Przekaż swoją opinię
Pomoc i obsługa techniczna
Zapisane elementy
Plany prywatne
Zaczekaj chwilę, trwa logowanie...
FiltryWyczyść wszystko

  • Produkty
  • Kategorie (1)
    • AI Apps and Agents
    • Analiza
    • Łańcuch bloków
    • Współpraca
    • Handel
    • Zgodność i przepisy
    • Obsługa klienta
    • Bazy danych
    • Narzędzia dla deweloperów
    • DevOps
    • Finanse
    • Geolokalizacja
    • Kadry
    • Tożsamość
    • Infrastructure Services
    • Integracja
    • Internet rzeczy
    • IT i narzędzia do zarządzania
    • Machine Learning
    • Marketing
    • Multimedia
    • Microsoft Entra ID
    • Migracja
    • Rzeczywistość mieszana
    • Monitorowanie i diagnostyka
    • Operacje i łańcuch zaopatrzenia
    • Produktywność
    • Sprzedaż
    • Zabezpieczenia
      • Zapory
      • Zarządzanie tożsamościami i dostępem
      • Information Protection and Governance
      • Ochrona przed zagrożeniami
    • Zarządzenie zadaniami i projektami
    • Internet
  • Branże
  • Model cen
  • Oceny
  • System operacyjny
  • Wydawca
  • 
    Zakup tych ofert za pomocą witryny Marketplace daje korzyści Twojej organizacji, zmniejszając istniejące zobowiązanie dotyczące platformy Azure. Dowiedz się więcej o swoich korzyściach

Protect your organization with trusted, scalable security solutions

Odkryj rozwiązania zabezpieczeń chroniące dane, urządzenia i tożsamości. Witryna Marketplace ułatwia znajdowanie rozwiązań chroniących przed pojawiającymi się zagrożeniami, upraszcza zarządzanie zabezpieczeniami i skaluje ochronę w miarę rozwoju firmy.

Polecane aplikacje


Fortinet FortiGate Next-Generation Firewall (PAYG VM only)Fortinet
+1
Applicable to:
virtual-machines product iconVirtual Machines
FortiGate Next-Generation Firewall delivers complete content and network protection
1 out of 5
TrendAI Vision One™Trend Micro
+1
Applicable to:
saas product iconSaaS
Stop threats before they strike with TrendAI Vision One™
2 out of 5
Cloud Next-Generation Firewall by Palo Alto Networks - an Azure Native ISV ServicePalo Alto Networks, Inc.
+1
Applicable to:
saas product iconSaaS
Looking for a managed firewall that can help secure your applications and protect against threats?
3 out of 5
Sophos FirewallSophos
+1
Applicable to:
azure-applications product iconAzure Applications
Complete cloud-edge firewall combining IPS, ATP, URL filtering, WAF, rich reporting and more
4 out of 5
pfSense Plus Public Cloud Firewall/VPN/RouterNetgate
+1
Applicable to:
virtual-machines product iconVirtual Machines
pfSense® Plus software - leading price-performance, commercial-grade Edge Firewall, Router, VPN.
5 out of 5

