FiltersClear all
Professional Services results
Showing results in professional services.
Windows Virtual Desktop: 1-Day AssessmentDigiTechWindows Virtual Desktop Assessment includes comprehensive pre-implementation assessment for WVD requirements and your business needs
+3
Applicable to:
Identity
Migration
Storage
1 out of 60
WA Azure Framework Review: 4h AssessmentNubego LimitednubeGo reviews your workload status to draw a comparison against the latest Azure architectural best practices.
+3
Applicable to:
DevOps
Identity
Security
2 out of 60
vSecOps 3 Weeks AssessmentVIRTUSA LTDConduct Security assessment and deliver roadmap for implementation
+3
Applicable to:
Identity
Networking
Security
3 out of 60
Microsoft Entra ID Connect: 5-Day ImplementationMismo Systems Private LimitedBeing a Modern Workplace Solution Partner, we have the expertise & experience to help you with a smooth integration of your Local Active Directory to cloud-based Microsoft Entra ID for SSO
+3
Applicable to:
Identity
Migration
Security
4 out of 60
Vinca_Cloud Readiness AssessmentVinca Cybertech Pvt LtdMany customers are inclined to adopt cloud but lack realistic and feasible guidelines to make it effective and efficient migration. It includes current Infrastructure, Process, Tools and Human efforts
+3
Applicable to:
Identity
Migration
Security
5 out of 60
Web Applications Modernization 1-day AssessmentSela Group (HQ)Web Application Modernization Consultancy is a professional consultancy service for cloud transition without disturbing business continuity.
+3
Applicable to:
App Modernization
DevOps
Identity
6 out of 60
IBM Threat Management for Sentinel & Defender for Microsoft AzureIBM Security ServicesConsulting and managed security services supporting threat management solutions including Microsoft Azure Sentinel and Microsoft Defender
+2
Applicable to:
Identity
Security
7 out of 60
Secure Cloud Shield: 4-Wk ImplementationPricewaterhouseCoopers UKDesign and configure security controls for clients undergoing digital transformation using Microsoft Azure security services.
+3
Applicable to:
Identity
Internet of Things
Security
8 out of 60
PwC SOC Optimisation: 8-Wk ImplementationPricewaterhouseCoopers UKImprove your ability to detect and respond to cyber attacks using your Microsoft security solutions
+3
Applicable to:
Identity
Internet of Things
Security
9 out of 60
Digital Trusted Identity Advisory: 2-week WorkshopNTT DATA Inc.Identity and Access Management (IAM) Azure AD Advisory 2-week Workshop helps determine how IAM can address key security challenges and enable your adaptive workforce as a dynamic workplace.
+2
Applicable to:
Identity
Security
10 out of 60
Passwordless workshopElisa Oyj1 or 2 day workshop to understand benefits for passwordless model and get proof-of-concept environment up and running and necessary accessories to start piloting passwordless.
+1
Applicable to:
Identity
11 out of 60
Azure Sentinel 3-Day WorkshopZIAASMicrosoft Funded Consultancy 3-Day Workshop for Azure Sentinel
+3
Applicable to:
AI & Machine Learning
Identity
Security
12 out of 60
WVD Horizon Migration - 3 Weeks ImplementationGreeneris Sp. z o.o.Greeneris will help you implement the Windows Virtual Desktops environment along with the Horizon control and management system
+3
Applicable to:
Disaster Recovery
Identity
Migration
13 out of 60
Cloud Fundamentals for Decision Makers:4h BriefingMallow OyBriefing about the basics and focus on the matters you need to know when implement, buy or evaluate public cloud as an option.
+3
Applicable to:
Identity
Security
Storage
14 out of 60
Sentinel Workshop - 3 weekIngram Micro India Private LimitedAn overview of Azure Sentinel along with insights on active threats to your Microsoft 365 cloud and on premises environments with an Azure Sentinel Workshop.
