FiltryWyczyść wszystko
Wyniki: Usługi doradcze
Pokazywanie wyników w usługi doradcze.
Audit & Compliance Management - Microsoft Compliance ManagerYASH TechnologiesAutomated compliance, reduced audit effort, and continuous regulatory assurance across cloud and hybrid environments
+3
Applicable to:
Analytics
Data Platform
Security
1 out of 60
EPAM Azure Landing Zone ImplementationEPAM Systems, Inc.Establish a secure, scalable, and compliant Azure foundation with an automated Landing Zone implementation that accelerates cloud adoption and operational readiness
+3
Applicable to:
DevOps
Networking
Security
2 out of 60
Data Loss Prevention EnablementCollective InsightsDLP designed to provide organizations with a controlled security framework that safeguards sensitive data while ensuring operational transparency
+3
Applicable to:
Big Data
Security
Storage
3 out of 60
Enterprise Azure API Gateway ImplementationBaltic AmadeusBaltic Amadeus implements enterprise-grade Azure API Gateway solutions using Azure API Management as a centralized, secure, and governed API layer for regulated and complex IT environments.
+3
Applicable to:
DevOps
Networking
Security
4 out of 60
Qrypta.aiQuadrant TechnologiesAI-powered cross‑repository document governance platform for SMEs and mid‑market organizations. Automate discovery, risk scoring, redaction, and compliance across Microsoft 365, Google Drive, Dropbox,
+3
Applicable to:
AI & Machine Learning
Identity
Security
5 out of 60
Microsoft Security Platform ServicesKainos SoftwareKainos helps organisations deploy and operate Microsoft Security products as a single, operational platform that delivers measurable protection and confidence.
+3
Applicable to:
AI & Machine Learning
Identity
Security
6 out of 60
Transformative FinOps Solution for Microsoft Azure – 12 Week ImplementationTechStar Consulting IncMaximize Azure ROI with TechStar’s AI-Driven Agentic FinOps, delivering intelligent cost control, governance, and real-time financial accountability.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
7 out of 60
1-Week Assessment: AI-Powered Document Governance with QryptaQuadrant TechnologiesSimplify document governance with 1-week Qrypta assessment to identify sensitive data exposure, compliance risks, and governance gaps across Microsoft 365 and hybrid repos, with a remediation roadmap.
+3
Applicable to:
AI & Machine Learning
Security
Storage
8 out of 60
Beyondsoft MonitoramentoBeyondsoftOs serviços de Monitoramento Standard e Premium garantem visibilidade, desempenho e suporte proativo para manter seus ambientes de TI estáveis e operando com eficiência.
+3
Applicable to:
Networking
Security
Storage
9 out of 60
EPAM Adaptive Sovereign Cloud ImplementationEPAM Systems, Inc.Enable secure, compliant, and resilient cloud operations by unifying governance, identity, and multi‑cloud control through an Adaptive Sovereign Cloud foundation
+2
Applicable to:
Identity
Security
10 out of 60
Microsoft Virtual Desktop Infrastructure Migration FY26 EngagementRackspace TechnologySecurely migrate Windows desktops and apps to Microsoft Azure Virtual Desktop with Rackspace expertise to modernize VDI, strengthen security, reduce costs, and enable scalable, anywhere access.
+3
Applicable to:
App Modernization
Migration
Security
11 out of 60
Azure Security Posture AssessmentSimform LLCSimform delivers an Azure Security Posture Assessment that gives CISOs and security teams a clear, actionable view of cloud risk across in-scope subscriptions and critical workloads
+3
Applicable to:
Backup
Networking
Security
12 out of 60
MissionOps - Secure 24/7 operations for business-critical Azure environmentsReplyMissionOps is Reply’s Azure operations service, providing 24/7 monitoring, incident response, security, optimisation, and service management for critical applications
+3
Applicable to:
Analytics
Disaster Recovery
Security
13 out of 60
Unisys Device Subscription ServiceUnisys Corp / Blue BellDeliver a turnkey solution covering the end-to-end device lifecycle to eliminate operational burden and realize cost optimization powered by Unisys Services and the full Microsoft stack.
+3
Applicable to:
Analytics
Identity
Security
14 out of 60
Nutanix on Azure: Deploy. Migrate. ModernizeSNP TechnologiesOrganizations running Nutanix on-premises want the agility and scalability of Microsoft Azure—without re-architecting applications, retraining teams, or introducing operational complexity.
