Azure Security Center
Unified security management and advanced threat protection across hybrid cloud workloads
- Monitor security across on-premises and cloud workloads
- Apply policy to ensure compliance with security standards
- Find and fix vulnerabilities before they can be exploited
- Use access and application controls to block malicious activity
- Leverage advanced analytics and threat intelligence to detect attacks
- Simplify investigation for rapid threat response
Understand security state across on-premises and cloud workloads
Get a unified view of security across all of your on-premises and cloud workloads. Automatically discover and onboard new Azure resources, and apply security policies across your hybrid cloud workloads to ensure compliance with security standards. Collect, search, and analyze security data from a variety of sources, including firewalls and other partner solutions.
Find vulnerabilities and remediate quickly
Continuously monitor the security of your machines, networks, and Azure services using hundreds of built-in security assessments or create your own. Use actionable security recommendations to remediate issues before they can be exploited.
Limit your exposure to threats
Enable adaptive threat protections to reduce exposure to attacks. Block malware and other unwanted code by applying application controls adapted to your specific workloads and powered by machine learning. Enable just-in-time, controlled access to management ports on Azure VMs to drastically reduce surface area exposed to brute force and other network attacks.
Detect and respond swiftly to attacks
Use advanced analytics and the Microsoft Intelligent Security Graph to get an edge over evolving cyber attacks. Leverage built-in behavioral analytics and machine learning to identify attacks and zero-day exploits. Monitor networks, machines, and cloud services for incoming attacks and post-breach activity. Streamline investigation with interactive tools and contextual threat intelligence.
Related products and services
Key Vault
Safeguard and maintain control of keys and other secrets
Virtual Machines
Provision Windows and Linux virtual machines in seconds