Pasar al contenido principal
Marketplace
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Productos
Categorías
Sectores
Asociados
Filters
Clear all
Su ubicación
Su ubicación
Productos (1)
Productos (1)
Azure (1)
Azure (1)
AI & Machine Learning
AI & Machine Learning
Análisis
Análisis
App Modernization
App Modernization
Archive
Archive
Backup
Backup
Big Data
Big Data
Data Platform
Data Platform
DevOps
DevOps
Disaster Recovery
Disaster Recovery
Identity
Identity
Internet of Things
Internet of Things
Migration
Migration
Networking
Networking
Security
Security
Storage
Storage
Dynamics 365
Dynamics 365
Microsoft 365
Microsoft 365
Power Platform
Power Platform
Sectores
Sectores
Tipo de servicio
Tipo de servicio
Modelo de precios
Modelo de precios
Consulting services results
Showing results in consulting services.
SOC de Soluções Microsoft Azure e Microsoft 365
Redbelt Security
+3
Applicable to:
Identity
Networking
Security
Serviços de gerenciamento, operação e resposta a incidentes focado em soluções e ambientes Microsoft.
1 out of 60
Azure Virtual Desktop Assessment: 2 Week Assessment
Sourcepass MCOE
+3
Applicable to:
Identity
Networking
Security
Azure Virtual Desktop Assessment begins with a comprehensive assessment, during which our team evaluates the existing environment & provides recommendations for performance, scalability & resilience.
2 out of 60
SOC Compliance readiness check: 1-Month Professional Service
IT Partner LLC
+2
Applicable to:
Identity
Security
Assess your organization's readiness for SOC compliance, helping identify and address potential control and policy issues to prepare for an official SOC audit effectively.
3 out of 60
Azure Security Assessment: 2 Week Assessment
Sourcepass MCOE
+3
Applicable to:
Identity
Security
Storage
Every Defender project starts with a thorough assessment where our team evaluates the current setup. Based on this, we offer suggestions to enhance security, performance, and scalability.
4 out of 60
Palo Alto Firewall Deployment: 6-Week Implementation
RSM Product Sales LLC
+3
Applicable to:
Identity
Networking
Security
Empower your network's security and safeguard your digital landscape with the Palo Alto firewall solution deployed by RSM.
5 out of 60
Azure MFA Quick Start: 2-Week Implementation
All Covered, a division of Konica Minolta
+2
Applicable to:
Identity
Security
A 2-week consulting implementation that will enhance your organization's identity security capabilities through Azure Multi-Factor Authentication (MFA)
6 out of 60
Okta to Microsoft Entra ID Migration: 3-Wk Implementation
Withum Digital
+2
Applicable to:
Identity
Security
This Okta to Microsoft Entra ID Migration Solution Will Streamline Your Identity Management for Enhanced Security and Cost Reduction
7 out of 60
Eviden's Application Strategy Workshop
Eviden International France - SAS
+3
Applicable to:
App Modernization
Data Platform
Identity
Eviden's Application Strategy Workshop is designed to help customers maximize business value from technology.
8 out of 60
Security Warrior: Managed Service
TechConnect
+3
Applicable to:
DevOps
Identity
Security
Our Security Warrior, will give you the visibility and remediation into your Azure security posture to manage the risk through an affordable single pane of glass solution.
9 out of 60
Sentinel Accelerator 4-Wk | Implementation/POC
Bulletproof Solutions Inc.
+2
Applicable to:
Identity
Security
Accelerate Sentinel Deployment for clients and Maximize Utilization
10 out of 60
Azure Well Architected Framework (AWAF) Assessment
NOVENTIQ
+3
Applicable to:
Identity
Security
Storage
Optimize Azure efficiency and security with our Well-Architected Framework Assessment. Uncover challenges, enhance performance, and fortify your infrastructure for success.
11 out of 60
Security and Compliance Assessment
NOVENTIQ
+3
Applicable to:
Identity
Networking
Security
Gain insights by thorough evaluation of Azure environment’s security posture to ensure best practices.
12 out of 60
Windows Autopilot - Initial Setup: 3-Wk Initial Professional Service
IT Partner LLC
+3
Applicable to:
Identity
Migration
Security
Implement Windows Autopilot for seamless device deployment, enabling automated, image-free Windows deployment to PCs worldwide, requiring minimal infrastructure.
