FiltresTout effacer
Services de conseil résultats
Affichage des résultats dans services de conseil.
AI Procurement Assistant Chatbot – 3-Week Paid PilotiFour Technolab Private LimitedYou’ll get a ready-to-use AI chatbot integrated with Dynamics 365 to automate purchase requests, approvals, and vendor lookups. It includes secure access, deployment in Web, and training for smo
+3
Applicable to:
Analytics
AI & Machine Learning
Security
1 out of 60
Accion Labs | SmartOps- AI infused DevOpsAccion Labs US, Inc.Kick-start Your Transformation with a Streamlined DevOps Strategy. Accelerate your organization's transformation and drive efficient decision-making by implementing a robust DevOps strategy.
+3
Applicable to:
AI & Machine Learning
DevOps
Security
2 out of 60
Cloud Security Envisioning WorkshopVerify8Given the volume and complexity of identities, data, applications, devices, and infrastructure, it’s essential to learn how secure your organization is, and how to mitigate and protect against threats
+1
Applicable to:
Security
3 out of 60
Data_Security_WorkshopWIZARD GROUP LIMITEDis designed to help organizations identify real data security and compliance risks within their Microsoft 365 environments and understand how to mitigate them using Microsoft Purview
+3
Applicable to:
Data Platform
Identity
Security
4 out of 60
Cloud Security Posture Management Service over Microsoft Defender for CloudMinsaitServicio especializado de Minsait Cyber para evaluar y mejorar la postura de seguridad cloud con Microsoft Defender for Cloud, priorizando riesgos y fortaleciendo el cumplimiento multicloud.
+3
Applicable to:
AI & Machine Learning
Identity
Security
5 out of 60
Identity & Access Management Bootstrapping PackageSpanish Point TechnologiesThe Spanish Point Identity & Access Management (IAM) assessment helps organisations evaluate their customer and partner identity access landscape, identify gaps, and build a clear roadmap to implement
+3
Applicable to:
App Modernization
Identity
Security
6 out of 60
Azure Operations & Governance: 2-6 Week AssessmentPlan A TechnologiesEvaluate your operational readiness, security posture, and governance model with a comprehensive discovery assessment from Plan A Technologies.
+3
Applicable to:
Analytics
DevOps
Security
7 out of 60
Managed Azure Support & OperationsPlan A TechnologiesMaximize your cloud reliability and performance with proactive support, infrastructure management, and 24/7 operations from Plan A Technologies.
+3
Applicable to:
Analytics
DevOps
Security
8 out of 60
Anchnet One-stop MLPS 2.0 Compliance Service上海安畅网络科技股份有限公司This service includes technical support for Azure China cloud platform and can assist customers in easily passing China Cybersecurity Law MLPS 2.0 compliance certification.
+1
Applicable to:
Security
9 out of 60
Anchnet SmartCare Managed Security Services上海安畅网络科技股份有限公司It offers a range of services including 7*24h security monitoring, emergency response, vulnerability assessment, security governance, log analysis, and alert management on Microsoft Azure.
+3
Applicable to:
Identity
Networking
Security
10 out of 60
Accion Labs | AI accelerated Purview ImplementationAccion Labs US, Inc.Unified data security, governance, and compliance powered by Microsoft Purview and AI accelerators for enterprise-scale control.
+2
Applicable to:
Identity
Security
11 out of 60
Free 2-Hour Microsoft Fabric Consultation for EWON Flexy 205 Integration with Azure IoT HubiFour Technolab Private LimitedGet a simple, easy plan to bring all your industrial data together and make smart decisions using Microsoft Fabric.
Start with a free 2-hour session to audit your current setup and share the solution
+3
Applicable to:
Analytics
Internet of Things
Security
12 out of 60
Identity and Access Management (IAM) bSidebSideGestión de acceso sólida, escalable y alineada con estándares internacionales. Protege cuentas privilegiadas frente a ataques como phishing, escalamiento de privilegios y movimientos laterales.
+3
Applicable to:
DevOps
Identity
Security
13 out of 60
S-SDLC Desarrollo de Software Seguro bSidebSideDetectamos y corregimos vulnerabilidades antes de escribir una sola línea de código, alineando la seguridad con los objetivos de negocio.
