Pasar al contenido principal
Marketplace
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Productos
Categorías
Sectores
Asociados
Filtros
Borrar todo
Su ubicación
Su ubicación
Productos (1)
Productos (1)
Azure (1)
Azure (1)
AI & Machine Learning
AI & Machine Learning
Análisis
Análisis
App Modernization
App Modernization
Archive
Archive
Backup
Backup
Big Data
Big Data
Data Platform
Data Platform
DevOps
DevOps
Disaster Recovery
Disaster Recovery
Identity
Identity
Internet of Things
Internet of Things
Migration
Migration
Networking
Networking
Security
Security
Storage
Storage
Dynamics 365
Dynamics 365
Microsoft 365
Microsoft 365
Power Platform
Power Platform
Sectores
Sectores
Tipo de servicio
Tipo de servicio
Modelo de precios
Modelo de precios
Servicios de consultoría resultados
Mostrando resultados en servicios de consultoría
Bonelli Systems - SharePoint & Collaboration
Bonelli Systems
+3
Applicable to:
App Modernization
Migration
Security
Bonelli Systems delivers Microsoft SharePoint Online migrations on Microsoft Azure with Microsoft Teams governance and Power Platform automation.
1 out of 60
Tenant-to-Tenant M&A Integration
Bonelli Systems
+3
Applicable to:
Identity
Migration
Security
Tenant-to-Tenant Microsoft 365 migrations with standardized playbooks for serial acquirers, Fortune 500 separations, and multi-wave consolidation programs.
2 out of 60
Bonelli Systems - Endpoint Management & Intune
Bonelli Systems
+3
Applicable to:
DevOps
Identity
Security
Enterprise endpoint management with Microsoft Intune: Windows 11 migration, Autopilot zero-touch deployment, GPO-to-Intune policy migration, CIS Benchmark hardening, and Zero Trust device compliance.
3 out of 60
Bonelli Systems - 365 Security Assessment
Bonelli Systems
+3
Applicable to:
Analytics
Data Platform
Security
Proprietary security scanning platform checking 11,000 data points across Microsoft 365 and Microsoft Azure against 24,000 rules with CIS/NIST compliance mapping.
4 out of 60
DXC Complete with Microsoft for SAP S/4HANA
DXC
+3
Applicable to:
Analytics
AI & Machine Learning
Security
DXC Complete: Differentiation Beyond the SAP Private Cloud Baseline
5 out of 60
eir business Azure Infrastructure Assessment
eir business
+3
Applicable to:
Migration
Networking
Security
Azure infrastructure assessment by eir business to evaluate readiness for migration, identify risks & optimisation opportunities, and deliver a clear roadmap to improve performance, security, and cost
6 out of 60
EPAM's Managed Extended Detection and Response (MXDR)
EPAM Systems, Inc.
+2
Applicable to:
Identity
Security
Deliver 24/7 managed detection and rapid response to cyber threats using EPAM’s MXDR service
7 out of 60
Modern SecOps with Defender XDR and Sentinel
EPAM Systems, Inc.
+2
Applicable to:
Analytics
Security
Modernize security operations using Microsoft Defender XDR and Sentinel for unified threat detection and response.
8 out of 60
Okta to Entra ID Migration 2-Day Assessment
Formula5
+2
Applicable to:
Identity
Security
Rapid 2-day Okta environment assessment using our Okta Analyzer tool, delivering a migration readiness report, app inventory, and cost estimate.
9 out of 60
SAP on Microsoft Azure
EPAM Systems, Inc.
+3
Applicable to:
Data Platform
Migration
Security
Securely migrate, modernize, and operate SAP on Microsoft Azure for performance and scale.
10 out of 60
AI Governance with Agent 365
EPAM Systems, Inc.
+2
Applicable to:
Identity
Security
Establish governed, secure, and compliant enterprise AI agent usage with full visibility and control
11 out of 60
Identity Management with Microsoft Entra
EPAM Systems, Inc.
+2
Applicable to:
Identity
Security
Implement secure, Entra-native identity and access management with Zero Trust and lifecycle automation
12 out of 60
Legacy DaaS Transformation to AVD
EPAM Systems, Inc.
+3
Applicable to:
Identity
Migration
Security
Transform legacy VDI and DaaS platforms to secure, scalable Azure Virtual Desktop
13 out of 60
IoT & Edge Solutions
EPAM Systems, Inc.
+3
Applicable to:
Analytics
Internet of Things
Security
Design, build, and scale secure IoT and edge solutions on Azure for real-time insights.
