Изпращане на обратна връзка
Помощ и поддръжка
Записани елементи
Частни планове
Един момент, обработва се влизането ви...
ФилтриИзчистване на всички

  • Продукти
  • Категории (1)
    • AI Apps and Agents
    • Analytics
    • Blockchain
    • Collaboration
    • Commerce
    • Compliance & Legal
    • Customer Service
    • Databases
    • Developer Tools
    • DevOps
    • Finance
    • Geolocation
    • Human Resources
    • Identity
    • Infrastructure Services
    • Integration
    • Internet of Things
    • IT & Management Tools
    • Machine Learning
    • Marketing
    • Media
    • Microsoft Entra ID
    • Migration
    • Mixed Reality
    • Monitoring & Diagnostics
    • Operations & Supply Chain
    • Productivity
    • Sales
    • Security
      • Firewalls
      • Identity & Access Management
      • Information Protection and Governance
      • Threat Protection
    • Task & Project Management
    • Web
  • Отрасли
  • Модел на ценообразуване
  • Оценки
  • Операционна система
  • Издател
  • 
    Закупуването на тези предложения чрез пазара е от полза за вашата организация чрез намаляване на съществуващия ви ангажимент за Azure. Научете повече за вашите ползи

Актуални приложения


Fortinet FortiGate Next-Generation Firewall (PAYG VM only)Fortinet
+1
Applicable to:
virtual-machines product iconVirtual Machines
1 out of 5
TrendAI Vision One™Trend Micro
+1
Applicable to:
saas product iconSaaS
2 out of 5
Cloud Next-Generation Firewall by Palo Alto Networks - an Azure Native ISV ServicePalo Alto Networks, Inc.
+1
Applicable to:
saas product iconSaaS
3 out of 5
Sophos FirewallSophos
+1
Applicable to:
azure-applications product iconAzure Applications
4 out of 5
pfSense Plus Public Cloud Firewall/VPN/RouterNetgate
+1
Applicable to:
virtual-machines product iconVirtual Machines
5 out of 5

