FiltriPočisti vse
Št. rezultatov: Professional Services
Prikaz toliko rezultatov v aplikaciji professional services:
Igel Azure Virtual Desktop As A Service 2-Hours WorkshopTriStratus Ltd.IGEL Technology provides a Linux based “Next generation edge operating system" which is purpose-built for secure access to cloud workspaces such as Azure Virtual Desktops.
+3
Applicable to:
App Modernization
Identity
Security
1 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield LtdSpartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
+3
Applicable to:
Identity
Migration
Security
2 out of 60
Consulting for Advanced Microsoft Security Solutions: 4-Week ImplementationLakeforest Technologies OÜWe work with hybrid customers, offering services and solutions for the modern workplace and hybrid-cloud management.
+2
Applicable to:
Identity
Security
3 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.aiImplementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
+1
Applicable to:
Identity
4 out of 60
skillup_consulting_openedx_v1Flexible Road LLCOpen edX Learning Management System with Azure.
+3
Applicable to:
Backup
Identity
Storage
5 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam FranceSecure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
+2
Applicable to:
Identity
Networking
6 out of 60
Azure Sentinel 5 hours Online WorkshopCLOUD SERVICESThis 5-hour workshop contains theoretic and practical parts. It is designed to help you to start working with Azure Sentinel
+3
Applicable to:
Disaster Recovery
Identity
Security
7 out of 60
Assesment Azure Base4Base4 Security Chile SPAThe Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
+3
Applicable to:
Analytics
Identity
Security
8 out of 60
Azure Security Accelerator SuiteNeudesicMitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
+3
Applicable to:
Identity
Networking
Security
9 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTDDotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
+3
Applicable to:
App Modernization
Identity
Storage
10 out of 60
Red Canary Microsoft Sentinel WorkshopRed CanaryGet an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
+2
Applicable to:
Identity
Security
11 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
12 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
13 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
14 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
15 out of 60
Modern workplace Active DirectorySii Sp. z o.o.Modern workplace Active Directory implementation, migration and support
+2
Applicable to:
Identity
Security
16 out of 60
Detection & Response Services (MXDR)Cloud LifeCloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
+3
Applicable to:
AI & Machine Learning
Identity
Security
17 out of 60
Sentinel-as-a-ServiceCloud LifeCloud Life delivers an innovative cloud-based AI and ML-enhanced Sentinel-as-a-Service, empowering your team with managed SIEM/SOAR capabilities using optimum Microsoft MXDR Services
+3
Applicable to:
AI & Machine Learning
Identity
Security
18 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
19 out of 60
Eviden's Application Strategy WorkshopEviden International France - SASEviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
+3
Applicable to:
App Modernization
Data Platform
Identity
20 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
+2
Applicable to:
Identity
Security
21 out of 60
HCLTech's Cybersecurity ServicesHCL Technologies Limited.HCLTech is a leading global technology company that helps enterprises reimagine their businesses for the digital age. Secure your cloud journey with HCLTech's comprehensive portfolio of cybersecurity
+3
Applicable to:
Backup
Identity
Security
22 out of 60
Workshop for Azure Cost Optimization using FinOpsSii Sp. z o.o.Control your costs in the cloud with the FinOps methodology
+2
Applicable to:
DevOps
Identity
23 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
24 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
25 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
27 out of 60
HIPAA Compliance Risk Assessment & Gap AnalysisAvertium, LLCAvertium’s team of healthcare and security consultants apply their deep knowledge of compliance to the way you do business.
+2
Applicable to:
Identity
Security
28 out of 60
Security Information and Event Management (SIEM) MigrationKyndryl Inc.Kyndryl SIEM Migration service transitions legacy SIEMs to Microsoft Sentinel, ensuring comprehensive coverage for both on premise and cloud assets. Services include discovery, design, implementation.
