FiltersClear all
Professional Services results
Showing results in professional services.
Hybrid Cloud Security Workshop - 3 WeeksIngram Micro India Private LimitedThe engagement involves showcasing in customer’s production environment Azure defender features, discovering real threats to selected hybrid workloads, and analyzing security vulnerabilities.
+3
Applicable to:
Big Data
Identity
Security
1 out of 60
Alarm Guardian MXDR with Microsoft Sentinel: 5-Day ImplementationProServeITProServeIT’s Alarm Guardian MXDR cybersecurity solution incorporates Microsoft Sentinel to provide managed continuous threat detection, monitoring, and incident response with human expertise.
+3
Applicable to:
Identity
Internet of Things
Security
2 out of 60
Azure Cloud Adoption 4 - Week AssessmentAKAVEIL TECHNOLOGIES INCStrategic Assessment to Migration & Operation
+3
Applicable to:
Identity
Migration
Security
3 out of 60
Secure External Identities: AD B2C 1-Hr BriefingCondatis Group LimitedCondatis will help you understand the benefits of Azure AD B2C, how B2C helps connect you with customers, citizens and other external identities to build trusted digital relationships.
+1
Applicable to:
Identity
4 out of 60
AVD/Windows 365 Plan for Success: 3-d AssessmentCubesys Pty Ltd Understand what you need to successfully deploy Azure Virtual Desktop (AVD) and Windows 365. In our unique assessment we will provide budget guidance, evaluate your readiness and build a tailored plan
+3
Applicable to:
Identity
Migration
Security
5 out of 60
Identity Health Check: 3-Week AssessmentCondatis Group LimitedPackaged consultancy service to help a business analyse, plan and build a robust and modern identity solution with Azure AD.
+1
Applicable to:
Identity
6 out of 60
Azure Rights Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Rights Management in their production environment.
+3
Applicable to:
App Modernization
Identity
Security
7 out of 60
Azure Empowered Endpoint Mgmt- 2wk ImplementationSteeves Protect your organization’s critical network endpoints and devices against potential cyber threats and security breaches with Steeves and Associates’ EndPoint Management + Security Service.
+2
Applicable to:
Identity
Security
8 out of 60
Azure Identity Management: 2 Week Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see and utilize Azure Identity and Access Management in demo environment.
+2
Applicable to:
Identity
Security
9 out of 60
Azure Identity Management: 4 Weeks ImplementationCommunication Square LLC4 week Implementation is designed to help customers fully utilize Azure Identity and Access Management in their existing infrastructure and training.
+3
Applicable to:
Data Platform
Identity
Storage
10 out of 60
Endpoint Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Device and Application Management solution and train their IT team.
+2
Applicable to:
Identity
Security
11 out of 60
Remote Learning Solution: 1-Hour briefingCommunication Square LLC1 hour Briefing on Remote Learning Solution
+3
Applicable to:
Identity
Security
Storage
12 out of 60
Remote Learning Solution: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Teams based Remote Learning Solution in their existing infrastructure and trainings.
+3
Applicable to:
Identity
Security
Storage
13 out of 60
Remote Learning Solution: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to re-imagine how your institution approaches secure communication, compliance to industry defined standards and access to data is secure on Microsoft Teams.
+3
Applicable to:
Identity
Security
Storage
14 out of 60
Azure Virtual Desktop - 5-week ImplementationSpektra Systems LLCSpektra Systems offers premium consulting & implementation services for Microsoft Azure Virtual Desktop, We provide quality AVD solution with minimal cost, best in class security & productivity.
+3
Applicable to:
Identity
Migration
Storage
15 out of 60
Secure Virtual Desktop: 1 Week AssessmentOpstack IncA proven solution built to assess, plan and deliver a secure Remote Desktop solution, based on Microsoft WVD through a thoughtful assessment of your identity, network and compute infrastructure
+3
Applicable to:
Identity
Networking
Security
16 out of 60
Azure Migration and Remote Work: 10 Day AssessmentOpstack IncPurpose built to assess and deliver an environment assessment for Azure migration and secure remote work (WVD) through a thoughtful assessment of your identity, network and compute infrastructure.
