New on Azure Marketplace: July 18-24, 2024

  • Thread starter Thread starter Luxmi_Nagaraj
  • Start date Start date
L

Luxmi_Nagaraj

We continue to expand the Azure Marketplace ecosystem. For this volume, 132 new offers successfully met the onboarding criteria and went live. See details of the new offers below:


Get it now in our marketplace

-f6d41c91d8cb.d5741a03-0707-4db5-986e-8f02bee44b7b.pngAccess Patient Flow Manager: Access Patient Flow Management provides real-time bed occupancy updates, improving patient care, reducing risk, and saving time. It interfaces with existing patient administration systems and departmental solutions, standardizes data capture, and digitally manages bed supply and demand.
-6ea5052a2c46.86c90c37-bb38-4178-946d-372dd279ca75.pngACSC-Compliant Red Hat Enterprise Linux 7: Foundation Security offers an ACSC-compliant Red Hat Enterprise Linux 7 virtual machine image with built-in security controls to protect sensitive data. The image is regularly updated and ideal for organizations needing a secure and compliant environment. Foundation Security's team of experts provides ongoing support, and its solutions are trusted by Fortune 500 companies.
-e92bde416533.c9a3f386-7c6d-48d1-99f9-39e188204377.pngACSC Essential Eight-Compliant Red Hat Enterprise Linux 8 (RHEL 8)
-7e0baaab8daa.8069e1df-4f97-45ec-bcc3-c70ee6e7c9fa.pngACSC Essential Eight-Compliant Rocky Linux 8: Foundation Security offers an ACSC Essential Eight-compliant Rocky Linux 8 virtual machine image with built-in security controls to protect sensitive data. The preconfigured image reduces the time and resources required for security implementation and is regularly updated to keep up with the latest threats and compliance regulations. Foundation Security's experienced team provides ongoing support.
-885c35b6969b.914cd2e1-49f1-4d7e-8a19-e02386d8f81c.pngACSC Essential Eight-Compliant Rocky Linux 9: Foundation Security offers an ACSC Essential Eight-compliant Rocky Linux 9 virtual machine image with hundreds of built-in security controls. This preconfigured image reduces the time and resources required for security implementation, ensuring the confidentiality, integrity, and availability of sensitive data. Foundation Security's experienced team provides ongoing support, making it an ideal solution for organizations that need a secure and compliant environment.
-57b68fc9a9f8.a52bdfdd-9f49-4978-80ab-d51ca935cf55.pngACSC ISM-Compliant Red Hat Enterprise Linux 8 (RHEL 8)
: Foundation Security offers an ACSC Essential Eight-compliant RHEL 8 virtual machine image with built-in security controls to protect sensitive data. The preconfigured image reduces the time and resources required for security implementation and is regularly updated to keep up with the latest threats and compliance regulations. Foundation Security's experienced team provides ongoing support, and its solutions are used by several Fortune 500 companies.
: This preconfigured ACSC ISM-compliant RHEL 8 virtual machine image is designed to meet Australian government security standards, reducing time and resources required for security implementation and compliance efforts. Foundation Security updates the image regularly to address evolving threats and compliance requirements, with ongoing support provided by a team of experts.
