フィルターすべてクリア
コンサルティング サービス 件の結果
件の結果を コンサルティング サービス で表示。
Remote Learning Solution: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Teams based Remote Learning Solution in their existing infrastructure and trainings.
+3
Applicable to:
Identity
Security
Storage
1 out of 60
Active Directory Health Check: 5-Day AssessmentTallanWe want to help you ensure that your AD environment is working correctly before and after an Active Directory upgrade, migration, merger or acquisition.
+2
Applicable to:
Identity
Security
2 out of 60
Active Directory On Azure: 10 Days ImplementationIbn Technologies LtdCloudIBN, an ISO 9001:2008 & 27001:2013 certified company ensures that your local Active Directory is migrated to Azure IaaS AD or Azure seamlessly.
+2
Applicable to:
Identity
Migration
3 out of 60
Secure Virtual Desktop: 1 Week AssessmentOpstack IncA proven solution built to assess, plan and deliver a secure Remote Desktop solution, based on Microsoft WVD through a thoughtful assessment of your identity, network and compute infrastructure
+3
Applicable to:
Identity
Networking
Security
4 out of 60
Microsoft Entra ID and Identity: 5-Day WorkshopeGroup Enabling TechnologiesThe eGroup Enabling Technologies, LLC. Microsoft Entra ID and Identity engagement includes interactive sessions about Microsoft Entra ID and Microsoft 365 Identity security policies.
+3
Applicable to:
Backup
Identity
Security
5 out of 60
Hybrid Security with Azure 2 Week ImplementationIFI TechsolutionsCloud-enabled SIEM & SOAR solutions for infra, application and data security operations with unified identity to stay ahead of the changing threat landscape across cloud and on-premise environments.
+3
Applicable to:
AI & Machine Learning
Identity
Security
6 out of 60
Windows Virtual Desktop KickstartSoftwareOneDeliver A Seamless And Secure Remote Desktop Experience
+3
Applicable to:
Identity
Networking
Security
7 out of 60
Application Workloads to Azure- 2 days WorkshopDynamics Edge - San Jose, CA - 2935 N 1stMigrating Application Workloads to Azure
This workshop teaches IT Professionals how to migrate existing on-premises workloads and assets to the cloud, specifically to the Microsoft Azure platform.
+3
Applicable to:
DevOps
Identity
Migration
8 out of 60
Custom Microsoft Entra ID Identity Solutions: 4-wk ImpOxford Computer Group LLCEnterprise Identity Solutions (IAM, IGA, and Compliance) using Modern Authentication and Microsoft Entra ID and Microsoft Entra ID Governance
+2
Applicable to:
Identity
Security
9 out of 60
Digital Trusted Identity Advisory: 2-week WorkshopNTT DATA Inc.Identity and Access Management (IAM) Azure AD Advisory 2-week Workshop helps determine how IAM can address key security challenges and enable your adaptive workforce as a dynamic workplace.
+2
Applicable to:
Identity
Security
10 out of 60
WVD Horizon Migration - 3 Weeks ImplementationGreeneris Sp. z o.o.Greeneris will help you implement the Windows Virtual Desktops environment along with the Horizon control and management system
+3
Applicable to:
Disaster Recovery
Identity
Migration
11 out of 60
Adversary Emulation Service 10 Day AssessmentKontex Security Ltd-Designing effective Azure Security Solutions
-Proactive monitoring of events
-Automate actions and responses
-Unleashing your SIEM's power
-Taking automation to the next level with Playbooks
+3
Applicable to:
Identity
Networking
Security
12 out of 60
Azure Performance Engineering: 2 -Weeks AssessmentL&T Technology ServicesPerformance Engineering of Azure and hybrid cloud based applications, Website with market leading performance testing, monitoring, analysis and in-house automation tools
+3
Applicable to:
App Modernization
Data Platform
Identity
13 out of 60
Azure DevOps - 2 Week ImplementationTrianz IT and Cloud Solutions Pvt. LtdTrianz will guide you on your CICD and DevOps journey through the implementation of the Azure DevOps service.