+3
Applicable to:
Identity
Networking
Security
15 out of 60
Azure Well-Architected Review 2-Day AssessmentSoftServe Inc.Quickly assess your workload/solution against Azure best practices and industry standards and get actionable recommendations.
+3
Applicable to:
App Modernization
Identity
Security
16 out of 60
Azure Secure Remote Worker : 3-Wk ImplementationNBConsult Holdings (PTY) LtdWindows Virtual Desktop delivers virtual desktops and apps seamlessly from Azure that can be accessed anywhere anytime and from any device.
+3
Applicable to:
Identity
Networking
Security
17 out of 60
Managed Security Services- 1 Week AssessmentCloud4C Services Pvt LtdAvail Cloud4C’s in-depth cybersecurity assessment services to track organizational risk loopholes and vulnerabilities and develop a fail-proof blueprint for Risk Management.
+2
Applicable to:
Identity
Security
18 out of 60
Azure Security: 1-Week AssessmentForteventoWe will make sure that you have enabled most critical security settings and your Azure environment is properly protected against attacks.
+3
Applicable to:
Identity
Networking
Security
19 out of 60
COMPASS-Cloud Security Assessment: 4-Wk AssessmentTech Mahindra LimitedThe Cloud Security Assessment Solution provides a comprehensive approach in evaluation of pre migration security landscape, roadmap for secure implementation of target security landscape.
+3
Applicable to:
Identity
Networking
Security
20 out of 60
Security 1 - Month AssessmentPredicaProtect your Azure investment: Identify and address your security vulnerabilities
+3
Applicable to:
Disaster Recovery
Identity
Security
21 out of 60
Azure HCI Stack Solution: 3-Wk ImplementationTech Mahindra LimitedTech Mahindra is Certified Cloud Adoption Framework (CAF) Ready Partner, and our Azure Cloud offerings are aligned to CAF
+3
Applicable to:
App Modernization
Identity
Migration
22 out of 60
AVD Services: 3Wk Implementation & Managed ServiceTech Mahindra LimitedAccelerate your Digital Workspace Adoption with Tech Mahindra's Azure Virtual Desktop Services
+3
Applicable to:
App Modernization
Identity
Migration
23 out of 60
Azure Landing Zone Design: 1-Week WorkshopLiveRoute FZ-LLCEngagement for designing Enterprise Scale (CAF and WAF compliant) landing zone design and high level plan as per your organizational structure and IT application needs.
+3
Applicable to:
Identity
Migration
Networking
24 out of 60
cubesys AVD & Windows 365 Managed ServicesCubesys Pty Ltd Australia's leading AVD & Windows 365 specialists now offer a unique managed service for your Cloud-based VDI. Built specifically to work alongside your existing IT team.
+3
Applicable to:
Identity
Migration
Security
25 out of 60
AVD & Windows 365: 2-Weeks ImplementationCubesys Pty Ltd Work with Australia's leading AVD & Windows 365 partner to implement your AVD & Windows 365 foundations. Whether you're replacing RDS or Citrix, or starting out on your VDI journey
+3
Applicable to:
Identity
Migration
Security
26 out of 60
Azure Virtual Desktop: 5-Day Proof of ConceptYork Telecom CorpYorktel will provide a 5 day proof of concept for deploying Azure Virtual Desktops managed by Nerdio for Enterprise. The POC will demonstrate how to deploy and manage AVD.
+3
Applicable to:
Backup
Identity
Security
27 out of 60
DXC Defender for Endpoint - ImplementationDXCDXC Managed Endpoint Threat Detection and Response (METDR) hunts for indicators of compromise (IOCs) across organizations' endpoints.
+2
Applicable to:
Identity
Security
28 out of 60
Cloud Security Assessment: 4-6 weeks engagementmnemonicExperience a comprehensive security assessment with mnemonic's full-spectrum cloud security testing, designed to uncover vulnerabilities across your entire cloud footprint.
