FiltersClear all
Professional Services results
Showing results in professional services.
Managed Microsoft Sentinel SOC ServiceDigitalXRAID LtdProactively monitor, detect, and respond to cyber threats 24/7, with DigitalXRAID’s CREST Accredited Managed Microsoft Sentinel SOC Service. Explore DigitalXRAID’s Managed Microsoft Sentinel Service.
+2
Applicable to:
Identity
Security
1 out of 60
Managed Microsoft XDR ServiceDigitalXRAID LtdEnd-to-end threat detection, investigation, and response with DigitalXRAID’s Managed Microsoft XDR Service. Explore how DigitalXRAID’s Managed Microsoft XDR Service can enhance your cybersecurity.
+3
Applicable to:
Analytics
Identity
Security
2 out of 60
Azure DevOps Practice and Platform AssessementAptum Technologies (USA) Inc.Transform your development practices with Aptum's comprehensive DevOps assessment. Get expert evaluation of your security, automation, and operational efficiency, plus a clear roadmap for improvement.
+3
Applicable to:
App Modernization
DevOps
Security
3 out of 60
Fortis ActiveRecovery Malware Digital Forensics JumpstartSentinel Technologies Inc.Fortis by Sentinel’s Incident Response team will use best efforts, as specified in the Service Level Agreement below, to address a malware incident within your organization’s Azure environment.
+2
Applicable to:
Disaster Recovery
Security
4 out of 60
LTIMindtree Security MSOC WorkshopLTIMindtree LimitedIn this workshop, we will showcase the features of Microsoft Sentinel, along with LTIMindtree’s SOC processes, frameworks, and accelerators aimed at improving threat detection and response.
+1
Applicable to:
Security
5 out of 60
Migrate and Secure Windows and SQL Server - 6-week assessmentECF Data LLCECF Data helps navigate aging Windows and SQL infrastructure, determining what to move to the cloud to reduce risk and improve performance in a 6-week engagement.
+3
Applicable to:
Disaster Recovery
Migration
Security
6 out of 60
Azure Identity Security ImplementationBaufestIn a context of increasing threats of identity theft and excessive privilege exploitation, our team of specialists works alongside our clients to implement secure identity management in Azure.
+2
Applicable to:
Identity
Security
7 out of 60
Microsoft Defender for IoT Assessment: 2-Month Proof of ConceptAccountabilITA Defender for IoT POC designed to demystify live OT/ICS data and visualize threats alongside our 24x7 SOC- providing actionable insights to address risks and enhance security with Microsoft Sentinel.
+2
Applicable to:
Internet of Things
Security
8 out of 60
Cloud Adoption & MigrationAIM ConsultingAIM Consulting can Transform your Business with Microsoft Cloud Adoption and Migration: Simplifying Your Cloud Journey Every Step of the Way
+3
Applicable to:
Big Data
Migration
Security
9 out of 60
Multi-Cloud Platform Strategy AssessmentAppviaA strategic assessment to align your multi-cloud platform with best practices, ensuring consistency, security, and scalability across Azure and AWS.
+3
Applicable to:
DevOps
Migration
Security
10 out of 60
Workload Onboarding AssessmentAppviaBoost developer productivity with our Workload Onboarding Assessment to provide insights and recommendations for your platform.
+3
Applicable to:
DevOps
Identity
Security
11 out of 60
ProtectYourBusiness with Advanced Identity & Access ManagementECF Data LLCSecure access to ECF Data’s Azure IAM solutions. Simplify user access, protect data, and integrate identity management for seamless security.
+2
Applicable to:
Identity
Security
12 out of 60
Azure Landing Zone AssessmentAppviaAssess and optimise your Azure Landing Zone for security, scalability, and compliance. Identify gaps, align with best practices, and receive actionable recommendations for a robust Azure Landing Zone.
+3
Applicable to:
Identity
Migration
Security
13 out of 60
Eastwall Azure Governance & Security Health CheckEastwallAssess, prioritize, and enhance your Azure security, governance, and compliance with a 3-week deep dive, delivering actionable insights and a phased remediation roadmap aligned with best practices.