Wyniki (Aplikacje) dla Zabezpieczenia

Pokazywanie wyników w aplikacje.
Widok powiązane wyniki w: chmury branżowe.
Redgate Test Data ManagerRed Gate Software Ltd
+1
Applicable to:
saas product iconSaaS
Enable reliable test data delivery and eliminate compliance burdens with Redgate Test Data Manager.
1 out of 60
ACSC ISM Compliant Rocky Linux 8Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
2 out of 60
ACSC Essential Eight Compliant Rocky Linux 8Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
3 out of 60
ACSC Essential Eight Compliant Rocky Linux 9Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
4 out of 60
ACSC ISM Compliant Rocky Linux 9Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
5 out of 60
ACSC ISM Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
6 out of 60
HCLTech's Cloud Security Foundation (CsaaS) for AzureHCL America Inc_HCLT
+1
Applicable to:
saas product iconSaaS
Adopt Azure cloud securely with azure native security
7 out of 60
PCI Compliant Rocky Linux 9Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
8 out of 60
Standard System Security Compliant Red Hat Enterprise Linux 7 (RHEL 7)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet industry-standard system security best practices by Foundation Security.
9 out of 60
OSPP Compliant Rocky Linux 9Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
10 out of 60
PCI Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
11 out of 60
RH CCP Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet Red Hat Common Criteria Profile compliance for high-assurance Red Hat environments by Foundation Security.
12 out of 60
Standard System Security Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet industry-standard system security best practices by Foundation Security.
13 out of 60
STIG Compliant Rocky Linux 8Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
14 out of 60
OSPP Compliant Rocky Linux 8Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
15 out of 60
OSPP Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
16 out of 60
RH CCP Compliant Red Hat Enterprise Linux 7 (RHEL 7)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet Red Hat Common Criteria Profile compliance for high-assurance Red Hat environments by Foundation Security.
17 out of 60
CJIS Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet CJIS compliance for law enforcement and criminal justice agencies by Foundation Security.
18 out of 60
CJIS Compliant Red Hat Enterprise Linux 7 (RHEL 7)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet CJIS compliance for law enforcement and criminal justice agencies by Foundation Security.
19 out of 60
CCN Basic Level Compliant Red Hat Enterprise Linux (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet CCN Basic Level compliance for public sector and low-sensitivity information systems by Foundation Security.
20 out of 60
OSPP Compliant Red Hat Enterprise Linux 7 (RHEL 7)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
21 out of 60
CCN Advanced Level Compliant Red Hat Enterprise Linux 9 (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet CCN Advanced Level compliance for high-security government and critical infrastructure systems.
22 out of 60
CCN Intermediate Level Compliant Red Hat Enterprise Linux 9 (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet CCN Intermediate Level compliance for government and public sector systems handling sensitive information.
23 out of 60
STIG Compliant Red Hat Enterprise Linux 8 (RHEL 8)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
24 out of 60
ACSC ISM Compliant Red Hat Enterprise Linux 9 (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC ISM compliance for Australian government systems by Foundation Security.
25 out of 60
PCI Compliant Red Hat Enterprise Linux 9 (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet PCI DSS v4.0 compliance for organizations handling payment card data by Foundation Security.
26 out of 60
OSPP Compliant Red Hat Enterprise Linux 9 (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet OSPP compliance for high-assurance operating system environments by Foundation Security.
27 out of 60
GravityZone Small Business SecurityBitDefender SRL
+1
Applicable to:
