Pasar al contenido principal
Marketplace
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Productos
Categorías
Sectores
Asociados
Filters
Clear all
Su ubicación
Su ubicación
Productos (1)
Productos (1)
Azure (1)
Azure (1)
AI & Machine Learning
AI & Machine Learning
Análisis
Análisis
App Modernization
App Modernization
Archive
Archive
Backup
Backup
Big Data
Big Data
Data Platform
Data Platform
DevOps
DevOps
Disaster Recovery
Disaster Recovery
Identity
Identity
Internet of Things
Internet of Things
Migration
Migration
Networking
Networking
Security
Security
Storage
Storage
Dynamics 365
Dynamics 365
Microsoft 365
Microsoft 365
Power Platform
Power Platform
Sectores
Sectores
Tipo de servicio
Tipo de servicio
Modelo de precios
Modelo de precios
Consulting services results
Showing results in consulting services.
Managed Microsoft Sentinel SOC Service
DigitalXRAID Ltd
+2
Applicable to:
Identity
Security
Proactively monitor, detect, and respond to cyber threats 24/7, with DigitalXRAID’s CREST Accredited Managed Microsoft Sentinel SOC Service. Explore DigitalXRAID’s Managed Microsoft Sentinel Service.
1 out of 60
Landing Zone Assessment
Appvia
+3
Applicable to:
Identity
Migration
Security
Assess and optimise your Azure Landing Zone for security, scalability, and compliance. Identify gaps, align with best practices, and receive actionable recommendations for a robust Azure Landing Zone.
2 out of 60
Multi-Cloud Platform Strategy Assessment
Appvia
+3
Applicable to:
DevOps
Migration
Security
A strategic assessment to align your multi-cloud platform with best practices, ensuring consistency, security, and scalability across Azure and AWS.
3 out of 60
Azure DevOps Practice and Platform Assessement
Aptum Technologies (USA) Inc.
+3
Applicable to:
App Modernization
DevOps
Security
Transform your development practices with Aptum's comprehensive DevOps assessment. Get expert evaluation of your security, automation, and operational efficiency, plus a clear roadmap for improvement.
4 out of 60
Fortis ActiveRecovery Malware Digital Forensics Jumpstart
Sentinel Technologies Inc.
+2
Applicable to:
Disaster Recovery
Security
Fortis by Sentinel’s Incident Response team will use best efforts, as specified in the Service Level Agreement below, to address a malware incident within your organization’s Azure environment.
5 out of 60
LTM Security MSOC Workshop
LTIMindtree Limited
+1
Applicable to:
Security
In this workshop, we will showcase the features of Microsoft Sentinel, along with LTIMindtree’s SOC processes, frameworks, and accelerators aimed at improving threat detection and response.
6 out of 60
Migrate and Secure Windows and SQL Server - 6-week assessment
ECF Data LLC
+3
Applicable to:
Disaster Recovery
Migration
Security
ECF Data helps navigate aging Windows and SQL infrastructure, determining what to move to the cloud to reduce risk and improve performance in a 6-week engagement.
7 out of 60
Workload Onboarding Assessment
Appvia
+3
Applicable to:
DevOps
Identity
Security
Boost developer productivity with our Workload Onboarding Assessment to provide insights and recommendations for your platform.
8 out of 60
Azure Identity Security Implementation
Baufest
+2
Applicable to:
Identity
Security
In a context of increasing threats of identity theft and excessive privilege exploitation, our team of specialists works alongside our clients to implement secure identity management in Azure.
9 out of 60
Microsoft Defender for IoT Assessment: 2-Month Proof of Concept
AccountabilIT
+2
Applicable to:
Internet of Things
Security
A Defender for IoT POC designed to demystify live OT/ICS data and visualize threats alongside our 24x7 SOC- providing actionable insights to address risks and enhance security with Microsoft Sentinel.
10 out of 60
Cloud Adoption & Migration
AIM Consulting
+3
Applicable to:
Big Data
Migration
Security
AIM Consulting can Transform your Business with Microsoft Cloud Adoption and Migration: Simplifying Your Cloud Journey Every Step of the Way
11 out of 60
Multi-Cloud Platform Strategy Assessment
Appvia
+3
Applicable to:
DevOps
Migration
Security
A strategic assessment to align your multi-cloud platform with best practices, ensuring consistency, security, and scalability across Azure and AWS.
