Azure Obtain security from the beginning with the support of a team of experts and proactive regulatory compliance trusted by companies, public administrations and startups.
Take advantage of the multilayer security provided in data centers, infrastructure and operations, with cybersecurity experts who actively monitor them to protect your company’s resources and data.
You control your data, on which your experiences are based. Our basic principle of privacy is that you are the owner of your data. We will never use them for advertising or marketing purposes.
Make detection and response to threats smarter and faster with security signals based on artificial intelligence that modernize security operations.
Microsoft’s continuous innovation — supports the development work it does today and its ideas for future products.
Create solutions with the latest advances in artificial intelligence, blockchain, Kubernetes, containers and databases to always be at the forefront.
Transform your business and its applications with a complete set of cognitive services. Add intelligent algorithms to your applications, websites and bots that allow you to see, hear, speak, understand and interpret the needs of users with natural forms of communication.
Turn data into conclusions with an extraordinary level of performance, safety and speed. Our business-level analysis solution outperforms the competition, costs less and is fully compatible with the development tools, business intelligence and data science you already have.
In the local environment, in the cloud and on the perimeter — we adapt to you. Integrate and manage your environments with tools and services designed for the hybrid cloud.
Improve security, simplify access and establish smart policies in various environments with a single identity platform trusted by 90% of companies around the world.
Take advantage of the Azure Hybrid Advantage and save 40% on virtual machines with your current investment in SQL Server or Windows Server licenses.
Implement Azure Cognitive Services in containers to analyze information near the physical world where the data is located. Offer real-time conclusions and immersive experiences with a high responsiveness and context-sensitive.
Sincronice los directorios locales y habilite el inicio de sesión único.
Services for teams to share code, monitor work and distribute software.
Unleash innovation with hybrid cloud applications.
Devices and solutions for data transfer to Azure and the perimeter process.
Unify security management and enable advanced threat protection for workloads in the hybrid cloud.
Small surface data engine optimized for the perimeter with integrated artificial intelligence.
Get unmatched hybrid security management and threat protection functionality.
Microsoft utiliza una gran variedad de controles físicos, de infraestructura y operativos para proteger Azure, pero estas son medidas adicionales que usted debe llevar a cabo para ayudar a proteger sus cargas de trabajo. Utilice Security Center para fortalecer con rapidez sus medidas de seguridad y proteger sus recursos frente a amenazas.
Once you have solved them, easily implement Microsoft and partner solutions directly from Azure Portal.
Customize your security policy to focus on what is necessary (for example, check for web application firewalls or encryption in storage) and apply the policy to multiple Azure subscriptions. Get visibility of your environment to verify compliance with standards such as CIS, PCI DSS, SOC and ISO.
Security Center helps protect Windows servers and clients with Advanced Threat Protection from Microsoft Defender. In addition, it protects Linux servers with behavior analysis. For each attack that is attempted or carried out, you receive a detailed report and recommended solutions.
Protect servers running on Azure and other clouds with advanced controls. Just-in-Time access to virtual machines reduces the area exposed to brute force attacks through RDP / SSH, one of the most common threats, with more than 100,000 attempts to attack Azure Virtual Machines per month. Use the Standard level to mitigate this threat.
As you add applications to virtual machines in Azure, block malicious applications, including those that do not mitigate anti-malware solutions, using adaptive application controls. Machine Learning automatically applies new white-list application policies to virtual machines.
Resolve vulnerabilities in web applications, such as add-ons and exposed web pages, which are a frequent target of attackers. The Standard level helps protect applications running in Azure App Service, because it marks the behavior that could happen through web application firewall instruments. It also helps protect other cloud services, such as VM Scale Sets and Containers.
Advances in the field of big data and machine learning make it possible for Security Center to detect query patterns and anomalous accesses in databases, attacks by SQL code injection and other threats aimed at its Azure SQL databases Database Receive suspicious activity alerts and recommended actions to investigate and mitigate these threats. Detect, classify, label and protect the confidential data of your databases. Stop threats in your Azure Storage instance, including access from an unusual location, unusual anonymous access, unusual data extraction or unexpected removal.