+3
Applicable to:
Identity
Migration
Security
17 out of 60
Azure AD Connect: 2-Day ImplementationPetabytz IncIn this 2 day workshop we will teach you how to integrate your on-premises AD DS environment with Azure AD
+3
Applicable to:
Identity
Migration
Security
18 out of 60
Microsoft Entra ID Single Sign-On 2wk Pilot ImplementationOxford Computer Group LLCThis 2-week pilot implementation is designed to help customers understand and test Microsoft Entra ID Single Sign-On (SSO) by configuring SSO for 5 applications.
+2
Applicable to:
App Modernization
Identity
19 out of 60
Custom Microsoft Entra ID Identity Solutions: 4-wk ImpOxford Computer Group LLCEnterprise Identity Solutions (IAM, IGA, and Compliance) using Modern Authentication and Microsoft Entra ID and Microsoft Entra ID Governance
+2
Applicable to:
Identity
Security
20 out of 60
Microsoft Identity - 3 Day WorkshopAvalerisDevelop a strategic plan to protect identities while still giving users the freedom to work and collaborate with others.
+2
Applicable to:
Identity
Security
21 out of 60
Windows Virtual Desktop: 1-Day AssessmentDigiTechWindows Virtual Desktop Assessment includes comprehensive pre-implementation assessment for WVD requirements and your business needs
+3
Applicable to:
Identity
Migration
Storage
22 out of 60
Web Applications Modernization 1-day AssessmentSela Group (HQ)Web Application Modernization Consultancy is a professional consultancy service for cloud transition without disturbing business continuity.
+3
Applicable to:
App Modernization
DevOps
Identity
23 out of 60
Digital Trusted Identity Advisory: 2-week WorkshopNTT DATA Inc.Identity and Access Management (IAM) Azure AD Advisory 2-week Workshop helps determine how IAM can address key security challenges and enable your adaptive workforce as a dynamic workplace.
+2
Applicable to:
Identity
Security
24 out of 60
Azure AD B2C QuickStart: ImplementationOxford Computer Group LLCOCG's Basic, Basic+, Standard, and Standard+ implementation packages can help you start managing external identities with Azure Active Directory B2C.
+3
Applicable to:
App Modernization
Identity
Security
25 out of 60
Azure Multi-Cloud Security: 4 week ImplementationLixar ITFramework for a centralized view of your environment, regardless of location
+3
Applicable to:
Data Platform
Identity
Security
26 out of 60
Azure Secure Remote Worker : 3-Wk ImplementationNBConsult Holdings (PTY) LtdWindows Virtual Desktop delivers virtual desktops and apps seamlessly from Azure that can be accessed anywhere anytime and from any device.
+3
Applicable to:
Identity
Networking
Security
27 out of 60
Cloud Management (Managed Service)SoftchoiceModular services to simplify and streamline operating in the cloud
+3
Applicable to:
Backup
Identity
Security
28 out of 60
cubesys AVD & Windows 365 Managed ServicesCubesys Pty Ltd Australia's leading AVD & Windows 365 specialists now offer a unique managed service for your Cloud-based VDI. Built specifically to work alongside your existing IT team.
+3
Applicable to:
Identity
Migration
Security
29 out of 60
AVD & Windows 365: 2-Weeks ImplementationCubesys Pty Ltd Work with Australia's leading AVD & Windows 365 partner to implement your AVD & Windows 365 foundations. Whether you're replacing RDS or Citrix, or starting out on your VDI journey
+3
Applicable to:
Identity
Migration
Security
30 out of 60
Azure Sentinel and MDR Services :8-Wk ImpHappiest Minds Technologies LimitedEnd to end Azure Sentinel consulting, Engineering, PoC, Solution assessment, customer environment fitment, Implementation and Managed services leveraging our SOC 2.0 Framework
+3
Applicable to:
Identity
Networking
Security
31 out of 60
IAM Student Passport: 2-Hr BriefingCondatis Group LimitedOur Student Passport solution leverages decentralized identity technologies to offer education providers optimised student enrolment and movement.
