FiltersClear all
Professional Services results
Showing results in professional services.
Crayon Desktop Anywhere: 1 week assesmentCrayonEase of access to a virtualized desktop - available on-demand anytime, anywhere and on any device
+3
Applicable to:
Identity
Migration
Security
1 out of 60
Azure Cloud Foundation (10-day workshop)DexMachGet knowledge transfer from our experts and hands-on experience with running Azure workloads using Cloud Adoption Framework, incl. cost insights, operational excellence, reliability & security.
+3
Applicable to:
Identity
Migration
Security
2 out of 60
Managed Azure CapacityNordcloud an IBM companyNordclouds Managed Capacity Service simplifies your IT financial process by providing spend visibility & tracking, cost optimisation recommendations & Premium technical support.
+2
Applicable to:
Migration
Security
3 out of 60
Azure Well Architected Review: 2-Day WorkshopRackspace TechnologyA 2-day architecture workshop that analyzes customers current infrastructure, providing a broad roadmap on how to optimize an existing environment and operations in Azure.
+2
Applicable to:
DevOps
Security
4 out of 60
Azure assessment, migration and modernisationNordcloud an IBM companyAccelerate your move to Azure with a comprehensive migration assessment and Nordcloud’s rapid migration and modernisation approach.
+2
Applicable to:
Migration
Security
5 out of 60
Managed Azure Cloud ServicesNordcloud an IBM companyLeverage the benefits of Azure while offloading the complex and time-consuming tasks of managing and optimising your environments to Nordcloud Managed Services
+2
Applicable to:
Backup
Security
6 out of 60
Predica 2-Day Security WorkshopPredicaWe will give you practical information to help your organization design and set up cloud access, and then show you how to properly manage security mechanisms available on the platform.
+3
Applicable to:
Backup
Disaster Recovery
Security
7 out of 60
CloudCan Windows Virtual Desktop - 3 Days of PoCCC Bilgi TeknolojileriWVD provides the ONLY multi-session Windows 10 experience: multiple users active simultaneously on the same Virtual Machine.
CloudCan Consultancy Team has worked and evaluated this product since its
+3
Applicable to:
Identity
Migration
Security
8 out of 60
Windows Virtual Desktop 2-weeks implementationCLOUD SERVICES#Windows Virtual Desktop implementation service helps organizations to set up and manage Remote Desktop and virtualized application environment
+3
Applicable to:
App Modernization
Backup
Security
9 out of 60
Innofactor Azure Virtual Desktop: 2 Wk implementInnofactor NorwayAccelerate secure remote work by implementing Azure Virtual Desktop, delivered by Innofactor. Automated setup of Windows Virtual Desktop to enable secure remote work.
+3
Applicable to:
Identity
Migration
Security
10 out of 60
HPE Cloud Adoption Workshop: ASHCI Planning, 1 DayHewlett Packard EnterpriseHPE Microsoft Azure Stack HCI Planning Workshop identifies planning steps and a timeline to accelerate your Azure Stack HCI implementation. 1 Day Service priced at $5,000 USD List.
+3
Applicable to:
App Modernization
Migration
Security
11 out of 60
SAP on Azure: 2 Hours BriefingTCS - SAP on AZURETCS SAP on AZURE -Implementation and Managed Services
+3
Applicable to:
Analytics
Migration
Security
12 out of 60
Azure Optimization: 5-day Free AssessmentVIAcodeStart optimizing your Azure environment with VIAcode's Free 5-day Assessment
+3
Applicable to:
DevOps
Disaster Recovery
Security
13 out of 60
Azure Firewall & DDOS Protection POC (10-day)DexMachEven when organizations maintain a "cloud-first" approach, still some workloads will stay on-premises. Learn how to build a secure network in Azure and extend it to your on-premise environment.
+2
Applicable to:
Networking
Security
14 out of 60
Secure Your Cloud Apps POC (10-day)DexMachCloud can be a great enabler to make your applications scalable and widely available. Learn how we can secure your application with Web Application Firewall and protect your app against DDOS attacks.
+1
Applicable to:
Security
15 out of 60
Threat Protection & Security POC (10-day)DexMachLearn about Threat Protection and Vulnerability scanning capabilities to protect your cloud workloads likes Virtual Machines, storage, databases, containers, etc.
+1
Applicable to:
Security
16 out of 60
Well-Architected Security Assessment (7-day)DexMachValidate your cloud app workloads against best practices and Well-Architected principles. Improve your security posture and gain visibility through insightful reports with recommendations.
+2
Applicable to:
Identity
Security
17 out of 60
Modernization of web apps: 6-day assessmentSMART business LLCGet a strategy, plan, and architectural solution for web application modernization
+3
Applicable to:
App Modernization
Migration
Security
18 out of 60
1-Week Cloud2 Virtual Desktop Service POCCloud2 OyCloud2 takes care of your Azure WVD Windows Virtual Desktops with love, expertise and best of breed technologies.
+3
Applicable to:
Migration
Networking
Security
19 out of 60
Azure Conditional Access - 2 day implementationSolvo IT ApSAzure Conditional Access is leveraging standard politics for Azure AD MFA activations, leveraging 10+ core policies scenario standards for secure governace and compliance.
