提供意見反應
Help & support
已儲存項目
私人方案
請稍候,正在登入...
篩選全部清除

  • 您的地點
  • 產品 (1)
    • Azure (1)
      • AI & Machine Learning
      • 分析
      • App Modernization
      • Archive
      • Backup
      • Big Data
      • Data Platform
      • DevOps
      • Disaster Recovery
      • Identity
      • Internet of Things
      • Migration
      • Networking
      • Security
      • Storage
    • Dynamics 365
    • Microsoft 365
    • Power Platform
  • 產業 (1)
    • 國防與情報
    • 發佈
    • 教育
    • 能源與資源
    • 金融服務
    • 政府機關
    • 醫療保健
    • 餐旅與旅遊
    • 製造業和移動產業
      • 製造業
      • 移動產業
    • 非營利組織
    • 專業服務
    • 零售與消費性商品
    • 永續發展性
    • 電信業與媒體
  • 服務類型
  • 計價模式

Professional Services 個結果

在 professional services 中顯示 個結果。
Cloud Security Approach: 2-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Through the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
1 out of 60
ADP to Active Directory - 1 Week ImplementationCovenant Technology Partners
+1
Applicable to:
identity product iconIdentity
Integrate ADP to Active Directory to automate employee onboarding within your organization.
2 out of 60
Secure SAP on Azure : 2-Hrs BriefingTCS - Security
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
2 Hrs briefing on TCS Managed Security services offering leveraging contextual and pre-integrated solution for protecting SAP ecosystem on Azure
3 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Evolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
4 out of 60
Cloud Security Posture: 2-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
5 out of 60
Cloud Security Deployment: 4-months ImplementationPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
Implementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
6 out of 60
Cloud Security Compliance: 4-months AssessmentPyxis
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
7 out of 60
Microsoft Sentinel Consulting Services: 12-Months ImplementationForsyte IT Solutions
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Microsoft Sentinel consulting services are designed to get you up and running quickly to maximize your return on investment in Microsoft's advanced security technologies.
8 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield Ltd
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Spartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
9 out of 60
IGA and Zero Trust with Microsoft Entra ID and Saviynt: ImplementationOxford Computer Group LLC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Oxford Computer Group, Saviynt, and Microsoft's Identity Governance & Administration (IGA) solution propels enterprise organizations toward Zero Trust security.
10 out of 60
SC-100T00: Microsoft Cybersecurity Architect: 4 Days WorkshopNETCOM LEARNING
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
SC-100T00: Microsoft Cybersecurity Architect course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance
11 out of 60
Managed Desktop - 12 Month - Managed Service ImplementationCoretek Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Comprehensive Managed Desktop Solution Leveraging Microsoft AVD & Windows 365
12 out of 60
CoreDefend Managed XDR Microsoft Security SolutionCoretek Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
A Comprehensive Managed XDR Security Solution Using Microsoft Security Tools to Improve Security Posture
13 out of 60
IBM Threat Management with Microsoft’s SAP Threat Monitoring Solution for Microsoft AzureIBM Security Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Consulting and managed security services from IBM Security supporting Microsoft Defender, Azure Sentinel, and the SAP Threat Monitoring solution for Sentinel
14 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies Services
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Delivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
15 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.ai
+1
Applicable to:
identity product iconIdentity
Implementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
16 out of 60
Next Generation SOC: 4Wk ImplementationCOEM
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Servicios profesionales de seguridad para proteger la Infraestructura, redes y aplicaciones, fomentando el consumo de Azure a través de los diferentes conectores y la retención de la información.
17 out of 60
Sentinel: 3-Day WorkshopBridewell Consulting Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Mitigate threats, and work with Bridewell's leading cloud security specialists to develop a roadmap to drive improvements in your Sentinel deployment.
18 out of 60
HCLTech Unified Digital AccessHCL America Inc_HCLT
+1
Applicable to:
identity product iconIdentity
HCLTech’s Unified Digital Access solution protects enterprise users and apps from cybersecurity attacks by aiding with right enterprise security posture with easy access to Apps and services.
19 out of 60
Virtusa’s Hybrid Cloud Management using Azure Arc: 5 Weeks Pilot ImplementationVIRTUSA LTD
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Virtua’s Hybrid Cloud Management uses Azure Arc to build a strategy for addressing organization-wide hybrid cloud complexity
20 out of 60
Virtusa's Zero Trust Security Assessment for Azure Cloud:4-Weeks AssessmentVIRTUSA LTD
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Virtusa's Zero Trust Security assessment uses the zero-trust model to enable best-practice controls for you to safeguard data. confidentiality, integrity, and availability.
