FiltersClear all
Professional Services results
Showing results in professional services.
DXC Defender for Endpoint - ImplementationDXCDXC Managed Endpoint Threat Detection and Response (METDR) hunts for indicators of compromise (IOCs) across organizations' endpoints.
+2
Applicable to:
Identity
Security
1 out of 60
Cloud Security Assessment: 4-6 weeks engagementmnemonicExperience a comprehensive security assessment with mnemonic's full-spectrum cloud security testing, designed to uncover vulnerabilities across your entire cloud footprint.
+3
Applicable to:
Identity
Networking
Security
2 out of 60
Azure Security Assessment - 1 month assessmentSela Group (HQ)Improve your Azure security posture by reviewing and assessing your Azure operation. Receive top-notch action plan for improvements
+2
Applicable to:
Identity
Security
3 out of 60
Microsoft Azure Sentinel 4-Week WorkshopCloud4C Services Pte LtdA workshop allowing you to experience “Azure Sentinel” a combination of SIEM and SOAR solution powered by the built-in AI, analytics and automation with an ability to write the custom alerts
+3
Applicable to:
Identity
Migration
Security
4 out of 60
Keep Cloud Under Security - 4 weeks implementationCELLENZAAudit et définition d'un framework de sécurité adaptées au contexte client.
+3
Applicable to:
App Modernization
Identity
Security
5 out of 60
Infosys Cloud Security Services: 9 Week AssessmentInfosys LimitedProvide security and maturity assessment, secure architecture and design, implementation of security controls, monitoring, management, and operations of Azure environment.
+3
Applicable to:
Data Platform
Identity
Security
6 out of 60
IBM Fraud and Abuse Management System on AzureIBM-Alliance-GBS-DTT-Microsoft Partner-USA-NY-Armonk-6418595Our solution is deployed for several states, federal clients, and private companies, successfully detecting income tax fraud, benefits fraud, healthcare fraud, internal fraud and travel & expense frau
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
7 out of 60
Identity and Access Management: 4-Wk ImplementationAlpha Data LLCImplement Identity and Access Management packages along with Single Sign-on capabilities for varying levels of users through Azure
+2
Applicable to:
Identity
Security
8 out of 60
Cloud Security: 2-Wk AssessmentZitecThis 2-week security assessment will provide companies with detailed documentation on vulnerabilities and remediation plan for cloud & hybrid infrastructures.
+3
Applicable to:
DevOps
Identity
Security
9 out of 60
Igel Azure Virtual Desktop As A Service 2-Hours WorkshopTriStratus Ltd.IGEL Technology provides a Linux based “Next generation edge operating system" which is purpose-built for secure access to cloud workspaces such as Azure Virtual Desktops.
+3
Applicable to:
App Modernization
Identity
Security
10 out of 60
Modern Secure and Productive Workplace: 4-Wk ImplementationSpartan Shield LtdSpartan Shield Ltd Modern, Secure & Productive Workplace Solution is an all-in-one Solution that provides you value for your Azure environment
+3
Applicable to:
Identity
Migration
Security
11 out of 60
IBM Threat Management with Microsoft’s SAP Threat Monitoring Solution for Microsoft AzureIBM Security ServicesConsulting and managed security services from IBM Security supporting Microsoft Defender, Azure Sentinel, and the SAP Threat Monitoring solution for Sentinel
+2
Applicable to:
Identity
Security
12 out of 60
Azure AD B2C Help-Desk and Role-Based Access Control: 4-Wk Implementationwhoiam.aiImplementation of a customizable help-desk for Azure AD B2C and Azure AD External Identities with support for role based access control and user management.
+1
Applicable to:
Identity
13 out of 60
XDR & Sentinel Expeditious:1-Week ImplementationAztekAztek 1 Week XDR deployment program simplifies the process by bringing ready-to-use customized playbooks and alert rules based on our extensive experience and advanced Microsoft best practices.
+2
Applicable to:
Identity
Security
14 out of 60
HCLTech Unified Digital AccessHCL America Inc_HCLTHCLTech’s Unified Digital Access solution protects enterprise users and apps from cybersecurity attacks by aiding with right enterprise security posture with easy access to Apps and services.
+1
Applicable to:
Identity
15 out of 60
Transition To Cloud: 2-Day WorkshopSaportif Technology QFZ LLCProductivity and teamwork are fundamental to build resilience for your people, teams, and organization.