+3
Applicable to:
Identity
Networking
Security
29 out of 60
Azure Security Assessment - 1 month assessmentSela Group (HQ)Improve your Azure security posture by reviewing and assessing your Azure operation. Receive top-notch action plan for improvements
+2
Applicable to:
Identity
Security
30 out of 60
Microsoft Azure Sentinel 4-Week WorkshopCloud4C Services Pte LtdA workshop allowing you to experience “Azure Sentinel” a combination of SIEM and SOAR solution powered by the built-in AI, analytics and automation with an ability to write the custom alerts
+3
Applicable to:
Identity
Migration
Security
31 out of 60
Microsoft Azure Security: 5-Week ImplementationTeklink International, Inc.Let our Cloud Security Experts deploy your Cloud Security Framework to optimize Threat Prevention, provide Resilience, and Compliance.
Center for your Microsoft Azure systems.
+3
Applicable to:
Analytics
Identity
Security
32 out of 60
Keep Cloud Under Security - 4 weeks implementationCELLENZAAudit et définition d'un framework de sécurité adaptées au contexte client.
+3
Applicable to:
App Modernization
Identity
Security
33 out of 60
Infosys Cloud Security Services: 9 Week AssessmentInfosys LimitedProvide security and maturity assessment, secure architecture and design, implementation of security controls, monitoring, management, and operations of Azure environment.
+3
Applicable to:
Data Platform
Identity
Security
34 out of 60
Azure Migration Security By Design: 9 DaysNVISOOur team of certified Azure Security Engineers can provide you with support on many security aspects while migrating or extending your workload on Azure.
+3
Applicable to:
Identity
Networking
Security
35 out of 60
Azure Governance: 4-Week AssessmentSoftServe Inc.Get recommendations outlining gaps and areas of improvement based on Cloud Adoption Framework (CAF) Governance best practices.
+3
Applicable to:
Identity
Networking
Security
36 out of 60
Cloud Governance: 8-week AssessmentGofore OyjGofore is an established and diverse IT consultancy with top experts in creating cloud governance models for the Azure cloud platform. We'll transform your business using modern technology solutions.
+3
Applicable to:
App Modernization
DevOps
Identity
37 out of 60
Azure Sentinel Quickstart: 1 Day ImplementationInsight Technology SolutionsInsight's Azure Sentinel Quickstart provides the customer with a configured Azure Sentinel platform on which they can perform their own security analytics function.
+2
Applicable to:
Identity
Security
38 out of 60
Microsoft Security Identity and Compliance : 2-Hrs BriefingTCS - SecurityTCS Managed and Integrated Services for Azure and Microsoft 365 Security, Compliance and Identity products
+3
Applicable to:
Identity
Networking
Security
39 out of 60
IBM Fraud and Abuse Management System on AzureIBM-Alliance-GBS-DTT-Microsoft Partner-USA-NY-Armonk-6418595Our solution is deployed for several states, federal clients, and private companies, successfully detecting income tax fraud, benefits fraud, healthcare fraud, internal fraud and travel & expense frau
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
40 out of 60
Identity and Access Management: 4-Wk ImplementationAlpha Data LLCImplement Identity and Access Management packages along with Single Sign-on capabilities for varying levels of users through Azure
+2
Applicable to:
Identity
Security
41 out of 60
Securing Identities Workshop: 3 DaysInsight Technology SolutionsThe Securing Identities Workshop helps Microsoft customers realize the full value of their Microsoft services investment.
+2
Applicable to:
Identity
Security
42 out of 60
Cloud Security: 1-Wk AssessmentZitecThis one week security assessment will provide companies with detailed documentation on vulnerabilities and remediation plan for cloud & hybrid infrastructures.
+3
Applicable to:
DevOps
Identity
Security
43 out of 60
Cloud Security: 2-Wk AssessmentZitecThis 2-week security assessment will provide companies with detailed documentation on vulnerabilities and remediation plan for cloud & hybrid infrastructures.