+3
Applicable to:
DevOps
Identity
Security
14 out of 60
S-SDLC bSide Marco de TrabajobSideIntegración de seguridad desde la conceptualización del software, Detectamos y corregimos vulnerabilidades antes de escribir una sola línea de código, alineando la seguridad con el negocio.
+3
Applicable to:
DevOps
Disaster Recovery
Security
15 out of 60
Desarrollo de Software Seguro bSide EntrenamientobSideDetectamos y corregimos vulnerabilidades antes de escribir una sola línea de código, alineando la seguridad con los objetivos de negocio y fomentando una cultura donde todos son responsables.
+3
Applicable to:
DevOps
Identity
Security
16 out of 60
GRC bSide BasicbSideMejora el cumplimiento regulatorio con evidencia clara, reduce la exposición a riesgos legales, técnicos y operativos, y establece estándares homogéneos en entornos dispersos.
+3
Applicable to:
DevOps
Identity
Security
17 out of 60
CISO as a Service bSide EssentialbSideDiseño e implementación de la estrategia de ciberseguridad de su empresa, cumpliendo con marcos regulatorios y contractuales, mejora de seguridad mediante evaluaciones, monitoreo, y políticas.
+3
Applicable to:
DevOps
Identity
Security
18 out of 60
Cloud Security bSidebSideProtección integral que asegura la confidencialidad, integridad y disponibilidad de sus datos y aplicaciones en la nube.
+3
Applicable to:
DevOps
Identity
Security
19 out of 60
CISO as a Service bSide ComplementbSideConsolide la estrategia de ciberseguridad de su empresa, cumpliendo con marcos regulatorios y contractuales.
Mejora la postura de seguridad mediante evaluaciones, monitoreo y políticas.
+3
Applicable to:
DevOps
Identity
Security
20 out of 60
CISO as a Service bSide ProfessionalbSideEstrategia de ciberseguridad para su empresa, cumpliendo con marcos regulatorios y contractuales.
Mejora la postura de seguridad mediante evaluaciones, monitoreo, políticas y gestión de incidentes.
+3
Applicable to:
DevOps
Identity
Security
21 out of 60
GRC Advance bSidebSideFormalización del gobierno de seguridad en desarrollo y operación.
Mejora el cumplimiento regulatorio con evidencia clara, reduce la exposición a riesgos legales, técnicos y operativos.
+3
Applicable to:
DevOps
Identity
Security
22 out of 60
Data Security & Privacy bSidebSideProtección integral de datos sensibles en cada etapa de su ciclo de vida. Permite clasificar, cifrar y controlar el acceso a la información con precisión, facilitando el cumplimiento de normativas.
+3
Applicable to:
DevOps
Identity
Security
23 out of 60
Data Security Posture Management with Microsoft PurviewKyndryl Inc.Assess and improve your data security posture with continuous visibility, risk insights, and compliance support to protect sensitive data across hybrid and multi-cloud environments.
+3
Applicable to:
Big Data
Disaster Recovery
Security
24 out of 60
Kyndryl Agentic AI Digital Trust ServicesKyndryl Inc.Kyndryl Agentic AI Digital Trust Services provide comprehensive security solutions for autonomous AI systems in hybrid and cloud environments using Microsoft's AI and security ecosystem. Focus on AI a
+3
Applicable to:
AI & Machine Learning
Disaster Recovery
Security
25 out of 60
AI Chatbot for Appointment SchedulingiFour Technolab Private Limited24/7 AI chatbot that lets patients instantly book, reschedule, or cancel appointments without calling the front desk.
Reduced admin effort, smoother operations through secure, real-time system.
+2
Applicable to:
AI & Machine Learning
Security
26 out of 60
Data Governance Proof of Concept – 12 Daysidata-4943029How can organizations quickly understand and govern data? This proof of concept validates Microsoft Purview, enabling control of data assets without adding complexity or risk.
+2
Applicable to:
Data Platform
Security
27 out of 60
Microsoft Security - IDENTITY & ACCESS MANAGEMENTFPT-SOFTWARE CO. LTD.FPT Software Microsoft Entra ID Acceleration
+1
Applicable to:
Security
28 out of 60
FPT Software Managed Service for Microsoft SentinelFPT-SOFTWARE CO. LTD.FPT Software Cloud Security Offering
+2
Applicable to:
Identity
Security
29 out of 60
FPT Software services for Cloud Security - Defender for CloudFPT-SOFTWARE CO. LTD.FPT Software Microsoft Cloud Security Offering
+2
Applicable to:
Identity
Security
30 out of 60
FPT Software Microsoft Security Copilot Implement - 4wkFPT-SOFTWARE CO. LTD.FPT Microsoft Security Copilot Offering harnesses the power of Microsoft Security Copilot to revolutionize security operations through generative AI.
