篩選全部清除
Professional Services 個結果
在 professional services 中顯示 個結果。
Azure Threat Hunting: 6wk AssessmentBridewell Consulting LimitedThe threat hunt assessment is designed to provide in an accurate representation of an organisations current security posture including highlighting immediate vulnerabilities within Azure.
+3
Applicable to:
Identity
Networking
Security
1 out of 60
Igel Azure Virtual Desktop As A Service 2-Hours WorkshopTriStratus Ltd.IGEL Technology provides a Linux based “Next generation edge operating system" which is purpose-built for secure access to cloud workspaces such as Azure Virtual Desktops.
+3
Applicable to:
App Modernization
Identity
Security
2 out of 60
Cloud Security Approach: 2-months AssessmentPyxisThrough the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
+3
Applicable to:
Analytics
Identity
Security
3 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxisEvolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
+3
Applicable to:
Analytics
Identity
Security
4 out of 60
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
5 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
6 out of 60
Cloud Security Compliance: 4-months AssessmentPyxisThe CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
+3
Applicable to:
Analytics
Identity
Security
7 out of 60
Cloud Security Services: 12-months ImplementationPyxisWe audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
+3
Applicable to:
Analytics
Identity
Security
8 out of 60
IAM Architecture 3-Weeks ImplementationToreon CVBASetting up a custom fitting IAM model to give your business the control it needs.
+2
Applicable to:
Identity
Security
9 out of 60
Azure Security: 2-Day AssessmentExtrinsica GlobalA fast and thorough assessment of your Microsoft Azure configuration security, providing a detailed report including prioritised remediation recommendations based on current security best practice.
+3
Applicable to:
Backup
Identity
Security
10 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield LtdSpartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
+3
Applicable to:
Identity
Migration
Security
11 out of 60
Azure Sentinel: 5-Days Proof of ConceptCloud NexusSee and stop threats before they cause harm with Azure Sentinel. Our proof of concept includes 5 days Professional Services for design, deployment and tuning for your business.
+3
Applicable to:
Analytics
Identity
Security
12 out of 60
Azure Cost Optimization: 1 Day WorkshopALEF Distribution RO S.A.Understand, monitor and optimize your cloud spendings in Azure with our "Cost Optimization Workshop".
+3
Applicable to:
Identity
Migration
Security
13 out of 60
Purple Team Assessment: 1 Week AssessmentBridewell Consulting LimitedTest your organisation's defensive capabilities by conducting a purple team assessment in collaboration with Bridewell
+3
Applicable to:
Identity
Migration
Security
14 out of 60
Sentinel: 3-Day WorkshopBridewell Consulting LimitedMitigate threats, and work with Bridewell's leading cloud security specialists to develop a roadmap to drive improvements in your Sentinel deployment.
+3
Applicable to:
Identity
Networking
Security
15 out of 60
Microsoft Sentinel Accelerator: 1 hour Automated ImplementationOrganised Computer Systems LimitedUse Telefónica Tech’s unique automation approach to rapidly deploy Microsoft Sentinel to Microsoft and T-Tech’s combined best practice standard.
+3
Applicable to:
DevOps
Identity
Security
16 out of 60
Accelerating Cloud Virtual Desktops: 2-Hour WorkshopSlalom ConsultingThis Free Workshop will introduce you to how Azure Virtual Desktops help you embrace a remote workforce while maintaining control through secure workstation experiences on any device.
+3
Applicable to:
Identity
Migration
Networking
17 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology HoldingOur offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
+3
Applicable to:
Identity
Security
Storage
18 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private LimitedWe help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
+3
Applicable to:
Identity
Migration
Security
19 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
+3
Applicable to:
Identity
Migration
Security
20 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology HoldingGet a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
+3
Applicable to:
Identity
Security
Storage
21 out of 60
Defend Against Threats with SIEM Plus XDRBJSS LimitedImprove your security posture and uncover risks that might be harmful to your organisation with BJSS' cyber security workshop: Defend Against Threats with SIEM Plus XDR.
+2
Applicable to:
Identity
Security
22 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam FranceSecure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
+2
Applicable to:
Identity
Networking
23 out of 60
Microsoft Entra Rapid StartShaping CloudShaping Cloud Microsoft Entra Rapid Start helps you get going with the Entra product set confidently, swiftly, economically.
+2
Applicable to:
Identity
Security
24 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
25 out of 60
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to:
App Modernization
Identity
26 out of 60
Microsoft Security License Utilisation & Commercial Assessment: 2-Week AssessmentBridewell Consulting LimitedProvide an overview of organisations current licensing position, identify what security Microsoft products could be utilised & build an adoption framework
+3
Applicable to:
Identity
Networking
Security
27 out of 60
Azure Security Accelerator SuiteNeudesicMitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
+3
Applicable to:
Identity
Networking
Security
28 out of 60
Managed Services for Microsoft EntraDXCAdvisory and Managed Services for Microsoft Entra
+2
Applicable to:
Identity
Security
29 out of 60
Managed Microsoft XDR - 12 month managed serviceANS Group LimitedANS will manage your Microsoft endpoint & workload protection tooling consisting of Microsoft 365 Defender, Defender for Cloud and Microsoft Sentinel, via our 24x7x365 UK based 3 Tiered SOC
+3
Applicable to:
Identity
Networking
Security
30 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARSALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
+3
Applicable to:
App Modernization
Identity
Migration
31 out of 60
Security COE - Managed Service (12 months minimum)ANS Group LimitedGain access to highly skilled engineering squads to continually develop, engineer and optimise services across your Azure Security solution suite to drive value rapidly.