13 out of 60
HCLTech's Universal Managed Detection Response (MXDR)
HCL Technologies Limited.
+2
Applicable to:
Identity
Security
Universal Managed Detection & Response (UMDR) powered by Microsoft XDR solution
14 out of 60
Virtual Desktop Workshop: Azure & Windows 365 PC - 2 hour Workshop
B&R Business Solutions
+3
Applicable to:
Identity
Networking
Security
Which is right for my business case Azure Virtual Desktop or Windows 365 PC? The purpose of this workshop is to provide the information you need to make a well informed & confident decision.
15 out of 60
Zero Trust Security
Sentinel Technologies Inc.
+3
Applicable to:
Disaster Recovery
Identity
Security
76% of organizations have experienced a ransomware attack at some point in the last two years - State of the Phish Report 2023
16 out of 60
Telehealth and Telemedicine Maturity Workshop
Sentinel Technologies Inc.
+2
Applicable to:
Identity
Security
Sentinel's Telehealth & Telemedicine Maturity Workshop analyzes the current status of your distributed care environment and helps you establish a clear strategy for the future.
17 out of 60
Threat Protection Envisioning Workshop – Microsoft Security
ENCAMINA S.L.
+3
Applicable to:
Identity
Networking
Security
Workshop de ciberseguridad para evaluar la postura frente a amenazas avanzadas y definir una estrategia de protección basada en Microsoft Security.
18 out of 60
Lightstream Comprehensive Azure Core Security Assessment
Lightstream
+3
Applicable to:
Identity
Networking
Security
Lightstream will provide a comprehensive understanding of your Azure security landscape with actionable recommendations.
19 out of 60
KloudIdentity: Application Onboarding to Entra made simple with our SCIM Gateway
KloudyNet Technologies SDN BHD
+2
Applicable to:
Identity
Security
KloudIdentity is our proprietary SCIM Gateway to onboard LOB & Cloud applications (including non SCIM compliant), databases and other applications to Microsoft Entra for users and groups provisioning.
20 out of 60
Threat Protection: 5-day Engagement
Bridewell Consulting Limited
+3
Applicable to:
Identity
Networking
Security
Mitigate cyber security risks within your Microsoft Azure environments by attending a 5 day workshop with Bridewell.
21 out of 60
Defender For Cloud: 1-Wk Proof of Concept
Bridewell Consulting Limited
+3
Applicable to:
Identity
Networking
Security
Secure your organisation's Azure Cloud workloads by leveraging the expertise of a leading cyber security services provider to review and optimise your implementation of Defender for Cloud.
22 out of 60
Microsoft Entra Verified ID: An Informative Briefing on Key Features and Real-World Applications
Formula5
+3
Applicable to:
App Modernization
Identity
Security
Formula5's briefing on Microsoft Entra Verified ID provides organizations with a clear understanding of the fundamental concepts and potential behind Verifiable Credentials.
23 out of 60
Microsoft Entra Products Overview
Formula5
+3
Applicable to:
App Modernization
Identity
Security
Formula5's briefing on Microsoft Entra provides clear overview of available products under Microsoft Entra umbrella.
24 out of 60
ALIANDO Managed Extended Detection and Response (MXDR)
myCloudDoor
+3
Applicable to:
Identity
Networking
Security
ALIANDO Managed Extended Detection & Response service (MXDR) powered by Sentinel and Defender
25 out of 60
myCloudDoor Azure Cybersecurity Posture Assessment 3-Weeks
myCloudDoor
+3
Applicable to:
Identity
Networking
Security
This assessment provides an efficient and secure cybersecurity analysis, allowing customers to have a final deliverable that determines the threats, vulnerabilities and risks of the audited envinment.
26 out of 60
myCD Microsoft Sentinel Workshop and Initial Set-Up 3-Weeks
myCloudDoor
+3
Applicable to:
Identity
Networking
Security
myCloudDoor specializes in consultative and engineering services designed to empower clients in utilizing Microsoft Sentinel and Security Analytics effectively.
27 out of 60
Eviden Threat Protection 5-Wk Workshop
Eviden International France - SAS
+2
Applicable to:
Identity
Security
Utilizing the Value Insights methodology, we deploy trial licenses for Threat Check, configure a suite of security tools, and conduct a comprehensive self-assessment of your security landscape.
