ФильтрыОчистить все
Результаты: Professional Services
Отображение результатов в professional services.
Secure SAP on Azure : 2-Hrs BriefingTCS - Security2 Hrs briefing on TCS Managed Security services offering leveraging contextual and pre-integrated solution for protecting SAP ecosystem on Azure
+3
Applicable to:
Identity
Networking
Security
1 out of 60
CoreDefend Managed XDR Microsoft Security SolutionCoretek ServicesA Comprehensive Managed XDR Security Solution Using Microsoft Security Tools to Improve Security Posture
+2
Applicable to:
Identity
Security
2 out of 60
IBM Threat Management with Microsoft’s SAP Threat Monitoring Solution for Microsoft AzureIBM Security ServicesConsulting and managed security services from IBM Security supporting Microsoft Defender, Azure Sentinel, and the SAP Threat Monitoring solution for Sentinel
+2
Applicable to:
Identity
Security
3 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies ServicesDelivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
+2
Applicable to:
Identity
Security
4 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.aiImplementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
+1
Applicable to:
Identity
5 out of 60
Purple Team Assessment: 1 Week AssessmentBridewell Consulting LimitedTest your organisation's defensive capabilities by conducting a purple team assessment in collaboration with Bridewell
+3
Applicable to:
Identity
Migration
Security
6 out of 60
Sentinel: 3-Day WorkshopBridewell Consulting LimitedMitigate threats, and work with Bridewell's leading cloud security specialists to develop a roadmap to drive improvements in your Sentinel deployment.
+3
Applicable to:
Identity
Networking
Security
7 out of 60
Virtusa's Zero Trust Security Assessment for Azure Cloud:4-Weeks AssessmentVIRTUSA LTDVirtusa's Zero Trust Security assessment uses the zero-trust model to enable best-practice controls for you to safeguard data. confidentiality, integrity, and availability.
+3
Applicable to:
Identity
Networking
Security
8 out of 60
Security and Compliance: 3 Week Proof of ConceptAVASOFTOur well-defined scope engagement will help you kick start your Security and Compliance operations based on Azure.
+2
Applicable to:
Identity
Security
9 out of 60
Microsoft Azure Security: 2 - Week AssessmentAVASOFTAVASOFT provides state-of-art Microsoft Azure security assessments for future-ready enterprises.
+3
Applicable to:
Identity
Networking
Security
10 out of 60
Hybrid Identity & Access Management: 8 - Week ImplementationAVASOFTThe goal of the project is to strategize and implement an Identity and Access Management solution based on Microsoft Identity Manager (MIM) 2016 and Azure Active Directory.
+3
Applicable to:
Identity
Migration
Security
11 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private LimitedWe help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
+3
Applicable to:
Identity
Migration
Security
12 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
+3
Applicable to:
Identity
Migration
Security
13 out of 60
Defend Against Threats with SIEM Plus XDRBJSS LimitedImprove your security posture and uncover risks that might be harmful to your organisation with BJSS' cyber security workshop: Defend Against Threats with SIEM Plus XDR.
+2
Applicable to:
Identity
Security
14 out of 60
Microsoft Security License Utilisation & Commercial Assessment: 2-Week AssessmentBridewell Consulting LimitedProvide an overview of organisations current licensing position, identify what security Microsoft products could be utilised & build an adoption framework
+3
Applicable to:
Identity
Networking
Security
15 out of 60
Managed Services for Microsoft EntraDXCAdvisory and Managed Services for Microsoft Entra
+2
Applicable to:
Identity
Security
16 out of 60
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITEDProvide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
+3
Applicable to:
Analytics
Data Platform
Identity
17 out of 60
Azure Health CheckIvision, Inc.Azure Health Check
+3
Applicable to:
Backup
Identity
Networking
18 out of 60
Enterprise - Zero Trust Strategy & Journey MapJohn Keells Information Technology Pvt LtdOrganizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid & multi-cloud workplace, and ensures cyber security assurance.
+2
Applicable to:
Identity
Security
19 out of 60
Hybrid Infra Management Though Azure ArcJohn Keells Information Technology Pvt LtdAzure Arc brings a unified management platform to your data centers, Azure Cloud as well as other clouds and edge, no matter how complex your environments may look like.
+2
Applicable to:
Identity
Security
20 out of 60
AVD Cost Optimization ProgramTechPlus TalentAre you looking to maximize the value of your Azure Virtual Desktop (AVD) environment while minimizing costs? Look no further! Tech Plus Talent is thrilled to present our Azure AVD Cost Optimization P
+3
Applicable to:
Backup
Identity
Security
21 out of 60
Verifiable Credentials with Microsoft Entra Verified ID: full architecture design with initial deploymentFormula5Formula5's Microsoft Entra Verified ID Workshop & POC helps organizations to understand decentralized identity concepts and implement secure identity solutions using Verifiable Credentials.