[TR]
[td width="15%"]-2fc1a16436c8.eddca909-b4d1-4b15-925d-fb30498f9e82.png[/td] [td width="85%"]ACSC ISM-Compliant Red Hat Enterprise Linux 9 (RHEL 9): The ACSC ISM-compliant RHEL 9 virtual machine image is a preconfigured solution that aligns with Australian government security standards. It reduces the time and resources required for security implementation and compliance efforts. Foundation Security updates the image regularly to address evolving threats and compliance requirements, providing ongoing support to address any security concerns or compliance queries.[/td]
[/TR]
[TR]
[td width="15%"]-7a0c636110e0.91a2fe7d-649a-482d-9522-b3fdf4bb7804.png[/td] [td width="85%"]ACSC ISM-Compliant Rocky Linux 8: The ACSC ISM-compliant Rocky Linux 8 virtual machine image is preconfigured with security controls aligned with Australian government standards. Foundation Security updates the image to address evolving threats and compliance requirements, providing ongoing support to meet the highest security standards required by the ACSC ISM.[/td]
[/TR]
[TR]
[td width="15%"]-e97d6495afa6.c7206a93-4cb7-4519-a3d4-25d3584bfa3a.png[/td] [td width="85%"]ACSC ISM-Compliant Rocky Linux 9: Foundation Security offers an ACSC ISM-compliant Rocky Linux 9 virtual machine image with built-in security controls to align with Australian government standards. This preconfigured image reduces the time and resources required for security implementation and compliance efforts. The team provides ongoing support, and its solutions are trusted by various Australian government agencies and contractors.[/td]
[/TR]
[TR]
[td width="15%"]-91c982d2c512.d324bc62-ec1d-4aae-bf11-57e86e6d67db.png[/td] [td width="85%"]AffableBPM AI-Based Data Analytics Copilot: AffableBPM’s Data Analytics is powered by Microsoft Azure OpenAI to convert your questions into database searches, presenting the results in an intuitive visual format. It provides instant insights without the need for complex tools or technical skills. It is perfect for quickly making decisions and enhances productivity by bypassing traditional setup and configuration steps.[/td]
[/TR]
[TR]
[td width="15%"]-9aae810b24f3.950ffe65-b0c3-4074-bb55-af37cf54f83c.png[/td] [td width="85%"]AI Anomaly Detection: AI Anomaly Detection monitors databases and business indicators to detect anomalies. Users are notified via email or preferred channels. The app monitors database schema and business indicators and sends notifications with interactive data visualizations and AI-generated descriptive analytics.[/td]
[/TR]
[TR]
[td width="15%"]-0c6602b3c27a.95e22ef6-6318-4762-b4ef-516cc665f134.png[/td] [td width="85%"]Apache Solr on Ubuntu: Apache Solr is an open-source search platform that excels in handling large volumes of data efficiently. It facilitates full-text search, supports advanced features such as faceted search and hit highlighting, and can handle diverse document types. Solr integrates seamlessly with various programming languages and frameworks, making it a cornerstone technology for organizations looking to enhance search functionality and improve user experience.[/td]
[/TR]
[TR]
[td width="15%"]-f4642c8e5abb.93ac0c34-094b-4dff-8d1e-8742be3dc102.png[/td] [td width="85%"]CCN Advanced Level-Compliant Red Hat Enterprise Linux 9 (RHEL 9): Foundation Security offers a preconfigured CCN Advanced Level-compliant RHEL 9 virtual machine image fortified with numerous security controls to meet the rigorous standards set by the CCN for high-security environments. The image is designed and implemented to meet the highest security standards required by the CCN Advanced Level profile, and regularly updated to address evolving threats and compliance requirements. Foundation Security also provides ongoing support to address any security concerns or compliance queries.[/td]
[/TR]
[TR]
[td width="15%"]-a60b636f8e50.9e5b52f5-649d-444d-b0d0-bb5a17053e5b.png[/td] [td width="85%"]CCN Basic Level-Compliant Red Hat Enterprise Linux (RHEL 9): Foundation Security offers a preconfigured CCN Basic Level-compliant RHEL 9 virtual machine image that meets Spanish government standards for public or low-sensitivity information systems. This reduces the time and effort required for basic security implementation and compliance. The image is regularly updated to address common threats and evolving compliance requirements, and Foundation Security offers support to address security concerns or compliance questions.[/td]
[/TR]
[TR]
[td width="15%"]-7a65b81c5446.0d861aa3-d585-451c-8a20-6d613ec44852.png[/td] [td width="85%"]CCN Intermediate Level-Compliant Red Hat Enterprise Linux 9 (RHEL 9): Foundation Security offers a CCN Intermediate Level-compliant RHEL 9 virtual machine image with robust security controls for moderately sensitive environments in Spain. Foundation Security’s expertise in Spanish security frameworks ensures compliance with government standards, reducing complexity and time for implementation.[/td]
[/TR]
[TR]
[td width="15%"]-73a47789a16b.986a5d6a-afce-486b-9abf-4030480c59a1.png[/td] [td width="85%"]CJIS-Compliant Red Hat Enterprise Linux 7 (RHEL 7): Foundation Security offers a preconfigured CJIS-compliant RHEL 7 virtual machine image with numerous security controls to meet CJIS Security Policy requirements. Foundation Security’s team of experts provides ongoing support to address security concerns and compliance queries.[/td]
[/TR]
[TR]
[td width="15%"]-2ae86c0e98fa.adfecb8d-b6ec-44bb-b101-c1983790e9de.png[/td] [td width="85%"]CJIS-Compliant Red Hat Enterprise Linux 8 (RHEL 8)[/td]: Foundation Security offers a preconfigured CJIS-compliant RHEL 8 virtual machine image with numerous security controls to meet CJIS Security Policy requirements. Foundation Security’s team of experts provides ongoing support to address concerns and compliance queries.
