FiltersClear all
Professional Services results
Showing results in professional services.
Decentralized Identity and Verifiable Credentials: 3 Months ImplementationPERSISTENT SYSTEMS LIMITEDProvide secure, easy identity management based on Blockchain that enables industries and governments with diverse sets of users to use an identity system and leverage existing trust.
+3
Applicable to:
Analytics
Data Platform
Identity
1 out of 60
Office 365 migration Services using Azure: 12-Wk ImplPwC Digital Technology Services Ltd. IsraelAccelerate your digital transformation with Cloud and Collaboration tools
+3
Applicable to:
Identity
Migration
Security
2 out of 60
Security as a Service: 3-Wk ImplementationA3Cloud SolutionsImprove your security of your solutions and infrastructures in Azure Cloud.
+3
Applicable to:
Identity
Migration
Security
3 out of 60
Azure Penetration TestMazzy Technologies Corp.This Azure Penetration Test simulates a variety of attacks that could threaten a business’s Public Cloud through vulnerabilities and allows you to fix the threat vector prior to an incident.
+3
Applicable to:
Data Platform
Identity
Security
4 out of 60
Azure Identity and Access ManagementDOTSQUARES TECHNOLOGIES INDIA P LTDAzure IAM is a service for managing access to Azure resources, offering centralized user identity management, role-based access control, and security features like conditional access.
+3
Applicable to:
Identity
Migration
Security
5 out of 60
Entra Permissions Management: 2 week Risk AssessmentMazzy Technologies Corp.To reduce the attack surface and increase overall security posture by giving you a full visibility into every identity and what resources it is accessing across your cloud platforms.
+3
Applicable to:
Analytics
Identity
Security
6 out of 60
Managed Azure Virtual Desktop - Managed Service for Azure Virtual Desktop environmentsAdvania Finland OyAzure Virtual Desktop is not a turnkey service – who is going to run it for you?
+3
Applicable to:
App Modernization
Identity
Storage
7 out of 60
Modern workplace Active DirectorySii Sp. z o.o.Modern workplace Active Directory implementation, migration and support
+2
Applicable to:
Identity
Security
8 out of 60
Enterprise - Zero Trust Strategy & Journey MapJohn Keells Information Technology Pvt LtdOrganizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid & multi-cloud workplace, and ensures cyber security assurance.
+2
Applicable to:
Identity
Security
9 out of 60
Detection & Response Services (MXDR)Cloud LifeCloud Life provides a cutting-edge cloud native AI and ML-driven Managed Protection & Response services, protecting your Microsoft environment with Microsoft XDR & MDR Services.
+3
Applicable to:
AI & Machine Learning
Identity
Security
10 out of 60
Sentinel-as-a-ServiceCloud LifeCloud Life delivers an innovative cloud-based AI and ML-enhanced Sentinel-as-a-Service, empowering your team with managed SIEM/SOAR capabilities using optimum Microsoft MXDR Services
+3
Applicable to:
AI & Machine Learning
Identity
Security
11 out of 60
Brillio Open Banking SolutionBrillioA robust, scalable, and secure solution that is designed to address the ever-evolving regulatory landscape and empower financial institutions to stay ahead in this new era of banking.
+3
Applicable to:
Data Platform
Identity
Security
12 out of 60
Hybrid Cloud ( Azure Arc) : 3-Wk Proof of ConceptLotus Beta AnalyticsThis solution is designed to assist customers in seamlessly extending their on-premises and multi-cloud resources to Azure using Azure Arc. By adopting Azure Arc, organizations can unlock a range of a
+3
Applicable to:
DevOps
Identity
Security
13 out of 60
ISO 27001 Readiness Assessment for Azure EnvironmentVisionet Systems Inc.Advance confidently towards ISO 27001 certification for your Azure environment with Visionet's readiness assessment. Get a detailed analysis of your infrastructure operations & security policies.
