FiltersClear all
Consulting services results
Showing results in consulting services.
Cloud4C Entra Governance & Compliance SuiteCloud4C Services Pte LtdCloud4C’s Entra Governance & Compliance Suite delivers identity governance, protection, and privileged access management with audit-ready workflows to strengthen compliance and reduce insider risks
+3
Applicable to:
Analytics
Identity
Security
1 out of 45
Cloud4C OT & IoT Security AssessmentCloud4C Services Pte LtdThis assessment leverages Microsoft Defender for IoT to map assets, model threats, and deliver vulnerability reports with a remediation roadmap for industrial and connected environments.
+3
Applicable to:
Identity
Networking
Security
2 out of 45
Cloud4C Zero Trust Readiness and StrategyCloud4C Services Pte LtdCloud4C’s Zero Trust Readiness and Strategy delivers maturity assessment, tailored architecture, and phased rollout planning with Microsoft Defender integrations for secure Zero Trust transformation
+3
Applicable to:
Identity
Networking
Security
3 out of 45
Cloud4C Security Posture AssessmentCloud4C Services Pte LtdCloud4C’s Security Posture Assessment delivers Zero Trust–aligned advisory with Secure Score reviews, Defender telemetry, workshops, and board-ready reporting to strengthen enterprise security.
+3
Applicable to:
Identity
Networking
Security
4 out of 45
Cloud4C Microsoft Cloud Security – Enterprise SuiteCloud4C Services Pte LtdCloud4C’s Microsoft Cloud Security – Enterprise Suite delivers unified protection with CNAPP, DevSecOps, WAF/DDoS, data security, and confidential computing in one enterprise-grade Zero Trust package.
+3
Applicable to:
Identity
Networking
Security
5 out of 45
Cloud4C Developer & DevOps Security BundleCloud4C Services Pte LtdCloud4C’s Developer & DevOps Security Bundle secures applications, workloads, and CI/CD pipelines with Entra Workload ID, PIM, and Conditional Access, supported by developer-focused onboarding.
+3
Applicable to:
DevOps
Identity
Security
6 out of 45
Cloud4C Confidential and Identity-Aware ComputingCloud4C Services Pte LtdCloud4C’s Confidential and Identity-Aware Computing secures data-in-use with Azure Confidential VMs, Managed HSM, Key Vault, and encryption policies for privacy-preserving, compliance-ready workloads.
+3
Applicable to:
Identity
Networking
Security
7 out of 45
Cloud4C Microsoft Copilot for Security –Readiness AssessmentCloud4C Services Pte LtdCloud4C’s Microsoft Copilot for Security Readiness Assessment identifies gaps, delivers recommendations, and builds a roadmap for smooth adoption of AI-driven security operations
+3
Applicable to:
AI & Machine Learning
Identity
Security
8 out of 45
Cloud4C Awareness Training and Incident WorkshopCloud4C Services Pte LtdThis readiness workshop delivers security training, phishing simulations, and tabletop incident response exercises to build employee resilience and organizational preparedness
+3
Applicable to:
Identity
Networking
Security
9 out of 45
Cloud4C Azure Identity Foundation AcceleratorCloud4C Services Pte LtdCloud4C’s Entra Zero Trust Starter Pack delivers identity, conditional access, privileged identity management, and secure private access to help organizations launch their Zero Trust journey
+3
Applicable to:
Identity
Networking
Security
10 out of 45
Cloud4C Microsoft Purview Data Protection OfferingCloud4C Services Pte LtdCloud4C’s Microsoft Purview Data Protection unifies discovery, classification, and compliance with AI-driven governance to prevent data loss and risks across Microsoft 365, Azure, and hybrid estates
+3
Applicable to:
Analytics
Identity
Security
11 out of 45
Cloud4C Defender for Office 365 Deployment OfferingCloud4C Services Pte LtdCloud4C’s Defender for Office 365 Deployment secures email and collaboration tools with expert setup, testing, and best practices to reduce threats, boost trust, and ensure compliant communication
+3
Applicable to:
Analytics
Identity
Security
12 out of 45
Cloud4C Intune Endpoint Compliance & Security Suite OfferingCloud4C Services Pte LtdCloud4C’s Intune Endpoint Compliance & Security Suite secures devices, enforces compliance, and streamlines endpoint management with Microsoft Intune, Defender for Endpoint, and Entra ID integration.
+3
Applicable to:
Analytics
Identity
Security
13 out of 45
Microsoft 365 Defender Enterprise DeploymentCloud4C Services Pte LtdCloud4C’s Microsoft 365 Defender Enterprise Deployment delivers unified protection with expert rollout, configuration, testing, and advisory for secure, scalable Microsoft 365 environments.