saas product iconSaaS
Enterprise-Grade Security, Simplified for Small Businesses
28 out of 60
ACSC Essential Eight Compliant Red Hat Enterprise Linux 9 (RHEL 9)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet ACSC Essential Eight compliance by Foundation Security.
29 out of 60
STIG Compliant Red Hat Enterprise Linux 7 (RHEL 7)Foundation
+1
Applicable to:
virtual-machines product iconVirtual Machines
Hardened and preconfigured to meet DISA STIG compliance for Department of Defense agencies and contractors by Foundation Security.
30 out of 60
Infisical secured and supported by HOSSTEDHOSSTED
+1
Applicable to:
virtual-machines product iconVirtual Machines
Infisical is a secure platform for managing and sharing sensitive data such as API keys, environment variables, and other secret credentials.
31 out of 60
DISARM Content Security for EmailSecuLetter
+1
Applicable to:
saas product iconSaaS
Make Microsoft 365 More Secure with Innovative Malware Prevention Technology
32 out of 60
Managed Platform Services for Azure Government CloudsOxford Computer Group LLC
+1
Applicable to:
managed-services product iconManaged Services
OCG’s Managed Platform Services enables both government agencies and Independent Software Vendors (ISVs) to combine the benefits of a Software as a Service (SaaS) model with the enhanced security of Azure Government Clouds.
33 out of 60
Digicentre Azure MSP Service雲力橘子數位股份有限公司-Gamania Digital Entertainment
+1
Applicable to:
managed-services product iconManaged Services
Digicentre provides expertise and support in MSP service and offers a comprehensive range of services for Microsoft Azure.
34 out of 60
SurePassID MFA ServerSurepassid Corp
+1
Applicable to:
virtual-machines product iconVirtual Machines
Advanced, deploy-anywhere MFA for IT/OT and critical infrastructure
35 out of 60
Radiflow OT/ICS Threat and Anomaly Detection Connector for Microsoft SentinelRadiflow
+1
Applicable to:
azure-applications product iconAzure Applications
Radiflow OT/ICS Threat and Anomaly Detection Connector for Microsoft Sentinel
36 out of 60
Eviden's Vyze School Safety SolutionEviden International France - SAS
+1
Applicable to:
saas product iconSaaS
Designed to enhance school safety through advanced AI computer vision and detection capabilities.
37 out of 60
Security-Hardened Image for Windows Server 2022 – Level 2 ComplianceMadarson It, LLC
+1
Applicable to:
virtual-machines product iconVirtual Machines
Azure-based VM pre-configured with Microsoft Windows Server 2022, hardened to Level 2 for advanced security and regulatory compliance.
38 out of 60
Security-Hardened Image for Windows Server 2022 – Level 1 ComplianceMadarson It, LLC
+1
Applicable to:
virtual-machines product iconVirtual Machines
Azure-based VM pre-configured with Microsoft Windows Server 2022, hardened for foundational security and regulatory compliance.
39 out of 60
Security-Hardened Image for Windows Server 2019 – Level 2 ComplianceMadarson It, LLC
+1
Applicable to:
virtual-machines product iconVirtual Machines
Azure-based VM pre-configured with Microsoft Windows Server 2019, hardened to Level 2 for advanced security and regulatory compliance.
40 out of 60
ReversingLabs Scanner for Microsoft DefenderReversingLabs
+1
Applicable to:
azure-applications product iconAzure Applications
Enrich security incidents in Microsoft Defender with file-based threat intelligence
41 out of 60
Assure 365CyberOne
+1
Applicable to:
managed-services product iconManaged Services
Microsoft Security Managed Services: Let CyberOne and Assure 365 strengthen your cyber resilience so you can focus on delivering business success.
42 out of 60
HAProxy on Ubuntu 20.04 LTSNuvemnest
+1
Applicable to:
virtual-machines product iconVirtual Machines
The Reliable, High Performance TCP/HTTP Load Balancer.
43 out of 60
FirstComm Direct Routing CompleteFirstComm
+1
Applicable to:
saas product iconSaaS
FirstComm Direct Routing for Microsoft Teams
44 out of 60
GauntletDeep Armor Technologies Pvt Ltd
+1
Applicable to:
saas product iconSaaS
Unified Solution for Automating Your Cloud Security & Compliance
45 out of 60
Entra ID Backup for Microsoft 365VIRTUAL DATA CENTRE SERVICES LTD
+1
Applicable to:
saas product iconSaaS