+3
Applicable to:
Backup
Identity
Security
14 out of 60
Cloud Realisation: 4-Hour WorkshopQUORUM SYSTEMS PTY LTDBegin your Cloud Transformation Journey
+3
Applicable to:
Disaster Recovery
Identity
Migration
15 out of 60
Microsoft Sentinel DeploymentBlazeClan Technologies Pvt. LtdBlazeclan offers Microsoft Sentinel deployment, integration, configuration and optimization in the customer's environment seamlessly.
+3
Applicable to:
Identity
Networking
Security
16 out of 60
Azure Well Architected Review - 5 Days AssessmentBlazeClan Technologies Pvt. LtdBlazeclan offers Azure Well Architected Review to help customers assess the environment for reliability, cost management, operational excellence, security and performance efficiency.
+3
Applicable to:
Identity
Migration
Networking
17 out of 60
Eviden's Application Strategy WorkshopEviden International France - SASEviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
+3
Applicable to:
App Modernization
Data Platform
Identity
18 out of 60
Security Warrior: Managed ServiceTechConnectOur Security Warrior, will give you the visibility and remediation into your Azure security posture to manage the risk through an affordable single pane of glass solution.
+3
Applicable to:
DevOps
Identity
Security
19 out of 60
Azure Well Architected Framework (AWAF) AssessmentNOVENTIQOptimize Azure efficiency and security with our Well-Architected Framework Assessment. Uncover challenges, enhance performance, and fortify your infrastructure for success.
+3
Applicable to:
Identity
Security
Storage
20 out of 60
Security and Compliance AssessmentNOVENTIQGain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
+3
Applicable to:
Identity
Networking
Security
21 out of 60
HCLTech's Universal Managed Detection Response (MXDR)HCL Technologies Limited.Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
+2
Applicable to:
Identity
Security
22 out of 60
Workshop Threat Protection con Microsoft Sentinel: Blindaje Avanzado contra Amenazas Cibernéticas - 4Wk WorkShopENCAMINA S.L.Una inmersión profunda en la estrategia de seguridad, adaptada a tu organización
+3
Applicable to:
Identity
Networking
Security
23 out of 60
KloudIdentity: Application Onboarding to Entra made simple with our SCIM GatewayKloudyNet Technologies SDN BHDKloudIdentity is our proprietary SCIM Gateway to onboard LOB & Cloud applications (including non SCIM compliant), databases and other applications to Microsoft Entra for users and groups provisioning.
+2
Applicable to:
Identity
Security
24 out of 60
ALIANDO Managed Extended Detection and Response (MXDR)myCloudDoorALIANDO Managed Extended Detection & Response service (MXDR) powered by Sentinel and Defender
+3
Applicable to:
Identity
Networking
Security
25 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-WeeksmyCloudDoorThis assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
+3
Applicable to:
Identity
Networking
Security
26 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-WeeksmyCloudDoormyCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
+3
Applicable to:
Identity
Networking
Security
27 out of 60
HCLTech's Cybersecurity ServicesHCL America Inc_HCLTHCLTech is a leading global technology company that helps enterprises reimagine their businesses for the digital age. Secure your cloud journey with HCLTech's comprehensive portfolio of cybersecurity
+3
Applicable to:
Backup
Identity
Security
28 out of 60
PwC Cybersecurity and Risk CapabilitiesPricewaterhousecoopers LLPReimagine risk and unlock opportunities through a human-led, tech-powered approach.
+2
Applicable to:
Identity
Security
29 out of 60
AI Assessment: Quality Improvement and Defect DetectionEduFin IT, Inc. d/b/a Brightpoint InfotechAI assessment for quality improvement and defect detection using AI. We assist in seamlessly integrating Azure services, this assessment identifies areas for improvement in your manufactring process
+3
Applicable to:
AI & Machine Learning
DevOps
Identity
30 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFTAVASOFTEntra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
+2
Applicable to:
Identity
Security
31 out of 60
Single Sign On (SSO) for Applications using Entra ID by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user access. Simplify authentication with SSO, reduce password fatigue, and enhance security and productivity.
