FiltersClear all
Consulting services results
Showing results in consulting services.
Microsoft Fabric Security AssessmentKainos SoftwareSecure and Enable Microsoft Fabric with Kainos
+3
Applicable to:
Analytics
Data Platform
Security
1 out of 16
Cloud Transformation: Strategy & ImplementationSoftware MindIdeal for businesses looking to optimize and scale their Microsoft Azure usage while maintaining efficiency and cost control.
+2
Applicable to:
Migration
Security
2 out of 16
南洋云安全分析解决方案上海南洋万邦软件技术有限公司以 Azure Log Analytics 作为统一的安全日志采集与分析底座,结合 Grafana 开源可视化平台,构建集中、透明、可扩展的云安全监测与分析体系
+1
Applicable to:
Security
3 out of 16
Azure Centre of Excellence: Unlock Cloud Value and Accelerate InnovationEPAM Systems, Inc.Accelerate secure, scalable Azure adoption through a structured Cloud Centre of Excellence.
+3
Applicable to:
DevOps
Migration
Security
4 out of 16
Azure Cloud & Security Readiness AssessmentSimform LLCDesigned for organizations early in Azure adoption or scaling from pilot especially with significant on-prem or non-Azure footprint where IT leaders need a clear Azure business case and roadmap
+3
Applicable to:
DevOps
Identity
Security
5 out of 16
Microsoft Purview Information Protection – Classification, Labeling & DLP at ScaleYASH TechnologiesGet tailored implementation and operational support for Microsoft Purview Information Protection to discover, classify, and protect sensitive data across Microsoft 365, Azure, and hybrid estates
+3
Applicable to:
Data Platform
Identity
Security
6 out of 16
Data Security Posture Management for AI Using Microsoft PurviewYASH TechnologiesSecure AI data, models, and pipelines with continuous data posture management
+3
Applicable to:
AI & Machine Learning
Data Platform
Security
7 out of 16
AI-SPM with Defender for CloudYASH TechnologiesGet tailored implementation and support for Defender for Cloud AI-SPM across Azure, strengthening AI security governance and compliance
+3
Applicable to:
Identity
Security
Storage
8 out of 16
Azure ExpressRoute: 2-Day Readiness AssessmentStormCloudEvaluate your on-premises network for Azure ExpressRoute. Get a detailed readiness report, gap analysis, and a high-speed hybrid connectivity roadmap in just 2 days.
+2
Applicable to:
Networking
Security
9 out of 16
Audit & Compliance Management - Microsoft Compliance ManagerYASH TechnologiesAutomated compliance, reduced audit effort, and continuous regulatory assurance across cloud and hybrid environments
+3
Applicable to:
Analytics
Data Platform
Security
10 out of 16
EPAM Azure Landing Zone ImplementationEPAM Systems, Inc.Establish a secure, scalable, and compliant Azure foundation with an automated Landing Zone implementation that accelerates cloud adoption and operational readiness
+3
Applicable to:
DevOps
Networking
Security
11 out of 16
Enterprise Azure API Gateway ImplementationBaltic AmadeusBaltic Amadeus implements enterprise-grade Azure API Gateway solutions using Azure API Management as a centralized, secure, and governed API layer for regulated and complex IT environments.
+3
Applicable to:
DevOps
Networking
Security
12 out of 16
Transformative FinOps Solution for Microsoft Azure – 12 Week ImplementationTechStar Consulting IncMaximize Azure ROI with TechStar’s AI-Driven Agentic FinOps, delivering intelligent cost control, governance, and real-time financial accountability.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
13 out of 16
Beyondsoft MonitoramentoBeyondsoftOs serviços de Monitoramento Standard e Premium garantem visibilidade, desempenho e suporte proativo para manter seus ambientes de TI estáveis e operando com eficiência.
+3
Applicable to:
Networking
Security
Storage
14 out of 16
EPAM Adaptive Sovereign Cloud ImplementationEPAM Systems, Inc.Enable secure, compliant, and resilient cloud operations by unifying governance, identity, and multi‑cloud control through an Adaptive Sovereign Cloud foundation
+2
Applicable to:
Identity
Security
15 out of 16
GDPR Readiness using AI Driven ToolsYASH TechnologiesAchieve GDPR readiness with AI driven data discovery, automated assessments, DPIA workflows, and continuous monitoring via Microsoft Compliance Manager and Purview
+3
Applicable to:
AI & Machine Learning
Identity
Security
16 out of 16