FiltreRyd alle
Konsulenttjenester resultater
Viser resultater i konsulenttjenester.
Microsoft Security - IDENTITY & ACCESS MANAGEMENTFPT-SOFTWARE CO. LTD.FPT Software Microsoft Entra ID Acceleration
+1
Applicable to:
Security
1 out of 60
FPT Software Managed Service for Microsoft SentinelFPT-SOFTWARE CO. LTD.FPT Software Cloud Security Offering
+2
Applicable to:
Identity
Security
2 out of 60
FPT Software services for Cloud Security - Defender for CloudFPT-SOFTWARE CO. LTD.FPT Software Microsoft Cloud Security Offering
+2
Applicable to:
Identity
Security
3 out of 60
FPT Software Microsoft Security Copilot Implement - 4wkFPT-SOFTWARE CO. LTD.FPT Microsoft Security Copilot Offering harnesses the power of Microsoft Security Copilot to revolutionize security operations through generative AI.
+3
Applicable to:
Identity
Migration
Security
4 out of 60
Microsoft Fabric Security AssessmentKainos SoftwareSecure and Enable Microsoft Fabric with Kainos
+3
Applicable to:
Analytics
Data Platform
Security
5 out of 60
Cloud Transformation: Strategy & ImplementationSoftware MindIdeal for businesses looking to optimize and scale their Microsoft Azure usage while maintaining efficiency and cost control.
+2
Applicable to:
Migration
Security
6 out of 60
南洋云安全分析解决方案上海南洋万邦软件技术有限公司以 Azure Log Analytics 作为统一的安全日志采集与分析底座,结合 Grafana 开源可视化平台,构建集中、透明、可扩展的云安全监测与分析体系
+1
Applicable to:
Security
7 out of 60
Azure Centre of Excellence: Unlock Cloud Value and Accelerate InnovationEPAM Systems, Inc.Accelerate secure, scalable Azure adoption through a structured Cloud Centre of Excellence.
+3
Applicable to:
DevOps
Migration
Security
8 out of 60
Azure Cloud & Security Readiness AssessmentSimform LLCDesigned for organizations early in Azure adoption or scaling from pilot especially with significant on-prem or non-Azure footprint where IT leaders need a clear Azure business case and roadmap
+3
Applicable to:
DevOps
Identity
Security
9 out of 60
Microsoft Purview Information Protection – Classification, Labeling & DLP at ScaleYASH TechnologiesGet tailored implementation and operational support for Microsoft Purview Information Protection to discover, classify, and protect sensitive data across Microsoft 365, Azure, and hybrid estates
+3
Applicable to:
Data Platform
Identity
Security
10 out of 60
Data Security Posture Management for AI Using Microsoft PurviewYASH TechnologiesSecure AI data, models, and pipelines with continuous data posture management
+3
Applicable to:
AI & Machine Learning
Data Platform
Security
11 out of 60
AI-SPM with Defender for CloudYASH TechnologiesGet tailored implementation and support for Defender for Cloud AI-SPM across Azure, strengthening AI security governance and compliance
+3
Applicable to:
Identity
Security
Storage
12 out of 60
Azure ExpressRoute: 2-Day Readiness AssessmentStormCloudEvaluate your on-premises network for Azure ExpressRoute. Get a detailed readiness report, gap analysis, and a high-speed hybrid connectivity roadmap in just 2 days.
+2
Applicable to:
Networking
Security
13 out of 60
Audit & Compliance Management - Microsoft Compliance ManagerYASH TechnologiesAutomated compliance, reduced audit effort, and continuous regulatory assurance across cloud and hybrid environments
+3
Applicable to:
Analytics
Data Platform
Security
14 out of 60
EPAM Azure Landing Zone ImplementationEPAM Systems, Inc.Establish a secure, scalable, and compliant Azure foundation with an automated Landing Zone implementation that accelerates cloud adoption and operational readiness
+3
Applicable to:
DevOps
Networking
Security
15 out of 60
Enterprise Azure API Gateway ImplementationBaltic AmadeusBaltic Amadeus implements enterprise-grade Azure API Gateway solutions using Azure API Management as a centralized, secure, and governed API layer for regulated and complex IT environments.