+2
Applicable to:
Identity
Security
32 out of 60
Azure AD Identity Protection AssessmentAVASOFTOur Azure AD Identity Protection Assessment identifies vulnerabilities and strengthens security. Mitigate risks with advanced threat detection and tailored defense strategies.
+2
Applicable to:
Identity
Security
33 out of 60
Microsoft Azure AD AuthenticationAVASOFTStruggling with user access management? Azure AD Authentication automates provisioning, access requests, and reviews, enhancing security, efficiency, and compliance.
+2
Applicable to:
Identity
Security
34 out of 60
AVASecure 360 - Entra ID Access Management Solutions by AVASOFTAVASOFTAutomated Identity & Access Management with Azure AD streamlines user provisioning, access requests, and reviews. Enhance security, efficiency, and compliance effortlessly.
+2
Applicable to:
Identity
Security
35 out of 60
Strengthen Your Azure Security - 3 days Comprehensive Risk AssessmentAVASOFTIdentify and address security gaps in Azure with our Risk Assessment. Gain insights, tailored recommendations, and best practices to strengthen your security and maintain compliance.
+2
Applicable to:
Identity
Security
36 out of 60
On-premises Active Directory Infra AssessmentAVASOFTOur On-Premises AD Infrastructure Assessment identifies vulnerabilities and compliance gaps. Strengthen security and ensure compliance with actionable insights and expert recommendations.
+2
Applicable to:
Identity
Security
37 out of 60
Dell Implementation Services for Microsoft Azure Network SecurityDell Technologies ServicesWith Dell Technologies Implementation Services for Microsoft Azure Network Security, organizations can enhance their cloud network security to address the challenges of implementation.
+3
Applicable to:
Identity
Networking
Security
38 out of 60
Seamless social app identity integrationAVASOFTOur solution enhances security, streamlines access, and provides customized integration strategies, ensuring robust protection and operational efficiency in a dynamic digital landscape.
+2
Applicable to:
Identity
Security
Enterprise App Integration with Microsoft My Apps PortalAVASOFTOur solution mitigates cybersecurity threats, fortifies identity security, safeguards data, and maintains trust, enabling organizations to focus on growth and innovation without compromising security.
+2
Applicable to:
Identity
Security
40 out of 60
Kyndryl IAM Design and Implementation ServicesKyndryl Inc.Kyndryl IAM Services provide IAM solutions for hybrid and cloud environments using Microsoft Entra. Focus on user authentication, identity governance, and secure access with Zero Trust principles.
+3
Applicable to:
Backup
Identity
Security
41 out of 60
Hybrid AD Identity Security AssessmentAVASOFTOur Hybrid AD Identity Security Assessment identifies vulnerabilities and compliance gaps. Fortify your Hybrid AD, enhance security, and ensure compliance with actionable insights.
+2
Applicable to:
Identity
Security
42 out of 60
Azure Zero Trust Assessment: 1 Day WorkshopSlalom ConsultingCreate your Azure security foundation: We will work with your organization's security and infrastructure leaders to create a point-in-time snapshot of where you are in your security journey.
+2
Applicable to:
Identity
Security
43 out of 60
HIPAA Compliance Risk Assessment & Gap AnalysisAvertium, LLCAvertium’s team of healthcare and security consultants apply their deep knowledge of compliance to the way you do business.
+2
Applicable to:
Identity
Security
44 out of 60
Microsoft Purview Information Protection: 12-Wk ImplementationUNIFY Solutions Pty. Ltd.UNIFY Solutions will deploy Microsoft Purview Information Protection to proactively protect and monitor your information as it moves between users and devices within your organisation and externally.