+3
Applicable to:
Identity
Migration
Security
14 out of 60
Microsoft Entra ID (Formerly Azure AD) AssessmentITsavvyEvaluate and optimize your Entra ID environment for security, compliance, and efficiency with expert assessment and actionable recommendations.
+2
Applicable to:
Identity
Security
15 out of 60
Data Security WorkshopMobile MentorThe Data Security Workshop is designed to create customer intent for adopting Microsoft Purview solutions by providing real data driven examples of data security & regulatory risks in your environment
+3
Applicable to:
Analytics
Big Data
Security
16 out of 60
LTIMindtree Security Identity Assessment As A ServiceLTIMindtree LimitedThis LTIMindtree offering provides the detailed overview of assessment activities and outcomes tailored for Identity services
+2
Applicable to:
Identity
Security
17 out of 60
R Systems Azure Landing Zone AcceleratorR SystemsR Systems' specialized consulting service designed to implement and optimize your Azure environment using the Azure Landing Zone Accelerator.
+3
Applicable to:
Migration
Networking
Security
18 out of 60
DORA Assessment and ImplementationSimform LLCEnsure full compliance with the Digital Operational Resilience Act (DORA) with expert guidance on ICT risk management, incident reporting, and resilience testing for financial entities in the EU.
+1
Applicable to:
Security
19 out of 60
Click2Cloud’s AI Centre of ExcellenceCLICK2CLOUD INCThe AI Centre of Excellence is a hub for innovation, offering expertise in discovery, AI assessment, PoC, and implementation—empowering customers to navigate their AI journeys with ease.
+3
Applicable to:
AI & Machine Learning
Migration
Security
20 out of 60
Defending your Cloud with Microsoft Defender for Cloud (5-hours workshop – FREE)Infinite Computer Solutions IncFortify your security with Infinite and Microsoft Defender for Cloud: Peerless, real-time defense from code to cloud.
+3
Applicable to:
Analytics
Networking
Security
21 out of 60
LTIMindtree Security Defender for IoT as a ServiceLTIMindtree LimitedThis offering provides the detailed overview of assessment activities and outcomes tailored for OT and IoT environments
+2
Applicable to:
Internet of Things
Security
22 out of 60
Azure Threat Detection & Response ImplementationBaufestWith tools such as Microsoft Sentinel, Web Application Firewall (WAF), Microsoft Defender and Threat Detection, their critical assets are protected through proactive monitoring and response
+2
Applicable to:
Identity
Security
23 out of 60
Migration of Microsoft Sentinel ModernizeExelegentMigrate from legacy SIEM to Microsoft Sentinel; a cloud native SIEM + SOAR
+3
Applicable to:
Identity
Migration
Security
24 out of 60
LTIMindtree Security Compliance Assessment As A ServiceLTIMindtree LimitedThis offering provides the detailed overview of assessment activities and outcomes tailored for Azure cloud compliance assessment related requirements and services
+1
Applicable to:
Security
25 out of 60
Microsoft Azure Cloud Deployment Services for the Epic EHR 4-Week Cloud AssessmentUSTThis 4-week assessment provides a comprehensive view of your EHR application, Microsoft Azure technical infrastructure, Cloud security, and Cloud economics TCO and ROI.
+2
Applicable to:
Migration
Security
26 out of 60
Secured Document Management & BPM - 5-Wk ImplementationatQorDocument Control System and Regulatory compliance solution with reporting and workflow for business processes.
+3
Applicable to:
Analytics
Identity
Security
27 out of 60
Windows/SQL 2008 Migration: 3-Week ImplementationatQorThis Migration implementation is focused on moving applications running on End-Of-Life-Support legacy Windows server 2008 and SQL Server 2008 products into Azure.
+3
Applicable to:
Backup
Migration
Security
28 out of 60
Azure Migration Service: 4-Wk ImplementationatQorThe Modernization Solution from atQor provides a comprehensive approach to migrate infrastructure workloads to an enterprise ready cloud.
