FilterRensa alla
Konsulttjänster resultat
Visar resultat i konsulttjänster
Azure Landing Zone Health CheckTTEC DigitalAccelerate secure cloud adoption with a scalable foundation. Evaluate your Azure environment and receive a tailored Landing Zone blueprint aligned to Microsoft’s Cloud Adoption Framework.
+2
Applicable to:
Networking
Security
1 out of 60
Microsoft Entra Privileged Identity Management ConfigurationTechNet UC LLCConfigure Microsoft Entra PIM to enforce least privilege, enable just-in-time access, and reduce risk with real-time auditing, approval workflows, and Conditional Access integration.
+3
Applicable to:
Analytics
Identity
Security
2 out of 60
Amdocs Cloud Development Environment SolutionAmdocsReimagine DevX by using Amdocs Cloud Development Environment to securely provision any infrastructure, AI agent, OS, or IDE — from VMs to Kubernetes, Jupyter to VS Code.
+3
Applicable to:
DevOps
Migration
Security
3 out of 60
Armor Sentinel Log Optimization WorkshopArmorWith Armor Log Optimization Workshop to ensure your security operations are both effective and cost-efficient. Contact us today to get started.
+1
Applicable to:
Security
4 out of 60
Microsoft Copilot for Security Workshop by OnevinnOnevinn ABIn this expert-led workshop, you’ll learn how to use generative AI to strengthen your security posture, empower your security teams, and make data-driven decisions faster.
+3
Applicable to:
AI & Machine Learning
Identity
Security
5 out of 60
Azure Landing Zone AssessmentArgano LLCEstablish a secure, scalable foundation for your Microsoft Azure cloud journey in just 3 days
+3
Applicable to:
Data Platform
Migration
Security
6 out of 60
Modern DevOps with GitHub On AzureInfoMagnus LLC Adopt Modern DevOps with GitHub on Azure—streamline CI/CD, enhance security, and accelerate releases with tailored strategies, expert guidance, and ongoing transformation support.
+3
Applicable to:
DevOps
Migration
Security
7 out of 60
GitHub Advanced Security (GHAS) Suite of Services.InfoMagnus LLC End-to-end GitHub Advanced Security services: POC, POV, Azure DevOps integration, and tailored adoption. Protect your code, ensure compliance, and embed security into DevOps workflows.
+3
Applicable to:
DevOps
Migration
Security
8 out of 60
GitHub Migration WorkshopInfoMagnus LLC A 3-day, hands-on GitHub Migration Workshop equipping teams with strategies, tools, and repeatable processes for seamless VCS-to-Git transitions. Offers post-workshop office hours for ongoing support.
+3
Applicable to:
DevOps
Migration
Security
9 out of 60
GitHub API TrainingInfoMagnus LLC In this hands-on training, participants learn to use the GitHub REST and GraphQL APIs, Octokit, and webhooks to create integrations that automate and enhance Microsoft Azure-based DevOps pipelines.
+3
Applicable to:
DevOps
Migration
Security
10 out of 60
GitHub Advisory ServicesInfoMagnus LLC On-demand GitHub advisory to optimize Azure-integrated DevOps workflows aligning strategy, security, and collaboration to extend Microsoft cloud adoption and value.
+3
Applicable to:
DevOps
Migration
Security
11 out of 60
GitHub for DevelopersInfoMagnus LLC In this two-day, instructor-led workshop, developers learn to use Git and GitHub for building, collaborating, and managing code in Azure-based workflows.
+3
Applicable to:
DevOps
Migration
Security
12 out of 60
Develop your own Azure MasterplannovaCapta GmbHKlarheit für den Start: Azure verstehen, den passenden Weg wählen, die Roadmap planen und eine belastbare Grundlage schaffen für die Entscheidung zur Cloud-Transformation
+3
Applicable to:
AI & Machine Learning
Migration
Security
13 out of 60
Data Security & DLP Workshop: 1-Day Strategic WorkshopAtmoseraIdentify sensitive data risks and strengthen protection with a Microsoft Purview-led workshop.
+3
Applicable to:
Data Platform
Disaster Recovery
Security
14 out of 60
Github Actions TrainingInfoMagnus LLC In this workshop, participants learn how to use GitHub Actions to automate build, test, and deployment pipelines for Microsoft Azure environments.
