FiltersClear all
Professional Services results
Showing results in professional services.
Calian Cybersecurity ProgramCalian Stay ahead with Calian’s Cybersecurity Program—safeguard data, maintain trust, and ensure continuity with assessments, IR plans, tabletop exercises , pentests, and full vulnerability management.
+3
Applicable to:
Backup
Identity
Security
1 out of 60
LBAN Azure Frontdoor ConfiguratorLotus Beta AnalyticsLBAN Azure Front Door Configurator simplifies the setup of secure, scalable global web traffic routing with custom domain, SSL, WAF, and load balancing configurations.
+3
Applicable to:
App Modernization
Networking
Security
2 out of 60
Cloud Penetration Test - CanadaCDWOur expert team conduct thorough penetration tests to identify vulnerabilities and potential threats in your cloud environment with Microsoft Azure
+3
Applicable to:
Backup
Data Platform
Security
3 out of 60
Servicios de Gestión Híbrida con Azure Arc y Microsoft DefenderGO TO CLOUD SASServicios profesionales de GoToCloud para habilitar Azure Arc y Defender, integrando gestión y seguridad en entornos híbridos y multicloud, con enfoque consultivo y ágil.
+2
Applicable to:
Migration
Security
4 out of 60
Cloud Security Microsoft Defender for CloudKyndryl Inc.Kyndryl / Microsoft Defender for Cloud deliver scalable, secure, and compliant cloud protection across hybrid and multi-cloud environments, addressing modern threats with deep insights and automation.
+3
Applicable to:
Backup
Disaster Recovery
Security
5 out of 60
Azure Cloud Security Optimization – Free 5-Day AssessmentITX360 (Pvt) Ltd.A 5-day expert-led Azure Security Assessment designed to evaluate your cloud environment, identify risks, and provide actionable recommendations for enhancing security and compliance—all at no cost
+1
Applicable to:
Security
6 out of 60
Cloud and On-Premise Architecture Design and Implementation Service上海诺未网络科技有限公司NovaTech offers flexible, secure, and efficient IT architecture solutions based on the Azure cloud to meet the full range of enterprise needs from cloud
+2
Applicable to:
Migration
Security
7 out of 60
Cloud Architecture Migration Service上海诺未网络科技有限公司NovaTech offers a one-stop cloud migration and modernization solution for enterprises, helping them reduce costs, improve efficiency, enhance secur
+3
Applicable to:
Identity
Migration
Security
8 out of 60
Invillia Platform Web DevelopmentInvillia Desenvolvimento de Produtos Digitais LTDAEnd-to-end digital solution development using GitHub Copilot to accelerate productivity, enable agile delivery, and ensure security aligned with strategic business goals.
+3
Applicable to:
App Modernization
DevOps
Security
9 out of 60
Invillia Software Architecture Definition and ExecutionInvillia Desenvolvimento de Produtos Digitais LTDAEnd-to-end software architecture focused on performance, security, and DevSecOps practices.
+3
Applicable to:
App Modernization
DevOps
Security
10 out of 60
Invillia Mobile DevelopmentInvillia Desenvolvimento de Produtos Digitais LTDADevelopment of high-performance mobile apps with advanced security, integrated payment systems, and intuitive UX/UI — powered by GitHub Copilot for faster, smarter deliveries.
+3
Applicable to:
App Modernization
DevOps
Security
11 out of 60
Invillia Secure Governable Data PlatformsInvillia Desenvolvimento de Produtos Digitais LTDASecure, scalable and governable data platform implementation, ensuring compliance, advanced analytics, and full data lifecycle control with Microsoft technologies.
+3
Applicable to:
Analytics
Data Platform
Security
12 out of 60
Azure Security Optimization: 5-Day AssessmentITX360 (Pvt) Ltd.Strengthen your Azure cloud security with ITX360’s 5-day expert assessment. Identify risks, evaluate configurations, and receive actionable recommendations aligned with Zero Trust.
+1
Applicable to:
Security
13 out of 60
Microsoft Purview Migration Accelerator - 1 Week Proof of Concept EngagementMAQ SoftwareTransform your data governance with our 1-Week Proof of Concept Pilot for Microsoft Purview to streamline data governance, enhance security, and ensure compliance.
