Pošljite povratne informacije
Help & support
Shranjeni izdelki
Zasebni načrti
Počakajte trenutek, da vas prijavimo ...
FiltriPočisti vse

  • Vaša lokacija
  • Izdelki (1)
    • Azure (1)
      • AI & Machine Learning
      • Analitika
      • App Modernization
      • Archive
      • Backup
      • Big Data
      • Data Platform
      • DevOps
      • Disaster Recovery
      • Identity
      • Internet of Things
      • Migration
      • Networking
      • Security
      • Storage
    • Dynamics 365
    • Microsoft 365
    • Power Platform
  • Panoge (1)
    • Obrambne in obveščevalne dejavnosti
    • Distribucija
    • Izobraževalne ustanove
    • Energija in viri
    • Finančne storitve
      • Banking
      • Zavarovanje
    • Vladna ustanova
    • Zdravstvo
    • Gostinstvo in potovanje
    • Proizvodnja in mobilnost
    • Neprofitna organizacija
    • Strokovne storitve
    • Maloprodaja in blago za široko porabo
    • Trajnost
    • Telekomunikacije in mediji
  • Vrsta storitve
  • Model oblikovanja cen

Št. rezultatov: Professional Services

Prikaz toliko rezultatov v aplikaciji professional services:
Cloud Security Approach: 2-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Through the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
1 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Evolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
2 out of 60
Cloud Security Posture: 2-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
3 out of 60
Cloud Security Deployment: 4-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Implementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
4 out of 60
Cloud Security Compliance: 4-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
5 out of 60
Cloud Security Services: 12-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
We audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
6 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield Ltd
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Spartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
7 out of 60
IBM Threat Management with Microsoft’s SAP Threat Monitoring Solution for Microsoft AzureIBM Security Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Consulting and managed security services from IBM Security supporting Microsoft Defender, Azure Sentinel, and the SAP Threat Monitoring solution for Sentinel
8 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Delivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
9 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.ai
+1
Applicable to:
identity product iconIdentity
Implementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
10 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Our offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
11 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Get a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
12 out of 60
skillup_consulting_openedx_v1Flexible Road LLC
+3
Applicable to:
backup product iconBackupidentity product iconIdentitystorage product iconStorage
Open edX Learning Management System with Azure.
13 out of 60
Modernización de Aplicaciones: Implementación en 4 semanasNebulan
+2
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentity
Modernización de tus aplicaciones en ambiente Cloud mejorando la operación con los beneficios de orquestación en la nube.
14 out of 60
Discovery y Assessment for Azure Cloud: en 4 semanasNebulan
+2
Applicable to:
identity product iconIdentitymigration product iconMigration
Asesoría gratuita por parte de equipo de expertos con amplia experiencia en procesos de migración a la nube.
15 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitynetworking product iconNetworking
Secure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
16 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Implementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
17 out of 60
ACE AVD: 4-Wk ImplementationDevoteam France
+2
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentity
Azure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
18 out of 60
Assesment Azure Base4Base4 Security Chile SPA
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
19 out of 60
Azure Security Accelerator SuiteNeudesic
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Mitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
20 out of 60
Managed Services for Microsoft EntraDXC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Advisory and Managed Services for Microsoft Entra
21 out of 60
8 wks - Implementacion de Sistemas de Pruebas de vida con reconocimiento facial para Onboarding de clientes o Deteccion de fraude54cuatro Mexico
+3
Applicable to:
analytics product iconAnalyticsai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentity
Implemente servicios cognitivos de Azure para evitar el fraude relacionado con la identificación de sus clientes
22 out of 60
UX / UI Design - Proof 2 WeeksMobiik S.A. de C.V.
+2
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentity
Soluciones digitales centradas en el usuario. Especializados en microservicios y microfrontends para experiencias satisfactorias y efectivas. Mejora tu negocio hoy con Mobiik
23 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitystorage product iconStorage
DotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
24 out of 60
Red Canary Microsoft Sentinel WorkshopRed Canary
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Get an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
25 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. Israel
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Accelerate your digital transformation with Cloud and Collaboration tools
26 out of 60
Azure Penetration TestMazzy Technologies Corp.
+3
Applicable to:
data-platform product iconData Platformidentity product iconIdentitysecurity product iconSecurity
This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
27 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Azure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
28 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
29 out of 60
Modern workplace Active DirectorySii Sp. z o.o.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Modern workplace Active Directory implementation, migration and support
30 out of 60
Detection & Response Services (MXDR)Cloud Life
+3
Applicable to:
ai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentitysecurity product iconSecurity
Cloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
31 out of 60
Sentinel-as-a-ServiceCloud Life
+3
Applicable to:
ai-plus-machine-learning product iconAI & Machine Learningidentity product iconIdentitysecurity product iconSecurity
Cloud Life delivers an innovative cloud-based AI and ML-enhanced Sentinel-as-a-Service, empowering your team with managed SIEM/SOAR capabilities using optimum Microsoft MXDR Services
32 out of 60
Brillio Open Banking SolutionBrillio
+3
Applicable to:
data-platform product iconData Platformidentity product iconIdentitysecurity product iconSecurity
A robust, scalable, and secure solution that is designed to address the ever-evolving regulatory landscape and empower financial institutions to stay ahead in this new era of banking.
33 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta Analytics
+3
Applicable to:
devops product iconDevOpsidentity product iconIdentitysecurity product iconSecurity
This solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
34 out of 60
Eviden's Application Strategy WorkshopEviden International France - SAS