21 out of 60
Accelerating Cloud Virtual Desktops: 2-Hour WorkshopSlalom Consulting
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationnetworking product iconNetworking
This Free Workshop will introduce you to how Azure Virtual Desktops help you embrace a remote workforce while maintaining control through secure workstation experiences on any device.
22 out of 60
Azure Governance & Platform: ImplementationConcurrency, Inc.
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Build a secure, scalable foundation for cloud adoption with Azure Landing Zones and governance best practices
23 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Our offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
24 out of 60
Security and Compliance: 3 Week Proof of ConceptAVASOFT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Our well-defined scope engagement will help you kick start your Security and Compliance operations based on Azure.
25 out of 60
Microsoft Azure Security: 2 - Week AssessmentAVASOFT
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
AVASOFT provides state-of-art Microsoft Azure security assessments for future-ready enterprises.
26 out of 60
Hybrid Identity & Access Management: 8 - Week ImplementationAVASOFT
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
The goal of the project is to strategize and implement an Identity and Access Management solution based on Microsoft Identity Manager (MIM) 2016 and Azure Active Directory.
27 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private Limited
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
We help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
28 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private Limited
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
We help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
29 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Technology Holding
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
Get a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
30 out of 60
skillup_consulting_openedx_v1Flexible Road LLC
+3
Applicable to:
backup product iconBackupidentity product iconIdentitystorage product iconStorage
Open edX Learning Management System with Azure.
31 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam France
+2
Applicable to:
identity product iconIdentitynetworking product iconNetworking
Secure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
32 out of 60
Azure Sentinel 5 hours Online WorkshopCLOUD SERVICES
+3
Applicable to:
disaster-recovery product iconDisaster Recoveryidentity product iconIdentitysecurity product iconSecurity
This 5-hour workshop contains theoretic and practical parts. It is designed to help you to start working with Azure Sentinel
33 out of 60
Azure Active Directory Migration: 3-Wk AssessmentiC Consult Gesellschaft für Systemintegration und Kommunikation mbH
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
This offer is ideal for customers that want to consolidate grown Identity and Access Management/MFA solutions to reach a best of breed approach for Azure AD infrastructure and Azure AD principles.
34 out of 60
SAP SuccessFactors and Microsoft Entra ID Integration: 6-wk ImplementationOxford Computer Group LLC
+1
Applicable to:
identity product iconIdentity
Enable User Lifecycle Management by integrating SAP SuccessFactors and Microsoft Entra ID.
35 out of 60
Assesment Azure Base4Base4 Security Chile SPA
+3
Applicable to:
analytics product iconAnalyticsidentity product iconIdentitysecurity product iconSecurity
The Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
36 out of 60
Microsoft Security License Utilisation & Commercial Assessment: 2-Week AssessmentBridewell Consulting Limited
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Provide an overview of organisations current licensing position, identify what security Microsoft products could be utilised & build an adoption framework
37 out of 60
Azure Security Accelerator SuiteNeudesic
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Mitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
38 out of 60
Managed Services for Microsoft EntraDXC
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Advisory and Managed Services for Microsoft Entra
39 out of 60
Microsoft Certification Exam Preparation: 8 Hours WorkshopNETCOM LEARNING
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationstorage product iconStorage
This session helps prepare your teams to pass the Microsoft Certification exams.
40 out of 60
Security Discovery: 4-Wk AssessmentProServeIT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
A security discovery & assessment will provide a new understanding of cyber threat trends & let you know where to start. Ensure your business continuity, protect your reputation & instill trust.
41 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARS
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitymigration product iconMigration
ALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
42 out of 60
Security Level Up: 4-Wk ImplementationProServeIT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Build your security baseline environment and level it up with the appropriate Microsoft cybersecurity technologies. Ensure your business continuity even after a cyberattack & protect your reputation.
43 out of 60
Spyglass Cloud Security: 6-week AssessmentQuisitive
+3
Applicable to:
identity product iconIdentitysecurity product iconSecuritystorage product iconStorage
The Spyglass Cloud Security Assessment is a complete evaluation of your organization’s cloud security posture centered around identity, data, devices, applications, and access.
44 out of 60
Security Managed Services Consulting: 12-Month ImplementationProServeIT
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Enhance your cybersecurity baseline & take it to a higher standard with appropriate Microsoft cybersecurity technologies. Proactive measures & regular audits will ensure business continuity.
45 out of 60
Azure Security: 3-week AssessmentQuisitive
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitysecurity product iconSecurity
A Quisitive Azure Security Assessment offers actionable insight about your cloud security posture, with peace of mind for how your Azure deployment can be made more safe and secure.