+3
Applicable to:
Identity
Migration
Security
16 out of 60
Secure Multi-Clouds & Hybrid Environments: 1-Month ImplementationSignal Alliance Consulting LimitedOur offering addresses the three most urgent security challenges: Rapidly changing workloads & Insecure Configurations, Increasingly sophisticated attacks, Visibility into security and compliance.
+3
Applicable to:
Identity
Security
Storage
17 out of 60
Azure Landing Zone: 4-Weeks Design and ImplementationMismo Systems Private LimitedWe help you design and build a secure, scalable, and compliant Azure foundation with Azure Landing Zone that enables application migration, modernization, and innovation at enterprise-scale in Azure
+3
Applicable to:
Identity
Migration
Security
18 out of 60
Azure Landing Zone: 2-Weeks Assessment & Gap AnalysisMismo Systems Private LimitedWe help you assess your Azure environment, identify gaps to build a secure, scalable, and compliant Azure foundation with Azure Landing Zone for seamless migration, modernization, and innovation.
+3
Applicable to:
Identity
Migration
Security
19 out of 60
Shield One: Managed Security Service: 1-Year Managed ServiceSignal Alliance Consulting LimitedGet a bird's eye view of your Cybersecurity leveraging Microsoft Sentinel SIEM
+3
Applicable to:
Identity
Security
Storage
20 out of 60
skillup_consulting_openedx_v1Flexible Road LLCOpen edX Learning Management System with Azure.
+3
Applicable to:
Backup
Identity
Storage
21 out of 60
ACE Enterprise Foundation: 12-Wk ImplementationDevoteam FranceSecure and accelerate your cloud journey with a solid cloud foundation that is fully compliant with Microsoft Enterprise Scale & Cloud Adoption Framework.
+2
Applicable to:
Identity
Networking
22 out of 60
Secure Identities with Cognizant's Next-Gen Microsoft Defender for Identity ServiceCognizantSecure your identities with Cognizant’s Next-Gen Identity and Access Management Service, powered by Microsoft Defender for Identity and Azure Active Directory
+2
Applicable to:
Identity
Security
23 out of 60
Azure Sentinel 5 hours Online WorkshopCLOUD SERVICESThis 5-hour workshop contains theoretic and practical parts. It is designed to help you to start working with Azure Sentinel
+3
Applicable to:
Disaster Recovery
Identity
Security
24 out of 60
ACE SIEM: 4-Wk ImplementationDevoteam FranceImplementation of the fastest security information and event management (SIEM) system which utilize Azure Sentinel and enables scalable and cost-effective data collection.
+2
Applicable to:
Identity
Security
25 out of 60
ACE AVD: 4-Wk ImplementationDevoteam FranceAzure Virtual Desktop implementation which is adapted to your needs and will be guaranteed fast and secure
+2
Applicable to:
App Modernization
Identity
26 out of 60
Assesment Azure Base4Base4 Security Chile SPAThe Assesment on the Azure environment has the goal of giving the CISO’s a clear vision of it’s risks and a recomendation plan to remediate them in a short term and without a lot of investment.
+3
Applicable to:
Analytics
Identity
Security
27 out of 60
Azure Security Accelerator SuiteNeudesicMitigating Risk to Accelerate Innovation, Transformation, and Growth in the Azure Cloud
+3
Applicable to:
Identity
Networking
Security
28 out of 60
Managed Services for Microsoft EntraDXCAdvisory and Managed Services for Microsoft Entra
+2
Applicable to:
Identity
Security
29 out of 60
Azure Virtual Desktop AVD solution (4Wk PoC)ALBARSALBARS solution is designed to fully enable remote work from any location and device to fulfil business needs without large customer effort.
+3
Applicable to:
App Modernization
Identity
Migration
30 out of 60
Cloud Security Specialist - 5 Days ServicesDirect ExpertsIn this 5 day’s service package you will work alongside our top Solution Architects and Security Engineers on Microsoft Security solutions, architecture, projects, and maintenance to achieve successfu
+3
Applicable to:
Disaster Recovery
Identity
Security
31 out of 60
CloudPOS: 4-Week ImplementationMediasoft Data Systems LimitedThe all-in-one cloud-based point-of-sale solution. Boost efficiency, streamline operations, and enhance the customer experience with the user-friendly, secure, and fast software solutions.