+3
Applicable to:
Analytics
Identity
Security
14 out of 45
Azure Managed Service上海诺未网络科技有限公司NovaTech offers comprehensive Azure cloud environment operation and maintenance services.
+3
Applicable to:
Analytics
Identity
Security
15 out of 45
AI Agent Customization Services上海诺未网络科技有限公司Custom AI assistants tailored for specific business needs, powered by Microsoft Copilot Studio and Azure AI Foundry technologies with enterprise security and compliance.
+3
Applicable to:
AI & Machine Learning
Data Platform
Identity
16 out of 45
Modern_SecOpsWIZARD GROUP LIMITEDhelps organizations understand the value of Microsoft's Unified Security Operations Platform—combining Microsoft Sentinel, Microsoft Defender XDR, and Microsoft Entra ID—to detect, investigate
+3
Applicable to:
Identity
Migration
Security
17 out of 45
Data_Security_WorkshopWIZARD GROUP LIMITEDis designed to help organizations identify real data security and compliance risks within their Microsoft 365 environments and understand how to mitigate them using Microsoft Purview
+3
Applicable to:
Data Platform
Identity
Security
18 out of 45
Cloud_SecurityWIZARD GROUP LIMITEDhelps organizations understand the value of Microsoft Defender for Cloud in detecting threats, improving security posture, and identifying risks and opportunities
+3
Applicable to:
Identity
Migration
Security
19 out of 45
Threat_Protection_WorkshopWIZARD GROUP LIMITEDhelps organizations uncover real threats and assess their security posture using Microsoft’s advanced security tools
+2
Applicable to:
Identity
Security
20 out of 45
Cloud Security Posture Management Service over Microsoft Defender for CloudMinsaitServicio especializado de Minsait Cyber para evaluar y mejorar la postura de seguridad cloud con Microsoft Defender for Cloud, priorizando riesgos y fortaleciendo el cumplimiento multicloud.
+3
Applicable to:
AI & Machine Learning
Identity
Security
21 out of 45
Identity & Access Management Bootstrapping PackageSpanish Point TechnologiesThe Spanish Point Identity & Access Management (IAM) assessment helps organisations evaluate their customer and partner identity access landscape, identify gaps, and build a clear roadmap to implement
+3
Applicable to:
App Modernization
Identity
Security
22 out of 45
Anchnet SmartCare Managed Security Services上海安畅网络科技股份有限公司It offers a range of services including 7*24h security monitoring, emergency response, vulnerability assessment, security governance, log analysis, and alert management on Microsoft Azure.
+3
Applicable to:
Identity
Networking
Security
23 out of 45
Identity and Access Management (IAM) bSidebSideGestión de acceso sólida, escalable y alineada con estándares internacionales. Protege cuentas privilegiadas frente a ataques como phishing, escalamiento de privilegios y movimientos laterales.
+3
Applicable to:
DevOps
Identity
Security
24 out of 45
Desarrollo de Software Seguro bSide EntrenamientobSideDetectamos y corregimos vulnerabilidades antes de escribir una sola línea de código, alineando la seguridad con los objetivos de negocio y fomentando una cultura donde todos son responsables.
+3
Applicable to:
DevOps
Identity
Security
25 out of 45
GRC bSide BasicbSideMejora el cumplimiento regulatorio con evidencia clara, reduce la exposición a riesgos legales, técnicos y operativos, y establece estándares homogéneos en entornos dispersos.
+3
Applicable to:
DevOps
Identity
Security
26 out of 45
CISO as a Service bSide EssentialbSideDiseño e implementación de la estrategia de ciberseguridad de su empresa, cumpliendo con marcos regulatorios y contractuales, mejora de seguridad mediante evaluaciones, monitoreo, y políticas.
+3
Applicable to:
DevOps
Identity
Security
27 out of 45
CISO as a Service bSide ComplementbSideConsolide la estrategia de ciberseguridad de su empresa, cumpliendo con marcos regulatorios y contractuales.
Mejora la postura de seguridad mediante evaluaciones, monitoreo y políticas.
+3
Applicable to:
DevOps
Identity
Security
28 out of 45
Cloud Security bSidebSideProtección integral que asegura la confidencialidad, integridad y disponibilidad de sus datos y aplicaciones en la nube.
+3
Applicable to:
DevOps
Identity
Security
29 out of 45
CISO as a Service bSide ProfessionalbSideEstrategia de ciberseguridad para su empresa, cumpliendo con marcos regulatorios y contractuales.