+3
Applicable to:
DevOps
Networking
Security
16 out of 60
Transformative FinOps Solution for Microsoft Azure – 12 Week ImplementationTechStar Consulting IncMaximize Azure ROI with TechStar’s AI-Driven Agentic FinOps, delivering intelligent cost control, governance, and real-time financial accountability.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
17 out of 60
Beyondsoft MonitoramentoBeyondsoftOs serviços de Monitoramento Standard e Premium garantem visibilidade, desempenho e suporte proativo para manter seus ambientes de TI estáveis e operando com eficiência.
+3
Applicable to:
Networking
Security
Storage
18 out of 60
EPAM Adaptive Sovereign Cloud ImplementationEPAM Systems, Inc.Enable secure, compliant, and resilient cloud operations by unifying governance, identity, and multi‑cloud control through an Adaptive Sovereign Cloud foundation
+2
Applicable to:
Identity
Security
19 out of 60
Unisys Device Subscription ServiceUnisys Corp / Blue BellDeliver a turnkey solution covering the end-to-end device lifecycle to eliminate operational burden and realize cost optimization powered by Unisys Services and the full Microsoft stack.
+3
Applicable to:
Analytics
Identity
Security
20 out of 60
GDPR Readiness using AI Driven ToolsYASH TechnologiesAchieve GDPR readiness with AI driven data discovery, automated assessments, DPIA workflows, and continuous monitoring via Microsoft Compliance Manager and Purview
+3
Applicable to:
AI & Machine Learning
Identity
Security
21 out of 60
EPAM Microsoft Purview Data Security DeploymentEPAM Systems, Inc.Deploy Microsoft Purview to unify data security, compliance, and lifecycle governance across the organization.
+3
Applicable to:
Data Platform
Identity
Security
22 out of 60
FY26_Azure Security AssessmentIFI TechsolutionsAzure Security Assessment uncovers security gaps with clear, actionable insights. It enables customers to securely adopt or scale Microsoft Azure.
+3
Applicable to:
Migration
Networking
Security
23 out of 60
AI Security Data Security DashboardBillennium S.A.This engagement adds a unified, governance-aligned Data&AI security layer in Azure, providing clear visibility, KPIs, and a prioritized remediation plan to improve security without slowing innovation.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
24 out of 60
Atos || Transform Security Operations with Atos Sovereign MXDR integrated with MicrosoftAtos International SASUnify your SOC with sovereign MXDR. Maximize Microsoft security ROI and strengthen resilience.
+2
Applicable to:
Data Platform
Security
25 out of 60
Modernize Identity with Microsoft EntraIBM ConsultingIBM and Microsoft are partnering to modernize identity systems using Microsoft Entra, combining IBM’s expertise with Microsoft’s platform to improve security and streamline access.
+3
Applicable to:
App Modernization
Identity
Security
26 out of 60
Azure Rights Management: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Rights Management in their production environment.
+3
Applicable to:
App Modernization
Identity
Security
27 out of 60
Azure Rights Management: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see, understand and test the Azure Rights Management on a demo tenant.
+3
Applicable to:
App Modernization
Identity
Security
28 out of 60
Azure Security Center: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to secure workloads in Azure Cloud.
+3
Applicable to:
Identity
Security
Storage
29 out of 60
Disaster Site Recovery: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Cloud for Business Continuity
+3
Applicable to:
Backup
Disaster Recovery
Security
30 out of 60
Azure Rights Management: 1 Week AssessmentCommunication Square LLCThis 1 week assessment is designed to help customers plan for ways to deploy and manage Azure Rights Management.