+3
Applicable to:
Identity
Migration
Security
14 out of 60
Invillia DevSecOps ImplementationInvillia Desenvolvimento de Produtos Digitais LTDASoluções completas de DevSecOps que integram segurança desde o início do desenvolvimento, promovendo automação, compliance contínuo e resposta proativa a incidentes.
+3
Applicable to:
App Modernization
DevOps
Security
15 out of 60
Nimtech Cloud Journey Assessment - NetworkNimtechStart your Azure Cloud Journey with a comprehensive Cloud Adoption Framework (CAF) workshop, tailored to your network infrastructure needs
+2
Applicable to:
Networking
Security
16 out of 60
Software AuditSSA GroupSoftware Audit for custom Azure solutions of any type and complexity
+3
Applicable to:
App Modernization
Migration
Security
17 out of 60
Securing Your CI/CD Pipelines: 1 Month Implementation ProjectFuturice OyFuturice team of certified experts will secure your CI/CD pipelines with Azure DevOps and GitHub Advanced Security.
+2
Applicable to:
DevOps
Security
18 out of 60
Azure Well-Architected Assessment: 1 Month Assessment ProjectFuturice OyFuturice team of certified experts will conduct comprehensive Well-Architected assessment of your Azure workloads.
+3
Applicable to:
Data Platform
DevOps
Security
19 out of 60
Landing zone design and implementation: 3 Months Implementation ProjectFuturice OyFuturice team of certified experts will design and implement your Azure Landing Zone.
+3
Applicable to:
App Modernization
Networking
Security
20 out of 60
Quorum Cyber Security Maturity AssessmentQuorum CyberEvaluate your current cybersecurity posture, identify critical gaps and receive actionable insights tailored to your business needs - ensuring you are prepared, protected, and positioned
+1
Applicable to:
Security
21 out of 60
Quorum Cyber Microsoft Security Copilot - AI Integration SolutionsQuorum CyberEnable AI with Microsoft Security Copilot to enhance threat detection, streamline operations, and boost cybersecurity efficiency.
+1
Applicable to:
Security
22 out of 60
LBAN CloudSecure – Secured by Microsoft Defender for CloudLotus Beta AnalyticsLBAN CloudSecure delivers end-to-end Azure protection with Microsoft Defender for Cloud—boosting security, compliance, and visibility across your cloud workloads.
+2
Applicable to:
Identity
Security
23 out of 60
Windows in Cloud AssessmentTask Systems LimitedUnlock Azure Virtual Desktop Success: Expert-Led WVD Assessment & Migration Blueprint
+3
Applicable to:
Identity
Migration
Security
24 out of 60
Blue Cycle WAF Implementation ServiceBlue Cycle LLCThis consulting service will design, test, and implement an Azure Web Application Firewall in front of One (1) Azure Application.
+3
Applicable to:
DevOps
Networking
Security
25 out of 60
Unlock the Full Potential of Microsoft Copilot with Governed DataCarbon60 Operating Co. LtdC60 Digital and Cyera empower your organization to establish a secure, trusted data foundation, enabling confident and responsible AI adoption that drives tangible business value.
+2
Applicable to:
Data Platform
Security
26 out of 60
IDProof+: High-Assurance Identity for Remote Users with Microsoft Entra Verified IDOxford Computer Group LLCRemote hiring is increasingly targeted by sophisticated scammers. How can you confidently verify the identity of remote candidates?
+2
Applicable to:
Identity
Security
27 out of 60
IBM Technology Expert Labs EXPERTISE CONNECT for QRadar Suite OfferingIBM SoftwareIBM Expertise Connect for QRadar Suite monthly subscription based, fixed priced, part number offering allows you to access a "just in time" technical consultant to advise and consult.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
28 out of 60
Microsoft Sentinel ConfigurationTechNet UC LLCTechNet UC is proud to offer a comprehensive configuration service for Microsoft Sentinel, designed to optimize your security operations and enhance threat detection capabilities.
+3
Applicable to:
Analytics
Disaster Recovery
Security
29 out of 60
Access Management AppExponential Digital Solutions Private LimitedA solution designed to automate the quarterly review of access privileges, ensuring seamless governance, improved efficiency, and enhanced security.