Приложения резултата за Security

Показват се резултати след приложения.
Преглед свързани резултати в облаци за отрасли.
AlmaLinux 8 DesktopMadarson It, LLC
+1
Applicable to:
virtual-machines product iconVirtual Machines
Azure-based AlmaLinux 8 Virtual Desktop pre-configured with GUI/RDP access.
1 out of 60
Trustwave Advanced Phishing ScannerTrustwave Holdings, Inc.
+1
Applicable to:
saas product iconSaaS
Free phishing scanner that identifies potential threats which have bypassed your SEG
2 out of 60
Performanta Azure Lighthouse ConnectionsPerformanta
+1
Applicable to:
managed-services product iconManaged Services
A specialized implementation of Azure Lighthouse designed for Performanta, a Managed Security Service Provider (MSSP). This service enables Performanta to manage and oversee their customers' Azure environments with enhanced precision and efficiency.
3 out of 60
Hardened AlmaLinux 10 with Cockpit & Local AI System Assistant – Security CompliantMadarson It, LLC
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened Alma Linux 10 with Cockpit and a local AI assistant for secure, AI-assisted Linux management.
4 out of 60
Advanced Hardened ALMA Linux 8 image - Level 2 SecurityMadarson It, LLC
+1
Applicable to:
virtual-machines product iconVirtual Machines
Azure-based VM pre-configured with the latest ALMA Linux 8 image, hardened and optimized for level 2 security and compliance.
5 out of 60
Madarson IT Hardened AlmaLinux 8 – Secure and Optimized for AzureMadarson It, LLC
+1
Applicable to:
virtual-machines product iconVirtual Machines
Azure-based VM pre-configured with the latest ALMA Linux 8 image, hardened and optimized for security and compliance.
6 out of 60
BreachRisk™ CoPilot for SecurityBreachBIts
+1
Applicable to:
saas product iconSaaS
Red Team attack surface management and accurate risk scoring from the hackers perspective.
7 out of 60
DashMagiqVidyatech Solutions Private Limited
+1
Applicable to:
saas product iconSaaS
DashMagiq® DLP Workflow incident remidiation automation with automatic audit trail for compliance.
8 out of 60
Linux Stream 9 Minimal with VPN ServerVirtual Pulse S. R. O.
+1
Applicable to:
virtual-machines product iconVirtual Machines
Securely access your network from anywhere with Linux Stream 9 Minimal with VPN Server
9 out of 60
ACSC Compliant Red Hat Enterprise Linux 7Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC compliance by Foundation Security.
10 out of 60
ACSC ISM Compliant Rocky Linux 8Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
11 out of 60
ACSC Essential Eight Compliant Rocky Linux 8Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
12 out of 60
ACSC Essential Eight Compliant Rocky Linux 9Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
13 out of 60
ACSC ISM Compliant Rocky Linux 9Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
14 out of 60
ACSC Essential Eight Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
15 out of 60
ACSC ISM Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
16 out of 60
HCLTech's Cloud Security Foundation (CsaaS) for AzureHCL America Inc_HCLT
+1
Applicable to:
saas product iconSaaS
Adopt Azure cloud securely with azure native security
17 out of 60
PCI Compliant Rocky Linux 9Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
18 out of 60
PCI Compliant Rocky Linux 8Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
19 out of 60
Standard System Security Compliant Red Hat Enterprise Linux 7 (RHEL 7)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet industry-standard system security best practices by Foundation Security.
20 out of 60
OSPP Compliant Rocky Linux 9Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
21 out of 60
PCI Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
22 out of 60
PCI Compliant Red Hat Enterprise Linux 7 (RHEL 7)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
23 out of 60
STIG Compliant Rocky Linux 9Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
24 out of 60
RH CCP Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet Red Hat Common Criteria Profile compliance for high-assurance Red Hat environments by Foundation Security.
25 out of 60
Standard System Security Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet industry-standard system security best practices by Foundation Security.
26 out of 60
STIG Compliant Rocky Linux 8Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
27 out of 60
OSPP Compliant Rocky Linux 8Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
28 out of 60
OSPP Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
29 out of 60
RH CCP Compliant Red Hat Enterprise Linux 7 (RHEL 7)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet Red Hat Common Criteria Profile compliance for high-assurance Red Hat environments by Foundation Security.
30 out of 60
CJIS Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet CJIS compliance for law enforcement and criminal justice agencies by Foundation Security.
31 out of 60
CJIS Compliant Red Hat Enterprise Linux 7 (RHEL 7)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet CJIS compliance for law enforcement and criminal justice agencies by Foundation Security.
32 out of 60
CCN Basic Level Compliant Red Hat Enterprise Linux (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet CCN Basic Level compliance for public sector and low-sensitivity information systems by Foundation Security.
33 out of 60
OSPP Compliant Red Hat Enterprise Linux 7 (RHEL 7)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
34 out of 60
CCN Advanced Level Compliant Red Hat Enterprise Linux 9 (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet CCN Advanced Level compliance for high-security government and critical infrastructure systems.
35 out of 60
CCN Intermediate Level Compliant Red Hat Enterprise Linux 9 (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet CCN Intermediate Level compliance for government and public sector systems handling sensitive information.