+3
Applicable to:
DevOps
Migration
Security
15 out of 60
Microsoft Authentication Context UpdatesCovenant Technology PartnersAuthentication Context Updates to MFA & Conditional Access Readiness Assessment
+2
Applicable to:
Identity
Security
16 out of 60
Azure Migration Jumpstart: 1-Week Strategic WorkshopAtmoseraNo-cost AVS migration to validate Azure value and accelerate cloud modernization.
+2
Applicable to:
Migration
Security
17 out of 60
CMMC Cloud Estimate - Scoping and Security Readiness OverviewRedspinLearn from a C3PAO leader what you need to protect CUI for CMMC Level 2 with GCC Hight and the insight to get it right the first time with security and compliance management cost efficiency.
+2
Applicable to:
Networking
Security
18 out of 60
Azure AVD Deployment with Nerdio Manager for EnterpriseTrace3, LLCTogether, Trace3 and Nerdio offer a comprehensive, end-to-end AVD program that accelerates time to value, reduces risk, and ensures operational excellence.
+3
Applicable to:
DevOps
Migration
Security
19 out of 60
Cloud Security Posture ManagementTELEPERFORMANCECloud Security Posture Management (CSPM) aims to continuously monitor, assess, and improve the security configuration of cloud environments to prevent breaches, ensure compliance, and reduce risk.
+2
Applicable to:
Identity
Security
20 out of 60
Quickstart for Azure Landing ZoneEmergent SoftwareAzure Landing Zone Quickstart: Establish a secure, scalable foundation in Microsoft Azure using best practices for design, networking, governance and cost management.
+3
Applicable to:
Identity
Networking
Security
21 out of 60
Trace3 and F5 Azure Landing Zones with AI GatewayTrace3, LLCThis strategic partnership between Trace3 and F5 equips organizations to move beyond proof-of-concepts and into enterprise-scale AI deployments with the confidence.
+3
Applicable to:
AI & Machine Learning
Networking
Security
22 out of 60
GitHub AdoptionCoretek ServicesGitHub Adoption: Migrate Git Ecosystem to Microsoft Azure using GitHub Cloud
+3
Applicable to:
App Modernization
DevOps
Security
23 out of 60
Secure Automation with Azure DevOps & GitHubBDOTransform the way you manage your digital estate & application workloads with automation powered by Azure DevOps & GitHub
+3
Applicable to:
App Modernization
DevOps
Security
24 out of 60
Entra ID AssessmentTechNet UC LLCAssess your Entra ID tenant for security, governance, and compliance. Receive expert insights and actionable recommendations to strengthen identity posture and align with Microsoft best practices.
+3
Applicable to:
App Modernization
Identity
Security
25 out of 60
Dedicated Internet Access: 5-Week ImplementationLumen TechnologiesReliable symmetrical bandwidth, managed router services and support with transparent pricing options
+3
Applicable to:
Disaster Recovery
Networking
Security
26 out of 60
Modernize Your Legacy Software with AIiFour Technolab Private LimitedIn this session we will explore how intelligence automation, predictive analytics and conversational AI can breathe new life into your software and create a practical future ready modernization plan.
+3
Applicable to:
AI & Machine Learning
Migration
Security
27 out of 60
Comprehensive IT Security AssessmentiLink Systems, Inc.Assess and strengthen your organization's security posture by uncovering vulnerabilities, mitigating risks, and building resilience against evolving cyber threats across cloud and hybrid environments.
+1
Applicable to:
Security
28 out of 60
AI Chatbot for Patient Support – 2-Week MVP BuildiFour Technolab Private LimitedIn just 2 weeks, we’ll help you launch a secure, HIPAA-compliant chatbot that’s simple, smart, and built for growth.
+3
Applicable to:
Analytics
AI & Machine Learning
Security
29 out of 60
Azure & Microsoft 365 Licensing Audit - 2-Hour Cost Optimization ReviewiFour Technolab Private LimitedOur 2-Hour Azure and Microsoft 365 Licensing Audit is designed to quickly uncover hidden savings, optimize your license usage and make your setup aligns with compliance needs.
+3
Applicable to:
Analytics
Migration
Security
30 out of 60
Microsoft Sentinel - Next-Gen SIEMTrace3, LLCImplement modern threat protection and SIEM with Microsoft Sentinel to detect, investigate, and respond to evolving security threats with confidence.