[/TR]
[TR]
[td width="15%"]-16b4ee1430a1.71c0cb06-7eba-49df-8bb5-e6f195be1c71.png[/td] [td width="85%"]Debian 10 with Minecraft Bedrock Game Server: Virtual Pulse offers a simplified solution for hosting a Minecraft Bedrock game server on Debian 10. The image provides a user-friendly interface and comprehensive documentation to guide users through every step of the configuration process, allowing them to focus on enjoying the game rather than troubleshooting technical issues. The solution is designed for both enthusiasts and server administrators seeking a robust and customizable hosting solution.[/td]
[/TR]
[TR]
[td width="15%"]-c09b72c965c6.12b05477-d236-4f3c-b61d-384f48b83f1b.png[/td] [td width="85%"]Docker: ATH Infosystems offers this image providing Docker, a containerization platform that simplifies application development, deployment, and scaling. Docker provides a consistent and isolated environment, runs on any system, optimizes resource utilization, and enhances security.[/td]
[/TR]
[TR]
[td width="15%"]-9a5fecc65c4c.a17d14ec-87cb-4819-b0be-daea9bd605ba.png[/td] [td width="85%"]EMQX: ATH Infosystems has configured this image providing EMQX on CentOS. EMQX is designed for large-scale IoT deployments. It offers reliable communication, advanced security features, and easy customization through a plugin-based architecture.[/td]
[/TR]
[TR]
[td width="15%"]-e49380e218e1.2dc4ef3f-7245-4dc8-9ae0-5cf3e31d199b.png[/td] [td width="85%"]Fedora 40 with Trusted Launch: Ntegral has configured this virtual machine image containing Fedora Server 40, a stable and flexible Linux operating system suitable for organizations and individuals. It offers the latest open-source technology, modularity, easy administration, and advanced identity management. Ntegral has optimized and packaged it for Azure, ensuring it is always up-to-date and secure.[/td]
[/TR]
[TR]
[td width="15%"]-685886b2626d.86f22ed4-ede4-42fc-8369-cded0b26f593.png[/td] [td width="85%"]fieldWISE: fieldWISE by Vassar Labs uses GIS, remote sensing, AI, machine learning, and data analytics to provide timely insights up to the agriculture field level. It offers customizable and scalable products to help growers plan, monitor, optimize, protect, and earn the most from their fields. The platform benefits food manufacturing, agriculture inputs, insurance, and government institutions.[/td]
[/TR]
[TR]
[td width="15%"]-e84962b26590.75e3035f-4c92-41be-87de-b48bab9bd668.png[/td] [td width="85%"]Flask: Flask is a lightweight and flexible web framework for Python, offering easy-to-use tools and libraries for building web applications quickly and efficiently. It follows the WSGI specification and supports extension with various libraries and frameworks. ATH Infosystems has configured this virtual machine image containing Flask on CentOS 8.5.[/td]
[/TR]
[TR]
[td width="15%"]-095fc8b326ad.8f21d446-fd79-4f06-854a-42203f2bf468.png[/td] [td width="85%"]Health AI247: This AI-powered database built on Microsoft Azure allows medical professionals to access patient records and research symptoms via efficient workflows. By entering an ID number, doctors can retrieve medical records and provide informed care.[/td]
[/TR]
[TR]
[td width="15%"]-d41043283ba3.15b7919a-4d11-40bd-a19b-acafeef6e435.png[/td] [td width="85%"]HyperStream Data Processor: HyperStream Data Processor is a high-performance platform for real-time data processing and analytics. It offers advanced tools for processing large data streams, enabling organizations to gain immediate insights and make data-driven decisions.[/td]
[/TR]
[TR]
[td width="15%"]-204a2bdba29d.989b81b7-7aee-48e4-aebb-22c52a515927.png[/td] [td width="85%"]Jitsi: Jitsi is an open-source video conferencing tool that offers secure and flexible online meetings and video calls with high-quality audio and video, robust security features, screen sharing, integration with various tools, and customization options. ATH Infosystems has configured this image with Jitsi on CentOS 8.5.[/td]
[/TR]
[TR]
[td width="15%"]-3c79a1ffa130.7ecd96ab-ba31-4142-9531-b6046ce38449.jpg[/td] [td width="85%"]Linux Stream 9 Minimal with OpenVPN: OpenVPN provides a reliable solution for secure remote access, catering to diverse user personas and addressing the growing need for enhanced privacy and security. It encrypts data transmission, protecting against cyber threats and unauthorized access to sensitive data. Virtual Pulse has packaged this image for easy installation on Microsoft Azure.[/td]
[/TR]
[TR]