28 out of 60
Eviden's Data Security CSI Engagement 4 Week Assessment
Eviden International France - SAS
+3
Applicable to:
Analytics
Identity
Security
Elevate your data security with our workshop, "Data Security Value Insights," utilizing the Value Insights methodology.
29 out of 60
LogicalisOne: 12-month support
Logicalis, Inc.
+3
Applicable to:
Identity
Networking
Security
Logicalis One offers on demand Professional Services to support Azure environments by providing certified consultants to define, architect and/or integrate new or existing Azure capabilities.
30 out of 60
Azure Assure
Managed Solution
+2
Applicable to:
Identity
Security
Harness the power of the cloud, enabling you to concentrate on optimizing your data while entrusting Managed Solution with the responsibility of managing and securing your infrastructure.
31 out of 60
Eviden's Azure Cloud Consulting Services – Landing Zones
Eviden International France - SAS
+2
Applicable to:
Identity
Security
A consulting workshop leveraging Eviden’s Azure Landing zone approach providing a roadmap to build efficient Azure cloud platforms for the client.
32 out of 60
24x7 SOC Service by Intelequia
Intelequia Technologies
+3
Applicable to:
Analytics
Identity
Security
24x7 monitoring, protection and automated response to cyberthreats
33 out of 60
Lightstream Complimentary Azure Core Security Assessment
Lightstream
+3
Applicable to:
Identity
Networking
Security
Lightstream will provide a complimentary comprehensive understanding of your Azure security landscape with actionable recommendations.
34 out of 60
Keycloak-3 weeks Implementation
Apexon
+3
Applicable to:
Analytics
DevOps
Identity
Keycloak is an open-source identity and access management solution. Apexon repackages open source Keycloak and provides one-click deployment with automation and customization.
35 out of 60
HCLTech's Cybersecurity Services
HCL America Inc_HCLT
+3
Applicable to:
Backup
Identity
Security
HCLTech is a leading global technology company that helps enterprises reimagine their businesses for the digital age. Secure your cloud journey with HCLTech's comprehensive portfolio of cybersecurity
36 out of 60
Apexon Lab-as-a-Service (LaaS) – 4 Weeks - Proof of Concept
Apexon
+3
Applicable to:
DevOps
Identity
Internet of Things
Unlock the power of rapid innovation with Apexon LaaS, leveraging Azure AI Services, including Copilot, Azure Open AI, NLP, Vision, Speech, Search, Anomaly Detector and Document Processing.
37 out of 60
DevOps as a Service 6-month agreement
IT ITSE S.A.S.
+3
Applicable to:
DevOps
Identity
Security
Ofrecemos una solución integral para implementar y gestionar prácticas de DevOps en una organización de manera externalizada.
38 out of 60
HIPAA Compliance Risk Assessment & Gap Analysis 6 Weeks
Avertium, LLC
+2
Applicable to:
Identity
Security
Avertium’s team of healthcare and security consultants apply their deep knowledge of compliance to the way you do business.
39 out of 60
Copilot for Security Readiness Assessment: 4 Weeks
Avertium, LLC
+3
Applicable to:
AI & Machine Learning
Identity
Security
Copilot for Security readiness assessment will prepare you to defend beyond machine speed.
40 out of 60
HITRUST Certification e1, i1 or r2: 6 Months
Avertium, LLC
+2
Applicable to:
Identity
Security
Simplify the HITRUST certification experience, unburden your teams, and get a clear and actionable roadmap that builds towards a mature security posture.
41 out of 60
Workshop for Azure Cost Optimization using FinOps
Sii Sp. z o.o.
+2
Applicable to:
DevOps
Identity
Control your costs in the cloud with the FinOps methodology
42 out of 60
Azure Security Assessment: Initial Audit
Architectnow, LLC
+3
Applicable to:
Disaster Recovery
Identity
Security
Ensure that your Azure Resources are secure and setup properly! Our team can help with immediate ACTIONABLE recommendations and assistance!
43 out of 60
Azure Governance Workshop: 5-Day Workshop
eGroup Enabling Technologies
+2
Applicable to:
Identity
Security
Learn how to create, enforce, and audit Microsoft Azure Policies
44 out of 60
Identity & Access Management Assessment 4 Weeks
Avertium, LLC
+2
Applicable to:
Identity
Security
Avertium will partner with the client to review the architecture, components, configuration, and overall health of the client's Microsoft Entra ID environment.