+3
Applicable to:
Identity
Networking
Security
32 out of 60
CloudPOS: 4-Week ImplementationMediasoft Data Systems LimitedThe all-in-one cloud-based point-of-sale solution. Boost efficiency, streamline operations, and enhance the customer experience with the user-friendly, secure, and fast software solutions.
+3
Applicable to:
Analytics
Archive
Identity
33 out of 60
Security ReviewShaping CloudShaping Cloud will perform a high-level security assessment throughout your organisation's IT infrastructure.
+3
Applicable to:
Backup
Identity
Security
34 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTDDotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
+3
Applicable to:
App Modernization
Identity
Storage
35 out of 60
Fintech Azure Landing Zone Accelerator: 5 week ImplementationYobah LimitedDefining an enterprise landing zone for your Azure environment, tailored with financial services in mind.
+3
Applicable to:
Identity
Networking
Security
36 out of 60
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITEDProvide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
+3
Applicable to:
Analytics
Data Platform
Identity
37 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
38 out of 60
Azure Advanced Security 4-Week ImplementationServentAzure Advanced Security is a service provided by Servent to help you take advantage of the multi-layered security provided by Microsoft across datacentres, infrastructure and operations in Azure
+2
Applicable to:
Identity
Security
39 out of 60
Security as a Service: 3-Wk ImplementationA3Cloud SolutionsImprove your security of your solutions and infrastructures in Azure Cloud.
+3
Applicable to:
Identity
Migration
Security
40 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
41 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
42 out of 60
AVD Cost Optimization ProgramTechPlus TalentAre you looking to maximize the value of your Azure Virtual Desktop (AVD) environment while minimizing costs? Look no further! Tech Plus Talent is thrilled to present our Azure AVD Cost Optimization P
+3
Applicable to:
Backup
Identity
Security
43 out of 60
Managed Azure Virtual Desktop (Base) - 12 month Managed ServiceANS Group LimitedProvide, manage and control secure modern workplaces with Managed Azure Virtual Desktop from ANS
+3
Applicable to:
Identity
Migration
Security
44 out of 60
ISO 27001 Readiness Assessment for Azure EnvironmentVisionet Systems Inc.Advance confidently towards ISO 27001 certification for your Azure environment with Visionet's readiness assessment. Get a detailed analysis of your infrastructure operations & security policies.
+3
Applicable to:
Backup
Identity
Security
45 out of 60
Azure Active Directory B2C - Assess & PlanShaping CloudAzure Active Directory B2C provides business-to-customer identity as a service. We can design, develop & implement a customer identity & access management solution based in Azure Active Directory B2C.
+2
Applicable to:
Identity
Security
46 out of 60
Microsoft & Multi-Cloud Security Penetration Testing: 5-Day AssessmentBDO LLPCREST certified Ethical Hackers from BDO perform penetration tests on your Microsoft and Multi-Cloud environment and test the setup of Microsoft Azure AD, Defender, Sentinel and Purview.
+3
Applicable to:
Identity
Security
Storage
47 out of 60
Microsoft 365 Azure Tenant Management EntraID: 2 month POC with workshopT-Systems International With the Bundle Quickstart, T-Systems supports the customer on their Azure tenant with a minimum configuration of the Microsoft Entra ID for use in self-service.
+3
Applicable to:
App Modernization
Identity
Internet of Things
48 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
49 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
+2
Applicable to:
Identity
Security
50 out of 60
Threat Protection: 5-day EngagementBridewell Consulting LimitedMitigate cyber security risks within your Microsoft Azure environments by attending a 5 day workshop with Bridewell.
+3
Applicable to:
Identity
Networking
Security
51 out of 60
Defender For Cloud: 1-Wk Proof of ConceptBridewell Consulting LimitedSecure your organisation's Azure Cloud workloads by leveraging the expertise of a leading cyber security services provider to review and optimise your implementation of Defender for Cloud.
+3
Applicable to:
Identity
Networking
Security
52 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoormyCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
+3
Applicable to:
Identity
Networking
Security
53 out of 60
24x7 SOC Service by IntelequiaIntelequia Technologies24x7 monitoring, protection and automated response to cyberthreats
+3
Applicable to:
Analytics
Identity
Security
54 out of 60
Workshop for Azure Cost Optimization using FinOpsSii Sp. z o.o.Control your costs in the cloud with the FinOps methodology
+2
Applicable to:
DevOps
Identity
55 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
56 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
57 out of 60
Well Architectured FrameWork Review by NessNess IsraelStrengthen Your Cloud Architecture with Ness Cloud. Get tailored recommendations for Operational Excellence, Security, Reliability, Performance Efficiency, Cost Optimization, and Sustainability.
+3
Applicable to:
DevOps
Identity
Security
58 out of 60
Cloud Security Assessment By NessNess IsraelEnhance Your Cloud Security with Ness Cloud. Our assessment uncovers vulnerabilities, misconfigurations, and weaknesses, offering customized recommendations to strengthen your cloud environment.
+3
Applicable to:
Identity
Migration
Security
59 out of 60
Cloud Architect Review by NessNess IsraelOptimize Your Cloud Architecture with Ness. Our Cloud Architect Review provides a comprehensive analysis of your cloud setup, ensuring it is efficient, reliable, and cost-effective.
+3
Applicable to:
DevOps
Identity
Security
60 out of 60