FiltersClear all
Consulting services results
Showing results in consulting services.
Accion Labs | SmartOps- AI infused DevOpsAccion Labs US, Inc.Kick-start Your Transformation with a Streamlined DevOps Strategy. Accelerate your organization's transformation and drive efficient decision-making by implementing a robust DevOps strategy.
+3
Applicable to:
AI & Machine Learning
DevOps
Security
1 out of 39
Cloud Security Envisioning WorkshopVerify8Given the volume and complexity of identities, data, applications, devices, and infrastructure, it’s essential to learn how secure your organization is, and how to mitigate and protect against threats
+1
Applicable to:
Security
2 out of 39
Modern_SecOpsWIZARD GROUP LIMITEDhelps organizations understand the value of Microsoft's Unified Security Operations Platform—combining Microsoft Sentinel, Microsoft Defender XDR, and Microsoft Entra ID—to detect, investigate
+3
Applicable to:
Identity
Migration
Security
3 out of 39
Data_Security_WorkshopWIZARD GROUP LIMITEDis designed to help organizations identify real data security and compliance risks within their Microsoft 365 environments and understand how to mitigate them using Microsoft Purview
+3
Applicable to:
Data Platform
Identity
Security
4 out of 39
Cloud_SecurityWIZARD GROUP LIMITEDhelps organizations understand the value of Microsoft Defender for Cloud in detecting threats, improving security posture, and identifying risks and opportunities
+3
Applicable to:
Identity
Migration
Security
5 out of 39
Threat_Protection_WorkshopWIZARD GROUP LIMITEDhelps organizations uncover real threats and assess their security posture using Microsoft’s advanced security tools
+2
Applicable to:
Identity
Security
6 out of 39
Cloud Security Posture Management Service over Microsoft Defender for CloudMinsaitServicio especializado de Minsait Cyber para evaluar y mejorar la postura de seguridad cloud con Microsoft Defender for Cloud, priorizando riesgos y fortaleciendo el cumplimiento multicloud.
+3
Applicable to:
AI & Machine Learning
Identity
Security
7 out of 39
Identity & Access Management Bootstrapping PackageSpanish Point TechnologiesThe Spanish Point Identity & Access Management (IAM) assessment helps organisations evaluate their customer and partner identity access landscape, identify gaps, and build a clear roadmap to implement
+3
Applicable to:
App Modernization
Identity
Security
8 out of 39
Azure Operations & Governance: 2-6 Week AssessmentPlan A TechnologiesEvaluate your operational readiness, security posture, and governance model with a comprehensive discovery assessment from Plan A Technologies.
+3
Applicable to:
Analytics
DevOps
Security
9 out of 39
Managed Azure Support & OperationsPlan A TechnologiesMaximize your cloud reliability and performance with proactive support, infrastructure management, and 24/7 operations from Plan A Technologies.
+3
Applicable to:
Analytics
DevOps
Security
10 out of 39
Anchnet One-stop MLPS 2.0 Compliance Service上海安畅网络科技股份有限公司This service includes technical support for Azure China cloud platform and can assist customers in easily passing China Cybersecurity Law MLPS 2.0 compliance certification.
+1
Applicable to:
Security
11 out of 39
Anchnet SmartCare Managed Security Services上海安畅网络科技股份有限公司It offers a range of services including 7*24h security monitoring, emergency response, vulnerability assessment, security governance, log analysis, and alert management on Microsoft Azure.
+3
Applicable to:
Identity
Networking
Security
12 out of 39
Free 2-Hour Microsoft Fabric Consultation for EWON Flexy 205 Integration with Azure IoT HubiFour Technolab Private LimitedGet a simple, easy plan to bring all your industrial data together and make smart decisions using Microsoft Fabric.
Start with a free 2-hour session to audit your current setup and share the solution
+3
Applicable to:
Analytics
Internet of Things
Security
13 out of 39
Data Security Posture Management with Microsoft PurviewKyndryl Inc.Assess and improve your data security posture with continuous visibility, risk insights, and compliance support to protect sensitive data across hybrid and multi-cloud environments.
+3
Applicable to:
Big Data
Disaster Recovery
Security
14 out of 39
Kyndryl Agentic AI Digital Trust ServicesKyndryl Inc.Kyndryl Agentic AI Digital Trust Services provide comprehensive security solutions for autonomous AI systems in hybrid and cloud environments using Microsoft's AI and security ecosystem. Focus on AI a
+3
Applicable to:
AI & Machine Learning
Disaster Recovery
Security
15 out of 39
AI Chatbot for Appointment SchedulingiFour Technolab Private Limited24/7 AI chatbot that lets patients instantly book, reschedule, or cancel appointments without calling the front desk.
Reduced admin effort, smoother operations through secure, real-time system.
+2
Applicable to:
AI & Machine Learning
Security
16 out of 39
Cloocus Cloud Security Envisioning Workshop with Microsoft Defender for ClouodCloocusA focused workshop that helps organizations understand their cloud security posture, identify real risks, and define and executive-ready security roadmap using Microsoft Defender for Cloud.
+1
Applicable to:
Security
17 out of 39
Cloocus Threat Protection Envisioning WorkshopCloocusA focused workshop that helps organizations identify real security threats in their production environment and define a prioritized threat protection roadmap using Microsoft Security solutions.