+3
Applicable to:
Backup
Migration
Security
29 out of 60
Data and Infrastructure Migration - AI AssessmentCLICK2CLOUD INCAccelerate Your Cloud Migration Journey with Click2Cloud’s AI-Driven Precision!
+3
Applicable to:
AI & Machine Learning
Migration
Security
30 out of 60
Microsoft Sentinel Deployment by H OneH One (Private) LimitedStrengthen your security with Microsoft Sentinel, deployed seamlessly by H One for smarter threat detection and rapid response.
+1
Applicable to:
Security
31 out of 60
Managed XDR Defense for Commercial, GCC, GCCHRSM Product Sales LLCDefend your organization with managed threat detection and response services, emphasizing 24x7 security, automation, and integrated threat intelligence
+3
Applicable to:
Data Platform
Identity
Security
32 out of 60
Cloud Security Accelerator: Three (3)-Wk Microsoft Defender for Cloud WorkshopsLong View SystemsEnhance your security strategy and achieve regulatory compliance through Microsoft Defender for Cloud.
+2
Applicable to:
DevOps
Security
33 out of 60
Azure Virtual Desktop in 30: Six (6)-Week ImplementationLong View SystemsEnhance remote work capabilities and reduce IT infrastructure costs with Azure Virtual Desktop (AVD).
+3
Applicable to:
Identity
Networking
Security
34 out of 60
Data and Infrastructure MigrationCLICK2CLOUD INCDrive a seamless transition of your data and infrastructure workloads to new environments with Click2Cloud’s AI-powered Migration Factory service.
+3
Applicable to:
AI & Machine Learning
Migration
Security
35 out of 60
MXDR as a Service | Assure 365CyberOneComprehensive 24x7 Managed eXtended Detection & Response, powered by Microsoft Sentinel.
+1
Applicable to:
Security
36 out of 60
Sentinel Active Directory Assessment Optimization JumpstartSentinel Technologies Inc.Ensuring the health, security, and efficiency of your Active Directory environment is essential for maintaining operational stability and security.
+1
Applicable to:
Security
37 out of 60
Penetration Testing for Microsoft InfrastructureCyberOneSimulated cyber attacks to uncover vulnerabilities in your Microsoft 365, Azure and hybrid cloud environments.
+1
Applicable to:
Security
38 out of 60
Cyber Recovery AssessmentUnisys Corp / Blue BellIdentify vulnerabilities, assess cyber maturity, and gain actionable recommendations for defending against threats and complying with industry standards like NIST and government regulations like DORA.
+1
Applicable to:
Security
39 out of 60
Incident Response & Recovery ServicesCyberOneRapid Containment, Investigation & Recovery From Cyber Incidents Across Your Microsoft Environment
+1
Applicable to:
Security
40 out of 60
Document Management and Control System: 5-Wk ImplementationatQorDocument Control System and Regulatory compliance solution with reporting and workflow for business processes.
+3
Applicable to:
Analytics
Identity
Security
41 out of 60
Cloud Readiness Assessment: 1-Wk AssessmentatQoratQor's Cloud Readiness Assessment is a journey to help customers determine resources associated with running their environment in Cloud or On-Premise and developing a detail migration plan.
+2
Applicable to:
Analytics
Security
42 out of 60
Azure Arc Build Borderless Applications and Services: 3-WkatQorAzure Arc is the bridge that brings together the power of cloud computing across data centers, the edge, and multi-cloud environments.
+2
Applicable to:
App Modernization
Security
43 out of 60
SQL Server Migration: 2-Wk ImplementationatQorThis SQL Migration Service will provides you with expert level resources to execute on your database migration to variety of Microsoft Azure offerings
+3
Applicable to:
Backup
Migration
Security
44 out of 60
Security on Microsoft Azure: 4-Wk AssessmentatQoratQor designed the Cloud Security Assessment and Migration Roadmap programs that allow organizations business transformation and sensitive data with secure and robust infrastructure assessment.
+3
Applicable to:
Disaster Recovery
Identity
Security
45 out of 60
Application Modernization AssessmentCloudServusRun an Application Modernization Assessment to pinpoint gaps using App modernization; align next steps to Migrate & Modernize Your Estate.
