Azure Firewall Policy PNG and SVG Icon

Azure Firewall Policy allows creation and enforcement of security and routing rules for Azure Firewall instances, supporting centralized rule definitions and network segmentation.


Cost Export icon in SVG and PNG formats

Cost Export

Cost Export in Azure automates the export of detailed usage and billing data to storage accounts for external analysis and reporting.
Lab Accounts icon in SVG and PNG formats

Lab Accounts

Azure Lab Accounts provide centralized administration of Azure DevTest Labs, enabling resource sharing, automated cleanup, and cost control for multiple lab environments.
User Settings icon in SVG and PNG formats

User Settings

Azure User Settings allow individuals to customize their Azure portal experience, manage preferences, and configure default behaviors.
Azure HPC Workbenches icon in SVG and PNG formats

Azure HPC Workbenches

Azure HPC Workbenches offer a scalable platform for high performance computing workloads, allowing researchers and engineers to run simulations, data modeling, and analytics in the cloud.
Quickstart Center icon in SVG and PNG formats

Quickstart Center

Azure Quickstart Center offers personalized recommendations and guided setup experiences to help you onboard services and best practices quickly and confidently.
Resource Mover icon in SVG and PNG formats

Resource Mover

Azure Resource Mover helps orchestrate the migration of Azure resources like VMs, disks, and networking across regions with minimal disruption and automated dependency resolution.
Keys icon in SVG and PNG formats

Keys

Keys represent individual cryptographic keys stored in Azure Key Vault, used for signing, encryption, and authentication ensuring secure operations for cloud applications and services.
DevTest Labs icon in SVG and PNG formats

DevTest Labs

Azure DevTest Labs is designed to help development teams quickly create and manage environments in Azure while optimizing cost. It is ideal for testing applications, running development experiments, and managing training environments with streamlined provisioning and automation.
FHIR Service icon in SVG and PNG formats

FHIR Service

Azure FHIR Service enables secure exchange of healthcare data using the HL7 FHIR standard. It streamlines interoperability between systems and applications, making clinical data accessible, structured, and scalable on Azure.
Defender Distributer Control System icon in SVG and PNG formats

Defender Distributer Control System

Defender Distributer Control System supports cybersecurity for industrial control systems by monitoring distributed assets and processes. It provides real time threat detection and compliance insights tailored to operational technology networks.
Load Testing icon in SVG and PNG formats

Load Testing

Azure Load Testing provides a managed service for performance testing web apps at scale with diagnostics, reporting, and automated load simulation tools.
Azure Monitors for SAP Solutions icon in SVG and PNG formats

Azure Monitors for SAP Solutions

Azure Monitors for SAP Solutions delivers deep monitoring and performance insights for SAP landscapes hosted on Azure, ensuring optimal uptime, availability, and resource utilization.
Azure Center for SAP icon in SVG and PNG formats

Azure Center for SAP

Azure Center for SAP simplifies deployment, monitoring, and optimization of SAP workloads on Azure. It offers health insights, governance recommendations, best practices, and integration with Azure's hybrid infrastructure.
Web Application Firewall Policies(WAF) icon in SVG and PNG formats

Web Application Firewall Policies(WAF)

Web Application Firewall (WAF) Policies provide centralized configuration and management for protecting web applications from common threats and vulnerabilities.
Applens icon in SVG and PNG formats

Applens

Applens is a diagnostic tool used in Azure App Services to troubleshoot issues by providing insights, metrics, and self help solutions.
Detonation icon in SVG and PNG formats

Detonation

Detonation in Azure refers to the process of safely executing potentially malicious content in an isolated environment to analyze its behavior. This security approach helps detect advanced threats and zero day vulnerabilities by observing how the content acts, without putting your network at risk.
Software as a Service icon in SVG and PNG formats

Software as a Service

Azure Software as a Service (SaaS) offerings deliver fully managed applications over the internet, reducing infrastructure overhead for customers.
Azure Operator 5G Core icon in SVG and PNG formats

Azure Operator 5G Core

Azure Operator 5G Core supports telecom operators with a cloud native 5G core infrastructure, enabling scalable, low latency mobile connectivity solutions using Azure infrastructure.
Website Staging icon in SVG and PNG formats

Website Staging

Website Staging refers to isolated environments used for testing web apps before publishing to production, ensuring stable releases.
Toolchain Orchestrator icon in SVG and PNG formats

Toolchain Orchestrator

Toolchain Orchestrator helps automate and coordinate complex development workflows across different CI/CD tools within Azure DevOps and third party services.
Compliance icon in SVG and PNG formats

Compliance

Compliance in Azure encompasses tools and dashboards that help organizations maintain and monitor regulatory compliance across cloud resources.
Azure Database MySQL Server icon in SVG and PNG formats

Azure Database MySQL Server

Azure Database for MySQL is a managed cloud database for transactional MySQL workloads. It provides built in scalability, automated backups, security, and high availability for web and enterprise apps.
Azure Fileshares icon in SVG and PNG formats

Azure Fileshares

Azure Fileshares delivers fully managed file storage over SMB or NFS protocols in Azure. It supports Azure Active Directory integration, snapshots, geo redundancy, and high reliability.
Defender PLC icon in SVG and PNG formats

Defender PLC

Azure Defender for PLCs (Programmable Logic Controllers) provides deep threat detection and anomaly monitoring for core industrial control units. It plays a vital role in protecting OT environments from targeted cyberattacks.