+1
Applicable to:
Security
18 out of 39
Microsoft Security - IDENTITY & ACCESS MANAGEMENTFPT-SOFTWARE CO. LTD.FPT Software Microsoft Entra ID Acceleration
+1
Applicable to:
Security
19 out of 39
FPT Software Managed Service for Microsoft SentinelFPT-SOFTWARE CO. LTD.FPT Software Cloud Security Offering
+2
Applicable to:
Identity
Security
20 out of 39
FPT Software services for Cloud Security - Defender for CloudFPT-SOFTWARE CO. LTD.FPT Software Microsoft Cloud Security Offering
+2
Applicable to:
Identity
Security
21 out of 39
FPT Software Microsoft Security Copilot Implement - 4wkFPT-SOFTWARE CO. LTD.FPT Microsoft Security Copilot Offering harnesses the power of Microsoft Security Copilot to revolutionize security operations through generative AI.
+3
Applicable to:
Identity
Migration
Security
22 out of 39
Accion Labs | AI accelerated Purview ImplementationAccion Labs US, Inc.Unified data security, governance, and compliance powered by Microsoft Purview and AI accelerators for enterprise-scale control.
+2
Applicable to:
Identity
Security
23 out of 39
Microsoft Fabric Security AssessmentKainos SoftwareSecure and Enable Microsoft Fabric with Kainos
+3
Applicable to:
Analytics
Data Platform
Security
24 out of 39
Cloud Transformation: Strategy & ImplementationSoftware MindIdeal for businesses looking to optimize and scale their Microsoft Azure usage while maintaining efficiency and cost control.
+2
Applicable to:
Migration
Security
25 out of 39
南洋云安全分析解决方案上海南洋万邦软件技术有限公司以 Azure Log Analytics 作为统一的安全日志采集与分析底座,结合 Grafana 开源可视化平台,构建集中、透明、可扩展的云安全监测与分析体系
+1
Applicable to:
Security
26 out of 39
Azure AI Landing Zone: BriefingSK(주)AI Landing Zone in Azure by SK AX is a secure, compliant enterprise platform that accelerates the deployment and operation of generative AI workloads using Azure landing zone architecture.
+3
Applicable to:
AI & Machine Learning
DevOps
Security
27 out of 39
Azure Cloud & Security Readiness AssessmentSimform LLCDesigned for organizations early in Azure adoption or scaling from pilot especially with significant on-prem or non-Azure footprint where IT leaders need a clear Azure business case and roadmap
+3
Applicable to:
DevOps
Identity
Security
28 out of 39
Microsoft Purview Information Protection – Classification, Labeling & DLP at ScaleYASH TechnologiesGet tailored implementation and operational support for Microsoft Purview Information Protection to discover, classify, and protect sensitive data across Microsoft 365, Azure, and hybrid estates
+3
Applicable to:
Data Platform
Identity
Security
29 out of 39
Data Security Posture Management for AI Using Microsoft PurviewYASH TechnologiesSecure AI data, models, and pipelines with continuous data posture management
+3
Applicable to:
AI & Machine Learning
Data Platform
Security
30 out of 39
AI-SPM with Defender for CloudYASH TechnologiesGet tailored implementation and support for Defender for Cloud AI-SPM across Azure, strengthening AI security governance and compliance
+3
Applicable to:
Identity
Security
Storage
31 out of 39
Azure ExpressRoute: 2-Day Readiness AssessmentStormCloudEvaluate your on-premises network for Azure ExpressRoute. Get a detailed readiness report, gap analysis, and a high-speed hybrid connectivity roadmap in just 2 days.
+2
Applicable to:
Networking
Security
32 out of 39
Audit & Compliance Management - Microsoft Compliance ManagerYASH TechnologiesAutomated compliance, reduced audit effort, and continuous regulatory assurance across cloud and hybrid environments
+3
Applicable to:
Analytics
Data Platform
Security
33 out of 39
EPAM Azure Landing Zone ImplementationEPAM Systems, Inc.Establish a secure, scalable, and compliant Azure foundation with an automated Landing Zone implementation that accelerates cloud adoption and operational readiness
+3
Applicable to:
DevOps
Networking
Security
34 out of 39
Enterprise Azure API Gateway ImplementationBaltic AmadeusBaltic Amadeus implements enterprise-grade Azure API Gateway solutions using Azure API Management as a centralized, secure, and governed API layer for regulated and complex IT environments.
+3
Applicable to:
DevOps
Networking
Security
35 out of 39
Transformative FinOps Solution for Microsoft Azure – 12 Week ImplementationTechStar Consulting IncMaximize Azure ROI with TechStar’s AI-Driven Agentic FinOps, delivering intelligent cost control, governance, and real-time financial accountability.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
36 out of 39
Beyondsoft MonitoramentoBeyondsoftOs serviços de Monitoramento Standard e Premium garantem visibilidade, desempenho e suporte proativo para manter seus ambientes de TI estáveis e operando com eficiência.
+3
Applicable to:
Networking
Security
Storage
37 out of 39
EPAM Adaptive Sovereign Cloud ImplementationEPAM Systems, Inc.Enable secure, compliant, and resilient cloud operations by unifying governance, identity, and multi‑cloud control through an Adaptive Sovereign Cloud foundation
+2
Applicable to:
Identity
Security
38 out of 39
Unisys Device Subscription ServiceUnisys Corp / Blue BellDeliver a turnkey solution covering the end-to-end device lifecycle to eliminate operational burden and realize cost optimization powered by Unisys Services and the full Microsoft stack.
+3
Applicable to:
Analytics
Identity
Security
39 out of 39