+3
Applicable to:
App Modernization
Identity
Security
30 out of 60
Identity Management AssessmentTTEC DigitalStrengthen security and streamline access across your organization with modern identity solutions. Assess your identity environment and get a modernization plan using Microsoft Entra ID, Conditional A
+2
Applicable to:
Identity
Security
31 out of 60
Azure Landing Zone Health CheckTTEC DigitalAccelerate secure cloud adoption with a scalable foundation. Evaluate your Azure environment and receive a tailored Landing Zone blueprint aligned to Microsoft’s Cloud Adoption Framework.
+2
Applicable to:
Networking
Security
32 out of 60
Microsoft Entra Privileged Identity Management ConfigurationTechNet UC LLCConfigure Microsoft Entra PIM to enforce least privilege, enable just-in-time access, and reduce risk with real-time auditing, approval workflows, and Conditional Access integration.
+3
Applicable to:
Analytics
Identity
Security
33 out of 60
Amdocs Cloud Development Environment SolutionAmdocsReimagine DevX by using Amdocs Cloud Development Environment to securely provision any infrastructure, AI agent, OS, or IDE — from VMs to Kubernetes, Jupyter to VS Code.
+3
Applicable to:
DevOps
Migration
Security
34 out of 60
Microsoft Copilot for Security Workshop by OnevinnOnevinn ABIn this expert-led workshop, you’ll learn how to use generative AI to strengthen your security posture, empower your security teams, and make data-driven decisions faster.
+3
Applicable to:
AI & Machine Learning
Identity
Security
35 out of 60
Modern DevOps with GitHub On AzureInfoMagnus LLC Adopt Modern DevOps with GitHub on Azure—streamline CI/CD, enhance security, and accelerate releases with tailored strategies, expert guidance, and ongoing transformation support.
+3
Applicable to:
DevOps
Migration
Security
36 out of 60
GitHub Advanced Security (GHAS) Suite of Services.InfoMagnus LLC End-to-end GitHub Advanced Security services: POC, POV, Azure DevOps integration, and tailored adoption. Protect your code, ensure compliance, and embed security into DevOps workflows.
+3
Applicable to:
DevOps
Migration
Security
37 out of 60
GitHub Migration WorkshopInfoMagnus LLC A 3-day, hands-on GitHub Migration Workshop equipping teams with strategies, tools, and repeatable processes for seamless VCS-to-Git transitions. Offers post-workshop office hours for ongoing support.
+3
Applicable to:
DevOps
Migration
Security
38 out of 60
GitHub API TrainingInfoMagnus LLC In this hands-on training, participants learn to use the GitHub REST and GraphQL APIs, Octokit, and webhooks to create integrations that automate and enhance Microsoft Azure-based DevOps pipelines.
+3
Applicable to:
DevOps
Migration
Security
39 out of 60
GitHub Advisory ServicesInfoMagnus LLC On-demand GitHub advisory to optimize Azure-integrated DevOps workflows aligning strategy, security, and collaboration to extend Microsoft cloud adoption and value.
+3
Applicable to:
DevOps
Migration
Security
40 out of 60
GitHub for DevelopersInfoMagnus LLC In this two-day, instructor-led workshop, developers learn to use Git and GitHub for building, collaborating, and managing code in Azure-based workflows.
+3
Applicable to:
DevOps
Migration
Security
41 out of 60
Data Security & DLP Workshop: 1-Day Strategic WorkshopAtmoseraIdentify sensitive data risks and strengthen protection with a Microsoft Purview-led workshop.
+3
Applicable to:
Data Platform
Disaster Recovery
Security
42 out of 60
Github Actions TrainingInfoMagnus LLC In this workshop, participants learn how to use GitHub Actions to automate build, test, and deployment pipelines for Microsoft Azure environments.
+3
Applicable to:
DevOps
Migration
Security
43 out of 60
Azure Migration Jumpstart: 1-Week Strategic WorkshopAtmoseraNo-cost AVS migration to validate Azure value and accelerate cloud modernization.
+2
Applicable to:
Migration
Security
44 out of 60
Cloud Security Posture ManagementTELEPERFORMANCECloud Security Posture Management (CSPM) aims to continuously monitor, assess, and improve the security configuration of cloud environments to prevent breaches, ensure compliance, and reduce risk.
+2
Applicable to:
Identity
Security
45 out of 60
Secure Automation with Azure DevOps & GitHubBDOTransform the way you manage your digital estate & application workloads with automation powered by Azure DevOps & GitHub
+3
Applicable to:
App Modernization
DevOps
Security
46 out of 60
Entra ID AssessmentTechNet UC LLCAssess your Entra ID tenant for security, governance, and compliance. Receive expert insights and actionable recommendations to strengthen identity posture and align with Microsoft best practices.