+3
Applicable to:
Identity
Migration
Security
31 out of 60
Microsoft Fabric Security AssessmentKainos SoftwareSecure and Enable Microsoft Fabric with Kainos
+3
Applicable to:
Analytics
Data Platform
Security
32 out of 60
南洋云安全分析解决方案上海南洋万邦软件技术有限公司以 Azure Log Analytics 作为统一的安全日志采集与分析底座,结合 Grafana 开源可视化平台,构建集中、透明、可扩展的云安全监测与分析体系
+1
Applicable to:
Security
33 out of 60
Azure Cloud & Security Readiness AssessmentSimform LLCDesigned for organizations early in Azure adoption or scaling from pilot especially with significant on-prem or non-Azure footprint where IT leaders need a clear Azure business case and roadmap
+3
Applicable to:
DevOps
Identity
Security
34 out of 60
Microsoft Purview Information Protection – Classification, Labeling & DLP at ScaleYASH TechnologiesGet tailored implementation and operational support for Microsoft Purview Information Protection to discover, classify, and protect sensitive data across Microsoft 365, Azure, and hybrid estates
+3
Applicable to:
Data Platform
Identity
Security
35 out of 60
Data Security Posture Management for AI Using Microsoft PurviewYASH TechnologiesSecure AI data, models, and pipelines with continuous data posture management
+3
Applicable to:
AI & Machine Learning
Data Platform
Security
36 out of 60
AI-SPM with Defender for CloudYASH TechnologiesGet tailored implementation and support for Defender for Cloud AI-SPM across Azure, strengthening AI security governance and compliance
+3
Applicable to:
Identity
Security
Storage
37 out of 60
Azure ExpressRoute: 2-Day Readiness AssessmentStormCloudEvaluate your on-premises network for Azure ExpressRoute. Get a detailed readiness report, gap analysis, and a high-speed hybrid connectivity roadmap in just 2 days.
+2
Applicable to:
Networking
Security
38 out of 60
Audit & Compliance Management - Microsoft Compliance ManagerYASH TechnologiesAutomated compliance, reduced audit effort, and continuous regulatory assurance across cloud and hybrid environments
+3
Applicable to:
Analytics
Data Platform
Security
39 out of 60
Enterprise Azure API Gateway ImplementationBaltic AmadeusBaltic Amadeus implements enterprise-grade Azure API Gateway solutions using Azure API Management as a centralized, secure, and governed API layer for regulated and complex IT environments.
+3
Applicable to:
DevOps
Networking
Security
40 out of 60
Transformative FinOps Solution for Microsoft Azure – 12 Week ImplementationTechStar Consulting IncMaximize Azure ROI with TechStar’s AI-Driven Agentic FinOps, delivering intelligent cost control, governance, and real-time financial accountability.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
41 out of 60
Beyondsoft MonitoramentoBeyondsoftOs serviços de Monitoramento Standard e Premium garantem visibilidade, desempenho e suporte proativo para manter seus ambientes de TI estáveis e operando com eficiência.
+3
Applicable to:
Networking
Security
Storage
42 out of 60
Unisys Device Subscription ServiceUnisys Corp / Blue BellDeliver a turnkey solution covering the end-to-end device lifecycle to eliminate operational burden and realize cost optimization powered by Unisys Services and the full Microsoft stack.
+3
Applicable to:
Analytics
Identity
Security
43 out of 60
GDPR Readiness using AI Driven ToolsYASH TechnologiesAchieve GDPR readiness with AI driven data discovery, automated assessments, DPIA workflows, and continuous monitoring via Microsoft Compliance Manager and Purview
+3
Applicable to:
AI & Machine Learning
Identity
Security
44 out of 60
FY26_Azure Security AssessmentIFI TechsolutionsAzure Security Assessment uncovers security gaps with clear, actionable insights. It enables customers to securely adopt or scale Microsoft Azure.
