篩選全部清除
Professional Services 個結果
在 professional services 中顯示 個結果。
Security as a Service: 3-Wk ImplementationA3Cloud SolutionsImprove your security of your solutions and infrastructures in Azure Cloud.
+3
Applicable to:
Identity
Migration
Security
1 out of 60
Azure Assessment: 2-Day AssessmentQuoStar Solutions LimitedOur team will perform a thorough evaluation of your existing Azure environment and we will provide you with clear guidance on how to implement these improvements.
+3
Applicable to:
App Modernization
Data Platform
Security
2 out of 60
QuoStar Azure Expert: 1-5 Day consultationQuoStar Solutions LimitedQuoStar's Azure expertscan provide tailored solutions, whether you need advice on industry best practice, troubleshooting or mapping an Azure migration.
+3
Applicable to:
App Modernization
Migration
Security
3 out of 60
QuoStar Azure Virtual Desktop Proof of ConceptQuoStar Solutions LimitedQuoStar will build a virtual desktop environment using Azure VDI as a proof of concept for your users to trial
+3
Applicable to:
Migration
Networking
Security
4 out of 60
Azure Cosmos DatabaseDOTSQUARES TECHNOLOGIES INDIA P LTDAzure Cosmos DB consulting services offer expert guidance in leveraging Microsoft's globally distributed, multi-model database service to design, implement, and optimize scalable and highly available
+3
Applicable to:
Migration
Security
Storage
5 out of 60
QuoStar Azure Readiness Assessment: 3-Day assessmentQuoStar Solutions LimitedUnlock the full potential of Microsoft Azure and optimise your business operations with QuoStar’s Azure Readiness Assessment
+3
Applicable to:
Migration
Networking
Security
6 out of 60
Azure Synapse Business Value AssessmentCLICK2CLOUD INCClick2Clloud's Azure Synapse Business Value Assessment provides insights across enterprise data warehouses and data systems to unlock value and scale.
+3
Applicable to:
Analytics
Migration
Security
7 out of 60
Accelerating Cloud Adoption for Azure efficiently and effectivelyTrianz IT and Cloud Solutions Pvt. LtdTrianz is a cloud migration pioneer and lead the initiatives by leveraging IP led services to automate and fast track the cloud adoption journey.
+3
Applicable to:
Migration
Networking
Security
8 out of 60
Innovation Anywhere with Azure ARC: 5 Week ImplementationCognizantLeverage Azure Arc to unify management, governance and security of your hybrid, on-premises, datacenter, private and public cloud environments
+2
Applicable to:
Backup
Security
9 out of 60
Azure Firewall 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+3
Applicable to:
Identity
Networking
Security
10 out of 60
Azure Automation and Infrastructure as Code 2 Days AssesmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+3
Applicable to:
Migration
Networking
Security
11 out of 60
Azure Files and Files Sync Services 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+3
Applicable to:
Networking
Security
Storage
12 out of 60
Azure Sentinel 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Sentinel and configure it together according to Microsoft’s best practices conformed to your environment.
+2
Applicable to:
Identity
Security
13 out of 60
Azure Monitoring 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Monitoring and configure it together according to Microsoft’s best practices conformed to your environment.
+3
Applicable to:
Networking
Security
Storage
14 out of 60
Azure Firewall 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Firewall and configure it together according to Microsoft’s best practices conformed to your environment.
+3
Applicable to:
Disaster Recovery
Identity
Security
15 out of 60
Azure AD B2C 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+2
Applicable to:
Identity
Security
16 out of 60
Azure Key Vault 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure key Vault and configure it together according to Microsoft’s best practices conformed to your environment.
+3
Applicable to:
DevOps
Identity
Security
17 out of 60
Azure DevOps 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure DevOps and configure it together according to Microsoft’s best practices conformed to your environment.
+3
Applicable to:
DevOps
Networking
Security
18 out of 60
Azure Security 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Security and configure it together according to Microsoft’s best practices conformed to your environment.
+3
Applicable to:
Disaster Recovery
Identity
Security
19 out of 60
Azure Active Directory 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Active Directory and configure it together according to Microsoft’s best practices conformed to your environment.
+2
Applicable to:
Identity
Security
20 out of 60
Azure key Vault 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+2
Applicable to:
DevOps
Security
21 out of 60
Azure Active Directory B2C 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Active Directory B2C and configure it together according to Microsoft’s best practices conformed to your environment.
+2
Applicable to:
Identity
Security
22 out of 60
Azure Networking 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+2
Applicable to:
Networking
Security
23 out of 60
Azure Kubernetes Service (AKS) 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment
+3
Applicable to:
App Modernization
DevOps
Security
24 out of 60
Azure Back Up 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+3
Applicable to:
Backup
Disaster Recovery
Security
25 out of 60
Azure Sentinel 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+3
Applicable to:
Disaster Recovery
Identity
Security
26 out of 60
Azure Monitoring 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+3
Applicable to:
Networking
Security
Storage
27 out of 60
Azure Security 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment
+3
Applicable to:
Data Platform
Identity
Security
28 out of 60
Azure Active Directory 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+2
Applicable to:
Identity
Security
29 out of 60
Azure Security 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure Security with a professional Solution Architect.
+3
Applicable to:
Disaster Recovery
Identity
Security
30 out of 60
Azure Active Directory (Azure AD) 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure AD with a professional Solution Architect
+2
Applicable to:
Identity
Security
31 out of 60
Azure Firewall 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure Firewall with a professional Solution Architect.
+3
Applicable to:
Disaster Recovery
Identity
Security
32 out of 60
Azure Active Directory B2C (Azure AD B2C) 2 Hours BriefingDirect Expertsn the current briefing you get 2 hours review of Azure AD B2C with a professional Solution Architect.