Full-fidelity Backup for Microsoft 365, including Entra ID protection
46 out of 60
CodeCybear (for Office Macros and PS Scripts)Idahys
+1
Applicable to:
saas product iconSaaS
CodeCybear secures your endpoints by analyzing and signing Office Macros and PowerShell scripts
47 out of 60
Cloud-Optimized Hardened Image for Microsoft Windows 11 Pro, 25H2 – Level 1 ComplianceMadarson It, LLC
+1
Applicable to:
virtual-machines product iconVirtual Machines
Azure-based VM with Windows 11 Pro 25H2 hardened for Level 1 security compliance
48 out of 60
Meraki Security & Monitoring Products And ServicesBahama Group Llc/dba/Transtechnology Corporation
+1
Applicable to:
saas product iconSaaS
Secure building premises with security analytics and industrial sensor for monitoring environment
49 out of 60
HAProxy on CentOS Linux 7Nuvemnest
+1
Applicable to:
virtual-machines product iconVirtual Machines
The Reliable, High Performance TCP/HTTP Load Balancer
50 out of 60
Linux 7.9 with VPN ServerVirtual Pulse S. R. O.
+1
Applicable to:
virtual-machines product iconVirtual Machines
Securely connect and manage your network with Linux 7.9 with VPN Server
51 out of 60
Ubuntu 22.04 with VPN ServerVirtual Pulse S. R. O.
+1
Applicable to:
virtual-machines product iconVirtual Machines
Secure and customizable VPN solution
52 out of 60
Debian 10 with VPN ServerVirtual Pulse S. R. O.
+1
Applicable to:
virtual-machines product iconVirtual Machines
A robust solution for secure remote access
53 out of 60
Cipher xMDR Platform and Services.Cipher
+1
Applicable to:
saas product iconSaaS
Enhance your cybersecurity visibility and protection with Cipher's xMDR.
54 out of 60
HAProxy on Red Hat Enterprise Linux 7Nuvemnest
+1
Applicable to:
virtual-machines product iconVirtual Machines
The Reliable, High Performance TCP/HTTP Load Balancer
55 out of 60
HAProxy on Red Hat Enterprise Linux 9Nuvemnest
+1
Applicable to:
virtual-machines product iconVirtual Machines
The Reliable, High Performance TCP/HTTP Load Balancer
56 out of 60
Oracle 8 with VPN ServerVirtual Pulse S. R. O.
+1
Applicable to:
virtual-machines product iconVirtual Machines
A robust and secure solution for creating private networks, offering enhanced privacy and data protection.
57 out of 60
EntraID Connector for IntelliTime - Contact Me OfferIntellitime Systems Corporation
+1
Applicable to:
saas product iconSaaS
User authentication via your existing Azure AD account
58 out of 60
CYSANA Malware Detector and Ransomware BlockerConatix
+1
Applicable to:
saas product iconSaaS
CYSANA uses AI to detect malware embedded in executable files and blocks ransomware data encryption.
59 out of 60
Click Armor Enterprise Security Awareness TrainingClick Armor
+1
Applicable to:
saas product iconSaaS
The interactive security training platform for Human Risk Management
60 out of 60
  • Wstecz
  • 46
  • 47
  • 48
  • 49
  • 50
  • Dalej
Informacje o witrynie Marketplace
  • Dlaczego witryna Microsoft Marketplace
  • Blogi
  • Historie klientów
Dla klientów
  • Godziny pracy
  • Przewodnik Wprowadzenie
  • Dokumentacja techniczna
  • Oferty prywatne
  • Microsoft Azure Consumption Commitment
  • Rozliczenia i fakturowanie
Dla partnerów
  • Zostań partnerem
  • Umieść swoją firmę na liście
  • Uzyskaj pomoc techniczną w zakresie marketingu
  • Dokumentacja techniczna
  • Wskazówki krok po kroku dotyczące tworzenia, publikowania i sprzedawania
  • Zostań uprawnionym do wspólnej sprzedaży
  • Społeczność witryny Marketplace dla partnerów
  • Sprzedaż w witrynie Marketplace kierowana przez kanał
  • Wielopartyjne oferty prywatne dla partnerów kanałów
Dla firm
  • Microsoft AI
  • Rozwiązania zabezpieczające firmy Microsoft
  • Azure
  • Dynamics 365
  • Microsoft 365
  • Microsoft Advertising
  • Microsoft 365 Copilot
  • Microsoft Teams
Firma
  • Praca
  • Informacje o firmie Microsoft
  • Aktualności
  • Ochrona prywatności
  • Inwestorzy
  • Zrównoważony rozwój
Polski (Polska) Ikona rezygnacji z opcji prywatności Twoje opcje wyboru dotyczące prywatności Zasady prywatności dotyczące zdrowia użytkowników
  • Mapa witryny
  • Skontaktuj się z nami
  • Prywatność & Pliki cookie
  • Warunki użytkowania
  • Znaki towarowe
  • Informacje o naszych reklamach
  • Zarządzaj plikami cookie
  • © Microsoft 2026