Resource search results
1 - 10 of 193
Learn how hundreds of independent software vendors (ISVs) increased productivity and cut operational costs by choosing Azure as their strategic cloud partner. Read this IDC white paper commissioned by Microsoft to see how ISVs around the world met growing customer demands for agile, intelligent microservices by using the Azure cloud platform. Download the white paper to see how these ISVs experienced on average: 59 percent increase in annual profits overall. 44 percent increase in annual revenue from cloud offerings. 58 percent faster time to market for new products and services, and 3.5 times more new offerings. Faster release cycles and a 30 to 40 percent gain in app development productivity through agile development and automated testing. Lower customer acquisition costs, shorter buying cycles, and new opportunities for customer retention.
For the aspiring intelligent manufacturer, the path to the future starts with an enterprise-ready cloud they can rely on at every stage of the journey. They need a platform that has been proven capable of powering complex industrial operations at global scale, and that delivers the technology underpinnings to reimagine how they do business. Read this whitepaper to learn about how manufacturers can achieve agility, cost savings, and run resilient supply chains by migrating their SAP solutions to the cloud with Microsoft Azure.
Boost security and cut costs by migrating your SQL Server workloads to the cloud with Azure. Read the white paper, Choosing Your Database Migration Path to Azure, for guidance on moving your on-premises database workloads to Azure SQL Database: Learn about cost-saving migration strategies like using the Azure Hybrid Benefit. See how to take advantage of enhanced security, built-in intelligence, and dynamic scalability. Get step-by-step details on planning, optimizing, and implementing your cloud migration. Streamline your transition to the cloud with tools like Azure Database Migration Service. Start researching your path to the cloud now—and find out how migrating to Azure helps to reduce administrative overhead and increase productivity.
This document provides our customers with a detailed assessment of how Azure core services fulfill the security, privacy, compliance, and risk management requirements as defined in the Cloud Security Alliance (CSA) Cloud Control Matrix (CCM) version 3.0.1. Note, however, that the responses below are intended to provide information on how Microsoft operates Azure services; customers have accountability to control and maintain their cloud environment once the service has been provisioned (for example, user access management with appropriate policies and procedures in accordance with regulatory requirements).
Microsoft Azure Responses to Cloud Security Alliance Consensus Assessments Initiative Questionnaire v3.0.1
The Cloud Security Alliance (CSA) Consensus Assessments Initiative Questionnaire (CAIQ) v3.0.1 provides a comprehensive set of questions that customers can use to evaluate the depth / breadth of cloud vendors’ security, privacy, and compliance processes. The Microsoft Azure team has compiled detailed responses to the over 300 items in the assessment, laid out according to their respective domains.
For companies considering implementing solutions involving the Internet of Things (IoT), there are questions as to how to comply with security and privacy requirements. This document is written for decision makers who are considering the use of Microsoft Azure IoT Suite. Section 1 focuses on information about how Microsoft generally addresses key security, privacy, and compliance principles in Azure cloud services. Section 2 describes specific cloud services that Microsoft offers for IoT. Section 3 provides recommendations about how customers can achieve a high level of security and data compliance for their IoT environment.
This white paper helps explain the relationship between cloud service providers (CSPs) and their customers, and notes their roles and responsibilities. Standards such as National Institute of Standards and Technology (NIST) (Special Publication 500-292) and the PCI Standards Council (Information Supplement: PCI DSS Cloud Computing Guidelines) provide considerations for shared responsibilities. This document also examines the relationships between CSPs and their customers in more detail. In addition, this white paper helps explain the shared roles and responsibilities an organization needs to consider when selecting a cloud model, such as IaaS, PaaS, and SaaS. The document also explores the compliance requirements that need consideration based on the selection of the service model.
For governments and the public sector industry worldwide, Microsoft provides Azure - a public multi-tenant cloud services platform that government agencies can use to deploy a variety of solutions. Using Azure's public cloud capabilities, customers benefit from rapid feature growth, resiliency, and the cost-effective operation of the hyperscale cloud while still obtaining the levels of isolation, security, and confidence required to handle workloads across a broad spectrum of data classifications, including unclassified and classified data. Leveraging Azure isolation technologies, as well as intelligent edge capabilities (such as Azure Stack and Data Box Edge), customers can process confidential and sensitive data in secure isolated infrastructure within Azure public multi-tenant regions or highly sensitive data at the edge under the customer's full operational control.
Almost three years ago, Microsoft introduced a new standard for IoT security and argued, based on an analysis of best-in-class devices, that seven properties must be present on every standalone device that connects to the internet in order to be considered secured. Azure Sphere, now generally available, is Microsoft’s entry into the market: a seven-properties-compliant, end-to-end product offering for building and deploying highly secured IoT devices. These details are captured in a new paper titled, Nineteen cybersecurity best practices used to implement the seven properties of highly secured devices in Azure Sphere. It focuses on why the seven properties are always required and describes best practices used to implement Azure Sphere. The paper provides detailed information about the architecture and implementation of Azure Sphere and discusses design decisions and trade-offs. We hope that the new paper can assist organizations and individuals in evaluating the measures used within Azure Sphere to improve the security of IoT devices. Companies may also want to use this paper as a reference, when assessing Azure Sphere or other IoT offerings.
Azure SQL Edge: A data engine optimized for IoT workloads on edge devices