+2
Applicable to:
Identity
Security
33 out of 60
Azure key Vault 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure key Vault with a professional Solution Architect.
+3
Applicable to:
DevOps
Identity
Security
34 out of 60
Azure Sentinel 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure Sentinel with a professional Solution Architect.
+3
Applicable to:
Backup
Identity
Security
35 out of 60
Azure Monitoring 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure Monitoring with a professional Solution Architect
+3
Applicable to:
Analytics
Networking
Security
36 out of 60
SAP Enterprise Threat Detection & ProtectionJohn Keells Information Technology Pvt LtdSAP Systems usually process and store sensitive & highly critical data. Therefore, to increase overall protection for SAP ERP data from cyber threats, "Sentinel Solution for SAP" is essential.
+2
Applicable to:
Security
Storage
37 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
38 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
39 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
40 out of 60
Azure Core ServicesNTT LimitedEnjoy end-to-end management of your Azure infrastructure with NTT's Azure Core Services.
+2
Applicable to:
App Modernization
Security
41 out of 60
Modern workplace Active DirectorySii Sp. z o.o.Modern workplace Active Directory implementation, migration and support
+2
Applicable to:
Identity
Security
42 out of 60
IntraSenz - Digitally Next Employee Engagement with Microsoft Viva ConnectionTOTAL EBIZ SOLUTIONS PTE. LTD.Fast Track Employee Engagement Experience Using IntraSenz on Viva Connection in 30 Days.
+3
Applicable to:
Migration
Security
Storage
43 out of 60
Enterprise - Zero Trust Strategy & Journey MapJohn Keells Information Technology Pvt LtdOrganizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid & multi-cloud workplace, and ensures cyber security assurance.
+2
Applicable to:
Identity
Security
44 out of 60
Teams Solution for FLW in Manufacturing :2 Wk Proof of ConceptC3IT Software Solutions Pvt. Ltd.A Repository of Processes Pre-built for Microsoft Teams for Frontline workers and Supervisors in Manufacturing
+3
Applicable to:
Data Platform
Security
Storage
45 out of 60
Teams Solution for Retail FLW Workforce: 2 Wk Proof of ConceptsC3IT Software Solutions Pvt. Ltd.A Repository of Processes Pre-built for Microsoft Teams for Frontline workers and Supervisors in Retail
+3
Applicable to:
Data Platform
Security
Storage
46 out of 60
Detection & Response Services (MXDR)Cloud LifeCloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
+3
Applicable to:
AI & Machine Learning
Identity
Security
47 out of 60
Sentinel-as-a-ServiceCloud LifeCloud Life delivers an innovative cloud-based AI and ML-enhanced Sentinel-as-a-Service, empowering your team with managed SIEM/SOAR capabilities using optimum Microsoft MXDR Services
+3
Applicable to:
AI & Machine Learning
Identity
Security
48 out of 60
BlueVoyant Security DiagnosticsBlueVoyantBlueVoyant experts review an organization's Azure and Microsoft 365 Defender Security Portal to identify potential vulnerabilities and provide actionable recommendations.
+1
Applicable to:
Security
49 out of 60
DXC Azure VMware SolutionDXCUnlock innovation and gain a competitive edge with the powerhouse Azure VMware Solution, moving your workloads to a more secure and scalable cloud infrastructure.
+2
Applicable to:
Migration
Security
50 out of 60
IN - Active Directory Risk Assessment with Crowd strikeCrayonUnderstand your Microsoft Azure AD Risk with quick assessment without paying any cost.
+1
Applicable to:
Security
51 out of 60
Data Protection implementationSii Sp. z o.o.Protection of confidential organizational data using Microsoft Purview Information Protection and Microsoft Purview Data Lost Prevention
+1
Applicable to:
Security
52 out of 60
Brillio Open Banking SolutionBrillioA robust, scalable, and secure solution that is designed to address the ever-evolving regulatory landscape and empower financial institutions to stay ahead in this new era of banking.
+3
Applicable to:
Data Platform
Identity
Security
53 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
54 out of 60
Fortifying SDLC on Azure with Defender for DevOps: 3-Wks Consulting AssessmentWipro LtdDiscover and evaluate the application security risk posture on Azure with Wipro's Application Security framework leveraging Defender for DevOps
+2
Applicable to:
DevOps
Security
55 out of 60
Sentinel OptimizationLotus Beta AnalyticsThis service is designed to assist organizations trying to optimize their Azure Sentinel, enabling them to harness the unique advantages of this advanced security solution.
+1
Applicable to:
Security
56 out of 60
Azure Chat Bot with OpenAIreadymindDeploy your Private Azure Bot with OpenAI & ChatGPT in 3 days
+3
Applicable to:
App Modernization
AI & Machine Learning
Security
57 out of 60
Quorum Cyber - Tactical MDRQuorum CyberQuorum Cyber's Tactical Managed Detection & Response Service using Microsoft Sentinel
+1
Applicable to:
Security
58 out of 60
Microsoft Sentinel DeploymentBlazeClan Technologies Pvt. LtdBlazeclan offers Microsoft Sentinel deployment, integration, configuration and optimization in the customer's environment seamlessly.
+3
Applicable to:
Identity
Networking
Security
59 out of 60
Migration to AzureBlazeClan Technologies Pvt. LtdAchieving a successful migration is a cornerstone of achieving success. Success in transitioning to the cloud necessitates comprehensive planning and in-depth analysis. Migrating intricate systems to
+3
Applicable to:
Migration
Networking
Security
60 out of 60