FiltersClear all
Professional Services results
Showing results in professional services.
Crayon Desktop Anywhere: 1 week assesmentCrayonEase of access to a virtualized desktop - available on-demand anytime, anywhere and on any device
+3
Applicable to:
Identity
Migration
Security
1 out of 60
Windows Virtual Desktop: 1-Week Proof of ConceptALPHA DATA P.J.S.CDeploying Windows Virtual Desktop Environment as a Proof of Concept
+3
Applicable to:
Identity
Networking
Security
2 out of 60
Secure External Identities: AD B2C 1-Hr BriefingCondatis Group LimitedCondatis will help you understand the benefits of Azure AD B2C, how B2C helps connect you with customers, citizens and other external identities to build trusted digital relationships.
+1
Applicable to:
Identity
3 out of 60
AVD/Windows 365 Plan for Success: 3-d AssessmentCubesys Pty Ltd Understand what you need to successfully deploy Azure Virtual Desktop (AVD) and Windows 365. In our unique assessment we will provide budget guidance, evaluate your readiness and build a tailored plan
+3
Applicable to:
Identity
Migration
Security
4 out of 60
Avanade Multi-Cloud SecurityAvanade, Inc.With Avanade's Multi-Cloud Security offering, you can confidently embrace the cloud while maintaining a strong security posture.
+3
Applicable to:
Identity
Networking
Security
5 out of 60
Citrix Desktop on Azure: 2-Wk ImplementationUni Systems S.M.S.A.Uni Systems can provide you with simple virtual client services on Azure infrastructure.
+3
Applicable to:
App Modernization
Identity
Security
6 out of 60
ACE Enterprise Foundation - 12Wk ImplementationDevoteam Cloudify ASThe ACE Enterprise Foundation is an accelerator for organizations that wish to deploy a Azure Foundation fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework in weeks
+2
Applicable to:
Identity
Networking
7 out of 60
Zero-trust Workplace Security: 2wk ImplementationAdfolksSecurity, Governance & Operational Insights in the Modern Workplace Implementation in 2 business weeks
+3
Applicable to:
Analytics
Identity
Security
8 out of 60
Microsoft Azure Security: 5-Week ImplementationTeklink International, Inc.Let our Cloud Security Experts deploy your Cloud Security Framework to optimize Threat Prevention, provide Resilience, and Compliance.
Center for your Microsoft Azure systems.
+3
Applicable to:
Analytics
Identity
Security
9 out of 60
Cybersecurity Solution Assessment: 2-Wk AssessmentWaterleaf Digital DWC-LLCWDigital aims to identify security concerns to ensure correct adherence to best practices
+3
Applicable to:
AI & Machine Learning
Identity
Security
10 out of 60
Deployment Ready in WVD Native - ImplementationUni Systems S.M.S.A.Deploy and scale your Windows desktops and apps on Azure in minutes, and get built-in security and compliance features
+3
Applicable to:
Identity
Migration
Security
11 out of 60
wSOC: 6-week implementationWragby Business Solutions & Technologies LimitedThe Wragby Security Operations Center( wSOC) is a suite of modern and intelligent security solutions built on the Microsoft platform to better secure remote workers.
+2
Applicable to:
Identity
Security
12 out of 60
Windows Virtual Desktop: 1-Day AssessmentDigiTechWindows Virtual Desktop Assessment includes comprehensive pre-implementation assessment for WVD requirements and your business needs
+3
Applicable to:
Identity
Migration
Storage
13 out of 60
WA Azure Framework Review: 4h AssessmentNubego LimitednubeGo reviews your workload status to draw a comparison against the latest Azure architectural best practices.
+3
Applicable to:
DevOps
Identity
Security
14 out of 60
Vinca_Cloud Readiness AssessmentVinca Cybertech Pvt LtdMany customers are inclined to adopt cloud but lack realistic and feasible guidelines to make it effective and efficient migration. It includes current Infrastructure, Process, Tools and Human efforts
+3
Applicable to:
Identity
Migration
Security
15 out of 60
Web Applications Modernization 1-day AssessmentSela Group (HQ)Web Application Modernization Consultancy is a professional consultancy service for cloud transition without disturbing business continuity.
+3
Applicable to:
App Modernization
DevOps
Identity
16 out of 60
Managed Security Services- 1 Week AssessmentCloud4C Services Pvt LtdAvail Cloud4C’s in-depth cybersecurity assessment services to track organizational risk loopholes and vulnerabilities and develop a fail-proof blueprint for Risk Management.
+2
Applicable to:
Identity
Security
17 out of 60
COMPASS-Cloud Security Assessment: 4-Wk AssessmentTech Mahindra LimitedThe Cloud Security Assessment Solution provides a comprehensive approach in evaluation of pre migration security landscape, roadmap for secure implementation of target security landscape.
+3
Applicable to:
Identity
Networking
Security
18 out of 60
Cryptographic Risk AssessmentEntrustGet an assessment of the cryptographic health of your Microsoft environment: Azure, ADCS, InTune, Windows
+2
Applicable to:
Identity
Security
19 out of 60
cubesys AVD & Windows 365 Managed ServicesCubesys Pty Ltd Australia's leading AVD & Windows 365 specialists now offer a unique managed service for your Cloud-based VDI. Built specifically to work alongside your existing IT team.
+3
Applicable to:
Identity
Migration
Security
20 out of 60
Azure Virtual Desktop: 5-Day Proof of ConceptYork Telecom CorpYorktel will provide a 5 day proof of concept for deploying Azure Virtual Desktops managed by Nerdio for Enterprise. The POC will demonstrate how to deploy and manage AVD.