+3
Applicable to:
Analytics
Archive
Identity
32 out of 60
8 wks - Implementacion de Sistemas de Pruebas de vida con reconocimiento facial para Onboarding de clientes o Deteccion de fraude54cuatro MexicoImplemente servicios cognitivos de Azure para evitar el fraude relacionado con la identificación de sus clientes
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
33 out of 60
DotPay- A Payment processor for cryptocurrencyDOTSQUARES TECHNOLOGIES INDIA P LTDDotPay is a cutting-edge payment processing platform that utilizes blockchain technology to provide a reliable and secure payment processing experience in the era of digital currencies.
+3
Applicable to:
App Modernization
Identity
Storage
34 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
35 out of 60
Azure Firewall 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+3
Applicable to:
Identity
Networking
Security
36 out of 60
Azure Sentinel 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Sentinel and configure it together according to Microsoft’s best practices conformed to your environment.
+2
Applicable to:
Identity
Security
37 out of 60
Azure Firewall 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Firewall and configure it together according to Microsoft’s best practices conformed to your environment.
+3
Applicable to:
Disaster Recovery
Identity
Security
38 out of 60
Azure Key Vault 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure key Vault and configure it together according to Microsoft’s best practices conformed to your environment.
+3
Applicable to:
DevOps
Identity
Security
39 out of 60
Azure AD B2C 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+2
Applicable to:
Identity
Security
40 out of 60
Azure Active Directory 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Active Directory and configure it together according to Microsoft’s best practices conformed to your environment.
+2
Applicable to:
Identity
Security
41 out of 60
Azure Security 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Security and configure it together according to Microsoft’s best practices conformed to your environment.
+3
Applicable to:
Disaster Recovery
Identity
Security
42 out of 60
Azure Active Directory B2C 3 Days Workshop/POCDirect ExpertsIn this workshop/POC we’ll cover the capabilities of Azure Active Directory B2C and configure it together according to Microsoft’s best practices conformed to your environment.
+2
Applicable to:
Identity
Security
43 out of 60
Azure Sentinel 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+3
Applicable to:
Disaster Recovery
Identity
Security
44 out of 60
Azure Security 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment
+3
Applicable to:
Data Platform
Identity
Security
45 out of 60
Azure Active Directory 2 Days AssessmentDirect ExpertsIn the 2 days assessment, our experts will perform a review of your site and will thoroughly go over your current technical environment.
+2
Applicable to:
Identity
Security
46 out of 60
Azure Active Directory B2C (Azure AD B2C) 2 Hours BriefingDirect Expertsn the current briefing you get 2 hours review of Azure AD B2C with a professional Solution Architect.
+2
Applicable to:
Identity
Security
47 out of 60
Azure Security 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure Security with a professional Solution Architect.
+3
Applicable to:
Disaster Recovery
Identity
Security
48 out of 60
Azure key Vault 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure key Vault with a professional Solution Architect.
+3
Applicable to:
DevOps
Identity
Security
49 out of 60
Azure Firewall 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure Firewall with a professional Solution Architect.
+3
Applicable to:
Disaster Recovery
Identity
Security
50 out of 60
Azure Active Directory (Azure AD) 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure AD with a professional Solution Architect
+2
Applicable to:
Identity
Security
51 out of 60
Azure Sentinel 2 Hours BriefingDirect ExpertsIn the current briefing you get 2 hours review of Azure Sentinel with a professional Solution Architect.
+3
Applicable to:
Backup
Identity
Security
52 out of 60
Security as a Service: 3-Wk ImplementationA3Cloud SolutionsImprove your security of your solutions and infrastructures in Azure Cloud.
+3
Applicable to:
Identity
Migration
Security
53 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
54 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
55 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
56 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
57 out of 60
Modern workplace Active DirectorySii Sp. z o.o.Modern workplace Active Directory implementation, migration and support
+2
Applicable to:
Identity
Security
58 out of 60
Enterprise - Zero Trust Strategy & Journey MapJohn Keells Information Technology Pvt LtdOrganizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid & multi-cloud workplace, and ensures cyber security assurance.
+2
Applicable to:
Identity
Security
59 out of 60
Detection & Response Services (MXDR)Cloud LifeCloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
+3
Applicable to:
AI & Machine Learning
Identity
Security
60 out of 60