+2
Applicable to:
Identity
Security
32 out of 60
Cloud Security Approach: 2-months AssessmentPyxisThrough the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
+3
Applicable to:
Analytics
Identity
Security
33 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxisEvolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
+3
Applicable to:
Analytics
Identity
Security
34 out of 60
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
35 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
36 out of 60
Cloud Security Compliance: 4-months AssessmentPyxisThe CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
+3
Applicable to:
Analytics
Identity
Security
37 out of 60
Cloud Security Services: 12-months ImplementationPyxisWe audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
+3
Applicable to:
Analytics
Identity
Security
38 out of 60
Privileged Identity Management JumpstartSteeves Understand and control privileged accounts with a simple to implement solution
+2
Applicable to:
Identity
Migration
39 out of 60
Azure Virtual Desktop: 2-Wk ImplementationPetabytz IncStart experiencing the best kind of virtualization with Azure Virtual Desktop in minutes to enable remote work. Provides employees the same experience they would have on a local desktop.
+3
Applicable to:
Identity
Migration
Security
40 out of 60
skillup_consulting_openedx_v1Flexible Road LLCOpen edX Learning Management System with Azure.
+3
Applicable to:
Backup
Identity
Storage
41 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
42 out of 60
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to:
App Modernization
Identity
43 out of 60
Assesment Azure Base4Base4 Security Chile SPAThe Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
+3
Applicable to:
Analytics
Identity
Security
44 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
45 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
46 out of 60
AD Domain Consolidation for Migration to Microsoft Entra ID: 6 wk ImpOxford Computer Group LLCGet started on your journey towards zero trust by consolidating your organization’s Active Directories for better visibility, efficiency, and security.
+3
Applicable to:
Identity
Migration
Security
47 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
48 out of 60
Credential Manager: 5-Day Implementation SolutionCreospark Consulting Services IncThis solution harnesses the capabilities of Dataverse, Power Apps, Power Automate, and Azure Key Vault technologies to redefine how organizations protect sensitive user credentials and information.
+3
Applicable to:
Backup
Identity
Security
49 out of 60
User Profile Manager: 5-Day Implementation SolutionCreospark Consulting Services IncThis solution offers users a window into their access privileges, allowing them to effortlessly navigate their information and files.
+2
Applicable to:
Archive
Identity
50 out of 60
Deploy Azure ResourcesESTI Consulting ServicesThis consulting engagement is targeted at new Azure clients. The key engagement deliverable is a secure, network-connected, and functional tenant on the Azure platform.
+3
Applicable to:
Identity
Networking
Security
51 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
52 out of 60
External IAM 5 day assessmentCondatis Group LimitedCondatis is offering an external Identity and Access Management (IAM) assessment focusing on how your organisation secures and manages external identities in your business context.
+2
Applicable to:
Identity
Security
53 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
54 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
56 out of 60
Migration vers AzureProjetlysBlue Soft Empower (ex-Projetlys) vous propose une démarche pour vous accompagner dans votre migration vers Azure
+3
Applicable to:
Identity
Migration
Security
57 out of 60
MIM Migration To Entra ID Assessment: 8-Wk AssessmentModern 42Microsoft Identity Manager Current state assessment and transition plan to Microsoft Entra ID
+2
Applicable to:
Identity
Security
58 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITEDOverwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
+2
Applicable to:
Identity
Security
59 out of 60
QServices AI-Powered SaaS AutomationQ SERVICES INCAI-powered SaaS platform for customer support, workflow automation, and efficiency boost.
+3
Applicable to:
App Modernization
AI & Machine Learning
Identity
60 out of 60