45 out of 60
PwC Cybersecurity and Risk Capabilities
Pricewaterhousecoopers LLP
+2
Applicable to:
Identity
Security
Reimagine risk and unlock opportunities through a human-led, tech-powered approach.
46 out of 60
Digital Backpack
Telelink Business Services EAD
+1
Applicable to:
Identity
The Digital Backpack is an expansive learning platform that supports various teaching models—remote, in-person, and hybrid.
47 out of 60
AI Assessment: Quality Improvement and Defect Detection
EduFin IT, Inc. d/b/a Brightpoint Infotech
+3
Applicable to:
AI & Machine Learning
DevOps
Identity
AI assessment for quality improvement and defect detection using AI. We assist in seamlessly integrating Azure services, this assessment identifies areas for improvement in your manufactring process
48 out of 60
Azure Cloud 5-Week Assessment
Vigilant Technologies
+3
Applicable to:
Identity
Networking
Security
We offer an Azure Cloud Assessment to help your organization plan and prepare for a move to the Azure cloud, or scan and provide feedback on existing Azure deployments.
49 out of 60
Formula5's Azure AD B2C 2-Wk Accelerator
Formula5
+3
Applicable to:
App Modernization
Identity
Security
Formula5's Azure B2C Accelerator helps organizations build secure and legally compliant identity platforms to secure access to applications and resources.
50 out of 60
External Identities Hub Architecture 2-Week PoC
Formula5
+3
Applicable to:
DevOps
Identity
Security
Leverage our package of architecture design, initial scripts, and source code to boost of your modern CIAM platform development, using Microsoft Entra and Azure services.
51 out of 60
Entra ID Identity Access Vulnerability Assessment by AVASOFT
AVASOFT
+2
Applicable to:
Identity
Security
Entra ID Vulnerability Assessment identifies and addresses security gaps in Azure deployments, ensuring compliance with organizational policies
52 out of 60
通天云云迁移方案
北京通天云计算有限公司
+3
Applicable to:
Identity
Migration
Security
云咨询/云化评估/云规划设计/云迁移/云创新
53 out of 60
Azure AD Identity Protection Assessment
AVASOFT
+2
Applicable to:
Identity
Security
Our Azure AD Identity Protection Assessment identifies vulnerabilities and strengthens security. Mitigate risks with advanced threat detection and tailored defense strategies.
54 out of 60
Single Sign On (SSO) for Applications using Entra ID by AVASOFT
AVASOFT
+2
Applicable to:
Identity
Security
Automated Identity & Access Management with Azure AD streamlines user access. Simplify authentication with SSO, reduce password fatigue, and enhance security and productivity.
55 out of 60
AVASecure 360 - Entra ID Access Management Solutions by AVASOFT
AVASOFT
+2
Applicable to:
Identity
Security
Automated Identity & Access Management with Azure AD streamlines user provisioning, access requests, and reviews. Enhance security, efficiency, and compliance effortlessly.
56 out of 60
Microsoft Azure AD Authentication
AVASOFT
+2
Applicable to:
Identity
Security
Struggling with user access management? Azure AD Authentication automates provisioning, access requests, and reviews, enhancing security, efficiency, and compliance.
57 out of 60
Secure Hybrid & Multi-Cloud: 8-Week POC
ITC Secure Ltd
+3
Applicable to:
Identity
Security
Storage
Experience a customised threat and vulnerability analysis of your hybrid and Azure / multi-cloud environment with Microsoft Defender for Cloud
58 out of 60
Strengthen Your Azure Security - 3 days Comprehensive Risk Assessment
AVASOFT
+2
Applicable to:
Identity
Security
Identify and address security gaps in Azure with our Risk Assessment. Gain insights, tailored recommendations, and best practices to strengthen your security and maintain compliance.
59 out of 60
On-premises Active Directory Infra Assessment
AVASOFT
+2
Applicable to:
Identity
Security
Our On-Premises AD Infrastructure Assessment identifies vulnerabilities and compliance gaps. Strengthen security and ensure compliance with actionable insights and expert recommendations.
60 out of 60
Anterior
1
2
3
4
5
Siguiente