FiltriPočisti vse
Št. rezultatov: Professional Services
Prikaz toliko rezultatov v aplikaciji professional services:
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
1 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
2 out of 60
Cloud Security Compliance: 4-months AssessmentPyxisThe CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
+3
Applicable to:
Analytics
Identity
Security
3 out of 60
Azure Governance Assessment - 1 DayInde1 Day Governance Assessment to review and provide recommendations to improve your Azure governance level
+3
Applicable to:
Identity
Migration
Security
4 out of 60
skillup_consulting_openedx_v1Flexible Road LLCOpen edX Learning Management System with Azure.
+3
Applicable to:
Backup
Identity
Storage
5 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
6 out of 60
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to:
App Modernization
Identity
7 out of 60
Assesment Azure Base4Base4 Security Chile SPAThe Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
+3
Applicable to:
Analytics
Identity
Security
8 out of 60
Security - Sentinel- 4 week ImplementationLinktech AustraliaThis engagement is an accelerated program that will help your organisation implement and take full advantage of Microsoft Sentinel to review and manage the detect and response capabilities.
+2
Applicable to:
Identity
Security
9 out of 60
Red Canary Microsoft Sentinel WorkshopRed CanaryGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
+2
Applicable to:
Identity
Security
10 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
11 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
12 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
13 out of 60
Cloud Realisation: 4-Hour WorkshopQUORUM SYSTEMS PTY LTDBegin your Cloud Transformation Journey
+3
Applicable to:
Disaster Recovery
Identity
Migration
14 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
15 out of 60
External IAM 5 day assessmentCondatis Group LimitedCondatis is offering an external Identity and Access Management (IAM) assessment focusing on how your organisation secures and manages external identities in your business context.
+2
Applicable to:
Identity
Security
16 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
17 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
19 out of 60
Microsoft Purview Information Protection: 12-Wk ImplementationUNIFY Solutions Pty. Ltd.UNIFY Solutions will deploy Microsoft Purview Information Protection to proactively protect and monitor your information as it moves between users and devices within your organisation and externally.
+2
Applicable to:
Identity
Security
20 out of 60
MIM Migration To Entra ID Assessment: 8-Wk AssessmentModern 42Microsoft Identity Manager Current state assessment and transition plan to Microsoft Entra ID
+2
Applicable to:
Identity
Security
21 out of 60
Microsoft Purview Services from UNIFY SolutionsUNIFY Solutions Pty. Ltd.Comprehensive Microsoft Purview Services for data governance and security
+2
Applicable to:
Identity
Security
22 out of 60
Microsoft Endpoint Security Services: 4-Wk ImplementationUNIFY Solutions Pty. Ltd.Comprehensive Microsoft Endpoint Security services, providing enterprise data safety, regulatory compliance, and operational continuity.
+2
Applicable to:
Identity
Security
23 out of 60
Microsoft Entra Deployment: 12-Wk ImplementationUNIFY Solutions Pty. Ltd.Comprehensive Microsoft Entra Design, Migrate, and Deploy Services.
+2
Applicable to:
Identity
Security
24 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITEDOverwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
+2
Applicable to:
Identity
Security
25 out of 60
QServices AI-Powered SaaS AutomationQ SERVICES INCAI-powered SaaS platform for customer support, workflow automation, and efficiency boost.
+3
Applicable to:
App Modernization
AI & Machine Learning
Identity
26 out of 60
Microsoft Entra Verified ID: 3-8 Day WorkshopCondatis Group LimitedAn immersive 3-8 day workshop designed to provide a deep dive into Microsoft Entra Verified ID.
+1
Applicable to:
Identity
27 out of 60
Microsoft Entra Verified ID: POCCondatis Group LimitedCondatis is offering a Microsoft Entra Verified ID Proof of Concept demonstrating how your organisation can leverage digital identity credentials to streamline onboarding and secure access.