+3
Applicable to:
Migration
Networking
Security
45 out of 60
AI Security Data Security DashboardBillennium S.A.This engagement adds a unified, governance-aligned Data&AI security layer in Azure, providing clear visibility, KPIs, and a prioritized remediation plan to improve security without slowing innovation.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
46 out of 60
Microsoft Entra Private AccessNebulanServicio profesional de implementación de Microsoft Entra Private Access para habilitar acceso seguro por aplicación a recursos privados, reemplazando VPN tradicionales mediante un modelo Zero Trust.
+3
Applicable to:
Identity
Networking
Security
47 out of 60
Modern VPN Implementation (Azure Always On)NebulanServicio profesional de implementación de VPN moderna con Azure VPN Always On para habilitar conectividad segura, automática y persistente entre dispositivos Windows y recursos corporativos en Azure.
+3
Applicable to:
Identity
Networking
Security
48 out of 60
SOFI AAINebulanCopiloto de IA para operaciones de ciberseguridad que se integra nativamente con Microsoft Sentinel y Defender para reducir fatiga de alertas, eliminar falsos positivos y acelerar responder incidentes
+2
Applicable to:
AI & Machine Learning
Security
49 out of 60
Modernize Identity with Microsoft EntraIBM ConsultingIBM and Microsoft are partnering to modernize identity systems using Microsoft Entra, combining IBM’s expertise with Microsoft’s platform to improve security and streamline access.
+3
Applicable to:
App Modernization
Identity
Security
50 out of 60
FPT Software: DevOps & DevSecOps on Azure with GitHubFPT-SOFTWARE CO. LTD.FPT Software delivers enterprise-grade DevOps and DevSecOps implementation services on Microsoft Azure using GitHub Enterprise.
+2
Applicable to:
DevOps
Security
51 out of 60
Modernize Security Intelligence for Always On Threat VisibilityYASH TechnologiesAchieve unified, AI powered threat visibility across Azure, AWS, and GCP with Microsoft Sentinel analytics, UEBA, MDTI/TAXII intelligence, and Defender XDR integration
+3
Applicable to:
Analytics
AI & Machine Learning
Security
52 out of 60
NIST CSF 2.0 Assessment & Security Posture Enhancement Powered by AIYASH TechnologiesOperationalize NIST CSF 2.0 with AI assisted assessments, outcome based risk scoring, and posture dashboards integrating Microsoft Compliance Manager, Microsoft Purview & Microsoft Sentinel/Defender
+3
Applicable to:
AI & Machine Learning
Identity
Security
53 out of 60
AI SecOps enablement with Microsoft Sentinel & Threat DefenseYASH TechnologiesEnable proactive AI-driven SecOps with Microsoft Sentinel for real-time threat detection and continuous defense
+3
Applicable to:
AI & Machine Learning
Migration
Security
54 out of 60
Accenture Sovereign Cloud AssessmentAccentureA structured sovereign cloud assessment and strategy engagement that helps organisations understand regulatory requirements, assess their current estate, and define a clear, actionable roadmap
+3
Applicable to:
Analytics
Identity
Security
55 out of 60
Cognizant® Agent Security & Assurance ServiceCognizantOur services accelerate agent adoption & extend Zero Trust to AI agents & autonomous workflows
+1
Applicable to:
Security
56 out of 60
BUI Secure AI Landing ZoneBUI (Pty) LtdUnderstand your AI readiness, define your governance model, and leave with a prioritised use case roadmap and approved secure AI landing zone architecture.
+2
Applicable to:
AI & Machine Learning
Security
57 out of 60
Reliance FastTrack to AzureReliance InfosystemsA structured, expert‑led Azure migration program that accelerates your move to the cloud with low risk, clear governance, and a future‑ready Azure foundation.
+2
Applicable to:
Migration
Security
58 out of 60
AI Triage Chatbot for Patient Intake – 2-Week MVPiFour Technolab Private LimitedLaunch a secure, AI-powered triage chatbot MVP in just 2 weeks to streamline patient intake, reduce wait times, and guide patients to the right care.
+2
Applicable to:
AI & Machine Learning
Security
59 out of 60
GitHub Copilot Adoption for Enterprise AI-Driven SDLC.Hexaware Technologies IncAccelerate enterprise adoption of GitHub Copilot Agent mode with a structured, governed, and scalable framework that delivers measurable productivity gains across the SDLC.
+3
Applicable to:
App Modernization
DevOps
Security
60 out of 60