36 out of 60
STIG Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
37 out of 60
ACSC ISM Compliant Red Hat Enterprise Linux 9 (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
38 out of 60
PCI Compliant Red Hat Enterprise Linux 9 (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
39 out of 60
OSPP Compliant Red Hat Enterprise Linux 9 (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
40 out of 60
GravityZone Small Business SecurityBitDefender SRL
+1
Applicable to:
saas product iconSaaS
Enterprise-Grade Security, Simplified for Small Businesses
41 out of 60
ACSC Essential Eight Compliant Red Hat Enterprise Linux 9 (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
42 out of 60
STIG Compliant Red Hat Enterprise Linux 7 (RHEL 7)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
43 out of 60
Infisical secured and supported by HOSSTEDHOSSTED
+1
Applicable to:
virtual-machines product iconVirtual Machines
Infisical is a secure platform for managing and sharing sensitive data such as API keys, environment variables, and other secret credentials.
44 out of 60
DISARM Content Security for EmailSecuLetter
+1
Applicable to:
saas product iconSaaS
Make Microsoft 365 More Secure with Innovative Malware Prevention Technology
45 out of 60
Managed Platform Services for Azure Government CloudsOxford Computer Group LLC
+1
Applicable to:
managed-services product iconManaged Services
OCG’s Managed Platform Services enables both government agencies and Independent Software Vendors (ISVs) to combine the benefits of a Software as a Service (SaaS) model with the enhanced security of Azure Government Clouds.
46 out of 60
Digicentre Azure MSP Service雲力橘子數位股份有限公司-Gamania Digital Entertainment
+1
Applicable to:
managed-services product iconManaged Services
Digicentre provides expertise and support in MSP service and offers a comprehensive range of services for Microsoft Azure.
47 out of 60
Eviden's Vyze School Safety SolutionEviden International France - SAS
+1
Applicable to:
saas product iconSaaS
Designed to enhance school safety through advanced AI computer vision and detection capabilities.
48 out of 60
Security-Hardened Image for Windows Server 2022 – Level 2 ComplianceMadarson It, LLC
+1
Applicable to:
virtual-machines product iconVirtual Machines
Azure-based VM pre-configured with Microsoft Windows Server 2022, hardened to Level 2 for advanced security and regulatory compliance.
49 out of 60
Security-Hardened Image for Windows Server 2022 – Level 1 ComplianceMadarson It, LLC
+1
Applicable to:
virtual-machines product iconVirtual Machines
Azure-based VM pre-configured with Microsoft Windows Server 2022, hardened for foundational security and regulatory compliance.
50 out of 60
Security-Hardened Image for Windows Server 2019 – Level 2 ComplianceMadarson It, LLC
+1
Applicable to:
virtual-machines product iconVirtual Machines
Azure-based VM pre-configured with Microsoft Windows Server 2019, hardened to Level 2 for advanced security and regulatory compliance.
51 out of 60
ReversingLabs Scanner for Microsoft DefenderReversingLabs
+1
Applicable to:
azure-applications product iconAzure Applications
Enrich security incidents in Microsoft Defender with file-based threat intelligence
52 out of 60
HAProxy on Ubuntu 20.04 LTSNuvemnest
+1
Applicable to:
virtual-machines product iconVirtual Machines
The Reliable, High Performance TCP/HTTP Load Balancer.
53 out of 60
FirstComm Direct Routing CompleteFirstComm
+1
Applicable to:
saas product iconSaaS
FirstComm Direct Routing for Microsoft Teams
54 out of 60
GauntletDeep Armor Technologies Pvt Ltd
+1
Applicable to:
saas product iconSaaS
Unified Solution for Automating Your Cloud Security & Compliance
55 out of 60
Entra ID Backup for Microsoft 365VIRTUAL DATA CENTRE SERVICES LTD
+1
Applicable to:
saas product iconSaaS
Full-fidelity Backup for Microsoft 365, including Entra ID protection
56 out of 60
CodeCybear (for Office Macros and PS Scripts)Idahys
+1
Applicable to:
saas product iconSaaS
CodeCybear secures your endpoints by analyzing and signing Office Macros and PowerShell scripts
57 out of 60
Meraki Security & Monitoring Products And ServicesBahama Group Llc/dba/Transtechnology Corporation
+1
Applicable to:
saas product iconSaaS
Secure building premises with security analytics and industrial sensor for monitoring environment
58 out of 60
HAProxy on CentOS Linux 7Nuvemnest
+1
Applicable to:
virtual-machines product iconVirtual Machines
The Reliable, High Performance TCP/HTTP Load Balancer
59 out of 60
Linux 7.9 with VPN ServerVirtual Pulse S. R. O.
+1
Applicable to:
virtual-machines product iconVirtual Machines
Securely connect and manage your network with Linux 7.9 with VPN Server
60 out of 60
  • Назад
  • 48
  • 49
  • 50
  • 51
  • 52
  • Напред
За пазара
  • Защо Microsoft Пазар
  • Блогове
  • Истории на клиенти
За клиенти
  • Работно време
  • Ръководство за първи стъпки
  • Техническа документация
  • Частни предложения
  • Microsoft Azure Consumption Commitment
  • Плащане и фактуриране
За партньори
  • Станете партньор
  • Включване в списъка
  • Получаване на маркетингова поддръжка
  • Техническа документация
  • Указания стъпка по стъпка за създаване, публикуване и продажба
  • Станете отговарящи на условията за съвместна продажба
  • Общност на пазара за партньори
  • Продажби на пазара, ръководени от канал
  • Частни предложения с много дялове за партньори в канала
Бизнес
  • ИИ на Microsoft
  • Microsoft Security
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Реклами на Microsoft
  • Microsoft 365 Copilot
  • Microsoft Teams
Компания
  • Кариери
  • Поверителност в Microsoft
  • Инвеститори
  • устойчивост
Български (България) Вашите избори за поверителност Икона за отписване Вашите избори за поверителност Поверителност на здравето на потребителите
  • Карта на сайта
  • Връзка с нас
  • Поверителност и бисквитки
  • Условия на използване
  • Търговски марки
  • Относно нашите реклами
  • Управление на бисквитките
  • © Microsoft 2026