46 out of 60
Microsoft Sentinel Quick Start: 6-week ImplementationQuisitive
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Get ahead with the next generation solution for Security Information and Event Management (SIEM) and Security Orchestration and Automated Remediation (SOAR) with our Microsoft Sentinel Quick Start.
47 out of 60
Onesec 7x24 Managed Security Operation ServicesSecure Nextgen Systems
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Takes care of your organization using the full artificial intelligence and machine learning power of Microsoft Sentinel to detect potential threats that can cause a significant loss
48 out of 60
Azure Data Modernization: 4-Hour WorkshopIvision, Inc.
+3
Applicable to:
analytics product iconAnalyticsdata-platform product iconData Platformidentity product iconIdentity
In this 4-hour workshop designed for data professionals, our data and BI experts will guide your team though a tailored, interactive exploration to put you on the path to data management success.
49 out of 60
CloudPOS: 4-Week ImplementationMediasoft Data Systems Limited
+3
Applicable to:
analytics product iconAnalyticsarchive product iconArchiveidentity product iconIdentity
The all-in-one cloud-based point-of-sale solution. Boost efficiency, streamline operations, and enhance the customer experience with the user-friendly, secure, and fast software solutions.
50 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
app-modernization product iconApp Modernizationidentity product iconIdentitystorage product iconStorage
DotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
51 out of 60
Red Canary Microsoft Sentinel WorkshopRed Canary
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Get an overview of Microsoft Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments with a Microsoft Sentinel Workshop.
52 out of 60
Azure Health CheckIvision, Inc.
+3
Applicable to:
backup product iconBackupidentity product iconIdentitynetworking product iconNetworking
Azure Health Check
53 out of 60
Implementation of Cloud Endpoints using Microsoft IntuneConcurrency, Inc.
+2
Applicable to:
identity product iconIdentitysecurity product iconSecurity
Modernize endpoint management and security with Microsoft Intune
54 out of 60
Security as a Service: 3-Wk ImplementationA3Cloud Solutions
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Improve your security of your solutions and infrastructures in Azure Cloud.
55 out of 60
Azure Security Essentials: 3-Wk ImplementationAgile IT
+3
Applicable to:
identity product iconIdentitynetworking product iconNetworkingsecurity product iconSecurity
Onboarding Azure for Security and Compliance (Essentials) seeks to reduce the mean time to detection by consolidating logging, analytics, detection, and response into a single cohesive solution
56 out of 60
Mergers, Acquisitions, and Divestitures (MAD)Concurrency, Inc.
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Concurrency helps clients that are divesting, acquiring, or merging companies or divisions. Confidently navigate IT transitions with a proven, user-first approach.
57 out of 60
Azure Penetration TestMazzy Technologies Corp.
+3
Applicable to:
data-platform product iconData Platformidentity product iconIdentitysecurity product iconSecurity
This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
58 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTD
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Azure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
59 out of 60
Microsoft Intune - Initial Setup for Windows devices: 2-Wk Consulting ServiceIT Partner LLC
+3
Applicable to:
identity product iconIdentitymigration product iconMigrationsecurity product iconSecurity
Comprehensive support to customers in their journey of leveraging Microsoft Azure, particularly in getting started with or expanding their utilization of the platform.
60 out of 60
  • 1
  • 2
  • 3
  • 4
  • 5
  • 下一頁
關於 Marketplace
  • 為什麼選擇 Microsoft Marketplace
  • 部落格
  • 客戶案例
適用於客戶
  • 辦公時間
  • 使用者入門指南
  • 技術文件
  • 私人供應項目
  • Microsoft Azure 使用量承諾
  • 計費與發票開立
就合作夥伴而言
  • 成為合作夥伴
  • 列入清單
  • 取得行銷支援
  • 技術文件
  • 建置、發佈和銷售的逐步指導
  • 符合共同銷售資格
  • 合作夥伴的 Marketplace 社群
  • 以通路為導向的 Marketplace 銷售
  • 頻道合作夥伴的多方私人供應項目
商務
  • Microsoft Cloud
  • Microsoft 安全性
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
公司
  • 人才招募
  • 公司新聞
  • Microsoft 隱私權
  • 投資者
  • 永續性
中文(台灣) 您的隱私權選擇退出圖示 您的隱私選擇 消費者健康情況隱私權
  • 網站地圖
  • Contact Us
  • 隱私權與 Cookie
  • 使用條款
  • 商標
  • 關於我們的廣告
  • 管理 Cookie
  • © Microsoft 2025