+1
Applicable to:
Security
31 out of 60
Salesforce and Microsoft Azure IntegrationIT Partner LLCConnect Salesforce to Azure for automation, security, and AI analytics. Streamline CRM with Logic Apps, secure access via Entra ID, and gain insights with Azure AI. Pricing customized.
+3
Applicable to:
Analytics
Identity
Security
32 out of 60
YASH - Attack Defense FrameworkYASH TechnologiesYASH Attack Defense Framework strategy that goes beyond traditional passive defenses by proactively engaging with threats to detect, deceive, and disrupt adversaries.
+1
Applicable to:
Security
33 out of 60
Threat Management using DefenderYASH TechnologiesThis is a Comprehensive Cloud Native Application Protection Platform (CNAPP) that provides end-to-end implementation and support for Microsoft Defender for Cloud to secure workloads for enterprises.
+1
Applicable to:
Security
34 out of 60
RedSpin Ready CMMC Secure Azure Managed ServicesRedspinRedspin Ready Managed Azure GCC High Services & More. Purpose Built to Meet CMMC Level 2 Certification, with Scoping, Implementation, and Managed Security and Compliance to Protect CUI.
+2
Applicable to:
Networking
Security
35 out of 60
NIS2 Rapid Readiness Check for AzureFuture Processing S.A.Free, one-day Azure security assessment for NIS2 compliance. Identify IAM, storage, and network risks with expert recommendations from Future Processing cybersecurity specialists.
+3
Applicable to:
App Modernization
Disaster Recovery
Security
36 out of 60
Active Insights AssessmentBDOMigrate and modernize your estate with an assessment of ongoing support operations as your Cloud Solution Provider.
+2
Applicable to:
Identity
Security
37 out of 60
AI IgnitionOBT Live Realise value from AI in your organisation, quickly & confidently
+3
Applicable to:
Analytics
AI & Machine Learning
Security
38 out of 60
AI Ignition - (not MarketPlace transactable)OBT Live AI Ignition - Rapidly deploy secure and scalable AI solutions with measurable business impact in weeks
+3
Applicable to:
Analytics
AI & Machine Learning
Security
39 out of 60
Redapt Modern SecOps Proof of ValueRedapt, Inc. Modernize Your Security Operations with Expert Guidance
+3
Applicable to:
Backup
Big Data
Security
40 out of 60
Birlasoft AI Driven Platform for SecurityBIRLASOFT LIMITEDiSight is a SaaS-based AI-Driven Platform for optimizing costs & enhancing productivity.
+3
Applicable to:
Disaster Recovery
Identity
Security
41 out of 60
Cloud Foundations: Well-Architected Framework ReviewApex Systems LLCOur Microsoft-certified Cloud SMEs conduct a Well-Architected Framework Review that identifies risks, optimizes costs, and empowers your cloud journey
+3
Applicable to:
App Modernization
Migration
Security
42 out of 60
TSG Cloud CareTechnology Service Group LtdUK managed cloud services that scale with your ambitions.
+3
Applicable to:
Data Platform
Identity
Security
43 out of 60
LBA KubeXpress - Fast track AKS DeploymentLotus Beta AnalyticsLBA KubeXpress rapidly deploys secure, production-ready AKS clusters—accelerating your journey to containerized workloads on Azure.
+3
Applicable to:
App Modernization
DevOps
Security
44 out of 60
Unlocking Compliance Excellence with Microsoft PurviewiLink Systems, Inc.Streamline compliance & data security with iLink’s Microsoft Purview services — implementation, policy enforcement, reporting and tailored ongoing support
+1
Applicable to:
Security
45 out of 60
Transform Your Enterprise with AI-Driven Managed ServicesiLink Systems, Inc.Get peak performance from your cloud environment with iLink’s AI-powered Managed Services—24/7 monitoring, automated issue resolution, and expert support for scalable IT operations.
+2
Applicable to:
Security
Storage
46 out of 60
Comprehensive IT Security Assessment : Safeguarding Your Digital AssetsiLink Systems, Inc.Strengthen your organization's security posture with iLink Digital’s Security Assessment, uncover vulnerabilities, reduce risks, and build resilience across your IT environment.