+3
Applicable to:
App Modernization
Identity
Security
31 out of 60
Azure Security Center: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see Azure Security Center benefits and stay ahead of changing threat landscape across the cloud.
+3
Applicable to:
Identity
Security
Storage
32 out of 60
Azure Virtual Desktop: 4-Week PoCInfopulseInfopulse will help your enterprise to achieve strategic digital transformation goals with Azure Virtual configuration, migration, and deployment of your RDS/VDI infrastructure to Azure.
+3
Applicable to:
Disaster Recovery
Migration
Security
33 out of 60
Cybersecurity Advisory Baseline 1-wk WorkshopNTT LimitedCybersecurity Advisory Baseline is an asset-based consulting engagement that uses workshops and interviews to assess cybersecurity maturity across all areas of your people, processes and technologies.
+3
Applicable to:
Internet of Things
Migration
Security
34 out of 60
Cloud Adoption: 7-Day Technical AssessmentASSECO DATA SYSTEMS S.A.Knowledge and ability to perform tasks requiring complex analysis and precise solutions. We implement and manage services and provide maintenance and optimization support.
+2
Applicable to:
Identity
Security
35 out of 60
Azure Security: 21-Day Security AssessmentASSECO DATA SYSTEMS S.A.Take the right steps to ensure your Azure implementation keeps your business safe and secure.
+2
Applicable to:
Data Platform
Security
36 out of 60
Cloud Disaster Recovery: 3-day AssessmentAtende S.A.Cloud Disaster Recovery assessment is a three-days evaluation of customer requirements, business needs and goals to provide available DR options with estimated cost information.
+3
Applicable to:
Backup
Disaster Recovery
Security
37 out of 60
Penetration tests: 4-Wks AssessmentPwC Advisory spółka z ograniczoną odpowiedzialnością spółka komandytowaPenetration tests and configuration reviews of Microsoft Azure cloud and hybrid infrastructure
+3
Applicable to:
Analytics
Networking
Security
38 out of 60
Windows Virtual Desktop: 6-Hr WorkshopIntegrity Partners Sp. z o.o.The WVD workshop covers a detailed description of best practices and step-by-step guide to deploy a new tenant to move your infrastructure into the Azure cloud.
+3
Applicable to:
Internet of Things
Networking
Security
39 out of 60
Security platforms and SOC: <10 Wks ImplementationPwC Advisory spółka z ograniczoną odpowiedzialnością spółka komandytowaSecurity platform (SIEM, EDR, SOAR) implementation and SOC services
+3
Applicable to:
Analytics
Migration
Security
40 out of 60
Remote Team - WVD Migration: 2-Wk AssessmentIntegrity Partners Sp. z o.o.Our experts will interview you and recommend the custom Windows Virtual Desktop deployment for your team.
+3
Applicable to:
Migration
Security
Storage
41 out of 60
Cloud Security Readiness: 3 Week AssessmentAccenture - PolandWith Cloud Security Readiness Assessment, Accenture helps customer to assess information security risks, legal and compliance challenges and plan secure cloud implementation.
+3
Applicable to:
DevOps
Identity
Security
42 out of 60
Azure PCI DSS Compliance: 4-Hr AssessmentDGITAL LabsDGITAL Labs offers an assessment session to transform an Azure environment compliant to PCI DSS standard.
+3
Applicable to:
Analytics
App Modernization
Security
43 out of 60
Azure Migration: 2-Hr AssessmentIntegrity Partners Sp. z o.o.We will plan the necessary resources to transfer a single server based on Windows Server OS to the Azure platform and define the way and plan of migration.
+3
Applicable to:
Backup
Migration
Security
44 out of 60
Cloud Security: 4-Week AssessmentKPMG ADVISORY SP Z O O SPOLKA KOMANDYTOWAWith the growth of cloud adoption, it is crucial to look into not only technological advancement but also ensure that all of your Company’s most vital assets have been properly secured.