14 out of 60
Presidio Azure Cloud Network QuickStart
Presidio
+2
Applicable to:
Networking
Security
Presidio’s Azure Network Design Workshop helps organizations evaluate and modernize cloud network architectures to achieve resiliency, security, and operational simplicity.
15 out of 60
Presidio Azure Local Quickstart
Presidio
+2
Applicable to:
AI & Machine Learning
Security
Dell AX System is purpose-built for Azure Local deployments. It features high-performance compute, storage, and networking components optimized for enterprise workloads. Presidio's Azure integrations.
16 out of 60
Microsoft Defender for Cloud Deployment
Cyclotron Inc.
+2
Applicable to:
DevOps
Security
Deploy Microsoft Defender for Cloud to improve security posture and reduce risk fast.
17 out of 60
Azure & Microsoft 365 Health Check Assessment
EPMPOINT, Inc.
+3
Applicable to:
Analytics
Identity
Security
A fixed-fee, 2-week assessment of your Microsoft Azure and Microsoft 365 environment designed to identify security risks, governance gaps, compliance alignment, and cost optimization opportunities.
18 out of 60
CloudOps Managed Services
QBurst Technologies
+3
Applicable to:
DevOps
Migration
Security
Engineering-led managed cloud operations on AZURE, built on QBurst's XOps framework. We don't report uptime but we engineer it. 24×7 CloudOps coverage with SLO-based SLAs, AIOps-powered observability,
19 out of 60
Microsoft AI Operations and Governance Implementation
TrellisPoint LLC
+3
Applicable to:
AI & Machine Learning
DevOps
Security
Ongoing operating model for Microsoft Azure AI: adoption, governance, value monitoring, evolution.
20 out of 60
Implementation of Microsoft Azure Networking
Dynamic Consultants Group
+2
Applicable to:
Networking
Security
4–6 week Microsoft Azure network design and implementation engagement for organizations migrating to, standing up, or reworking their Microsoft Azure environment — delivered by DCG.
21 out of 60
Azure Landing Zone Implementation
Zones Inc.
+3
Applicable to:
Migration
Networking
Security
Azure Landing Zone helps customers establish a production-ready Azure Landing Zone built on Microsoft’s Cloud Adoption Framework (CAF), enabling secure, governed, and scalable cloud adoption
22 out of 60
Enterprise Agentic AI Platform (Foundry)
Velvetech LLC
+3
Applicable to:
AI & Machine Learning
Identity
Security
Deploy a secure, governed Multi-Agent framework leveraging Microsoft Foundry. Automate enterprise workflows (HR, Legal, Sales) with strict traceability, rules-based logic, and a robust security shell.
23 out of 60
AI Readiness & Security Assessment for Microsoft 365 Copilot
PNP Solutions T/as ECLEVA
+3
Applicable to:
AI & Machine Learning
Identity
Security
Assess your Microsoft environment’s readiness for secure AI and Copilot adoption across identity, data governance, compliance, endpoint exposure, and Power Platform controls.
24 out of 60
SOC 2 Audit Readiness and Compliance with AI Automation
YASH Technologies
+2
Applicable to:
AI & Machine Learning
Security
Accelerate SOC 2 readiness and maintain continuous compliance with AI-driven automation, leveraging our partner platform with advanced AI capabilities and Microsoft Compliance Manager
25 out of 60
CMMC Level 1 Compliance Enablement and Risk Management through AI Automation
YASH Technologies
+2
Applicable to:
AI & Machine Learning
Security
Enable CMMC Level 1 compliance with AI‑driven assessments, evidence capture, continuous monitoring using Microsoft Compliance Manager, Microsoft Sentinel, and AI‑driven compliance platform
26 out of 60
Modernize AutoRemediation with AI‑Driven Security Automation
YASH Technologies
+2
Applicable to:
AI & Machine Learning
Security
Reduce MTTR with AI-driven auto‑remediation across cloud and workload layers using Sentinel playbooks, Microsoft Defender for Cloud workflow automation, and Azure Policy remediation
27 out of 60
Agentic AI vCISO Services for Strategic Security Leadership
YASH Technologies
+2
Applicable to:
AI & Machine Learning
Security
Accelerate strategic security leadership with AgenticAI vCISO-combining human expertise and Microsoft agentic security platform (Sentinel , MCP; Security Copilot agents) to govern risk etc at scale
28 out of 60
Cyber Essentials Certification and Security Operations Support with AI Integration
YASH Technologies
+2
Applicable to:
AI & Machine Learning
Security