+3
Applicable to:
Backup
Migration
Security
15 out of 60
GDPR Readiness using AI Driven ToolsYASH TechnologiesAchieve GDPR readiness with AI driven data discovery, automated assessments, DPIA workflows, and continuous monitoring via Microsoft Compliance Manager and Purview
+3
Applicable to:
AI & Machine Learning
Identity
Security
16 out of 60
SLMIT | Microsoft Sentinel SOC Níveis 2, 3 e 4 – Threat Hunting e Resposta a IncidentesSLMIT Innovation Technology MSPAdvanced SOC operations using Microsoft Sentinel and Microsoft Defender XDR for threat detection, investigation, threat hunting and coordinated incident response.
+2
Applicable to:
Networking
Security
17 out of 60
Purview Data Governance QuickStart AssessmentDatavail CorporationAssess governance maturity, define ownership, and create a practical roadmap for trusted data.
+3
Applicable to:
Analytics
Data Platform
Security
18 out of 60
Purview Data Governance QuickStart AssessmentDatavail CorporationAssess governance maturity, define ownership, and create a practical roadmap for trusted data.
+3
Applicable to:
Analytics
Data Platform
Security
19 out of 60
SLMIT | Microsoft Sentinel SOC Nível 1 – Monitoramento e Detecção de SegurançaSLMIT Innovation Technology MSPServiço de monitoramento de segurança com Microsoft Sentinel que oferece visibilidade contínua, análise de eventos, triagem de alertas e relatórios de segurança para organizações que desejam iniciar
+3
Applicable to:
Identity
Networking
Security
20 out of 60
EPAM Microsoft Purview Data Security DeploymentEPAM Systems, Inc.Deploy Microsoft Purview to unify data security, compliance, and lifecycle governance across the organization.
+3
Applicable to:
Data Platform
Identity
Security
21 out of 60
FY26_Azure Security AssessmentIFI TechsolutionsAzure Security Assessment uncovers security gaps with clear, actionable insights. It enables customers to securely adopt or scale Microsoft Azure.
+3
Applicable to:
Migration
Networking
Security
22 out of 60
Splunk to Microsoft Sentinel MigrationQuisitiveHelping enterprises transition from legacy SIEM platforms to a modern, cloud - native security foundation
+3
Applicable to:
AI & Machine Learning
Identity
Security
23 out of 60
Entra External ID - Migration Readiness AssessmentSlalom ConsultingSlalom's Migration Readiness Assessment gives your organization a clear-eyed view of what it takes to move from Azure AD B2C to Microsoft Entra External ID — and a roadmap to get there with confidence
+3
Applicable to:
Identity
Migration
Security
24 out of 60
SLMIT | Avaliação de Vulnerabilidades – Infraestrutura, Cloud e Microsoft 365SLMIT Innovation Technology MSPAvaliação de vulnerabilidades em infraestrutura, Microsoft Azure e Microsoft 365, identificando riscos de segurança e priorizando ações de remediação com base nas soluções de segurança da Microsoft.
+3
Applicable to:
Identity
Networking
Security
25 out of 60
Atos || Transform Security Operations with Atos Sovereign MXDR integrated with MicrosoftAtos International SASUnify your SOC with sovereign MXDR. Maximize Microsoft security ROI and strengthen resilience.
+2
Applicable to:
Data Platform
Security
26 out of 60
Modernize Identity with Microsoft EntraIBM ConsultingIBM and Microsoft are partnering to modernize identity systems using Microsoft Entra, combining IBM’s expertise with Microsoft’s platform to improve security and streamline access.
+3
Applicable to:
App Modernization
Identity
Security
27 out of 60
NetManage Fortigate Managed ServicesOpticca Consulting IncThis service supports Microsoft Azure environments by managing and operating Fortinet FortiGate VM firewalls deployed within Azure virtual network architectures.
+1
Applicable to:
Security
28 out of 60
Azure Managed Service for EnergyHypercube ConsultingOperate, optimise and secure cloud environments for energy organisations
+3
Applicable to:
Backup
Migration
Security
29 out of 60
Azure Migration and Modernization (Secure by Design)ProArch Technologies, IncProArch migrates and modernizes workloads to Azure with security built in from day one—documented plan plus hardening using Microsoft security baselines.