+2
Applicable to:
Identity
Security
22 out of 60
ISO 27001 Readiness Assessment for Azure EnvironmentVisionet Systems Inc.Advance confidently towards ISO 27001 certification for your Azure environment with Visionet's readiness assessment. Get a detailed analysis of your infrastructure operations & security policies.
+3
Applicable to:
Backup
Identity
Security
23 out of 60
Azure Security Assessment – by NIST 800-53Visionet Systems Inc.Harness Visionet's expertise to secure and optimize your Azure environment with our Security Assessment service grounded in NIST 800-53 Rev 4 best practices.
+3
Applicable to:
Identity
Networking
Security
24 out of 60
Azure Virtual Desktop Assessment: 2 Week AssessmentSourcepass MCOEAzure Virtual Desktop Assessment begins with a comprehensive assessment, during which our team evaluates the existing environment & provides recommendations for performance, scalability & resilience.
+3
Applicable to:
Identity
Networking
Security
25 out of 60
Azure Security Assessment: 2 Week AssessmentSourcepass MCOEEvery Defender project starts with a thorough assessment where our team evaluates the current setup. Based on this, we offer suggestions to enhance security, performance, and scalability.
+3
Applicable to:
Identity
Security
Storage
26 out of 60
External IAM 5 day assessmentCondatis Group LimitedCondatis is offering an external Identity and Access Management (IAM) assessment focusing on how your organisation secures and manages external identities in your business context.
+2
Applicable to:
Identity
Security
27 out of 60
Threat Protection: 5-day EngagementBridewell Consulting LimitedMitigate cyber security risks within your Microsoft Azure environments by attending a 5 day workshop with Bridewell.
+3
Applicable to:
Identity
Networking
Security
28 out of 60
Defender For Cloud: 1-Wk Proof of ConceptBridewell Consulting LimitedSecure your organisation's Azure Cloud workloads by leveraging the expertise of a leading cyber security services provider to review and optimise your implementation of Defender for Cloud.
+3
Applicable to:
Identity
Networking
Security
29 out of 60
Keycloak-3 weeks ImplementationApexonKeycloak is an open-source identity and access management solution. Apexon repackages open source Keycloak and provides one-click deployment with automation and customization.
+3
Applicable to:
Analytics
DevOps
Identity
30 out of 60
Apexon Lab-as-a-Service (LaaS) – 4 Weeks - Proof of ConceptApexonUnlock the power of rapid innovation with Apexon LaaS, leveraging Azure AI Services, including Copilot, Azure Open AI, NLP, Vision, Speech, Search, Anomaly Detector and Document Processing.
+3
Applicable to:
DevOps
Identity
Internet of Things
31 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
32 out of 60
通天云云迁移方案北京通天云计算有限公司云咨询/云化评估/云规划设计/云迁移/云创新
+3
Applicable to:
Identity
Migration
Security
33 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Security Information and Event Management (SIEM) MigrationKyndryl Inc.Kyndryl SIEM Migration service transitions legacy SIEMs to Microsoft Sentinel, ensuring comprehensive coverage for both on premise and cloud assets. Services include discovery, design, implementation.
+3
Applicable to:
Disaster Recovery
Identity
Security
35 out of 60
Azure Landing Zone Deployment ServiceLotus Beta AnalyticsThe "Azure Landing Zone Deployment Service" simplifies setting up secure, compliant Azure environments with pre-configured templates, ensuring a solid foundation for cloud operations and governance.
+2
Applicable to:
Identity
Security
36 out of 60
Nagarro's GAiN: Unlock the power of AI for your enterpriseNagarroNagarro's GAiN platform leverages Azure AI to unlock enterprise data, transforming customer and employee experience.
+3
Applicable to:
AI & Machine Learning
Identity
Security
37 out of 60
Microsoft Entra ID Conditional Access: 10-Day ImplementationWIZARD GROUP LIMITEDdesigned to quickly and effectively deploy Entra ID Conditional Access policies to enhance your organisation's security posture
+3
Applicable to:
Identity
Migration
Security
38 out of 60
Microsoft Purview: 4-8 Week ImplementationWIZARD GROUP LIMITEDOur implementation service aims to streamline the deployment of Microsoft Purview, ensuring that your organization can leverage its full capabilities to make informed decisions
+3
Applicable to:
Identity
Migration
Security
39 out of 60
Microsoft Entra : Quick Start AcceleratorWIZARD GROUP LIMITEDThis service ensures that your organization can quickly leverage the full capabilities of Microsoft Entra ID to enhance security and streamline access management
+3
Applicable to:
Identity
Migration
Security
40 out of 60
Microsoft Purview Quickstart Accelerator Implementation with Wizard CyberWIZARD GROUP LIMITEDThis service ensures that your organization can quickly harness the power of Microsoft Purview to manage and govern your data effectively
+3
Applicable to:
Identity
Migration
Security
41 out of 60
Multi Cloud Security Briefing: Secure Multi & Hybrid Cloud EnvironmentsApex Systems LLCThis one-hour session is tailored for IT and security leaders looking to bolster their Azure Cloud security posture, mitigate risks, and align with best practices in governance and compliance.