Accelerate Cyber Essentials/Cyber Essentials Plus certification and strengthen SecOps with Microsoft security tools and an AI‑driven compliance platform for evidence and workflows
29 out of 60
Alert Intelligent Framework using Microsoft Azure Security & AI Powered Dashboards
YASH Technologies
+2
Applicable to:
AI & Machine Learning
Security
Secure and modernize security operations by transforming alerts into actionable intelligence across Azure and hybrid environments
30 out of 60
ISO42001 Compliance Automation Governance with AI Insights
YASH Technologies
+2
Applicable to:
AI & Machine Learning
Security
Enable ISO/IEC 42001 (AI Management Systems) compliance with automated assessments, AI‑driven control mapping, and governance advisory powered by our AI driven compliance platform from MCM & Purview
31 out of 60
Vulnerability Management using Microsoft Defender Vulnerability Management
YASH Technologies
+2
Applicable to:
AI & Machine Learning
Security
YASH’s Vulnerability Management offering leverages Microsoft Defender Vulnerability Management(MDVM) to provide real-time visibility into vulnerabilities across endpoints, cloud workloads & containers
32 out of 60
AI-Led Automated TPRM for Cybersecurity Risk and Threat Management
YASH Technologies
+2
Applicable to:
AI & Machine Learning
Security
Streamline third-party risk management, reduce supply-chain exposure, and simplify audits with AI automation and integrated partnership with our Vendor Risk Management Platform.
33 out of 60
Security and Compliance: 3-Wk Proof of Concept
Conterra
+2
Applicable to:
Identity
Security
This fixed scope engagement helps you to quickly start your Security and Compliance operations based on Azure.
34 out of 60
AKS Post-Deploy Operations: 10-Wk Implementation
Altoros
+2
Applicable to:
Analytics
Security
Mentoring and upskilling customer platform teams with essential Kubernetes skills Reducing operational effort and filling knowledge gaps
35 out of 60
Azure Infrastructure as a Service: 3-Day POC
SyCom Technologies
+2
Applicable to:
Migration
Security
Allow SyCom to provide a POC for migration of infrastructure to Azure. This engagement will include a WB session, cost analysis with ROI information and a POC for up to 2 systems.
36 out of 60
CI/CD on Azure: 2-Wk Implementation
Altoros
+3
Applicable to:
App Modernization
DevOps
Security
Automate the deployment and updates of your cloud-native platform clusters. Push applications in a standardized and automated way.
37 out of 60
AKS Enablement: 4-wk Implementation
Altoros
+3
Applicable to:
App Modernization
Networking
Security
Installation of Kubernetes and related technology, providing a “dial tone” of Kubernetes for customers On-Demand Kubernetes services for your developers
38 out of 60
Microsoft Azure API Management: 3-Day Assessment
TwoConnect - App Modernization & Azure Data Solutions
+3
Applicable to:
App Modernization
Migration
Security
Azure API Management and Azure Networking give your apps and services global reach.
39 out of 60
Azure- Azure Advanced Networking 2 Day POC
SyCom Technologies
+3
Applicable to:
Migration
Networking
Security
Whiteboard and planning session to identify business objectives and craft a solution that will enhance Azure networking and security.
40 out of 60
Azure Rights Management: 4 Weeks Implementation
Communication Square LLC
+3
Applicable to:
App Modernization
Identity
Security
This 4 week Implementation is designed to help customers fully utilize Azure Rights Management in their production environment.
41 out of 60
Azure Rights Management: 2 Weeks Proof of Concept
Communication Square LLC
+3
Applicable to:
App Modernization
Identity
Security
This 2 week Proof of Concept is designed to help customers see, understand and test the Azure Rights Management on a demo tenant.
42 out of 60
Azure Security Center: 1 Week Assessment
Communication Square LLC
+3
Applicable to:
Identity
Security
Storage
This 1 week assessment is designed to help customers plan for ways to secure workloads in Azure Cloud.
43 out of 60
Disaster Site Recovery: 4 Weeks Implementation
Communication Square LLC
+3
Applicable to:
Backup
Disaster Recovery
Security
This 4 week Implementation is designed to help customers fully utilize Azure Cloud for Business Continuity
44 out of 60
Azure Rights Management: 1 Week Assessment
Communication Square LLC
+3
Applicable to:
App Modernization
Identity
Security
This 1 week assessment is designed to help customers plan for ways to deploy and manage Azure Rights Management.