+3
Applicable to:
App Modernization
Migration
Security
30 out of 60
Azure Managed Services: ImplementationOpticca Consulting IncProactive Azure management — monitoring, security,
optimization & continuous improvement. 3 tiers.
+2
Applicable to:
Backup
Security
31 out of 60
Azure Virtual Desktop Health CheckHeartland Business Systems, LLCRun a 50-point Azure Virtual Desktop health check with HBS experts. Improve security, performance, availability and costs—fast.
+3
Applicable to:
App Modernization
Migration
Security
32 out of 60
FPT Software: DevOps & DevSecOps on Azure with GitHubFPT-SOFTWARE CO. LTD.FPT Software delivers enterprise-grade DevOps and DevSecOps implementation services on Microsoft Azure using GitHub Enterprise.
+2
Applicable to:
DevOps
Security
33 out of 60
Atos || Security for GenAIAtos International SASAdopt GenAI securely at scale by combining Atos Security for GenAI service offering with Microsoft-native controls for end-to-end governance, monitoring, and risk reduction.
+1
Applicable to:
Security
34 out of 60
Vervint's Copilot Agent Builder - AI Agent Services EngagementVervintAccelerate adoption of agentic AI with hands-on training and two production-ready Microsoft Copilot agents designed for real business workflows.
+3
Applicable to:
AI & Machine Learning
Data Platform
Security
35 out of 60
Modernize Security Intelligence for Always On Threat VisibilityYASH TechnologiesAchieve unified, AI powered threat visibility across Azure, AWS, and GCP with Microsoft Sentinel analytics, UEBA, MDTI/TAXII intelligence, and Defender XDR integration
+3
Applicable to:
Analytics
AI & Machine Learning
Security
36 out of 60
NIST CSF 2.0 Assessment & Security Posture Enhancement Powered by AIYASH TechnologiesOperationalize NIST CSF 2.0 with AI assisted assessments, outcome based risk scoring, and posture dashboards integrating Microsoft Compliance Manager, Microsoft Purview & Microsoft Sentinel/Defender
+3
Applicable to:
AI & Machine Learning
Identity
Security
37 out of 60
AI SecOps enablement with Microsoft Sentinel & Threat DefenseYASH TechnologiesEnable proactive AI-driven SecOps with Microsoft Sentinel for real-time threat detection and continuous defense
+3
Applicable to:
AI & Machine Learning
Migration
Security
38 out of 60
Accenture Sovereign Cloud AssessmentAccentureA structured sovereign cloud assessment and strategy engagement that helps organisations understand regulatory requirements, assess their current estate, and define a clear, actionable roadmap
+3
Applicable to:
Analytics
Identity
Security
39 out of 60
Accenture Digital Crisis ManagementAccentureCentralized, technology-enabled Crisis Management Center for organizations, designed to strengthen national resilience and ensure coordinated response across critical sectors
+2
Applicable to:
Analytics
Security
40 out of 60
Cognizant® Agent Security & Assurance ServiceCognizantOur services accelerate agent adoption & extend Zero Trust to AI agents & autonomous workflows
+1
Applicable to:
Security
41 out of 60
Bonelli Systems - SecurityOps & XDRBonelli SystemsEnterprise security operations for organizations from 50 to 500,000+ identities. We deploy Defender XDR, integrate Sentinel SIEM/SOAR, build SOCs, and harden environments to CIS Benchmarks.
+2
Applicable to:
Identity
Security
42 out of 60
BUI Secure AI Landing ZoneBUI (Pty) LtdUnderstand your AI readiness, define your governance model, and leave with a prioritised use case roadmap and approved secure AI landing zone architecture.
+2
Applicable to:
AI & Machine Learning
Security
43 out of 60
Microsoft Agent 365 Workshop: Slalom's Modern Approach to Agent ManagementSlalom ConsultingWe help you move from experimentation to enterprise-grade agent operations—so AI agents are onboarded, secured, monitored, and improved with the same rigor you apply to people, apps, and data.
+3
Applicable to:
AI & Machine Learning
Identity
Security
44 out of 60
Reliance FastTrack to AzureReliance InfosystemsA structured, expert‑led Azure migration program that accelerates your move to the cloud with low risk, clear governance, and a future‑ready Azure foundation.