+2
Applicable to:
Identity
Security
45 out of 60
Microsoft Purview Services from UNIFY SolutionsUNIFY Solutions Pty. Ltd.Comprehensive Microsoft Purview Services for data governance and security
+2
Applicable to:
Identity
Security
46 out of 60
Microsoft Endpoint Security Services: 4-Wk ImplementationUNIFY Solutions Pty. Ltd.Comprehensive Microsoft Endpoint Security services, providing enterprise data safety, regulatory compliance, and operational continuity.
+2
Applicable to:
Identity
Security
47 out of 60
Microsoft Entra Deployment: 12-Wk ImplementationUNIFY Solutions Pty. Ltd.Comprehensive Microsoft Entra Design, Migrate, and Deploy Services.
+2
Applicable to:
Identity
Security
48 out of 60
Microsoft 365 Managed Cloud Virtual Machine ServiceT-Systems International With the “Microsoft 365 Cloud Virtual Machine Service – Azure Virtual Desktop” product, Telekom provides operational and configuration services
+3
Applicable to:
Identity
Networking
Security
49 out of 60
Security Information and Event Management (SIEM) MigrationKyndryl Inc.Kyndryl SIEM Migration service transitions legacy SIEMs to Microsoft Sentinel, ensuring comprehensive coverage for both on premise and cloud assets. Services include discovery, design, implementation.
+3
Applicable to:
Disaster Recovery
Identity
Security
50 out of 60
Azure Landing Zone Deployment ServiceLotus Beta AnalyticsThe "Azure Landing Zone Deployment Service" simplifies setting up secure, compliant Azure environments with pre-configured templates, ensuring a solid foundation for cloud operations and governance.
+2
Applicable to:
Identity
Security
51 out of 60
Kyndryl Managed Extended Detection and Response (XDR)Kyndryl Inc.Kyndryl helps customers extend their protection beyond just endpoints to cover all assets, including email, identity, SaaS applications, cloud infrastructure, and data.
+3
Applicable to:
Disaster Recovery
Identity
Security
52 out of 60
Entra ID: 2-week ImplementationSSW ConsultingElevate your identity and access management with our Entra ID Implementation service, enhancing security, streamlining user management, and optimizing Azure integration for robust protection.
+2
Applicable to:
Identity
Security
53 out of 60
Entra ID: 2-day AssessmentSSW ConsultingEvaluate your identity and access management approach with a detailed Entra ID analysis, focusing on security, compliance, and seamless integration with your existing or new Azure setup.
+2
Applicable to:
Identity
Security
54 out of 60
Dynamics 365 Sales CRM: 2-day AssessmentSSW ConsultingCreate a comprehensive strategy for your Dynamics 365 Sales implementation with a detailed analysis, feature backlog, and implementation roadmap.
+3
Applicable to:
AI & Machine Learning
Data Platform
Identity
55 out of 60
Dynamics 365 Sales CRM: 2-week ImplementationSSW ConsultingSSW will implement and configure your Dynamics 365 Sales system over 2 weeks, creating a powerful, customized sales solution for your organization.
+3
Applicable to:
AI & Machine Learning
Data Platform
Identity
56 out of 60
Dynamics 365 Sales CRM: 1-Hour BriefingSSW ConsultingExplore how Dynamics 365 Sales CRM can streamline your sales processes, improve customer relationships, and drive business growth with tailored solutions.
+3
Applicable to:
AI & Machine Learning
Data Platform
Identity
57 out of 60
Entra ID: 1-Hour BriefingSSW ConsultingAddress identity and access management challenges and receive expert advice on how to enhance security, streamline access, and improve compliance using Entra ID.
+2
Applicable to:
Identity
Security
58 out of 60
Copilot for Security Readiness AssessmentAvertium, LLCCopilot for Security readiness assessment will prepare you to defend beyond machine speed.
+2
Applicable to:
Identity
Security
59 out of 60
Overwatch for Azure Security: ImplementationTHREATSCAPE LIMITEDOverwatch for Azure Security service is the next generation of security posture management– it provides you with a dashboard tailored for your business, to improve and enhance your security posture.
+2
Applicable to:
Identity
Security
60 out of 60