필터
컨설팅 서비스 찾아보기
필터 및 정렬 옵션을 선택하여 플랜을 구체화합니다.
Dynamics 365 Business Central – Consulting ServiceSEER DYNAMICS TECHNOLOGIESEnd-to-end implementation services for Microsoft Dynamics 365 Business Central, including setup, configuration, migration, training, and go-live support.
+3
Applicable to:
Business Central
Power BI apps
Power Apps
1 out of 60
Copilot Data Exposure & Oversharing Risk Assessment - 2 WeeksPenthara TechnologiesIdentify and reduce the risk of sensitive data being unintentionally exposed by Microsoft 365 Copilot due to oversharing, weak permissions, and poor data governance.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Workplace Analytics
2 out of 60
Phishing & Impersonation Protection Setup (2 Weeks)Penthara TechnologiesProtect your organization from phishing, spoofing, and impersonation attacks by strengthening Microsoft 365 email security with advanced, targeted protection controls.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Workplace Analytics
3 out of 60
.NET and Java Apps Modernization & Migration to AzureWaferWire Cloud TechnologiesModernize your .NET and Java applications with a fast, low-risk, engineering-led migration to Azure AKS and App Service by WCT.
+3
Applicable to:
App Modernization
DevOps
Migration
4 out of 60
Microsoft Fabric and AI Copilot Readiness Assessment & Roadmap (2 Weeks) - by CloudalytixCloudalytix Tech Solutions LLPValidate readiness for Microsoft Fabric and AI Copilot and get a prioritized roadmap - architecture, data, security/governance, and a pilot plan to accelerate adoption.
+3
Applicable to:
Analytics
Big Data
Data Platform
5 out of 60
Victrix_modernisation outils Excel et AccessSolutions Victrix Inc, lesModernisez vos outils Excel & Access grâce à Power Platform !
+1
Applicable to:
Adoption & Change Management
6 out of 60
S4B_XDR_Recuperacion_Automatica_RecursosS4BSILENT4BUSINESS recupera recursos afectados por amenazas con Microsoft Defender XDR, reduciendo tiempos de respuesta, evitando propagación y manteniendo la operación sin intervención manual.
+2
Applicable to:
Cloud Security
Threat Protection
7 out of 60
Apps4Rent Azure Migration Services – VM & Server MigrationApps4Rent LLCApps4Rent helps organizations seamlessly migrate on-premises and virtualized workloads to Microsoft Azure through a secure, compliant, and downtime-minimized migration approach.
+1
Applicable to:
Migration
8 out of 60
Dynamics 365 Solution Assessmentxalution group GmbHDynamics 365 Finance & Supply Chain Assessment: Uncover risks, blind spots & optimization potential for confident decisions.
+3
Applicable to:
Commerce
Supply Chain Management
Finance
9 out of 60
Cloud Transformation: StrategySoftware MindWe focus on what matters most at the strategy level: performance, compliance, scalability, and cost-efficiency.
+1
Applicable to:
Migration
10 out of 60
DAaaS Ops – Fabric Native Data Operations –12 weeks ImplementationAximsoftDAaaS Ops is a Fabric-native powered data operations service delivering production-grade pipelines, data quality, lineage, observability, and analytics through a structured 12-week engagement.
+3
Applicable to:
Power BI apps
Power Automate
Power Apps
11 out of 60
Victrix_Modernization of Excel and Access toolsSolutions Victrix Inc, lesSecure Migration from Microsoft Excel and Access to Power Platform, Modernize Your In House Tools
+1
Applicable to:
Adoption & Change Management
12 out of 60
Red X Carbon Azure Networking AssessmentRed X Carbon Inc.A professional assessment of your Azure networking environment to identify security gaps, performance risks, and opportunities to align with Microsoft best practices.
+1
Applicable to:
Networking
13 out of 60
Vector One – Zero Trust AcceleratorALIANDOVector One – Zero Trust Accelerator is a high impact, 2–3 week engagement that rapidly strengthens your organization’s security posture using Microsoft’s Zero Trust framework.
