Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Azure Percept is a user-friendly, all-encompassing platform designed to enhance security while developing edge AI solutions. You can initiate your proof of concept within minutes, thanks to hardware accelerators that effortlessly connect with Azure AI and Azure IoT services. Out of the box, Azure Percept is compatible with Azure Cognitive Services, Azure Machine Learning, and various other Azure offerings, providing real-time insights for both vision and audio applications. This end-to-end edge AI platform includes hardware accelerators that are integrated with Azure AI and IoT services, facilitating a smoother development process. With pre-built AI models and robust solution management tools, you can quickly kickstart your proof of concept. Built-in security features ensure that your edge AI solution safeguards your most sensitive and high-value assets. You can begin with a collection of pre-existing AI models tailored for vision tasks, such as object detection, shelf analytics, and vehicle analytics, as well as audio functions like voice control and anomaly detection. Additionally, you have the flexibility to customize AI model training without writing any code and to deploy your solutions either locally or in the cloud, thereby maximizing your implementation options. This versatility and ease of use make Azure Percept a compelling choice for organizations looking to harness the power of edge AI.
Description
The Azure Web Application Firewall is a cloud-based solution designed to safeguard web applications against prevalent hacking methods, including SQL injection and cross-site scripting vulnerabilities. You can set up this service in minutes, enabling you to gain full visibility into your environment while effectively blocking malicious attacks. With the latest managed and preconfigured rule sets, you can protect your web applications quickly and efficiently. The detection engine of Azure Web Application Firewall, coupled with continuously updated rule sets, enhances security measures, minimizes false positives, and optimizes performance. Additionally, Azure Policy can be utilized to enforce organizational standards and assess compliance across Web Application Firewall resources on a large scale. By utilizing these tools, you can achieve a comprehensive overview of your environment's security posture. Ultimately, this proactive approach helps ensure your web applications remain secure and resilient against evolving threats.
API Access
Has API
API Access
Has API
Integrations
Microsoft Azure
Azure AI Services
Azure Industrial IoT
Azure IoT Central
Azure Machine Learning
Azure Marketplace
Microsoft Sentinel
Integrations
Microsoft Azure
Azure AI Services
Azure Industrial IoT
Azure IoT Central
Azure Machine Learning
Azure Marketplace
Microsoft Sentinel
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$0.443 per gateway per hour
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Microsoft
Founded
1975
Country
United States
Website
azure.microsoft.com/en-us/services/azure-percept/
Vendor Details
Company Name
Microsoft
Founded
1975
Country
United States
Website
azure.microsoft.com/en-us/products/web-application-firewall
Product Features
IoT Analytics
Activity Dashboard
Activity Tracking
Analytics
Asset Tracking
Data Collection
Data Synchronization
Data Visualization
ETL
Multiple Data Sources
Performance Analysis
Real-Time Analytics
Real-Time Data
Real-Time Monitoring
Status Tracking
Product Features
Web Application Firewalls (WAF)
Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention