From the outset and at every stage of the cloud solution, Microsoft Azure is focused on keeping your data safe. By choosing Azure, you are benefitting from all of the MS technology that supports this cloud solution. This includes industry leading security and privacy policies that have been built into the development process and is independently verified.


Watch this short video about Microsoft’s cloud security

Azure Security Centre

In addition to this, Azure is supported by the Azure Security Centre which prevents, detects and responds to threats with increased visibility into and control over the security of your Azure resources.

  • Understand your cloud security – Get a central view of the security state of all your Azure resources to verify appropriate controls are in place and identify any resources needing attention.
  • Take control – Define tailored policies to meet your security needs with policy-driven recommendations.
  • Easily deploy Microsoft and partner security solutions – Benefit from industry-leading firewalls and anti-malware with analysis and alerting.
  • Detect threats and respond fast – Using Microsoft’s global threat intelligence, detect threats early, gain insights on related events and impacted resources and receive help in remediating issues and recovering quickly.

In addition to the Azure Security Centre, as your Azure partner we can deploy other applications built around your specific security requirements.

P2V Systems provides a holistic approach to security both externally and internally. Covering all areas of entry into your network. Extensive auditing and reporting capability gives our customers a wealth of information that isn’t available or prohibitively expensive to implement locally without the cloud.

Azure Auditing

Azure Audit Logs include all of the provisioning actions performed via the Azure Resource Manager, in addition to other actions that are related to managing Azure resources. The retention period for these logs is 90 days, however this can be increased. Logs are forwarded to P2V Systems independent logging platform in real-time so they can be analysed on demand with the reassurance that the information hasn’t been manipulated.

Key Vault

Secure key management is essential to protecting data in the cloud. With Azure Key Vault, you can encrypt keys and small secrets like passwords using keys stored in hardware security modules (HSMs). For added assurance, you can import or generate keys in HSMs. If you choose to do this, Microsoft will process your keys in FIPS 140-2 Level 2 validated HSMs (hardware and firmware). Key Vault is designed so that Microsoft does not see or extract your keys. Monitor and audit key use with Azure logging—pipe logs into P2V Systems logging platform for additional analysis and threat detection.

Multi-Factor Authentication

Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication with a range of easy verification options – phone call, text message, or mobile app notification – allowing users to choose the method they prefer.

VPNs to secure connection to Azure

Azure Virtual Network provides an isolated and secure environment to run your virtual machines and applications. You can use your private IP addresses and define subnets, access control policies, and more. With Virtual Networks, you can treat Azure just as you would your own datacentre.

Encryption at rest

Azure Storage Service Encryption (SSE) for Data at Rest helps you protect and safeguard your data to meet your organizational security and compliance commitments. With this feature, Azure Storage automatically encrypts your data prior to storage and decrypts prior to retrieval. The encryption, decryption, and key management are totally transparent to users.

Click here to learn why Microsoft Azure is The Trusted Cloud