+3
Applicable to:
app-modernization product iconApp Modernizationdata-platform product iconData Platformidentity product iconIdentity
Eviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
35 out of 60
Security and Compliance AssessmentNOVENTIQ
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Gain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
36 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
37 out of 60
Microsoft Entra: Tu Aliado en SeguridadSuri Services SC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Impulsa la seguridad y gestión de tu organización con nuestro programa de implementación de Microsoft Entra.
38 out of 60
ALIANDO Managed Extended Detection and Response (MXDR)myCloudDoor
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
ALIANDO Managed Extended Detection & Response service (MXDR) powered by Sentinel and Defender
39 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoor
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
This assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
40 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoor
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
myCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
41 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SAS
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Utilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
42 out of 60
Eviden's Data Security CSI Engagement 4 Week AssessmentEviden International France - SAS
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Elevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
43 out of 60
Eviden's Azure Cloud Consulting Services – Landing ZonesEviden International France - SAS
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
A consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
44 out of 60
HCLTech's Cybersecurity ServicesHCL Technologies Limited.
+3
Applicable to:
backup product iconBackupidentity product iconIdentitysecurity product iconSecurity
HCLTech is a leading global technology company that helps enterprises reimagine their businesses for the digital age. Secure your cloud journey with HCLTech's comprehensive portfolio of cybersecurity
45 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Entra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
46 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies Services
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
With Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
47 out of 60
Enterprise App Integration with Microsoft My Apps PortalAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Our solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
48 out of 60
Security Information and Event Management (SIEM) MigrationKyndryl Inc.
+3
Applicable to:
disaster-recovery product iconDisaster Recoveryidentity product iconIdentitysecurity product iconSecurity
Kyndryl SIEM Migration service transitions legacy SIEMs to Microsoft Sentinel, ensuring comprehensive coverage for both on premise and cloud assets. Services include discovery, design, implementation.
49 out of 60
Azure Landing Zone Deployment ServiceLotus Beta Analytics
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
The "Azure Landing Zone Deployment Service" simplifies setting up secure, compliant Azure environments with pre-configured templates, ensuring a solid foundation for cloud operations and governance.
50 out of 60
Evaluación de seguridad Multicloud con Microsoft Cloud Security Benchmark (MCSB): Evaluación/Análisis de 2-6 semanas de MCSB.Cloud Continuity
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Con Seguridad Multicloud proteja sus entornos de nube dinámicos con controles robustos y líneas base de servicio, mediante Microsoft Cloud Security Benchmark con los mejores estándares de seguridad.
51 out of 60
Azure Well-Architected Framework: Evaluación/Análisis de 2-4 semanas de Ejecución.Cloud Continuity
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitysecurity product iconSecurity
Well Architected ayuda a las empresas a obtener cargas de trabajo más eficientes, seguras y resilientes en Azure, optimizando tus costos y mejoran su rendimiento general.
52 out of 60
Microsoft Entra ID: Consultancy & ImplementationNOVENTIQ
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Revolutionize Access Management with Microsoft Entra ID
53 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITED
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Overwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
54 out of 60
Microsoft Entra Private Access - Proof of Concept (PoC)Onevinn AB
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Microsoft Entra Private Access, is a cutting-edge Security Service Edge (SSE) solution designed to provide secure, seamless access to private applications and resourses.
55 out of 60
Microsoft Entra ID Conditional Access: 10-Day ImplementationWIZARD GROUP LIMITED
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
designed to quickly and effectively deploy Entra ID Conditional Access policies to enhance your organisation's security posture
56 out of 60
Microsoft Purview: 4-8 Week ImplementationWIZARD GROUP LIMITED
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Our implementation service aims to streamline the deployment of Microsoft Purview, ensuring that your organization can leverage its full capabilities to make informed decisions
57 out of 60
Microsoft Entra : Quick Start AcceleratorWIZARD GROUP LIMITED
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
This service ensures that your organization can quickly leverage the full capabilities of Microsoft Entra ID to enhance security and streamline access management
58 out of 60
Microsoft Purview Quickstart Accelerator Implementation with Wizard CyberWIZARD GROUP LIMITED
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
This service ensures that your organization can quickly harness the power of Microsoft Purview to manage and govern your data effectively
59 out of 60
Azure Identity Security ImplementationBaufest
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
In a context of increasing threats of identity theft and excessive privilege exploitation, our team of specialists works alongside our clients to implement secure identity management in Azure.
60 out of 60
  • 1
  • 2
  • 3
  • Naprej
O Marketplace
  • Zakaj Microsoft Marketplace
  • Spletni dnevniki
  • Zgodbe strank
Za stranke
  • Delovni čas
  • Vodnik za začetek
  • Tehnična dokumentacija
  • Zasebne ponudbe
  • Microsoft Azure Consumption Commitment
  • Obračunavanje in izdajanje računov
Za partnerje
  • Postanite partner
  • Bodite na seznamu
  • Pridobite podporo za trženje
  • Tehnična dokumentacija
  • Navodila po korakih za ustvarjanje, objavljanje in prodajo
  • Postanite upravičeni do partnerske prodaje
  • Skupnost Marketplace za partnerje
  • Prodaja na Marketplace, ki jo vodi kanal
  • Večstranske zasebne ponudbe za partnerje v kanalih
Poslovanje
  • Microsoft Cloud
  • Microsoftova varnost
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Podjetje
  • Zaposlitev
  • O Microsoftu
  • Zasebnost pri Microsoftu
  • Vlagatelji
  • Trajnost
Slovenščina (Slovenija) Ikona za zavrnitev sodelovanja pri možnostih glede zasebnosti Vaše možnosti glede zasebnosti Zasebnost o zdravstvenem stanju potrošnikov
  • Zemljevid spletnega mesta
  • Stik z nami
  • Zasebnost in piškotki
  • Pogoji uporabe
  • Blagovne znamke
  • O naših oglasih
  • Upravljajte piškotke
  • © Microsoft 2025