+1
Applicable to:
Security
14 out of 60
S4B Email Attack Simulation TrainingS4BAttack Simulation Training service that strengthens cybersecurity awareness through realistic phishing and social engineering campaigns, measuring human risks and improving security posture.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
15 out of 60
RTI Solution AcceleratorMAQ SoftwareA lightweight solution that streams real‑time changes from on‑prem SQL Server to Microsoft Fabric, reducing system load and simplifying data ingestion for faster, reliable insights.
+3
Applicable to:
Analytics
Big Data
Data Platform
16 out of 60
CGI DME - Device Management and EngineeringCGI Inc.Leveraging Microsoft 365 to deliver modern device management for secure, productive work anywhere.
+3
Applicable to:
Device Deployment & Management
Identity & Access Management
Mobile Device Management
17 out of 60
Victrix_Dynamics 365 CRMSolutions Victrix Inc, lesDéployez votre CRM intelligent et boostez votre croissance dès aujourd’hui !
+1
Applicable to:
Adoption & Change Management
18 out of 60
Data Elephant - Fabric Foundations AcceleratorData ElephantData Elephant’s Fabric Foundations offering helps organizations establish a modern, scalable, governed analytics backbone using Microsoft Fabric.
+1
Applicable to:
Data Platform
19 out of 60
南洋Azure Landing Zone解决方案上海南洋万邦软件技术有限公司端到端的 Azure Landing Zone 咨询与建设服务,帮助客户构建安全、合规、可扩展、可持续运营的云基础平台
+3
Applicable to:
App Modernization
DevOps
Migration
20 out of 60
CYBERWELL Azure Security AuditCYBERWELL Canada Inc.The Azure Security Audit assesses and hardens your Azure environment across identity, networking, logging, and platform design, delivering prioritized security and cost optimization opportunities.
+3
Applicable to:
Analytics
Identity
Security
21 out of 60
Azure Centre of Excellence: Unlock Cloud Value and Accelerate InnovationEPAM Systems, Inc.Accelerate secure, scalable Azure adoption through a structured Cloud Centre of Excellence.
+3
Applicable to:
DevOps
Migration
Security
22 out of 60
Intune for Windows: 6-week ImplementationPractical Solutions, IncIntune for Windows is a configuration service that enables you to manage Windows 10 devices in Intune.
+2
Applicable to:
Device Deployment & Management
Mobile Device Management
23 out of 60
Dynamics 365 Finance and Operations Analytics with Microsoft Fabric, 4-Week ImplementationDevanalytic3654-week analytics implementation for Dynamics 365 Finance & Operations using Microsoft Fabric and Power BI.
+3
Applicable to:
Analytics
AI & Machine Learning
Data Platform
24 out of 60
Victrix_Intranet_IASolutions Victrix Inc, lesTransform your intranet with AI and deliver a truly modern employee experience!
+1
Applicable to:
Adoption & Change Management
25 out of 60
Identity Life Cycle Management ModernizationCollective InsightsModernize your identity foundation today to secure and scale your business tomorrow.
+3
Applicable to:
Identity
Migration
Security
26 out of 60
Threat Investigation and Analysis Service with Microsoft Defender XDRS4BSILENT4BUSINESS investigates digital attacks using Microsoft Defender XDR, detects threats, analyzes signals, and delivers clear reports—no cybersecurity expertise required.
+2
Applicable to:
Cloud Security
Threat Protection
27 out of 60
Server Endpoint Protection Implementation Service using Microsoft Defender for EndpointS4BProvides comprehensive protection for physical and virtual servers with Microsoft Defender for Server, combined with continuous security monitoring to detect, investigate, and respond to threats.
+2
Applicable to:
Cloud Security
Threat Protection
28 out of 60
Detección y Respuesta Extendida para Endpoints con Microsoft Defender XDRS4BProtección y monitoreo 24/7, detección automática de amenazas y respuesta inmediata, sin necesidad de expertos en ciberseguridad ni montar un SOC interno.