[td width="15%"]-0f7aaac61b14.2e05255d-4dee-41e0-b153-7d555fbabd9a.png[/td] [td width="85%"]MongoDB on AlmaLinux 8: MongoDB on AlmaLinux 8 offers a flexible approach to data storage and management, allowing developers to work with unstructured and volatile data. Its ability to store data in the BSON document format makes it ideal for a variety of applications, from mobile apps to big data analytics. Tidal Media has configured and provides this image.[/td]
[/TR]
[TR]
[td width="15%"]-4cef0ef65081.500d0e1c-81b3-48c0-9f92-e0913d2bf41c.png[/td] [td width="85%"]MongoDB on AlmaLinux 9: MongoDB is an open-source NoSQL database that offers flexibility, scalability, and high performance. It supports multiple programming languages and platforms, has a dynamic schema, and reduces the complexity of database management. MongoDB is ideal for modern applications and businesses of all sizes and is accessible even to small companies and startups. Tidal Media has configured and provides this image.[/td]
[/TR]
[TR]
[td width="15%"]-9bc83969f6f8.879e0974-6439-4eb4-bd32-10cd858cae9b.png[/td] [td width="85%"]MongoDB on Debian 11: MongoDB on Debian 11 is a flexible and scalable NoSQL database that allows for easy handling of complex data structures. It integrates with various development frameworks and languages and provides comprehensive security features, automated backup, and recovery solutions. MongoDB is ideal for modern applications that require dynamic and robust data management solutions. Tidal Media has configured and provides this image.[/td]
[/TR]
[TR]
[td width="15%"]-dc88a062be3e.2521ffa5-9631-4ccc-b025-c13f860d0061.png[/td] [td width="85%"]MongoDB on Oracle Linux 8: MongoDB is a flexible and scalable database that allows for efficient storage and processing of data of any size and type. Its replication system ensures data reliability and availability, while its intuitive interface and natural integration with modern programming languages make application development fast and convenient. It easily scales both vertically and horizontally, making it easy and flexible to manage data. Tidal Media has configured and provides this image.[/td]
[/TR]
[TR]
[td width="15%"]-662e99938d4d.9c6daa15-3ee1-4198-959a-3e7afd44d387.png[/td] [td width="85%"]MongoDB on Red Hat Enterprise Linux 8: MongoDB is a flexible and high-performance database that can store and process various types of data. It offers powerful tools for data aggregation, indexing, replication, and sharding, making it suitable for projects of any scale. Tidal Media has configured and provides this image.[/td]
[/TR]
[TR]
[td width="15%"]-595ebfce3f7e.25a865c1-240c-4900-bcec-829087b846e5.png[/td] [td width="85%"]MongoDB on Rocky 8: MongoDB on Rocky 8 is a flexible and high-performance database management system that stores information as documents and collections, making data management easier and query processing faster. It offers data replication, indexing on any field, GridFS technology, load balancing, and support for ACID transactions across multiple documents. With MongoDB, businesses can efficiently process large volumes of data and have a reliable and efficient database for any task. Tidal Media has configured and provides this image.[/td]
[/TR]
[TR]
[td width="15%"]-30d050504555.2ff428bc-67c8-4fde-89ae-8ae195297394.png[/td] [td width="85%"]MongoDB on SUSE 15 SP5: MongoDB on SUSE 15 SP5 is a reliable and scalable database solution for modern applications. It offers enhanced security features, stability, and enterprise-grade support. This solution is perfect for enterprises seeking a dependable database system to handle complex and data-intensive workloads. Tidal Media has configured and provides this image.[/td]
[/TR]
[TR]
[td width="15%"]-55e40cef605b.224aa53f-fe81-4b62-b6ae-a2aca3b1c295.png[/td] [td width="85%"]MongoDB on Ubuntu 22.04 LTS: MongoDB on Ubuntu 22.04 is a NoSQL database solution that offers high performance, scalability, and flexibility for managing vast amounts of unstructured data. It supports real-time analytics, content management, and more, making it ideal for developers, data scientists, and systems administrators. Tidal Media has configured and provides this image.[/td]
[/TR]
[TR]
[td width="15%"]-5d3473a4d1f5.36d8f478-2941-41bb-9536-80b975c22448.png[/td] [td width="85%"]MongoDB on Ubuntu 24.04 LTS: MongoDB is a flexible and scalable database that allows you to store and manage data as documents. It has no strict data schema, making it ideal for projects that require rapid adaptation to changing needs. MongoDB simplifies the process of storing and retrieving data, resulting in increased performance and reduced overhead. It is an ideal choice for various types of applications, including big data analytics, web development, and mobile applications. Tidal Media has configured and provides this image.[/td]