+3
Applicable to:
Backup
Identity
Security
21 out of 60
Microsoft Azure Sentinel 4-Week WorkshopCloud4C Services Pte LtdA workshop allowing you to experience “Azure Sentinel” a combination of SIEM and SOAR solution powered by the built-in AI, analytics and automation with an ability to write the custom alerts
+3
Applicable to:
Identity
Migration
Security
22 out of 60
Microsoft Azure Assessment: 1-Day AssessmentZIAASZiAAS Azure assessment will help you review and build your Cloud strategy.
+3
Applicable to:
Identity
Networking
Security
23 out of 60
WVD Horizon Migration - 3 Weeks ImplementationGreeneris Sp. z o.o.Greeneris will help you implement the Windows Virtual Desktops environment along with the Horizon control and management system
+3
Applicable to:
Disaster Recovery
Identity
Migration
24 out of 60
Azure Security: 1-Week AssessmentForteventoWe will make sure that you have enabled most critical security settings and your Azure environment is properly protected against attacks.
+3
Applicable to:
Identity
Networking
Security
25 out of 60
Azure Landing Zone Design: 1-Week WorkshopLiveRoute FZ-LLCEngagement for designing Enterprise Scale (CAF and WAF compliant) landing zone design and high level plan as per your organizational structure and IT application needs.
+3
Applicable to:
Identity
Migration
Networking
26 out of 60
AVD & Windows 365: 2-Weeks ImplementationCubesys Pty Ltd Work with Australia's leading AVD & Windows 365 partner to implement your AVD & Windows 365 foundations. Whether you're replacing RDS or Citrix, or starting out on your VDI journey
+3
Applicable to:
Identity
Migration
Security
27 out of 60
Azure Security Assessment - 1 month assessmentSela Group (HQ)Improve your Azure security posture by reviewing and assessing your Azure operation. Receive top-notch action plan for improvements
+2
Applicable to:
Identity
Security
28 out of 60
IBM Fraud and Abuse Management System on AzureIBM-Alliance-GBS-DTT-Microsoft Partner-USA-NY-Armonk-6418595Our solution is deployed for several states, federal clients, and private companies, successfully detecting income tax fraud, benefits fraud, healthcare fraud, internal fraud and travel & expense frau
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
29 out of 60
Identity & Access Management using Microsoft Azure Active Directory: 12-Wk ImplementationPricewaterhousecoopers (Dubai)Design and configure a standalone or hybrid Azure AD solution to provide SSO, MFA and passwordless authentication across On-Premise and SaaS applications (including Office 365)
+2
Applicable to:
Identity
Security
30 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxisEvolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
+3
Applicable to:
Analytics
Identity
Security
31 out of 60
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
32 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
33 out of 60
Cloud Security Services: 12-months ImplementationPyxisWe audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
+3
Applicable to:
Analytics
Identity
Security
34 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield LtdSpartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
+3
Applicable to:
Identity
Migration
Security
35 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.aiImplementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
+1
Applicable to:
Identity
36 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Consulting LimitedOur offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
+3
Applicable to:
Identity
Security
Storage
37 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Consulting LimitedGet a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
+3
Applicable to:
Identity
Security
Storage
38 out of 60
Azure Virtual Desktop: 2-Wk ImplementationPetabytz IncStart experiencing the best kind of virtualization with Azure Virtual Desktop in minutes to enable remote work. Provides employees the same experience they would have on a local desktop.
+3
Applicable to:
Identity
Migration
Security
39 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam FranceSecure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
+2
Applicable to:
Identity
Networking
40 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
41 out of 60
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to:
App Modernization
Identity
42 out of 60
Managed Services for Microsoft EntraDXCAdvisory and Managed Services for Microsoft Entra
+2
Applicable to:
Identity
Security
43 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARSALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
+3
Applicable to:
App Modernization
Identity
Migration
44 out of 60
Azure Virtual Desktop 1-Day AssessmentREDINGTON GULF FZE - HQAssess and Design Azure Virtual Desktop Solution to get Organization Up and Running with AVD
+3
Applicable to:
Identity
Migration
Security
45 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
46 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
47 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
48 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
49 out of 60
Modern workplace Active DirectorySii Sp. z o.o.Modern workplace Active Directory implementation, migration and support
+2
Applicable to:
Identity
Security
50 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
51 out of 60
Windows 365 Cloud PC - 4Wk DeploymentBespin Global MEA, an e& enterprise CompanyWindows 365: Elevate Your Workforce Experience with Azure Cloud PC
+3
Applicable to:
Identity
Networking
Security
52 out of 60
Eviden's Application Strategy WorkshopEviden International France - SASEviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
+3
Applicable to:
App Modernization
Data Platform
Identity
53 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
54 out of 60
External IAM 5 day assessmentCondatis Group LimitedCondatis is offering an external Identity and Access Management (IAM) assessment focusing on how your organisation secures and manages external identities in your business context.
+2
Applicable to:
Identity
Security
55 out of 60
KloudIdentity: Application Onboarding to Entra made simple with our SCIM GatewayKloudyNet Technologies SDN BHDKloudIdentity is our proprietary SCIM Gateway to onboard LOB & Cloud applications (including non SCIM compliant), databases and other applications to Microsoft Entra for users and groups provisioning.
+2
Applicable to:
Identity
Security
56 out of 60
ALIANDO Managed Extended Detection and Response (MXDR)myCloudDoorALIANDO Managed Extended Detection & Response service (MXDR) powered by Sentinel and Defender
+3
Applicable to:
Identity
Networking
Security
57 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoorThis assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
+3
Applicable to:
Identity
Networking
Security
58 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoormyCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
+3
Applicable to:
Identity
Networking
Security
59 out of 60
Eviden Threat Protection 5-Wk WorkshopEviden International France - SASUtilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
+2
Applicable to:
Identity
Security
60 out of 60