45 out of 60
Azure Security Center: 2 Weeks Proof of Concept
Communication Square LLC
+3
Applicable to:
Identity
Security
Storage
This 2 week Proof of Concept is designed to help customers see Azure Security Center benefits and stay ahead of changing threat landscape across the cloud.
46 out of 60
Azure Virtual Desktop: 4-Week PoC
Infopulse
+3
Applicable to:
Disaster Recovery
Migration
Security
Infopulse will help your enterprise to achieve strategic digital transformation goals with Azure Virtual configuration, migration, and deployment of your RDS/VDI infrastructure to Azure.
47 out of 60
Azure Virtual Desktop: 1 week Proof-of-Concept
Choice Solutions,L.L.C
+3
Applicable to:
Identity
Migration
Security
The Azure Virtual Desktop Proof of Concept Jump Start is a versatile offering that utilizes Azure to enable companies to examine the role of virtual desktops to align with business objectives.
48 out of 60
Digital Forensics Incident Response 2-wk Workshop
NTT Limited
+3
Applicable to:
Backup
Disaster Recovery
Security
Digital Forensics Incident Response (DFIR) services augment your ability to respond to security incidents. Your response has a direct bearing on costs, reputation, share price, and business success.
49 out of 60
Cybersecurity Advisory Baseline 1-wk Workshop
NTT Limited
+3
Applicable to:
Internet of Things
Migration
Security
Cybersecurity Advisory Baseline is an asset-based consulting engagement that uses workshops and interviews to assess cybersecurity maturity across all areas of your people, processes and technologies.
50 out of 60
Secure Account Lifecycle Management: 8 Week Imp
Catalyte
+2
Applicable to:
Identity
Security
Secure Account Lifecycle Management – Streamline and automate the account management lifecycle with Azure AD and Workday!
51 out of 60
Birlasoft Blockchain Consulting & PoC: 10 weeks
BIRLASOFT LIMITED
+3
Applicable to:
App Modernization
DevOps
Security
Discover the right scenarios for blockchain adoption in your organization & get the proof of value. The offering spans identification and planning of blockchain use cases to a PoC
52 out of 60
Initial 2-Hr Assessment: Moving to the Cloud
KEYSTONE TECHNOLOGY CONSULTANTS
+3
Applicable to:
Backup
Migration
Security
This is a 2 hour assessment for customers considering moving to the cloud. We will deliver a roadmap to using services such as Microsoft Azure, Azure Active Directory, Azure backup and others.
53 out of 60
GlidePath™ for Cloud Governance: 2-4 Week Workshop
Sirius Computer Solutions
+2
Applicable to:
Identity
Security
GlidePath™ for Cloud Governance Standard Service delivers a 40 hour workshop and discovery plus a 2-4 weeks Baseline Governance Deployment in your Azure Environment.
54 out of 60
GlidePath™ for Cloud Governance: 1-2 Week Workshop
Sirius Computer Solutions
+2
Applicable to:
Identity
Security
GlidePath™ for Cloud Governance Basic Service delivers a 24hour workshop and discovery plus a 1-2 weeks Baseline Governance Deployment in your Azure Environment.
55 out of 60
GlidePath™ for Cloud Governance: (3)2hr Workshops
Sirius Computer Solutions
+2
Applicable to:
Identity
Security
The GlidePath™ for Cloud Governance Jumpstart Service delivers (3) two-hour workshops to help you embrace Access, Security, and Governance in your Azure Environment.
56 out of 60
GlidePath™ for Cloud Governance 4-8 Week Workshop
Sirius Computer Solutions
+2
Applicable to:
Identity
Security
GlidePath™ for Cloud Governance Enterprise Service delivers a 40 hour workshop and discovery plus a 4-8 weeks Baseline Governance Deployment in your Azure Environment.
57 out of 60
Azure App Services: 4-weeks Implementation Service
ComtechRIM India Private Limited
+3
Applicable to:
DevOps
Migration
Security
Azure App Service implementation package for organizations that are facing performance, scale or security issues with their applications
58 out of 60
Azure Access Management: 1-Wk Imp
Optiv Security Inc.
+3
Applicable to:
Data Platform
Identity
Security
Optiv’s Microsoft Azure Access Management consulting services can ensure your organization’s Azure implementation meets your business and security requirements.
59 out of 60
Cloud Security Assessment: Two Week Assessment
Logicalis, Inc.
+3
Applicable to:
Identity
Networking
Security
The Logicalis Cloud Security Assessment provides a rapid analysis of an existing Azure Cloud environment compared against best practices for security, performance, agility, scale and cost.
60 out of 60
Anterior
19
20
21
22
23
Siguiente