+2
Applicable to:
Identity
Security
42 out of 60
LTIMindtree Security Identity Assessment As A ServiceLTIMindtree LimitedThis LTIMindtree offering provides the detailed overview of assessment activities and outcomes tailored for Identity services
+2
Applicable to:
Identity
Security
43 out of 60
Active Directory: Free Security and Performance AssessmentMismo Systems Private LimitedWe help you assess your Active Directory environment for security, health, performance, and upgrade readiness, identifying gaps and providing remediation recommendations based on best practices.
+1
Applicable to:
Identity
44 out of 60
Active Directory Comprehensive Review: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Active Directory environment for security, health, performance, and upgrade readiness, identifying gaps and providing remediation recommendations based on best practices.
+1
Applicable to:
Identity
45 out of 60
C1st Implementation of Azure Virtual DesktopC1st Technologies LLCC1st Implementation of Azure Virtual Desktop solution delivers secure, flexible, and cost-efficient cloud desktops with expert management.
+3
Applicable to:
Identity
Security
Storage
46 out of 60
QServices AI-Powered SaaS AutomationQ SERVICES INCAI-powered SaaS platform for customer support, workflow automation, and efficiency boost.
+3
Applicable to:
App Modernization
AI & Machine Learning
Identity
47 out of 60
Implementation of Microsoft Entra ID IntegrationITX360 (Pvt) Ltd.Enhance security and simplify access with Microsoft Entra ID Integration, featuring SSO, MFA, passwordless login, and role-based access
+2
Applicable to:
Identity
Security
48 out of 60
Microsoft Entra Verified ID: 3-8 Day WorkshopCondatis Group LimitedAn immersive 3-8 day workshop designed to provide a deep dive into Microsoft Entra Verified ID.
+1
Applicable to:
Identity
49 out of 60
Microsoft Entra Verified ID: POCCondatis Group LimitedCondatis is offering a Microsoft Entra Verified ID Proof of Concept demonstrating how your organisation can leverage digital identity credentials to streamline onboarding and secure access.
+1
Applicable to:
Identity
50 out of 60
Microsoft Entra ID WorkshopCondatis Group LimitedAn immersive 3 - 8 day workshop designed to provide a deep dive into Microsoft Entra ID.
+1
Applicable to:
Identity
51 out of 60
Microsoft Entra ID Governance: 3 - 8 Day WorkshopCondatis Group LimitedAn immersive 3-8 day workshop designed to provide a deep dive into Microsoft Entra ID Governance.
+1
Applicable to:
Identity
52 out of 60
Microsoft Entra ID: POCCondatis Group LimitedCondatis is offering a Microsoft Entra ID Proof of Concept demonstrating how your organisation can strengthen security and unify identity management.
+1
Applicable to:
Identity
53 out of 60
Microsoft Entra ID Governance: POCCondatis Group LimitedCondatis is offering a Microsoft Entra ID Governance Proof of Concept to demonstrate how organisations can improve operations and empower teams.
+1
Applicable to:
Identity
54 out of 60
NexusTek Cloud Security Posture AssessmentNexus Technologies LLCIdentify and remediate cloud security risks. Ensure a secure cloud environment.
+2
Applicable to:
Identity
Security
55 out of 60
Windows in Cloud AssessmentTask Systems LimitedUnlock Azure Virtual Desktop Success: Expert-Led WVD Assessment & Migration Blueprint
+3
Applicable to:
Identity
Migration
Security
56 out of 60
Access Management AppExponential Digital Solutions Private LimitedA solution designed to automate the quarterly review of access privileges, ensuring seamless governance, improved efficiency, and enhanced security.
+3
Applicable to:
App Modernization
Identity
Security
57 out of 60
Cloud4C Defender for Office 365 Deployment OfferingCloud4C Services Pte LtdCloud4C’s Defender for Office 365 Deployment secures email and collaboration tools with expert setup, testing, and best practices to reduce threats, boost trust, and ensure compliant communication
+3
Applicable to:
Analytics
Identity
Security
58 out of 60
Zero Trust Security AssessmentProArch Technologies, IncProArch’s Microsoft Zero Trust Assessment evaluates your Microsoft Cloud & Azure environments, delivering a prioritized roadmap to strengthen security across identity, devices, data, apps, operations.
+3
Applicable to:
AI & Machine Learning
Identity
Security
59 out of 60
Modern_SecOpsWIZARD GROUP LIMITEDhelps organizations understand the value of Microsoft's Unified Security Operations Platform—combining Microsoft Sentinel, Microsoft Defender XDR, and Microsoft Entra ID—to detect, investigate
+3
Applicable to:
Identity
Migration
Security
60 out of 60