12 out of 60
Workload Onboarding Assessment
Appvia
+3
Applicable to:
DevOps
Identity
Security
Boost developer productivity with our Workload Onboarding Assessment to provide insights and recommendations for your platform.
13 out of 60
ProtectYourBusiness with Advanced Identity & Access Management
ECF Data LLC
+2
Applicable to:
Identity
Security
Secure access to ECF Data’s Azure IAM solutions. Simplify user access, protect data, and integrate identity management for seamless security.
14 out of 60
Azure Landing Zone Assessment
Appvia
+3
Applicable to:
Identity
Migration
Security
Assess and optimise your Azure Landing Zone for security, scalability, and compliance. Identify gaps, align with best practices, and receive actionable recommendations for a robust Azure Landing Zone.
15 out of 60
Logicalis Splunk on Azure
Logicalis UK
+2
Applicable to:
Security
Storage
Splunk on Azure offers security and observability, leveraging advanced analytics and AI-driven monitoring on Azure's infrastructure, enhancing security, scalability, and visibility.
16 out of 60
Eastwall Azure Governance & Security Health Check
Eastwall
+3
Applicable to:
Identity
Migration
Security
Assess, prioritize, and enhance your Azure security, governance, and compliance with a 3-week deep dive, delivering actionable insights and a phased remediation roadmap aligned with best practices.
17 out of 60
Microsoft Entra ID (Formerly Azure AD) Assessment
ITsavvy
+2
Applicable to:
Identity
Security
Evaluate and optimize your Entra ID environment for security, compliance, and efficiency with expert assessment and actionable recommendations.
18 out of 60
Data Security Workshop
Mobile Mentor
+3
Applicable to:
Analytics
Big Data
Security
The Data Security Workshop is designed to create customer intent for adopting Microsoft Purview solutions by providing real data driven examples of data security & regulatory risks in your environment
19 out of 60
2-Week Microsoft Purview DLP Rollout – Compliance Made Easy!
Brickred Systems LLC
+3
Applicable to:
Analytics
AI & Machine Learning
Security
Secure Sensitive Data, Prevent Leaks, and Achieve Compliance with Microsoft Purview DLP
20 out of 60
LTIMindtree Security Identity Assessment As A Service
LTIMindtree Limited
+2
Applicable to:
Identity
Security
This LTIMindtree offering provides the detailed overview of assessment activities and outcomes tailored for Identity services
21 out of 60
R Systems Azure Landing Zone Accelerator
R Systems
+3
Applicable to:
Migration
Networking
Security
R Systems' specialized consulting service designed to implement and optimize your Azure environment using the Azure Landing Zone Accelerator.
22 out of 60
DORA Assessment and Implementation
Simform LLC
+1
Applicable to:
Security
Ensure full compliance with the Digital Operational Resilience Act (DORA) with expert guidance on ICT risk management, incident reporting, and resilience testing for financial entities in the EU.
23 out of 60
Click2Cloud’s AI Centre of Excellence
CLICK2CLOUD INC
+3
Applicable to:
AI & Machine Learning
Migration
Security
The AI Centre of Excellence is a hub for innovation, offering expertise in discovery, AI assessment, PoC, and implementation—empowering customers to navigate their AI journeys with ease.
24 out of 60
Defending your Cloud with Microsoft Defender for Cloud (5-hours workshop – FREE)
Infinite Computer Solutions Inc
+3
Applicable to:
Analytics
Networking
Security
Fortify your security with Infinite and Microsoft Defender for Cloud: Peerless, real-time defense from code to cloud.
25 out of 60
LTM Security Defender for IoT as a Service
LTIMindtree Limited
+2
Applicable to:
Internet of Things
Security
This offering provides the detailed overview of assessment activities and outcomes tailored for OT and IoT environments
26 out of 60
Azure Threat Detection & Response Implementation
Baufest
+2
Applicable to:
Identity
Security
With tools such as Microsoft Sentinel, Web Application Firewall (WAF), Microsoft Defender and Threat Detection, their critical assets are protected through proactive monitoring and response
27 out of 60
Migration of Microsoft Sentinel Modernize
Exelegent
+3
Applicable to:
Identity
Migration
Security
Is your legacy SIEM (Security Information and Event Management) costing more to maintain than the threats it catches?