+3
Applicable to:
Disaster Recovery
Identity
Security
29 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITEDOverwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
+2
Applicable to:
Identity
Security
30 out of 60
Microsoft Identity Security Posture-4h assessmentReplyAssessment of Microsoft Cloud or Hybrid Identity and Access Management Solution Security Posture
+2
Applicable to:
Identity
Security
31 out of 60
Implementation of Microsoft Entra ID IntegrationITX360 (Pvt) Ltd.Enhance security and simplify access with Microsoft Entra ID Integration, featuring SSO, MFA, passwordless login, and role-based access
+2
Applicable to:
Identity
Security
32 out of 60
Azure Virtual Desktop & Productivity 2 Week ImplementationAKAVEIL TECHNOLOGIES INCAzure Virtual Desktop provides secure, remote access to desktops and apps, simplifying traditional VDI management through a fully managed, cloud-based solution.
+3
Applicable to:
Identity
Migration
Security
33 out of 60
Azure Virtual Desktop & Productivity 2 Week Implementation for Law Firms and Legal TeamsAKAVEIL TECHNOLOGIES INCAzure Virtual Desktop provides secure, remote access to desktops and apps, simplifying traditional VDI management through a fully managed, cloud-based solution.
+3
Applicable to:
Identity
Migration
Security
34 out of 60
Azure Security / Compliance Audit 5 Day AssessmentAKAVEIL TECHNOLOGIES INCThoroughly assess your Azure environment to uncover risks, boost security, and ensure compliance with industry standards
+2
Applicable to:
Identity
Security
35 out of 60
Microsoft Purview Migration Accelerator - 1 Week Proof of Concept EngagementMAQ SoftwareTransform your data governance with our 1-Week Proof of Concept Pilot for Microsoft Purview to streamline data governance, enhance security, and ensure compliance.
+3
Applicable to:
Identity
Migration
Security
36 out of 60
LBAN CloudSecure – Secured by Microsoft Defender for CloudLotus Beta AnalyticsLBAN CloudSecure delivers end-to-end Azure protection with Microsoft Defender for Cloud—boosting security, compliance, and visibility across your cloud workloads.
+2
Applicable to:
Identity
Security
37 out of 60
Windows in Cloud AssessmentTask Systems LimitedUnlock Azure Virtual Desktop Success: Expert-Led WVD Assessment & Migration Blueprint
+3
Applicable to:
Identity
Migration
Security
38 out of 60
Cloud4C Advanced Network Security and AccessCloud4C Services Pte LtdCloud4C’s Advanced Network Security and Access protects cloud perimeters with Azure Firewall, WAF, DDoS, Front Door, Bastion, and Zero Trust controls for secure, resilient, and compliant connectivity.
+3
Applicable to:
Identity
Networking
Security
39 out of 60
Cloud4C Entra Governance & Compliance SuiteCloud4C Services Pte LtdCloud4C’s Entra Governance & Compliance Suite delivers identity governance, protection, and privileged access management with audit-ready workflows to strengthen compliance and reduce insider risks
+3
Applicable to:
Analytics
Identity
Security
40 out of 60
Cloud4C Zero Trust Readiness and StrategyCloud4C Services Pte LtdCloud4C’s Zero Trust Readiness and Strategy delivers maturity assessment, tailored architecture, and phased rollout planning with Microsoft Defender integrations for secure Zero Trust transformation
+3
Applicable to:
Identity
Networking
Security
41 out of 60
Cloud4C Security Posture AssessmentCloud4C Services Pte LtdCloud4C’s Security Posture Assessment delivers Zero Trust–aligned advisory with Secure Score reviews, Defender telemetry, workshops, and board-ready reporting to strengthen enterprise security.
+3
Applicable to:
Identity
Networking
Security
42 out of 60
Cloud4C Confidential and Identity-Aware ComputingCloud4C Services Pte LtdCloud4C’s Confidential and Identity-Aware Computing secures data-in-use with Azure Confidential VMs, Managed HSM, Key Vault, and encryption policies for privacy-preserving, compliance-ready workloads.