+1
Applicable to:
Identity
28 out of 60
Data#3 Managed XDR EndpointData#3 LimitedBaseline 24/7 security for your endpoints. Ideal for robust, foundational protection
+3
Applicable to:
Analytics
Identity
Security
29 out of 60
Microsoft Entra ID WorkshopCondatis Group LimitedAn immersive 3 - 8 day workshop designed to provide a deep dive into Microsoft Entra ID.
+1
Applicable to:
Identity
30 out of 60
Microsoft Entra ID Governance: 3 - 8 Day WorkshopCondatis Group LimitedAn immersive 3-8 day workshop designed to provide a deep dive into Microsoft Entra ID Governance.
+1
Applicable to:
Identity
31 out of 60
Microsoft Entra ID: POCCondatis Group LimitedCondatis is offering a Microsoft Entra ID Proof of Concept demonstrating how your organisation can strengthen security and unify identity management.
+1
Applicable to:
Identity
32 out of 60
Microsoft Entra ID Governance: POCCondatis Group LimitedCondatis is offering a Microsoft Entra ID Governance Proof of Concept to demonstrate how organisations can improve operations and empower teams.
+1
Applicable to:
Identity
33 out of 60
Azure Landing Zone Accelerator by AC3AC3Azure Landing Zone deployment for a customer starting their cloud journey or planning to migrate their existing brownfield environments and workloads to the Microsoft Azure cloud.
+3
Applicable to:
Identity
Migration
Networking
34 out of 60
External Penetration Testing for EducationABTechnologiesUncover security risks in your Azure and internet-facing systems to strengthen your Microsoft cloud environment.
+3
Applicable to:
Identity
Networking
Security
35 out of 60
Azure Rights Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Rights Management in their production environment.
+3
Applicable to:
App Modernization
Identity
Security
36 out of 60
Azure Governance & Security: 4-Wk AssessmentAkkodis ConsultingThe Akkodis Azure Governance and Security Health Check provides independent assurance. Our actionable recommendations enable you to optimise cost, mitigate risk and improve quality and performance.
+3
Applicable to:
Data Platform
Identity
Security
37 out of 60
Identity Health Check: 3-Week AssessmentCondatis Group LimitedPackaged consultancy service to help a business analyse, plan and build a robust and modern identity solution with Azure AD.
+1
Applicable to:
Identity
38 out of 60
Azure Identity Management: 4 Weeks ImplementationCommunication Square LLC4 week Implementation is designed to help customers fully utilize Azure Identity and Access Management in their existing infrastructure and training.
+3
Applicable to:
Data Platform
Identity
Storage
39 out of 60
Azure Identity Management: 2 Week Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see and utilize Azure Identity and Access Management in demo environment.
+2
Applicable to:
Identity
Security
40 out of 60
Data#3 Azure Remediation Service - 2-Week ImplementationData#3 LimitedThe Azure Remediation Service takes the outputs from an Azure Health Check and implements the recommendations made, such as improving security, subscriptions, resource tagging and rightsizing.
+3
Applicable to:
Backup
Identity
Security
41 out of 60
Azure Health Check - 1-Day AssessmentData#3 LimitedThe Azure Health Check helps customers understand, assess and monitor their Azure expenditure, and assists to mitigate risk. The assessment reviews the state of your cloud and determines next steps.
+3
Applicable to:
Identity
Networking
Security
42 out of 60
Endpoint Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Device and Application Management solution and train their IT team.
+2
Applicable to:
Identity
Security
43 out of 60
Remote Learning Solution: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to re-imagine how your institution approaches secure communication, compliance to industry defined standards and access to data is secure on Microsoft Teams.
+3
Applicable to:
Identity
Security
Storage
44 out of 60
Remote Learning Solution: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Teams based Remote Learning Solution in their existing infrastructure and trainings.
+3
Applicable to:
Identity
Security
Storage
45 out of 60
Remote Learning Solution: 1-Hour briefingCommunication Square LLC1 hour Briefing on Remote Learning Solution
+3
Applicable to:
Identity
Security
Storage
46 out of 60
SimpleAz - WVD Proof of Concept: 6 WksEighty20 Solutions Pty LtdImprove user productivity, enhance resilience, increase automation, and optimize IT costs through adoption of Windows Virtual Desktop - validate the benefits, experience the difference.
