys offers a comprehensive assessment process for Azure workloads, guided by certified architects. During your review, leverage this expertise to evaluate your adoption of best practices.
+2
Applicable to:
Migration
Security
27 out of 60
Azure Landing Zone Deployment ServiceLotus Beta AnalyticsThe "Azure Landing Zone Deployment Service" simplifies setting up secure, compliant Azure environments with pre-configured templates, ensuring a solid foundation for cloud operations and governance.
+2
Applicable to:
Identity
Security
28 out of 60
Azure to Sophos/FortiGate VPN SetupLotus Beta AnalyticsSeamlessly connect your Azure environment to Sophos or FortiGate firewalls with our expert VPN setup service, ensuring secure, reliable site-to-site or point-to-site connectivity for your enterprise.
+2
Applicable to:
Networking
Security
29 out of 60
Unisys Attack Surface DiscoveryUnisys Corp / Blue BellNavigate your attack surface with an adversary's eye. With Unisys Attack Surface Discovery, you can outsmart threats and outpace risks.
+1
Applicable to:
Security
30 out of 60
Azure DevOps Practice and Platform AssessementAptum Technologies (USA) Inc.Transform your development practices with Aptum's comprehensive DevOps assessment. Get expert evaluation of your security, automation, and operational efficiency, plus a clear roadmap for improvement.
+3
Applicable to:
App Modernization
DevOps
Security
31 out of 60
Ops AmplifAIer: Amplify IT Operations with GenAITech Mahindra LimitedGenerative AI is enabling a paradigm shift in the traditional ways the IT industry leverages Artificial Intelligence for IT Operations (AIOps).
+2
Applicable to:
AI & Machine Learning
Security
32 out of 60
Modern And Trusted Cybersecurity SolutionsSonata Software Ltd.Secure your business with sonata’s modern and trusted cybersecurity solutions
+3
Applicable to:
Backup
Networking
Security
33 out of 60
Implementation of Microsoft Entra ID IntegrationITX360 (Pvt) Ltd.Enhance security and simplify access with Microsoft Entra ID Integration, featuring SSO, MFA, passwordless login, and role-based access
+2
Applicable to:
Identity
Security
34 out of 60
Assessment of Azure Cost OptimizationITX360 (Pvt) Ltd.Maximize savings with ITX360’s 5-Day Azure Cost Optimization Assessment. We analyze your Azure environment to identify cost-saving opportunities and ensure you get the most value from your investment.
+1
Applicable to:
Security
35 out of 60
LBAN Azure Frontdoor ConfiguratorLotus Beta AnalyticsLBAN Azure Front Door Configurator simplifies the setup of secure, scalable global web traffic routing with custom domain, SSL, WAF, and load balancing configurations.
+3
Applicable to:
App Modernization
Networking
Security
36 out of 60
Azure Cloud Security Optimization – Free 5-Day AssessmentITX360 (Pvt) Ltd.A 5-day expert-led Azure Security Assessment designed to evaluate your cloud environment, identify risks, and provide actionable recommendations for enhancing security and compliance—all at no cost
+1
Applicable to:
Security
37 out of 60
Azure Security Optimization: 5-Day AssessmentITX360 (Pvt) Ltd.Strengthen your Azure cloud security with ITX360’s 5-day expert assessment. Identify risks, evaluate configurations, and receive actionable recommendations aligned with Zero Trust.
+1
Applicable to:
Security
38 out of 60
Nimtech Cloud Journey Assessment - NetworkNimtechStart your Azure Cloud Journey with a comprehensive Cloud Adoption Framework (CAF) workshop, tailored to your network infrastructure needs
+2
Applicable to:
Networking
Security
39 out of 60
Windows in Cloud AssessmentTask Systems LimitedUnlock Azure Virtual Desktop Success: Expert-Led WVD Assessment & Migration Blueprint
+3
Applicable to:
Identity
Migration
Security
40 out of 60
Access Management AppExponential Digital Solutions Private LimitedA solution designed to automate the quarterly review of access privileges, ensuring seamless governance, improved efficiency, and enhanced security.
+3
Applicable to:
App Modernization
Identity
Security
41 out of 60
GitHub Advisory ServicesInfoMagnus LLC On-demand GitHub advisory to optimize Azure-integrated DevOps workflows aligning strategy, security, and collaboration to extend Microsoft cloud adoption and value.