+3
Applicable to:
Identity
Networking
Security
43 out of 60
Cloud4C Microsoft Copilot for Security –Readiness AssessmentCloud4C Services Pte LtdCloud4C’s Microsoft Copilot for Security Readiness Assessment identifies gaps, delivers recommendations, and builds a roadmap for smooth adoption of AI-driven security operations
+3
Applicable to:
AI & Machine Learning
Identity
Security
44 out of 60
Cloud4C Azure Identity Foundation AcceleratorCloud4C Services Pte LtdCloud4C’s Entra Zero Trust Starter Pack delivers identity, conditional access, privileged identity management, and secure private access to help organizations launch their Zero Trust journey
+3
Applicable to:
Identity
Networking
Security
45 out of 60
Cloud4C Microsoft Purview Data Protection OfferingCloud4C Services Pte LtdCloud4C’s Microsoft Purview Data Protection unifies discovery, classification, and compliance with AI-driven governance to prevent data loss and risks across Microsoft 365, Azure, and hybrid estates
+3
Applicable to:
Analytics
Identity
Security
46 out of 60
Cloud4C Defender for Office 365 Deployment OfferingCloud4C Services Pte LtdCloud4C’s Defender for Office 365 Deployment secures email and collaboration tools with expert setup, testing, and best practices to reduce threats, boost trust, and ensure compliant communication
+3
Applicable to:
Analytics
Identity
Security
47 out of 60
Cloud4C Intune Endpoint Compliance & Security Suite OfferingCloud4C Services Pte LtdCloud4C’s Intune Endpoint Compliance & Security Suite secures devices, enforces compliance, and streamlines endpoint management with Microsoft Intune, Defender for Endpoint, and Entra ID integration.
+3
Applicable to:
Analytics
Identity
Security
48 out of 60
Microsoft 365 Defender Enterprise DeploymentCloud4C Services Pte LtdCloud4C’s Microsoft 365 Defender Enterprise Deployment delivers unified protection with expert rollout, configuration, testing, and advisory for secure, scalable Microsoft 365 environments.
+3
Applicable to:
Analytics
Identity
Security
49 out of 60
Azure Rights Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Rights Management in their production environment.
+3
Applicable to:
App Modernization
Identity
Security
50 out of 60
Azure Rights Management: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see, understand and test the Azure Rights Management on a demo tenant.
+3
Applicable to:
App Modernization
Identity
Security
51 out of 60
Azure Security Center: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to secure workloads in Azure Cloud.
+3
Applicable to:
Identity
Security
Storage
52 out of 60
Azure Rights Management: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to deploy and manage Azure Rights Management.
+3
Applicable to:
App Modernization
Identity
Security
53 out of 60
Windows Virtual Desktop: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see how WVD (Windows Virtual Desktop) can bring value to their business.
+3
Applicable to:
Data Platform
Identity
Storage
54 out of 60
Azure Security Center: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see Azure Security Center benefits and stay ahead of changing threat landscape across the cloud.
+3
Applicable to:
Identity
Security
Storage
55 out of 60
Azure Virtual Desktop (AVD): - 2-Week ImplementationMismo Systems Private LimitedGet up and running with Azure Virtual Desktop within 2 weeks
+3
Applicable to:
Identity
Networking
Storage
56 out of 60
Microsoft Entra ID Single Sign-On (SSO): 5-Day ImplementationMismo Systems Private LimitedConfiguring Microsoft Entra ID Single Sign-On for both Gallery and Non-gallery applications to access all of your company provisioned applications via single click.
+1
Applicable to:
Identity
57 out of 60
Azure Rights Management: 1 Hour BriefingCommunication Square LLC1 hour Briefing on Azure Rights Management in the Cloud
+3
Applicable to:
App Modernization
Identity
Security
58 out of 60
Azure Identity Management: 4 Weeks ImplementationCommunication Square LLC4 week Implementation is designed to help customers fully utilize Azure Identity and Access Management in their existing infrastructure and training.
+3
Applicable to:
Data Platform
Identity
Storage
59 out of 60
Endpoint Management: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see how diverse the mobile eco system is and how azure is helping to protect and secure sensitive data.
+2
Applicable to:
Identity
Security
60 out of 60