28 out of 60
LTM Security Compliance Assessment As A Service
LTIMindtree Limited
+1
Applicable to:
Security
This offering provides the detailed overview of assessment activities and outcomes tailored for Azure cloud compliance assessment related requirements and services
29 out of 60
Microsoft Azure Cloud Deployment Services for the Epic EHR 4-Week Cloud Assessment
UST
+2
Applicable to:
Migration
Security
This 4-week assessment provides a comprehensive view of your EHR application, Microsoft Azure technical infrastructure, Cloud security, and Cloud economics TCO and ROI.
30 out of 60
Secured Document Management & BPM - 5-Wk Implementation
atQor
+3
Applicable to:
Analytics
Identity
Security
Document Control System and Regulatory compliance solution with reporting and workflow for business processes.
31 out of 60
Windows/SQL 2008 Migration: 3-Week Implementation
atQor
+3
Applicable to:
Backup
Migration
Security
This Migration implementation is focused on moving applications running on End-Of-Life-Support legacy Windows server 2008 and SQL Server 2008 products into Azure.
32 out of 60
Azure Migration Service: 4-Wk Implementation
atQor
+3
Applicable to:
Backup
Migration
Security
The Modernization Solution from atQor provides a comprehensive approach to migrate infrastructure workloads to an enterprise ready cloud.
33 out of 60
Data and Infrastructure Migration - AI Assessment
CLICK2CLOUD INC
+3
Applicable to:
AI & Machine Learning
Migration
Security
Accelerate Your Cloud Migration Journey with Click2Cloud’s AI-Driven Precision!
34 out of 60
Microsoft Sentinel Deployment by H One
H One (Private) Limited
+1
Applicable to:
Security
Strengthen your security with Microsoft Sentinel, deployed seamlessly by H One for smarter threat detection and rapid response.
35 out of 60
Managed XDR Defense for Commercial, GCC, GCCH
RSM Product Sales LLC
+3
Applicable to:
Data Platform
Identity
Security
Defend your organization with managed threat detection and response services, emphasizing 24x7 security, automation, and integrated threat intelligence
36 out of 60
Cloud Security Accelerator: Three (3)-Wk Microsoft Defender for Cloud Workshops
Long View Systems
+2
Applicable to:
DevOps
Security
Enhance your security strategy and achieve regulatory compliance through Microsoft Defender for Cloud.
37 out of 60
Implementation of Microsoft Defender for Server - Windows
ITC Secure Ltd
+1
Applicable to:
Security
Deploy Microsoft Defender for Server on Windows by enabling Defender plans in Microsoft Defender for Cloud, configuring security settings, and integrating with Microsoft Defender for Endpoint.
38 out of 60
Azure Virtual Desktop in 30: Six (6)-Week Implementation
Long View Systems
+3
Applicable to:
Identity
Networking
Security
Enhance remote work capabilities and reduce IT infrastructure costs with Azure Virtual Desktop (AVD).
39 out of 60
Data and Infrastructure Migration
CLICK2CLOUD INC
+3
Applicable to:
AI & Machine Learning
Migration
Security
Drive a seamless transition of your data and infrastructure workloads to new environments with Click2Cloud’s AI-powered Migration Factory service.
40 out of 60
MXDR as a Service | Assure 365
CyberOne
+1
Applicable to:
Security
Comprehensive 24x7 Managed eXtended Detection & Response, powered by Microsoft Sentinel.
41 out of 60
Sentinel Active Directory Assessment Optimization Jumpstart
Sentinel Technologies Inc.
+1
Applicable to:
Security
Ensuring the health, security, and efficiency of your Active Directory environment is essential for maintaining operational stability and security.
42 out of 60
Penetration Testing for Microsoft Infrastructure
CyberOne
+1
Applicable to:
Security
Simulated cyber attacks to uncover vulnerabilities in your Microsoft 365, Azure and hybrid cloud environments.
43 out of 60
Cyber Recovery Assessment
Unisys Corp / Blue Bell
+1
Applicable to:
Security
Identify vulnerabilities, assess cyber maturity, and gain actionable recommendations for defending against threats and complying with industry standards like NIST and government regulations like DORA.