+3
Applicable to:
DevOps
Migration
Security
42 out of 60
GitHub for DevelopersInfoMagnus LLC In this two-day, instructor-led workshop, developers learn to use Git and GitHub for building, collaborating, and managing code in Azure-based workflows.
+3
Applicable to:
DevOps
Migration
Security
43 out of 60
Modernize Your Legacy Software with AIiFour Technolab Private LimitedIn this session we will explore how intelligence automation, predictive analytics and conversational AI can breathe new life into your software and create a practical future ready modernization plan.
+3
Applicable to:
AI & Machine Learning
Migration
Security
44 out of 60
AI Ignition - (not MarketPlace transactable)OBT Live AI Ignition - Rapidly deploy secure and scalable AI solutions with measurable business impact in weeks
+3
Applicable to:
Analytics
AI & Machine Learning
Security
45 out of 60
Cloud4C Defender for Office 365 Deployment OfferingCloud4C Services Pte LtdCloud4C’s Defender for Office 365 Deployment secures email and collaboration tools with expert setup, testing, and best practices to reduce threats, boost trust, and ensure compliant communication
+3
Applicable to:
Analytics
Identity
Security
46 out of 60
Cloud solutions migration and modernizationDATARISELAB SP Z O OComprehensive migration of applications, infrastructure, and data to the Microsoft Azure cloud, enabling scalability, security, and long-term cost optimization while reducing on-premises dependency.
+2
Applicable to:
Migration
Security
47 out of 60
Accion Labs | SmartOps- AI infused DevOpsAccion Labs US, Inc.Kick-start Your Transformation with a Streamlined DevOps Strategy. Accelerate your organization's transformation and drive efficient decision-making by implementing a robust DevOps strategy.
+3
Applicable to:
AI & Machine Learning
DevOps
Security
48 out of 60
Anchnet One-stop MLPS 2.0 Compliance Service上海安畅网络科技股份有限公司This service includes technical support for Azure China cloud platform and can assist customers in easily passing China Cybersecurity Law MLPS 2.0 compliance certification.
+1
Applicable to:
Security
49 out of 60
Anchnet SmartCare Managed Security Services上海安畅网络科技股份有限公司It offers a range of services including 7*24h security monitoring, emergency response, vulnerability assessment, security governance, log analysis, and alert management on Microsoft Azure.
+3
Applicable to:
Identity
Networking
Security
50 out of 60
Accion Labs | AI accelerated Purview ImplementationAccion Labs US, Inc.Unified data security, governance, and compliance powered by Microsoft Purview and AI accelerators for enterprise-scale control.
+2
Applicable to:
Identity
Security
51 out of 60
Microsoft Security - IDENTITY & ACCESS MANAGEMENTFPT-SOFTWARE CO. LTD.FPT Software Microsoft Entra ID Acceleration
+1
Applicable to:
Security
52 out of 60
Azure Rights Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Rights Management in their production environment.
+3
Applicable to:
App Modernization
Identity
Security
53 out of 60
Azure Rights Management: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see, understand and test the Azure Rights Management on a demo tenant.
+3
Applicable to:
App Modernization
Identity
Security
54 out of 60
Azure Security Center: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to secure workloads in Azure Cloud.
+3
Applicable to:
Identity
Security
Storage
55 out of 60
Disaster Site Recovery: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Cloud for Business Continuity
+3
Applicable to:
Backup
Disaster Recovery
Security
56 out of 60
Azure Rights Management: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to deploy and manage Azure Rights Management.
+3
Applicable to:
App Modernization
Identity
Security
57 out of 60
Azure Security Center: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see Azure Security Center benefits and stay ahead of changing threat landscape across the cloud.
+3
Applicable to:
Identity
Security
Storage
58 out of 60
Azure PCI DSS Compliance: 4-Hr AssessmentDGITAL LabsDGITAL Labs offers an assessment session to transform an Azure environment compliant to PCI DSS standard.
+3
Applicable to:
Analytics
App Modernization
Security
59 out of 60
Remote Work Solution: 1 Hour BriefingCommunication Square LLCThis briefing or as we at Communication Square like to call it Cloud Strategy Call is designed to help customers understand the benefits of Remote Work Solution
+2
Applicable to:
Data Platform
Security
60 out of 60