+3
Applicable to:
DevOps
Identity
Security
14 out of 60
Azure Security: 1-Week AssessmentForteventoWe will make sure that you have enabled most critical security settings and your Azure environment is properly protected against attacks.
+3
Applicable to:
Identity
Networking
Security
15 out of 60
AVD Services: 3Wk Implementation & Managed ServiceTech Mahindra LimitedAccelerate your Digital Workspace Adoption with Tech Mahindra's Azure Virtual Desktop Services
+3
Applicable to:
App Modernization
Identity
Migration
16 out of 60
AVD & Windows 365: 2-Weeks ImplementationCubesys Pty Ltd Work with Australia's leading AVD & Windows 365 partner to implement your AVD & Windows 365 foundations. Whether you're replacing RDS or Citrix, or starting out on your VDI journey
+3
Applicable to:
Identity
Migration
Security
17 out of 60
DXC Defender for Endpoint - ImplementationDXCDXC Managed Endpoint Threat Detection and Response (METDR) hunts for indicators of compromise (IOCs) across organizations' endpoints.
+2
Applicable to:
Identity
Security
18 out of 60
Accenture Security ServicesAccentureAccenture Security Services
+3
Applicable to:
Disaster Recovery
Identity
Security
19 out of 60
Microsoft Azure Virtual Desktop: 1-Wk WorkshopeGroup Enabling Technologies, LLCExplore the modern desktop by obtaining the ability to work seamlessly regardless of your end-users location. Enable your workers, while keeping their data and the organization's data safe.
+3
Applicable to:
Identity
Migration
Security
20 out of 60
Azure Security Assessment - 1 month assessmentSela Group (HQ)Improve your Azure security posture by reviewing and assessing your Azure operation. Receive top-notch action plan for improvements
+2
Applicable to:
Identity
Security
21 out of 60
Introduction to Zero Trust: 1-Hr BriefingBJSS LimitedProvide a briefing to aid your organisation on Zero Trust principles and securing your Azure investment
+2
Applicable to:
Identity
Security
22 out of 60
IAM Student Passport: 2-Hr BriefingCondatis Group LimitedOur Student Passport solution leverages decentralized identity technologies to offer education providers optimised student enrolment and movement.
+2
Applicable to:
Identity
Security
23 out of 60
Keep Cloud Under Security - 4 weeks implementationCELLENZAAudit et définition d'un framework de sécurité adaptées au contexte client.
+3
Applicable to:
App Modernization
Identity
Security
24 out of 60
Microsoft Sentinel Smart Ingestion; 4-Day AssessmentITC Secure LtdAlign your security posture and understand your data, agent deployment and Microsoft Azure usage options to optimise investments within Microsoft Sentinel.
+2
Applicable to:
Identity
Security
25 out of 60
Spyglass Cloud Security: 6-week AssessmentCatapult Systems, LLCCatapult’s Spyglass Cloud Security Assessment is a complete evaluation of your organization’s cloud security posture centered around identity, data, devices, applications and access.
+3
Applicable to:
Identity
Security
Storage
26 out of 60
Azure & Multi-Cloud Framework Compliance Assessment with MDfC: 4-Day AssessmentITC Secure LtdITC Secure’s Azure & Multi-Cloud Framework Compliance Assessment uses Microsoft Defender for Cloud (MDfC) to give you deep insight into your current and ongoing framework compliance
+2
Applicable to:
Identity
Security
27 out of 60
Infosys Cloud Security Services: 9 Week AssessmentInfosys LimitedProvide security and maturity assessment, secure architecture and design, implementation of security controls, monitoring, management, and operations of Azure environment.
+3
Applicable to:
Data Platform
Identity
Security
28 out of 60
Azure Migration Security By Design: 9 DaysNVISOOur team of certified Azure Security Engineers can provide you with support on many security aspects while migrating or extending your workload on Azure.
+3
Applicable to:
Identity
Networking
Security
29 out of 60
Designing Microsoft Azure Infrastructure: 4 Days WorkshopNETCOM LEARNINGThe AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training combines lectures with case studies to demonstrate basic architect design principles.