+3
Applicable to:
Identity
Networking
Security
45 out of 60
Go to Cloud - 5 Day WorkshopInetum PolandThis workshop will allow your organization to understand what is possible in terms of Migration-to-Cloud.
+3
Applicable to:
App Modernization
Migration
Security
46 out of 60
Microsoft Azure Sentinel 4-Week WorkshopCloud4C Services Pte LtdA workshop allowing you to experience “Azure Sentinel” a combination of SIEM and SOAR solution powered by the built-in AI, analytics and automation with an ability to write the custom alerts
+3
Applicable to:
Identity
Migration
Security
47 out of 60
Cloud Backup: 3-day AssessmentAtende S.A.Atende Cloud Backup assessment is a three-days evaluation of customer backup requirements, business needs and goals to provide available cloud backup options with estimate cost information.
+3
Applicable to:
Archive
Backup
Security
48 out of 60
Azure Integration Services - 1 week assesementIWConnectNo application is isolated and functions alone. Nowadays, when you build or buy a software, you will need to connect it to other software.
+3
Applicable to:
Data Platform
DevOps
Security
49 out of 60
Host public services on Azure - 1 week assessmentIWConnectDo you have troubles with maintaining internet facing hardware and software on-premise? Do you want to take this burden off of your organization and even more reduce the cost?
+3
Applicable to:
App Modernization
Migration
Security
50 out of 60
2-Day Azure Security WorkshopSupremo Sp. z o.o.Two days of practical workshops addressing the subject of Azure security. Each participant will learn how to design and use defense mechanisms against hacker attacks.
+3
Applicable to:
Backup
Networking
Security
51 out of 60
Are you ready for the cloud? - 1 week assessmentIWConnectAre you thinking whether you should move to the cloud? You are doubting its capabilities?
+3
Applicable to:
App Modernization
Migration
Security
52 out of 60
Infrastructure Assessment - 4 weeksMITIBI LLC.analysis and study of infrastructure elements, applications and processes. Create a status report and cloud migration plan
+3
Applicable to:
App Modernization
Migration
Security
53 out of 60
Azure Managed Security Services: 2 Wk AssessmentUSTCyberProof will conduct a cyber maturity assessment for deploying an on-cloud SOC platform on an Azure environment.
+3
Applicable to:
AI & Machine Learning
DevOps
Security
54 out of 60
Azure Sentinel: QuickStart 1-Hr WorkshopForteventoOverview of Azure Sentinel service and quick setup of first connector (Microsoft 365) data collection, analysis. Start collecting Microsoft 365 activity data for free. See Azure Sentinel capabilities.
+2
Applicable to:
Identity
Security
55 out of 60
Remote Work Solution: 1 Hour BriefingCommunication Square LLCThis briefing or as we at Communication Square like to call it Cloud Strategy Call is designed to help customers understand the benefits of Remote Work Solution
+2
Applicable to:
Data Platform
Security
56 out of 60
Azure Security Center: 4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure Security Center, while having the ability to manage and control.
+3
Applicable to:
Identity
Security
Storage
57 out of 60
Azure Rights Management: 1 Hour BriefingCommunication Square LLC1 hour Briefing on Azure Rights Management in the Cloud
+3
Applicable to:
App Modernization
Identity
Security
58 out of 60
Endpoint Management: 2 Weeks Proof of ConceptCommunication Square LLCThis 2 week Proof of Concept is designed to help customers see how diverse the mobile eco system is and how azure is helping to protect and secure sensitive data.
+2
Applicable to:
Identity
Security
59 out of 60
First Line Workers Solution:4 Weeks ImplementationCommunication Square LLCThis 4 week Implementation is designed to help customers fully utilize Azure based First Line workers Solution in their existing infrastructure and training's.
+3
Applicable to:
Big Data
Data Platform
Security
60 out of 60