[/TR]
[TR]
[td width="15%"]-8fc9dfbb705a.55fdb60a-9f89-44a0-976f-18ab131a1645.png[/td] [td width="85%"]Neo4j: Neo4j is a scalable graph database management system with ACID transactions, horizontal scaling, and seamless integration with programming languages and analytics tools. ATH Infosystems has configured this image containing Neo4j on CentOS 8.5..[/td]
[/TR]
[TR]
[td width="15%"]-c866978bceaf.e1b53843-ea69-49b8-b5c3-df4b10b834da.png[/td] [td width="85%"]NeuralNet Integrator: NeuralNet Integrator is an AI platform that integrates and deploys neural network models across various applications. It offers tools for developing, training, and managing neural networks, ensuring optimal performance and scalability.[/td]
[/TR]
[TR]
[td width="15%"]-c036e9c18dd6.93f07ca3-cad5-413e-be17-27e6af43e594.png[/td] [td width="85%"]Next.js: Next.js is an open-source framework for building modern web applications with powerful features like server-side rendering, static site generation, and built-in CSS. ATH Infosystems has configured this image providing Next.js on CentOS 8.5.[/td]
[/TR]
[TR]
[td width="15%"]-25ccdda86785.08e02107-558f-45e9-9c68-7cb330137e43.png[/td] [td width="85%"]Oracle Linux 8.10 for Arm64 Architecture: Oracle Linux Server 8.10 is a reliable, secure, and performant enterprise operating system that brings the latest open-source innovations and business-critical performance and security optimizations. It delivers virtualization, management, and cloud-native computing tools, as well as application binary compatible with Red Hat Enterprise Linux. Ntegral has configured this image.[/td]
[/TR]
[TR]
[td width="15%"]-ab35af18c84f.538bf79d-6d56-4840-aa2e-e9fe2915f99b.png[/td] [td width="85%"]OSPP-Compliant Red Hat Enterprise Linux 7 (RHEL 7): Foundation Security offers an OSPP-compliant RHEL 7 virtual machine image with numerous security controls to meet the comprehensive requirements of the Operating System Protection Profile. Foundation provides ongoing support to address any security concerns or compliance queries.[/td]
[/TR]
[TR]
[td width="15%"]-ae9f0be0d853.dae7cfa3-c1b7-471a-8c17-c06bfbd19622.png[/td] [td width="85%"]OSPP-Compliant Red Hat Enterprise Linux 8 (RHEL 8)[/td]: Foundation Security offers an OSPP-compliant RHEL 8 virtual machine image with numerous security controls to meet the comprehensive requirements of the Operating System Protection Profile.Foundation provides ongoing support to address any security concerns or compliance queries.
[/TR]
[TR]
[td width="15%"]-9a00ce3bfeee.eef9ac78-8262-4a4f-8ff9-5d53098c9167.png[/td] [td width="85%"]OSPP-Compliant Red Hat Enterprise Linux 9 (RHEL 9): Foundation Security offers an OSPP-compliant RHEL 9 virtual machine image with hardened security controls for organizations requiring high assurance in their operating systems. The preconfigured image reduces time and resources needed for security implementation and evaluation, with ongoing support from experts in compliance standards.[/td]
[/TR]
[TR]
[td width="15%"]-18f3a29f5a28.1385c73a-d93a-493e-8447-0ed6e2c1a6a6.png[/td] [td width="85%"]OSPP-Compliant Rocky Linux 8: Foundation Security offers an OSPP-compliant Rocky Linux 8 virtual machine image with numerous security controls to meet the comprehensive requirements of the Operating System Protection Profile. Foundation provides ongoing support to address any security concerns or compliance queries.[/td]
[/TR]
[TR]
[td width="15%"]-ab76af12cca8.dad38905-d47b-4398-8ab5-1bf69f4e5a83.png[/td] [td width="85%"]OSPP-Compliant Rocky Linux 9: Foundation Security offers an OSPP-compliant Rocky Linux 9 virtual machine image with numerous security controls to meet the comprehensive requirements of the Operating System Protection Profile. Foundation provides ongoing support to address any security concerns or compliance queries.[/td]
[/TR]
[TR]
[td width="15%"]-8756b6f0b86f.4317796b-1883-4617-9fb9-23951fc18e6a.png[/td] [td width="85%"]PCI-Compliant Red Hat Enterprise Linux 7 (RHEL 7): Foundation Security offers a preconfigured RHEL 7 virtual machine image with numerous security controls to meet the latest PCI DSS standard. Foundation provides ongoing support to address security concerns and compliance queries.[/td]
[/TR]
[TR]
[td width="15%"]-128ed3e9a04d.0392d48c-2780-47d4-9795-a22045deff2f.png[/td] [td width="85%"]PCI-Compliant Red Hat Enterprise Linux 8 (RHEL 8)[/td]: Foundation Security offers a preconfigured RHEL 8 virtual machine image with numerous security controls to establish a PCI-compliant environment. Foundation provides ongoing support to address security concerns and compliance queries.