+2
Applicable to:
Migration
Security
45 out of 60
Assessments and MigrationsCyber HuskyCyber Husky works with you over the duration to determine the time, effort, and cost for your organization to migrate to the cloud.
+3
Applicable to:
Identity
Migration
Security
46 out of 60
Evangelist SAP Migration to Azure AcceleratorEvangelist Technology Private LimitedAccelerate your SAP migration from on-premises to Microsoft Azure with a structured, secure, and SAP-certified approach covering assessment, migration, and optimization.
+3
Applicable to:
DevOps
Migration
Security
47 out of 60
AI Triage Chatbot for Patient Intake – 2-Week MVPiFour Technolab Private LimitedLaunch a secure, AI-powered triage chatbot MVP in just 2 weeks to streamline patient intake, reduce wait times, and guide patients to the right care.
+2
Applicable to:
AI & Machine Learning
Security
48 out of 60
Evangelist Azure App Deployment AcceleratorEvangelist Technology Private LimitedAccelerate your application deployment on Microsoft Azure with expert setup and configuration services.
+3
Applicable to:
App Modernization
Migration
Security
49 out of 60
GitHub Copilot Adoption for Enterprise AI-Driven SDLC.Hexaware Technologies IncAccelerate enterprise adoption of GitHub Copilot Agent mode with a structured, governed, and scalable framework that delivers measurable productivity gains across the SDLC.
+3
Applicable to:
App Modernization
DevOps
Security
50 out of 60
SAP Azure Landing Zone AcceleratorALIANDOBuild a Secure, Scalable and SAP-Ready Azure Foundation Including SAP RISE Integration
+2
Applicable to:
Networking
Security
51 out of 60
Bonelli Systems - Identity & Access ManagementBonelli SystemsEntra ID, Azure AD B2C, Conditional Access, ADFS modernization, and Zero Trust IAM assessments.
+3
Applicable to:
App Modernization
Identity
Security
52 out of 60
Bonelli Systems - Compliance & Data GovernanceBonelli SystemsBonelli Systems deploys Microsoft Purview for DLP, sensitivity labels, eDiscovery Premium, retention policies, and data classification across healthcare, legal, and financial sectors.
+3
Applicable to:
Data Platform
Identity
Security
53 out of 60
Bonelli Systems - Privileged Access ManagementBonelli SystemsBonelli Systems delivers BeyondTrust PAM integrated with Microsoft Zero Trust — Password Safe, Endpoint Privilege Management, Privileged Remote Access with Entra ID and Microsoft Defender.
+3
Applicable to:
DevOps
Identity
Security
54 out of 60
Salesforce and Microsoft Azure IntegrationIT Partner LLCConnect Salesforce to Azure for automation, security, and AI analytics. Streamline CRM with Logic Apps, secure access via Entra ID, and gain insights with Azure AI. Pricing customized.
+3
Applicable to:
Analytics
Identity
Security
55 out of 60
Security and Compliance: 3-Wk Proof of ConceptConterraThis fixed scope engagement helps you to quickly start your Security and Compliance operations based on Azure.
+2
Applicable to:
Identity
Security
56 out of 60
AKS Post-Deploy Operations: 10-Wk ImplementationAltorosMentoring and upskilling customer platform teams with essential Kubernetes skills
Reducing operational effort and filling knowledge gaps
+2
Applicable to:
Analytics
Security
57 out of 60
Azure Infrastructure as a Service: 3-Day POCSyCom TechnologiesAllow SyCom to provide a POC for migration of infrastructure to Azure. This engagement will include a WB session, cost analysis with ROI information and a POC for up to 2 systems.
+2
Applicable to:
Migration
Security
58 out of 60
CI/CD on Azure: 2-Wk ImplementationAltorosAutomate the deployment and updates of your cloud-native platform clusters. Push applications in a standardized and automated way.
+3
Applicable to:
App Modernization
DevOps
Security
59 out of 60
AKS Enablement: 4-wk ImplementationAltorosInstallation of Kubernetes and related technology, providing a “dial tone” of Kubernetes for customers
On-Demand Kubernetes services for your developers
+3
Applicable to:
App Modernization
Networking
Security
60 out of 60