44 out of 60
Incident Response & Recovery Services
CyberOne
+1
Applicable to:
Security
Rapid Containment, Investigation & Recovery From Cyber Incidents Across Your Microsoft Environment
45 out of 60
Cloud Readiness Assessment: 1-Wk Assessment
atQor
+2
Applicable to:
Analytics
Security
atQor's Cloud Readiness Assessment is a journey to help customers determine resources associated with running their environment in Cloud or On-Premise and developing a detail migration plan.
46 out of 60
Document Management and Control System: 5-Wk Implementation
atQor
+3
Applicable to:
Analytics
Identity
Security
Document Control System and Regulatory compliance solution with reporting and workflow for business processes.
47 out of 60
Azure Arc Build Borderless Applications and Services: 3-Wk
atQor
+2
Applicable to:
App Modernization
Security
Azure Arc is the bridge that brings together the power of cloud computing across data centers, the edge, and multi-cloud environments.
48 out of 60
Security on Microsoft Azure: 4-Wk Assessment
atQor
+3
Applicable to:
Disaster Recovery
Identity
Security
atQor designed the Cloud Security Assessment and Migration Roadmap programs that allow organizations business transformation and sensitive data with secure and robust infrastructure assessment.
49 out of 60
SQL Server Migration: 2-Wk Implementation
atQor
+3
Applicable to:
Backup
Migration
Security
This SQL Migration Service will provides you with expert level resources to execute on your database migration to variety of Microsoft Azure offerings
50 out of 60
Application Modernization Assessment
CloudServus
+3
Applicable to:
App Modernization
Data Platform
Security
Run an Application Modernization Assessment to pinpoint gaps using App modernization; align next steps to Migrate & Modernize Your Estate.
51 out of 60
Microsoft Azure Cloud Deployment Services for the Epic EHR Cybersecurity and Zero Trust 4-week Assessment
UST
+3
Applicable to:
Disaster Recovery
Identity
Security
Explore how the Zero Trust framework and Microsoft Azure security can help hospitals and healthcare organizations optimize their cyber hygiene with EHR on cloud.
52 out of 60
CMMC Cloud Enclave - Scoping and Security Readiness Overview
Clearwater Security
+1
Applicable to:
Security
Learn from a C3PAO leader what you need for a CMMC Cloud Enclave and the insight to get it right the first time with security and compliance management cost efficiency.
53 out of 60
Capgemini OT/IIot Monitoring with Microsoft Sentinel and & AD4IoT
Capgemini Group
+3
Applicable to:
Disaster Recovery
Internet of Things
Security
Capgemini's Implementation of Microsoft Sentinel for OT is a managed security services offering supporting operational technology environments.
54 out of 60
Azure Landing Zone Foundation by Trofeo
Trofeo, LLC
+3
Applicable to:
Disaster Recovery
Migration
Security
Azure Landing Zone implemented by Trofeo is a pre-configured, foundational cloud environment that provides a well-architected framework for deploying and managing workloads.
55 out of 60
LTM_Security_EDR-XDR_Assessment _As_A_Service
LTIMindtree Limited
+1
Applicable to:
Security
This offering provides the detailed overview of assessment activities and outcomes tailored for endpoint security
56 out of 60
LTM Security Application Security Assessment As A Service
LTIMindtree Limited
+1
Applicable to:
Security
This offering provides comprehensive guidance on conducting assessments and achieving outcomes specifically designed to support application security
57 out of 60
Ops AmplifAIer: Amplify IT Operations with GenAI
Tech Mahindra Limited
+2
Applicable to:
AI & Machine Learning
Security
Generative AI is enabling a paradigm shift in the traditional ways the IT industry leverages Artificial Intelligence for IT Operations (AIOps).
58 out of 60
C1st Implementation of Azure Virtual Desktop
C1st Technologies LLC
+3
Applicable to:
Identity
Security
Storage
C1st Implementation of Azure Virtual Desktop solution delivers secure, flexible, and cost-efficient cloud desktops with expert management.
59 out of 60
Azure Hardening Security Implementation
Baufest
+2
Applicable to:
Identity
Security
We use advanced hardening practices to reduce the attack surface and strengthen the infrastructure, adapting to specific regulations and certifications such as NIST, ISO 27001, and GDPR
60 out of 60
Anterior
12
13
14
15
16
Siguiente