FiltersClear all
Consulting services results
Showing results in consulting services.
CISO as a Service bSide ProfessionalbSideEstrategia de ciberseguridad para su empresa, cumpliendo con marcos regulatorios y contractuales.
Mejora la postura de seguridad mediante evaluaciones, monitoreo, políticas y gestión de incidentes.
+3
Applicable to:
DevOps
Identity
Security
1 out of 16
Data Security & Privacy bSidebSideProtección integral de datos sensibles en cada etapa de su ciclo de vida. Permite clasificar, cifrar y controlar el acceso a la información con precisión, facilitando el cumplimiento de normativas.
+3
Applicable to:
DevOps
Identity
Security
2 out of 16
FPT Software Managed Service for Microsoft SentinelFPT-SOFTWARE CO. LTD.FPT Software Cloud Security Offering
+2
Applicable to:
Identity
Security
3 out of 16
FPT Software services for Cloud Security - Defender for CloudFPT-SOFTWARE CO. LTD.FPT Software Microsoft Cloud Security Offering
+2
Applicable to:
Identity
Security
4 out of 16
FPT Software Microsoft Security Copilot Implement - 4wkFPT-SOFTWARE CO. LTD.FPT Microsoft Security Copilot Offering harnesses the power of Microsoft Security Copilot to revolutionize security operations through generative AI.
+3
Applicable to:
Identity
Migration
Security
5 out of 16
Accion Labs | AI accelerated Purview ImplementationAccion Labs US, Inc.Unified data security, governance, and compliance powered by Microsoft Purview and AI accelerators for enterprise-scale control.
+2
Applicable to:
Identity
Security
6 out of 16
Azure Cloud & Security Readiness AssessmentSimform LLCDesigned for organizations early in Azure adoption or scaling from pilot especially with significant on-prem or non-Azure footprint where IT leaders need a clear Azure business case and roadmap
+3
Applicable to:
DevOps
Identity
Security
7 out of 16
Microsoft Purview Information Protection – Classification, Labeling & DLP at ScaleYASH TechnologiesGet tailored implementation and operational support for Microsoft Purview Information Protection to discover, classify, and protect sensitive data across Microsoft 365, Azure, and hybrid estates
+3
Applicable to:
Data Platform
Identity
Security
8 out of 16
AI-SPM with Defender for CloudYASH TechnologiesGet tailored implementation and support for Defender for Cloud AI-SPM across Azure, strengthening AI security governance and compliance
+3
Applicable to:
Identity
Security
Storage
9 out of 16
Unisys Device Subscription ServiceUnisys Corp / Blue BellDeliver a turnkey solution covering the end-to-end device lifecycle to eliminate operational burden and realize cost optimization powered by Unisys Services and the full Microsoft stack.
+3
Applicable to:
Analytics
Identity
Security
10 out of 16
GDPR Readiness using AI Driven ToolsYASH TechnologiesAchieve GDPR readiness with AI driven data discovery, automated assessments, DPIA workflows, and continuous monitoring via Microsoft Compliance Manager and Purview
+3
Applicable to:
AI & Machine Learning
Identity
Security
11 out of 16
Microsoft Entra Private AccessNebulanServicio profesional de implementación de Microsoft Entra Private Access para habilitar acceso seguro por aplicación a recursos privados, reemplazando VPN tradicionales mediante un modelo Zero Trust.
+3
Applicable to:
Identity
Networking
Security
12 out of 16
Modern VPN Implementation (Azure Always On)NebulanServicio profesional de implementación de VPN moderna con Azure VPN Always On para habilitar conectividad segura, automática y persistente entre dispositivos Windows y recursos corporativos en Azure.
+3
Applicable to:
Identity
Networking
Security
13 out of 16
Modernize Identity with Microsoft EntraIBM ConsultingIBM and Microsoft are partnering to modernize identity systems using Microsoft Entra, combining IBM’s expertise with Microsoft’s platform to improve security and streamline access.
+3
Applicable to:
App Modernization
Identity
Security
14 out of 16
NIST CSF 2.0 Assessment & Security Posture Enhancement Powered by AIYASH TechnologiesOperationalize NIST CSF 2.0 with AI assisted assessments, outcome based risk scoring, and posture dashboards integrating Microsoft Compliance Manager, Microsoft Purview & Microsoft Sentinel/Defender
+3
Applicable to:
AI & Machine Learning
Identity
Security
15 out of 16
Accenture Sovereign Cloud AssessmentAccentureA structured sovereign cloud assessment and strategy engagement that helps organisations understand regulatory requirements, assess their current estate, and define a clear, actionable roadmap
+3
Applicable to:
Analytics
Identity
Security
16 out of 16