Mejora la postura de seguridad mediante evaluaciones, monitoreo, políticas y gestión de incidentes.
+3
Applicable to:
DevOps
Identity
Security
30 out of 45
Data Security & Privacy bSidebSideProtección integral de datos sensibles en cada etapa de su ciclo de vida. Permite clasificar, cifrar y controlar el acceso a la información con precisión, facilitando el cumplimiento de normativas.
+3
Applicable to:
DevOps
Identity
Security
31 out of 45
FPT Software Managed Service for Microsoft SentinelFPT-SOFTWARE CO. LTD.FPT Software Cloud Security Offering
+2
Applicable to:
Identity
Security
32 out of 45
FPT Software services for Cloud Security - Defender for CloudFPT-SOFTWARE CO. LTD.FPT Software Microsoft Cloud Security Offering
+2
Applicable to:
Identity
Security
33 out of 45
FPT Software Microsoft Security Copilot Implement - 4wkFPT-SOFTWARE CO. LTD.FPT Microsoft Security Copilot Offering harnesses the power of Microsoft Security Copilot to revolutionize security operations through generative AI.
+3
Applicable to:
Identity
Migration
Security
34 out of 45
Accion Labs | AI accelerated Purview ImplementationAccion Labs US, Inc.Unified data security, governance, and compliance powered by Microsoft Purview and AI accelerators for enterprise-scale control.
+2
Applicable to:
Identity
Security
35 out of 45
Azure Cloud & Security Readiness AssessmentSimform LLCDesigned for organizations early in Azure adoption or scaling from pilot especially with significant on-prem or non-Azure footprint where IT leaders need a clear Azure business case and roadmap
+3
Applicable to:
DevOps
Identity
Security
36 out of 45
Microsoft Purview Information Protection – Classification, Labeling & DLP at ScaleYASH TechnologiesGet tailored implementation and operational support for Microsoft Purview Information Protection to discover, classify, and protect sensitive data across Microsoft 365, Azure, and hybrid estates
+3
Applicable to:
Data Platform
Identity
Security
37 out of 45
AI-SPM with Defender for CloudYASH TechnologiesGet tailored implementation and support for Defender for Cloud AI-SPM across Azure, strengthening AI security governance and compliance
+3
Applicable to:
Identity
Security
Storage
38 out of 45
Unisys Device Subscription ServiceUnisys Corp / Blue BellDeliver a turnkey solution covering the end-to-end device lifecycle to eliminate operational burden and realize cost optimization powered by Unisys Services and the full Microsoft stack.
+3
Applicable to:
Analytics
Identity
Security
39 out of 45
GDPR Readiness using AI Driven ToolsYASH TechnologiesAchieve GDPR readiness with AI driven data discovery, automated assessments, DPIA workflows, and continuous monitoring via Microsoft Compliance Manager and Purview
+3
Applicable to:
AI & Machine Learning
Identity
Security
40 out of 45
SLMIT | Microsoft Sentinel SOC Nível 1 – Monitoramento e Detecção de SegurançaSLMIT Innovation Technology MSPServiço de monitoramento de segurança com Microsoft Sentinel que oferece visibilidade contínua, análise de eventos, triagem de alertas e relatórios de segurança para organizações que desejam iniciar
+3
Applicable to:
Identity
Networking
Security
41 out of 45
SLMIT | Avaliação de Vulnerabilidades – Infraestrutura, Cloud e Microsoft 365SLMIT Innovation Technology MSPAvaliação de vulnerabilidades em infraestrutura, Microsoft Azure e Microsoft 365, identificando riscos de segurança e priorizando ações de remediação com base nas soluções de segurança da Microsoft.
+3
Applicable to:
Identity
Networking
Security
42 out of 45
Microsoft Entra Private AccessNebulanServicio profesional de implementación de Microsoft Entra Private Access para habilitar acceso seguro por aplicación a recursos privados, reemplazando VPN tradicionales mediante un modelo Zero Trust.
+3
Applicable to:
Identity
Networking
Security
43 out of 45
Modern VPN Implementation (Azure Always On)NebulanServicio profesional de implementación de VPN moderna con Azure VPN Always On para habilitar conectividad segura, automática y persistente entre dispositivos Windows y recursos corporativos en Azure.
+3
Applicable to:
Identity
Networking
Security
44 out of 45
Modernize Identity with Microsoft EntraIBM ConsultingIBM and Microsoft are partnering to modernize identity systems using Microsoft Entra, combining IBM’s expertise with Microsoft’s platform to improve security and streamline access.
+3
Applicable to:
App Modernization
Identity
Security
45 out of 45