+3
Applicable to:
Identity
Networking
Storage
30 out of 60
Microsoft Virtual Desktop 10 Days ImplementationCrucialLogics Inc.Windows Virtual Desktop for High Performance Graphics & AEC firms - Microsoft Virtual Desktop 10 Days Implementation
+3
Applicable to:
Identity
Migration
Networking
31 out of 60
Azure Governance: 4-Week AssessmentSoftServe Inc.Get recommendations outlining gaps and areas of improvement based on Cloud Adoption Framework (CAF) Governance best practices.
+3
Applicable to:
Identity
Networking
Security
32 out of 60
Administering Windows Server Hybrid Core Infrastructure: 4 Days WorkshopNETCOM LEARNINGAZ-800T00: Administering Windows Server Hybrid Core Infrastructure teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute.
+3
Applicable to:
Identity
Networking
Storage
33 out of 60
Azure Sentinel: 4-wk Workshop&Partners IT LtdUnderstand the features and benefits of Azure Sentinel
+2
Applicable to:
Identity
Security
34 out of 60
SMB Microsoft Adoption: 1-day AssessmentCyber Advisors Inc.Many customers do not understand their Microsoft licensing and therefore are not adopting applications fully. Our goal is to assist customers with removing barriers to increase adoption.
+2
Applicable to:
Identity
Security
35 out of 60
Microsoft Security, Compliance, and Identity Fundamentals: 1 Day WorkshopNETCOM LEARNINGThis course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
+3
Applicable to:
App Modernization
Identity
Security
36 out of 60
Enterprise Microsoft Adoption: 1-Day AssessmentCyber Advisors Inc.Many customers do not understand their Microsoft licensing and therefore are not adopting applications fully. We will assist customers with removing barriers to increase Azure/Microsoft 365 adoption.
+2
Applicable to:
Identity
Security
37 out of 60
Microsoft Identity and Access Administrator: 4 Days WorkshopNETCOM LEARNINGMicrosoft Identity and Access Administrator training includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.
+3
Applicable to:
App Modernization
Identity
Security
38 out of 60
Azure Sentinel Quick Start: 6-week ImplementationCatapult Systems, LLCGet a jump start on the next generation solution for Security Information and Event Management (SIEM) and Security Orchestration and Automated Remediation (SOAR) with our Azure Sentinel Quick Start.
+3
Applicable to:
Analytics
Identity
Security
39 out of 60
Azure Center of Excellence accelerator: 1- Week AssessmentMacrosoft Associates IncCloud center of excellence (COE) accelerator on migration and modernization of application, data, storage and infrastructure. Free of cost week of assessment and workshop.
+3
Applicable to:
App Modernization
Identity
Migration
40 out of 60
Assessment - Security - 1-MonthZones Inc.Analysis of your cross-platform security posture—evaluating vulnerabilities and identity risks with recommendations to mitigate
+3
Applicable to:
Backup
Identity
Security
41 out of 60
Azure Application: 8-Wk ImplementationOXWARE TECHNOLOGIES LTDOxware Technologies will implement, deploy, and integrate Microsoft Azure cloud-native application or service tailored to your unique business requirements and environment.
+3
Applicable to:
Data Platform
DevOps
Identity
42 out of 60
Microsoft Security Identity and Compliance : 2-Hrs BriefingTCS - SecurityTCS Managed and Integrated Services for Azure and Microsoft 365 Security, Compliance and Identity products
+3
Applicable to:
Identity
Networking
Security
43 out of 60
IBM Fraud and Abuse Management System on AzureIBM-Alliance-GBS-DTT-Microsoft Partner-USA-NY-Armonk-6418595Our solution is deployed for several states, federal clients, and private companies, successfully detecting income tax fraud, benefits fraud, healthcare fraud, internal fraud and travel & expense frau
+3
Applicable to:
Analytics
AI & Machine Learning
Identity
44 out of 60
Identity and Access Management: 4-Wk ImplementationAlpha Data LLCImplement Identity and Access Management packages along with Single Sign-on capabilities for varying levels of users through Azure
+2
Applicable to:
Identity
Security
45 out of 60
Application Security: 2-week AssessmentCatapult Systems, LLCCatapult application security experts analyze your environment to help you understand the security landscape of your applications and identify your risks, should a hacker gain access to your network.