+2
Applicable to:
Cloud Security
Threat Protection
29 out of 60
Credentials and access protection , unauthorized logins, and suspicious behavior with Microsoft IdentityS4BCloud Identity Protection detects and mitigates credential and access risks using Microsoft Entra ID Protection. It leverages analytics, adaptive MFA, and condicional access to enhance security.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
30 out of 60
Protección Identidades en ambiente Híbrido con Microsoft IdentityS4BIntegra seguridad en nube y on-premise con Defender for Identity y Entra ID Protection, unificando detección, investigación y respuesta frente a amenazas.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
31 out of 60
Advanced Hybrid Identity Security with Microsoft IdentityS4BHybrid Identity Protection mitigates risks across on-premises and cloud environments using Microsoft Defender for Identity and Entra ID Protection.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
32 out of 60
Implementation of security for Endpoint with Microsoft EDRS4BAdvanced defense for on-premises devices with Microsoft Defender for Endpoint, automated detection and response.
+2
Applicable to:
Cloud Security
Threat Protection
33 out of 60
Entrenamiento de Phishing con Microsoft Office 365S4BOfrece Entrenamiento de Simulación de Ataques con Microsoft Defender para fortalecer la conciencia de seguridad, ejecutar campañas realistas, medir la vulnerabilidad humana y capacitar al personal
+3
Applicable to:
Adoption & Change Management
Cloud Security
Threat Protection
34 out of 60
On-premise enviroment Identity Protection service with Microsoft IdentityS4BOn-Premises Identity Protection service detects and mitigates threats in Active Directory using Microsoft Defender for Identity.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
35 out of 60
Implementación de seguridad avanzada para Servidores con Microsoft EDRS4BSeguridad integral para servidores físicos y virtuales con Microsoft Defender for Server y monitoreo continuo.
+2
Applicable to:
Cloud Security
Threat Protection
36 out of 60
Investigación y Análisis de Amenazas con Microsoft Defender XDRS4BInvestiga ataques digitales con Microsoft Defender XDR, detecta amenazas, analiza señales y entrega reportes claros sin requerir conocimientos en ciberseguridad.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
37 out of 60
Accelerate Microsoft 365 Copilot ROI with our 3-week readiness AssessmentNewWave Computing Pvt LtdUnlock Faster ROI on Microsoft 365 Copilot with a 3-Week Readiness Program
+1
Applicable to:
Adoption & Change Management
38 out of 60
Extended Detection and Response Service for Endpoints with Microsoft Defender XDRS4BProtects your IT infrastructure with 24/7 monitoring, automatic threat detection, and immediate response—without the need for cybersecurity experts or setting up an internal SOC.
+2
Applicable to:
Cloud Security
Threat Protection
39 out of 60
Servicio de Implementación de Protección de Identidades Locales con Microsoft Defender for IdentityS4BRefuerza Active Directory local con Microsoft Defender for Identity, detectando ataques, credenciales comprometidas y movimientos laterales en controladores de dominio.
+3
Applicable to:
Identity & Access Management
Information Protection & Governance
Threat Protection
40 out of 60
Bank Integration Solution for Dynamics 365 POSConfiz LimitedEnable secure, real-time integration between Dynamics 365 POS and external banking payment devices to streamline transactions, reduce manual processing, and improve payment accuracy.
+3
Applicable to:
Commerce
Finance
Power BI apps
41 out of 60
Pulse Agent: Customer Engagement Monitor for Business CentralBoyer & AssociatesStop churn before it starts. This customizable AI agent monitors purchasing activity and flags at-risk customers, allowing your sales team to be proactive.
+1
Applicable to:
Business Central
42 out of 60
Securing & Protecting Microsoft 365 Copilot SolutionsProtivitiComprehensive solutions for ensuring a secure foundation for Microsoft 365 Copilot and Copilot Studio Agents.
+2
Applicable to:
Compliance Advisory Services
Information Protection & Governance
43 out of 60
Azure Cloud & Security Readiness AssessmentSimform LLCDesigned for organizations early in Azure adoption or scaling from pilot especially with significant on-prem or non-Azure footprint where IT leaders need a clear Azure business case and roadmap
+3
Applicable to:
DevOps
Identity
Security
44 out of 60
Microsoft Purview DSPM for AI EnablementCollective InsightsEnable organizations to proactively secure sensitive data in AI-powered environments
+3
Applicable to:
Big Data
Security
Storage
45 out of 60
Microsoft Purview Records Management (RM) PilotCollective InsightsTake control of your data before it controls you—discover how Microsoft Purview can transform your records management strategy.