+2
Applicable to:
Identity
Security
47 out of 60
IBM Technology Expert Labs ADVISE Auatomation Hashicorp non-SaaS and SaaS Offerings CONTACT MEIBM SoftwareBM Technology Expert Labs ADVISE Hashicorp remotely delivered, no "hands on keyboard", comprehensive product-oriented professional services offerings for non-SaaS and SaaS products.
+2
Applicable to:
Disaster Recovery
Security
48 out of 60
NuHarbor’s Microsoft Security Exposure Management Quick StartNuharbor Security Inc.Rapidly deploy Microsoft Security Exposure Management to reduce risks and improve posture.
+1
Applicable to:
Security
49 out of 60
Cloud4C Advanced Network Security and AccessCloud4C Services Pte LtdCloud4C’s Advanced Network Security and Access protects cloud perimeters with Azure Firewall, WAF, DDoS, Front Door, Bastion, and Zero Trust controls for secure, resilient, and compliant connectivity.
+3
Applicable to:
Identity
Networking
Security
50 out of 60
Cloud4C Microsoft Sentinel Enterprise DeploymentCloud4C Services Pte LtdCloud4C’s Microsoft Sentinel Enterprise Deployment accelerates SIEM adoption with structured rollout, customization, training, and optimization for enterprise-scale threat detection and response
+3
Applicable to:
Analytics
Migration
Security
51 out of 60
Cloud4C External Attack Surface Assessment (EASM + MDTI)Cloud4C Services Pte LtdCloud4C’s External Attack Surface Assessment uses Microsoft Defender EASM + MDTI to uncover shadow IT, misconfigurations, CVEs, and risks, delivering dashboards and remediation plans
+3
Applicable to:
Identity
Networking
Security
52 out of 60
Cloud4C Entra Governance & Compliance SuiteCloud4C Services Pte LtdCloud4C’s Entra Governance & Compliance Suite delivers identity governance, protection, and privileged access management with audit-ready workflows to strengthen compliance and reduce insider risks
+3
Applicable to:
Analytics
Identity
Security
53 out of 60
Cloud4C Zero Trust Readiness and StrategyCloud4C Services Pte LtdCloud4C’s Zero Trust Readiness and Strategy delivers maturity assessment, tailored architecture, and phased rollout planning with Microsoft Defender integrations for secure Zero Trust transformation
+3
Applicable to:
Identity
Networking
Security
54 out of 60
Cloud4C Security Posture AssessmentCloud4C Services Pte LtdCloud4C’s Security Posture Assessment delivers Zero Trust–aligned advisory with Secure Score reviews, Defender telemetry, workshops, and board-ready reporting to strengthen enterprise security.
+3
Applicable to:
Identity
Networking
Security
55 out of 60
Cloud4C OT & IoT Security AssessmentCloud4C Services Pte LtdThis assessment leverages Microsoft Defender for IoT to map assets, model threats, and deliver vulnerability reports with a remediation roadmap for industrial and connected environments.
+3
Applicable to:
Identity
Networking
Security
56 out of 60
Cloud4C Microsoft Cloud Security – Enterprise SuiteCloud4C Services Pte LtdCloud4C’s Microsoft Cloud Security – Enterprise Suite delivers unified protection with CNAPP, DevSecOps, WAF/DDoS, data security, and confidential computing in one enterprise-grade Zero Trust package.
+3
Applicable to:
Identity
Networking
Security
57 out of 60
Cloud4C Developer & DevOps Security BundleCloud4C Services Pte LtdCloud4C’s Developer & DevOps Security Bundle secures applications, workloads, and CI/CD pipelines with Entra Workload ID, PIM, and Conditional Access, supported by developer-focused onboarding.
+3
Applicable to:
DevOps
Identity
Security
58 out of 60
Cloud4C Confidential and Identity-Aware ComputingCloud4C Services Pte LtdCloud4C’s Confidential and Identity-Aware Computing secures data-in-use with Azure Confidential VMs, Managed HSM, Key Vault, and encryption policies for privacy-preserving, compliance-ready workloads.
+3
Applicable to:
Identity
Networking
Security
59 out of 60
Cloud4C Microsoft Copilot for Security –Readiness AssessmentCloud4C Services Pte LtdCloud4C’s Microsoft Copilot for Security Readiness Assessment identifies gaps, delivers recommendations, and builds a roadmap for smooth adoption of AI-driven security operations
+3
Applicable to:
AI & Machine Learning
Identity
Security
60 out of 60