+2
Applicable to:
Identity
Security
20 out of 60
Windows Virtual Desktop - 1 Day WorkshopSpektra Systems LLCSpektra Systems would like to invite you a 1-day Windows Virtual desktop workshop covering architecture, deployment and management aspects of a quality WVD Implementation.
+3
Applicable to:
Identity
Security
Storage
21 out of 60
Well Architecture Framework: 2-Wk AssessmentTOKIOTAAssess the good performance, security and quality of your cloud systems to optmize your cloud environment and reduce risks.
+3
Applicable to:
App Modernization
DevOps
Security
22 out of 60
Migrate to Azure DevOps: 2-hours briefingSMART business LLCGet introduction on how to migrate your existing development operations to Azure DevOps
+3
Applicable to:
DevOps
Migration
Security
23 out of 60
Endpoint Management: 1 Hour BriefingCommunication Square LLC1 hour Briefing on how to effectively manage mobile and desktop devices
+3
Applicable to:
Identity
Security
Storage
24 out of 60
GDPR Compliant Cloud Solutions: 1-Hour BriefingCommunication Square LLCThis briefing or as we at Communication Square like to call it Cloud Strategy Call is designed to help customers understand the benefits of GDPR Solution.
+3
Applicable to:
Identity
Security
Storage
25 out of 60
Azure Landing Zone for FS 3 Month ImplementationCapgemini GroupUsual engagement starts with 4 to 6 weeks Landing Zone Architecture definition and continues with accelerated Landing Zone build, performed by our experts.
+3
Applicable to:
DevOps
Networking
Security
26 out of 60
Windows Virtual Desktop 5-Days PoCVenzo A/SVENZO's 5-Days Windows Virtual Desktop kick-off gives you a full overview of how the solution can benefit your organization
+2
Applicable to:
Migration
Security
27 out of 60
Entra ID Well-Architected reviewNordcloud an IBM companyReview your current Entra ID environment against Nordcloud and Microsoft best practices.
+2
Applicable to:
Identity
Security
28 out of 60
EPAM Azure Security: 4 Days WorkshopEPAM Systems, Inc.This holistic workshop will give your team the tools they need to ensure that their Azure cloud workloads meet modern security needs.
+3
Applicable to:
Identity
Networking
Security
29 out of 60
Wipro Azure Virtual Desktop (AVD) : 4-Wk PoCWipro LtdEnabling a futuristic Digital virtual workspace using AVD with Wipro virtuadesk
+3
Applicable to:
Identity
Networking
Security
30 out of 60
Azure Cloud Adoption 4 - Week AssessmentAKAVEIL TECHNOLOGIES INCStrategic Assessment to Migration & Operation
+3
Applicable to:
Identity
Migration
Security
31 out of 60
AVD/Windows 365 Plan for Success: 3-d AssessmentCubesys Pty Ltd Understand what you need to successfully deploy Azure Virtual Desktop (AVD) and Windows 365. In our unique assessment we will provide budget guidance, evaluate your readiness and build a tailored plan
+3
Applicable to:
Identity
Migration
Security
32 out of 60
Cognizant® Secure Cloud Services powered by Microsoft Defender for CloudCognizantCognizant® Secure Cloud Services powered by Microsoft Defender for Cloud, delivers unified security, threat protection, compliance, and managed expertise to safeguard multi-cloud environments.
+1
Applicable to:
Security
33 out of 60
Fujitsu Azure Virtual Desktop 3-wk PoCFUJITSUEvolve the current Hybrid Workforce Solution to an Adaptive Workplace environment
+2
Applicable to:
Networking
Security
34 out of 60
Cloud Journey; 30-Mandays AssessmentORBIT s.r.o.Cloud journey is a consultancy service that ensures effective migration to Microsoft Azure environment. The activities include cloud strategy, application assessment and subsequent migration.
+3
Applicable to:
Analytics
Migration
Security
35 out of 60
Azure Arc PoC 5-daysOfficeline SAOffice Line 5-days offering to connect and operate hybrid resources as native Azure resources.
+2
Applicable to:
DevOps
Security
36 out of 60
EPAM Azure Security: AssessmentEPAM SystemsEPAM's Azure Security Assessment uses a combination of various industry best practices and frameworks to understand current security posture, critical gaps and future state of Azure cloud environment.
+2
Applicable to:
Migration
Security
37 out of 60
Avanade Data Governance FY24Avanade, Inc.Data Governance is a continual challenge, with data sprawl and the task of addressing compliance needs. Avanade can help your organization democratize your data and unify enterprise data governance.
+3
Applicable to:
Big Data
Data Platform
Security
38 out of 60
Avanade Multi-Cloud SecurityAvanade, Inc.With Avanade's Multi-Cloud Security offering, you can confidently embrace the cloud while maintaining a strong security posture.
+3
Applicable to:
Identity
Networking
Security
39 out of 60
Avanade Data SecurityAvanade, Inc.Organizations are rethinking how to manage data and strengthen security, having an integrated security approach to migrating and controlling privacy and regulatory risks is more important than ever.