Get a unified view of the security of all your local and cloud workloads, including your Azure IoT solution. Automatically detect and incorporate new devices and apply security policies to your workloads (Leaf, Edge and IOT Hub devices) to ensure compliance with safety standards. Constantly monitor the security of Azure IoT devices, machines, networks and services, including your Azure IoT solution, from perimeter devices to applications, using hundreds of integrated security assessments, or create your own Own in a central panel. Optimize your security settings and improve your security score with recommendations that will help you take action on virtual machines, networks, applications and data. With the newly added IoT functionality, you can now reduce the area exposed to attacks for your Azure IoT solution and solve problems before they can take advantage of them with a malicious purpose. Monitor your IoT solution to detect incoming attacks and activity following a security breach.
Collect and analyze telemetry data from your Azure and local environments and act on that data. Azure Monitor helps you maximize application performance and availability and proactively identify problems in seconds.
Store and analyze all operational telemetry in a centralized, fully managed and scalable data warehouse optimized for performance and cost.
Test your hypotheses and reveal hidden patterns using the advanced analytical engine, interactive query language and integrated machine learning constructs.
It integrates with well-known DevOps tools, problem management, IT service management and security and event information management.
Get everything you need to monitor the availability, performance and use of web applications, whether they are hosted in Azure or in a local environment. Azure Monitor supports popular languages and frameworks, such as .NET, Java and Node.js, and integrates with DevOps processes and tools such as Azure DevOps, Jira and PagerDuty. Track the flows, requests and response times of live metrics, and events.
Analyze and optimize the performance of your infrastructure, including virtual machines (VMs), Azure Kubernetes Service (AKS), Azure Storage and databases. Monitor your Linux and Windows virtual machines and their status and dependencies, all on a single map.
Monitor and diagnose network problems without logging into virtual machines. Activate packet capture, diagnose routing problems, analyze network security group flow records and gain visibility and control over the Azure network.
Azure Monitor collects monitoring telemetry from various sources in local and Azure environments. Administration tools, such as Azure Security Center and Azure Automation, also insert log data into Azure Monitor. The service aggregates and stores this telemetry in a log data store that is optimized for cost and performance. Analyze data, configure alerts, get end-to-end views of your applications and use machine-controlled conclusions to quickly identify and solve problems.
Create next-generation security operations with the cloud and artificial intelligence
See and stop threats before they cause damage, with SIEM technology reinvented for a modern world. Azure Sentinel offers you a complete view of your company. Take advantage of the large-scale knowledge of the cloud that Microsoft has acquired over decades of security work. Use artificial intelligence (AI) to detect and respond to threats more intelligently and faster. Eliminate infrastructure configuration and maintenance and scale resources resiliently to meet your security needs, while reducing IT costs.
Cloud-scale data of all users, devices, applications and the entire infrastructure, both in the local environment and in various clouds.
Threats that were not discovered before and minimize false positives using unparalleled threat analysis and information from Microsoft.
Threats with artificial intelligence and look for suspicious activity at scale, taking advantage of the work in cybersecurity that Microsoft has carried out for decades.
To incidents quickly using orchestration and automation of integrated common tasks.
Invest in security, not infrastructure configuration and maintenance, with the first SIEM solution native to the cloud from one of the leading cloud providers. Never allow more than a storage or query limit to prevent you from protecting your business. Start using Azure Sentinel immediately. It automatically scales according to the needs of your organization and only pays for the resources you need.
Focus on finding real threats quickly. Reduce the noise of legitimate events with integrated machine learning and knowledge based on the analysis of billions of signals daily. Streamline the proactive search for threats with integrated queries that are the result of years of experience in security. View a list of alerts in order of priority, obtain correlated analyzes of thousands of security events in just a few seconds and visualize the full scope of each attack. Simplify security operations and expedite threat response with integrated automation and orchestration of common tasks and workflows.
Collect and connect to data from all its sources, such as users, applications, servers and devices running in the local environment or in the cloud. Integrate it with your current tools, be they business applications, other security products or your own tools, and use your own Machine Learning models. Optimize it for your needs by incorporating your own conclusions, custom detections, Machine Learning models and threat information.