+3
Applicable to:
App Modernization
Data Platform
Security
46 out of 60
Microsoft Azure Cloud Deployment Services for the Epic EHR Cybersecurity and Zero Trust 4-week AssessmentUSTExplore how the Zero Trust framework and Microsoft Azure security can help hospitals and healthcare organizations optimize their cyber hygiene with EHR on cloud.
+3
Applicable to:
Disaster Recovery
Identity
Security
47 out of 60
CMMC Cloud Enclave - Scoping and Security Readiness OverviewClearwater SecurityLearn from a C3PAO leader what you need for a CMMC Cloud Enclave and the insight to get it right the first time with security and compliance management cost efficiency.
+1
Applicable to:
Security
48 out of 60
Capgemini OT/IIot Monitoring with Microsoft Sentinel and & AD4IoTCapgemini GroupCapgemini's Implementation of Microsoft Sentinel for OT is a managed security services offering supporting operational technology environments.
+3
Applicable to:
Disaster Recovery
Internet of Things
Security
49 out of 60
Azure Landing Zone Foundation by TrofeoTrofeo, LLCAzure Landing Zone implemented by Trofeo is a pre-configured, foundational cloud environment that provides a well-architected framework for deploying and managing workloads.
+3
Applicable to:
Disaster Recovery
Migration
Security
50 out of 60
Ltimindtree_Security_EDR-XDR_Assessment _As_A_ServiceLTIMindtree LimitedThis offering provides the detailed overview of assessment activities and outcomes tailored for endpoint security
+1
Applicable to:
Security
51 out of 60
Ltimindtree Security Application Security Assessment As A ServiceLTIMindtree LimitedThis offering provides comprehensive guidance on conducting assessments and achieving outcomes specifically designed to support application security
+1
Applicable to:
Security
52 out of 60
Ops AmplifAIer: Amplify IT Operations with GenAITech Mahindra LimitedGenerative AI is enabling a paradigm shift in the traditional ways the IT industry leverages Artificial Intelligence for IT Operations (AIOps).
+2
Applicable to:
AI & Machine Learning
Security
53 out of 60
C1st Implementation of Azure Virtual DesktopC1st Technologies LLCC1st Implementation of Azure Virtual Desktop solution delivers secure, flexible, and cost-efficient cloud desktops with expert management.
+3
Applicable to:
Identity
Security
Storage
54 out of 60
Azure Hardening Security ImplementationBaufestWe use advanced hardening practices to reduce the attack surface and strengthen the infrastructure, adapting to specific regulations and certifications such as NIST, ISO 27001, and GDPR
+2
Applicable to:
Identity
Security
55 out of 60
Microsoft Entra Suite AssessmentAscent Global, Inc.Identify the advantages of consolidating identity and access management with Microsoft Entra Suite, such as enhanced security, streamlined operations, and support for a Zero Trust model.
+1
Applicable to:
Security
56 out of 60
Azure Sentinel Implementation & Security OptimizationGO TO CLOUD SASImpulsa la seguridad de tu empresa con Azure Sentinel Security Accelerator, una solución SIEM y SOAR en la nube que permite detectar, analizar y responder a amenazas en tiempo real.
+3
Applicable to:
DevOps
Identity
Security
57 out of 60
Rapid Adoption of Microsoft SentinelAscent Global, Inc.Ascent’s Sentinel Rapid Adoption offer accelerates implementation, ensuring your organization gains full security visibility with an optimized, cost-effective SIEM strategy.
+2
Applicable to:
Migration
Security
58 out of 60
Accelerate Business Insights with Microsoft Fabric Readiness AssessmentYASH TechnologiesA hands-on readiness assessment to evaluate your environment, identify integration opportunities, and demonstrate Microsoft Fabric’s value through a working proof of concept.
+3
Applicable to:
Analytics
Data Platform
Security
59 out of 60
Managed Azure Cloud Disaster RecoveryEnsono Managed Cloud DRaaS - proactive managed change and recovery with technical solution governance.
+3
Applicable to:
Backup
Data Platform
Security
60 out of 60