+3
Applicable to:
Identity
Networking
Security
47 out of 60
AzWatcher - Azure Security: 2 wks assessmentEighty20 Solutions Pty LtdEighty20 Solutions' AzWatcher offering looks at your Azure security posture and provides you with prioritised list of issues and actionable recommendations.
+2
Applicable to:
Identity
Security
48 out of 60
Azure Virtual Desktop - 5-week ImplementationSpektra Systems LLCSpektra Systems offers premium consulting & implementation services for Microsoft Azure Virtual Desktop, We provide quality AVD solution with minimal cost, best in class security & productivity.
+3
Applicable to:
Identity
Migration
Storage
49 out of 60
Data#3 Azure Remediation Service - 2-Week ImplementationData#3 LimitedThe Azure Remediation Service takes the outputs from an Azure Health Check and implements the recommendations made, such as improving security, subscriptions, resource tagging and rightsizing.
+3
Applicable to:
Backup
Identity
Security
50 out of 60
Windows Virtual Desktop Solution: Proof of ConceptABTechnologiesThe best virtual Windows and Microsoft 365 experience, delivered to you on Microsoft Azure.
+3
Applicable to:
Identity
Networking
Security
51 out of 60
Windows Virtual Desktop: 1-Day AssessmentDigiTechWindows Virtual Desktop Assessment includes comprehensive pre-implementation assessment for WVD requirements and your business needs
+3
Applicable to:
Identity
Migration
Storage
52 out of 60
Web Applications Modernization 1-day AssessmentSela Group (HQ)Web Application Modernization Consultancy is a professional consultancy service for cloud transition without disturbing business continuity.
+3
Applicable to:
App Modernization
DevOps
Identity
53 out of 60
Azure Cloud Adoption 4 - Week AssessmentAKAVEIL TECHNOLOGIES INCStrategic Assessment to Migration & Operation
+3
Applicable to:
Identity
Migration
Security
54 out of 60
Digital Trusted Identity Advisory: 2-week WorkshopNTT DATA Inc.Identity and Access Management (IAM) Azure AD Advisory 2-week Workshop helps determine how IAM can address key security challenges and enable your adaptive workforce as a dynamic workplace.
+2
Applicable to:
Identity
Security
55 out of 60
Hybrid Cloud Security Workshop - 3 WeeksIngram Micro India Private LimitedThe engagement involves showcasing in customer’s production environment Azure defender features, discovering real threats to selected hybrid workloads, and analyzing security vulnerabilities.
+3
Applicable to:
Big Data
Identity
Security
56 out of 60
Azure Secure Remote Worker : 3-Wk ImplementationNBConsult Holdings (PTY) LtdWindows Virtual Desktop delivers virtual desktops and apps seamlessly from Azure that can be accessed anywhere anytime and from any device.
+3
Applicable to:
Identity
Networking
Security
57 out of 60
Windows365: 1-Day WorkshopCommunications Design & Management Pty LtdOne day workshop to recommend a best fit Desktop Virtualisation offering for your organisation.
+2
Applicable to:
Identity
Migration
58 out of 60
cubesys AVD & Windows 365 Managed ServicesCubesys Pty Ltd Australia's leading AVD & Windows 365 specialists now offer a unique managed service for your Cloud-based VDI. Built specifically to work alongside your existing IT team.
+3
Applicable to:
Identity
Migration
Security
59 out of 60
AVD/Windows 365 Plan for Success: 3-d AssessmentCubesys Pty Ltd Understand what you need to successfully deploy Azure Virtual Desktop (AVD) and Windows 365. In our unique assessment we will provide budget guidance, evaluate your readiness and build a tailored plan
+3
Applicable to:
Identity
Migration
Security
60 out of 60