+3
Applicable to:
Big Data
Security
Storage
46 out of 60
Zero Trust Rethink SecurityCollective InsightsThis proactive approach helps organizations protect their most critical assets in an environment where mobility, cloud adoption, and evolving threats are the norm.
+3
Applicable to:
AI & Machine Learning
Identity
Security
47 out of 60
Fabric Analyst In A Day - B Digital Solutions - En EspañolB Digital - FABRICUnifica, simplifica y optimiza tu sistema de datos con Fabric. Aprende cómo con 8 horas de sesiones gratuitas con laboratorios prácticos incluidos.
+1
Applicable to:
Power BI apps
48 out of 60
CYBERWELL Microsoft Security AuditCYBERWELL Canada Inc.Identify risks and misconfigurations with prioritized remediation guidance across Microsoft 365 environments.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
49 out of 60
Azure Local: 30-Day DiscoveryITI Inc.Explore your organization's eligibility for Azure Local—a hybrid cloud solution tailored to meet local compliance and operational needs.
+2
Applicable to:
Backup
Migration
50 out of 60
Seguridad avanzada de identidad en la nube con Microsoft IdentityS4BProtege credenciales y accesos en la nube con Microsoft Entra ID Protection, aplicando MFA adaptativo y acceso condicional para mitigar riesgos de identidad.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
51 out of 60
Servicio de implementación de protección de endpoints con Microsoft Defender for EndpointS4BDefensa avanzada para dispositivos locales con Microsoft Defender for Endpoint, detección y respuesta automatizada.
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
52 out of 60
Enterprise Automated Endpoint Recovery with Microsoft Defender XDRS4BSILENT4BUSINESS recovers resources affected by threats using Microsoft Defender XDR, reducing response times, preventing spread, and maintaining operations without manual intervention.
+3
Applicable to:
Cloud Security
Device Deployment & Management
Threat Protection
53 out of 60
Microsoft Project Server Deployment on Azure – Apps4RentApps4Rent LLCApps4Rent provides professional services to deploy and configure Microsoft Project Server on Microsoft Azure, helping organizations securely run and manage enterprise project management workloads.
+1
Applicable to:
Migration
54 out of 60
Kyndryl Cloud Center of Excellence (CCoE) for AzureKyndryl Inc.Accelerate cloud agility, governance, and cost efficiency with a Microsoft-aligned operating model.
+3
Applicable to:
Analytics
App Modernization
Migration
55 out of 60
External Sharing Risk Assessment - 2 WeeksPenthara TechnologiesIdentify and reduce data exposure risks by reviewing guest access and external sharing settings across Microsoft Teams and SharePoint.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Workplace Analytics
56 out of 60
Migrate and Modernize Deployment to Microsoft AzureRackspace TechnologyAccelerate Azure migration with AI-driven discovery and automation to reduce risk, control costs, and modernize workloads—delivering a future-ready cloud foundation with minimal disruption.
+3
Applicable to:
App Modernization
Data Platform
Migration
57 out of 60
Rackspace Elastic Engineering for Microsoft AzureRackspace TechnologyOn-demand Azure experts who work alongside your team to build, migrate, optimize, and evolve your cloud environment—removing roadblocks and accelerating business outcomes.
+3
Applicable to:
App Modernization
Data Platform
Migration
58 out of 60
Insider Risk Management Setup - 2 WeeksPenthara TechnologiesDetect and reduce insider data risks by configuring Microsoft Purview to monitor risky user behavior and prevent internal data loss before it impacts your organization.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Workplace Analytics
59 out of 60
Email Encryption & Sensitivity Configuration Setup - 2 WeeksPenthara TechnologiesStandardize email encryption, sensitivity labels, and access controls in Microsoft 365 to protect confidential communication and reduce data leakage risks.
+3
Applicable to:
Adoption & Change Management
Knowledge & Insights
Workplace Analytics
60 out of 60