+3
Applicable to:
Big Data
Data Platform
Security
40 out of 60
Avanade Threat Protection with XDR and SIEMAvanade, Inc.Cybercrime is an ongoing and escalating challenge for organizations around the globe. We help clients modernize their security and defend against these threats.
+1
Applicable to:
Security
41 out of 60
MSOC – A Cloud-Native Sentinel Platform 8 hour workshopLTIMindtree LimitedAzure Sentinel delivers a birds-eye view across the enterprise, alleviating the stress of increasingly sophisticated attacks and growing volumes of alerts, with long resolution timeframes.
+2
Applicable to:
Analytics
Security
42 out of 60
Azure Sentinel: 3 day implementationSulava OyPlanning and implementing the Cloud-native Security Information and Event Management system (SIEM) Azure Sentinel
+1
Applicable to:
Security
43 out of 60
Azure Governance Model: 5-day workshopSulava OyA governance model provides an organisation with a blueprint on how Azure is used within the organisation, and provides the guidelines for administrators on how the Azure services will be managed.
+2
Applicable to:
Identity
Security
44 out of 60
AVD Jump Start: 8-day Proof of ConceptWortellWe offer a standardized 4 step Jump Start to help you investigate, assess, plan, implement and evaluate AzureVirtual Desktop (AVD) for your organization.
+3
Applicable to:
DevOps
Migration
Security
45 out of 60
Citrix Desktop on Azure: 2-Wk ImplementationUni Systems S.M.S.A.Uni Systems can provide you with simple virtual client services on Azure infrastructure.
+3
Applicable to:
App Modernization
Identity
Security
46 out of 60
Azure Kubernetes Services: 3-Wk Proof of ConceptProtopia Sp. z o.o.In 3 weeks, we will go from zero to a running application in AKS. Automated and secure cluster, with best practices and clear recommendations where to go next.
+3
Applicable to:
App Modernization
DevOps
Security
47 out of 60
Azure Rights Management: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to deploy and manage Azure Rights Management.
+3
Applicable to:
App Modernization
Identity
Security
48 out of 60
Azure Rights Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Rights Management in their production environment.
+3
Applicable to:
App Modernization
Identity
Security
49 out of 60
Azure Security Center: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see Azure Security Center benefits and stay ahead of changing threat landscape across the cloud.
+3
Applicable to:
Identity
Security
Storage
50 out of 60
Cybersecurity Advisory Baseline 1-wk WorkshopNTT LimitedCybersecurity Advisory Baseline is an asset-based consulting engagement that uses workshops and interviews to assess cybersecurity maturity across all areas of your people, processes and technologies.
+3
Applicable to:
Internet of Things
Migration
Security
51 out of 60
IAM Assessment: 4wk AssessmentInnofactor NorwayIdentity - IAM Assessment is a security and automation assessment with Idenetity lifecycle management as the key datapoint. Summary is based on the Innofactor identity Journey framework.
+3
Applicable to:
Analytics
Identity
Security
52 out of 60
Azure PCI DSS Compliance: 4-Hr AssessmentDGITAL LabsDGITAL Labs offers an assessment session to transform an Azure environment compliant to PCI DSS standard.
+3
Applicable to:
Analytics
App Modernization
Security
53 out of 60
Azure Cloud Governance Model:4-day Workshop SeriesENFO OYEnfo’s Azure Governance Model is a blueprint on how Azure is to be used and managed within an organization. The Governance Model will be built in two workshops held between Enfo and the Customer.
+3
Applicable to:
DevOps
Migration
Security
54 out of 60
Azure Integration Services - 1 week assesementIWConnectNo application is isolated and functions alone. Nowadays, when you build or buy a software, you will need to connect it to other software.
+3
Applicable to:
Data Platform
DevOps
Security
55 out of 60
Host public services on Azure - 1 week assessmentIWConnectDo you have troubles with maintaining internet facing hardware and software on-premise? Do you want to take this burden off of your organization and even more reduce the cost?
+3
Applicable to:
App Modernization
Migration
Security
56 out of 60
Azure Managed Security Services: 2 Wk AssessmentUSTCyberProof will conduct a cyber maturity assessment for deploying an on-cloud SOC platform on an Azure environment.
+3
Applicable to:
AI & Machine Learning
DevOps
Security
57 out of 60
Azure Sentinel: QuickStart 1-Hr WorkshopForteventoOverview of Azure Sentinel service and quick setup of first connector (Microsoft 365) data collection, analysis. Start collecting Microsoft 365 activity data for free. See Azure Sentinel capabilities.
+2
Applicable to:
Identity
Security
58 out of 60
Remote Work Solution: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to re-imagine how your business approaches secure communication, compliance to industry defined standards and access to data is secure on Azure Cloud.
+3
Applicable to:
Big Data
Data Platform
Security
59 out of 60
Azure Identity Management: 1 Hour BriefingCommunication Square LLC1 hour Briefing on Azure Identity and Access Management
+2
Applicable to:
Data Platform
Security
60 out of 60