+3
Applicable to:
App Modernization
Identity
Security
47 out of 60
Modernize Your Legacy Software with AIiFour Technolab Private LimitedIn this session we will explore how intelligence automation, predictive analytics and conversational AI can breathe new life into your software and create a practical future ready modernization plan.
+3
Applicable to:
AI & Machine Learning
Migration
Security
48 out of 60
Comprehensive IT Security AssessmentiLink Systems, Inc.Assess and strengthen your organization's security posture by uncovering vulnerabilities, mitigating risks, and building resilience against evolving cyber threats across cloud and hybrid environments.
+1
Applicable to:
Security
49 out of 60
AI Chatbot for Patient Support – 2-Week MVP BuildiFour Technolab Private LimitedIn just 2 weeks, we’ll help you launch a secure, HIPAA-compliant chatbot that’s simple, smart, and built for growth.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
50 out of 60
Azure & Microsoft 365 Licensing Audit - 2-Hour Cost Optimization ReviewiFour Technolab Private LimitedOur 2-Hour Azure and Microsoft 365 Licensing Audit is designed to quickly uncover hidden savings, optimize your license usage and make your setup aligns with compliance needs.
+3
Applicable to:
Analytics
Migration
Security
51 out of 60
NIS2 Rapid Readiness Check for AzureFuture Processing S.A.Free, one-day Azure security assessment for NIS2 compliance. Identify IAM, storage, and network risks with expert recommendations from Future Processing cybersecurity specialists.
+3
Applicable to:
App Modernization
Disaster Recovery
Security
52 out of 60
Ctelecoms Secure Multi-Cloud Environments WorkshopConsolidated Telecoms (Ctelecoms)Secure Multi-Cloud Environments Workshop to gain insights on active threats and vulnerabilities related to our hybrid and multi-cloud workloads by using Microsoft Defender for Cloud.
+2
Applicable to:
Networking
Security
53 out of 60
AI Ignition - (not MarketPlace transactable)OBT Live AI Ignition - Rapidly deploy secure and scalable AI solutions with measurable business impact in weeks
+3
Applicable to:
Analytics
AI & Machine Learning
Security
54 out of 60
LBA KubeXpress - Fast track AKS DeploymentLotus Beta AnalyticsLBA KubeXpress rapidly deploys secure, production-ready AKS clusters—accelerating your journey to containerized workloads on Azure.
+3
Applicable to:
App Modernization
DevOps
Security
55 out of 60
IBM Technology Expert Labs ADVISE Auatomation Hashicorp non-SaaS and SaaS Offerings CONTACT MEIBM SoftwareBM Technology Expert Labs ADVISE Hashicorp remotely delivered, no "hands on keyboard", comprehensive product-oriented professional services offerings for non-SaaS and SaaS products.
+2
Applicable to:
Disaster Recovery
Security
56 out of 60
Cloud4C Advanced Network Security and AccessCloud4C Services Pte LtdCloud4C’s Advanced Network Security and Access protects cloud perimeters with Azure Firewall, WAF, DDoS, Front Door, Bastion, and Zero Trust controls for secure, resilient, and compliant connectivity.
+3
Applicable to:
Identity
Networking
Security
57 out of 60
Cloud4C Microsoft Sentinel Enterprise DeploymentCloud4C Services Pte LtdCloud4C’s Microsoft Sentinel Enterprise Deployment accelerates SIEM adoption with structured rollout, customization, training, and optimization for enterprise-scale threat detection and response
+3
Applicable to:
Analytics
Migration
Security
58 out of 60
Cloud4C External Attack Surface Assessment (EASM + MDTI)Cloud4C Services Pte LtdCloud4C’s External Attack Surface Assessment uses Microsoft Defender EASM + MDTI to uncover shadow IT, misconfigurations, CVEs, and risks, delivering dashboards and remediation plans
+3
Applicable to:
Identity
Networking
Security
59 out of 60
Cloud4C Entra Governance & Compliance SuiteCloud4C Services Pte LtdCloud4C’s Entra Governance & Compliance Suite delivers identity governance, protection, and privileged access management with audit-ready workflows to strengthen compliance and reduce insider risks
+3
Applicable to:
Analytics
Identity
Security
60 out of 60