+3
Applicable to:
DevOps
Identity
Security
44 out of 60
CloudTrack Azure Governance: WorkshopAtea Finland OyAtea’s CloudTrack Governance workshop established the governance model and principles on how Azure is used within the organization.
+3
Applicable to:
Data Platform
Identity
Security
45 out of 60
Hybrid Cloud Security 3 Day WorkshopInsight Technology SolutionsGet a customised threat and vulnerability analysis of your hybrid and multi-cloud environment and learn how to build a more robust cloud security system
+2
Applicable to:
Identity
Security
46 out of 60
Igel Azure Virtual Desktop As A Service 2-Hours WorkshopTriStratus Ltd.IGEL Technology provides a Linux based “Next generation edge operating system" which is purpose-built for secure access to cloud workspaces such as Azure Virtual Desktops.
+3
Applicable to:
App Modernization
Identity
Security
47 out of 60
Secure SAP on Azure : 2-Hrs BriefingTCS - Security2 Hrs briefing on TCS Managed Security services offering leveraging contextual and pre-integrated solution for protecting SAP ecosystem on Azure
+3
Applicable to:
Identity
Networking
Security
48 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield LtdSpartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
+3
Applicable to:
Identity
Migration
Security
49 out of 60
Microsoft pilvipalvelun tietoturvan katselmointipalvelu: 7-Days AssessmentLoihde OyjArviointipalvelun lopputulos: Asiakas saa pilviympäristön tietoturvasta tilannekuvan ja tavoitetilan
+3
Applicable to:
Identity
Networking
Security
50 out of 60
Microsoft Sentinel käyttöönotto: 5 Days WorkshopLoihde OyjWorkshopin tavoitteet: Microsoft Sentinel käyttöönotettu, perusmäärittelyt tehty ja ympäristö perehdytetty asiakkaalle.
+2
Applicable to:
Identity
Security
51 out of 60
Microsoft Sentinel, 2-day workshopDigiaFast track into taking Microsoft Sentinel into use as part of your organization’s security event management. Discover the capabilities of Microsoft Sentinel.
+2
Applicable to:
Identity
Security
52 out of 60
Advanced Microsoft Sentinel and Cost Optimization, 4-day WorkshopDigiaAdvanced fast track into taking Microsoft Sentinel into use as part of your organization’s security event management.
+2
Applicable to:
Identity
Security
53 out of 60
Managed Detection and Response with Microsoft Sentinel: 2-hour assessmentInnofactor Finland2-hour free-of-charge Managed Detection and Response assessment and readiness review meeting with Innofactor expert
+2
Applicable to:
Identity
Security
54 out of 60
Dell Technologies Managed Detection and Response with Microsoft (MDR)Dell Technologies ServicesDelivering 24x7 monitoring of threats and malicious behavior with Dell Technologies Managed Detection and Response with Microsoft services, powered by Microsoft Sentinel and Microsoft 365 Defender.
+2
Applicable to:
Identity
Security
55 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.aiImplementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
+1
Applicable to:
Identity
56 out of 60
HCLTech Unified Digital AccessHCL America Inc_HCLTHCLTech’s Unified Digital Access solution protects enterprise users and apps from cybersecurity attacks by aiding with right enterprise security posture with easy access to Apps and services.
+1
Applicable to:
Identity
57 out of 60
Standby Cybersecurity Incident Response Team:12-Months AssessmentTRUESEC ABProvides organizations high-priority access to experienced experts in a proven cybersecurity incident response team
+3
Applicable to:
Disaster Recovery
Identity
Security
58 out of 60
Transition To Cloud: 2-Day WorkshopSaportif Technology QFZ LLCProductivity and teamwork are fundamental to build resilience for your people, teams, and organization.
+3
Applicable to:
Identity
Migration
Security
59 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Consulting LimitedOur offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
+3
Applicable to:
Identity
Security
Storage
60 out of 60