+3
Applicable to:
App Modernization
Identity
Security
46 out of 60
Identity, Governance and Security Assessment - 2 week AssessmentPlain ConceptsProtect Your Investment - This Assessment is an in-depth evaluation of the management of access and identify in your organization. We will perform a complete gap analysis of your access security.
+2
Applicable to:
Identity
Security
47 out of 60
Cloud Security: 1-Wk AssessmentZitecThis one week security assessment will provide companies with detailed documentation on vulnerabilities and remediation plan for cloud & hybrid infrastructures.
+3
Applicable to:
DevOps
Identity
Security
48 out of 60
Cloud Security: 2-Wk AssessmentZitecThis 2-week security assessment will provide companies with detailed documentation on vulnerabilities and remediation plan for cloud & hybrid infrastructures.
+3
Applicable to:
DevOps
Identity
Security
49 out of 60
Cloud Architecture Optimization Assessment: 3-Wk AssessmentSoftchoiceOptimize your cloud footprint by acting on a prioritized remediation roadmap
+3
Applicable to:
Identity
Security
Storage
50 out of 60
Cloud Security Approach: 2-months AssessmentPyxisThrough the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.
+3
Applicable to:
Analytics
Identity
Security
51 out of 60
ADP to Active Directory - 1 Week ImplementationCovenant Technology PartnersIntegrate ADP to Active Directory to automate employee onboarding within your organization.
+1
Applicable to:
Identity
52 out of 60
Secure SAP on Azure : 2-Hrs BriefingTCS - Security2 Hrs briefing on TCS Managed Security services offering leveraging contextual and pre-integrated solution for protecting SAP ecosystem on Azure
+3
Applicable to:
Identity
Networking
Security
53 out of 60
Cloud Security Score Improvement: 6-months ImplementationPyxisEvolutive maintenance on Cloud solutions. It allows the incorporation of new services and technologies under a controlled and stable process that improves security features.
+3
Applicable to:
Analytics
Identity
Security
54 out of 60
Cloud Security Posture: 2-months AssessmentPyxisThe security posture of a cloud solution refers to the state and measures to protect it from cyber threats. Using CSP Detect and fix security breaches in your cloud infrastructure.
+3
Applicable to:
Analytics
Identity
Security
55 out of 60
Cloud Security Deployment: 4-months ImplementationPyxisImplementation of cybersecurity solutions at different points and with different approaches allows for mitigating the risks for your organization, in accordance with the design suggested in the CSA.
+3
Applicable to:
Analytics
Identity
Security
56 out of 60
Cloud Security Compliance: 4-months AssessmentPyxisThe CSC service allows you to explicitly confirm compliance with regulations and standards by running tests on your Cloud solutions that you define to certify.
+3
Applicable to:
Analytics
Identity
Security
57 out of 60
Cloud Security Services: 12-months ImplementationPyxisWe audit, design, and join your IT and Compliance teams to optimize the security of your cloud. Secure your Cloud environment and deploy solutions easily and reliably.
+3
Applicable to:
Analytics
Identity
Security
58 out of 60
Microsoft Sentinel Consulting Services: 12-Months ImplementationForsyte IT SolutionsMicrosoft Sentinel consulting services are designed to get you up and running quickly to maximize your return on investment in Microsoft's advanced security technologies.
+2
Applicable to:
Identity
Security
59 out of 60
Azure Virtual Desktop Implementation -3 week PilotPC Connection, Inc.Helping customers to architect, design and deploy a Windows Virtual Desktop solution that is integrated with their existing IT infrastructure and operations.
+3
Applicable to:
Identity
Migration
Security
60 out of 60