[/TR]
[TR]
[td width="15%"]-1f53b58a25c2.be9f4ac3-509b-4000-b1a2-8928f378341c.png[/td] [td width="85%"]PCI-Compliant Red Hat Enterprise Linux 9 (RHEL 9): Foundation Security offers a preconfigured RHEL 9 virtual machine image with numerous security controls to meet the latest PCI DSS standard. Foundation provides ongoing support to address security concerns and compliance queries.[/td]
[/TR]
[TR]
[td width="15%"]-f4b4b4272e8b.7f5dccd5-62f0-4022-b512-947bde4b27c5.png[/td] [td width="85%"]PCI-Compliant Rocky Linux 8: This Rocky Linux 8 virtual machine image is designed to meet the latest security standards for companies handling payment card data. It includes numerous security controls and is regularly updated to address evolving threats and compliance requirements. Foundation Security's team of experts provides ongoing support to ensure a consistently secure and compliant platform.[/td]
[/TR]
[TR]
[td width="15%"]-6109d6e6419f.37a4f7cc-936c-4c72-87bf-490579d1f401.png[/td] [td width="85%"]PCI-Compliant Rocky Linux 9: This Rocky Linux 9 virtual machine image is designed to meet the latest security standards for organizations handling payment card data. It includes numerous security controls and is regularly updated to address evolving threats and compliance requirements. Foundation Security's team of experts provides ongoing support to ensure a consistently secure and compliant platform.[/td]
[/TR]
[TR]
[td width="15%"]-0637b090b2e0.25918ee1-a53a-46e5-8673-1a95020ca439.png[/td] [td width="85%"]phpMyAdmin: ATH Infosystems has configured this image providing CentOS 8.5 and. phpMyAdmin, an open-source web-based administration tool for managing MySQL and MariaDB databases via a user-friendly interface for various database management tasks.[/td]
[/TR]
[TR]
[td width="15%"]-99c7cfbe5406.27a0af35-41c8-49c9-b8e0-94a0d2640c6c.png[/td] [td width="85%"]PortalTalk Governance Solution for Microsoft Teams: PortalTalk by QS Solutions streamlines administrative duties with automated site provisioning, offers robust access control, and empowers Microsoft Teams channel owners to manage their domains autonomously while IT staff retain comprehensive control over the system. It enhances an organization's security stance and simplifies administrative processes, delivering a secure and compliant environment for Teams and SharePoint document management.[/td]
[/TR]
[TR]
[td width="15%"]-48230a3004c5.c5a2d669-f484-4c29-b955-202a10cf38e8.png[/td] [td width="85%"]Prometheus on Ubuntu: Anarion has configured this image providing Prometheus, an open-source monitoring and alerting toolkit used to collect and store metrics as time series data. Prometheus employs a powerful query language called PromQL, allowing for complex aggregations and transformations of data.[/td]
[/TR]
[TR]
[td width="15%"]-e576b5e3d682.48010941-eb95-4efa-a593-7319a9796fa5.png[/td] [td width="85%"]Quantive StrategyAI Gold (US): Quantive StrategyAI is an AI-powered tool that helps businesses plan, execute, and adapt their strategies quickly. It provides real-time insights, digital collaboration tools, and flexible executive dashboards to track business KPIs and goals.[/td]
[/TR]
[TR]
[td width="15%"]-ab960426750e.3ea6c98a-1732-4ac3-b1d8-d5591fa1a2f4.png[/td] [td width="85%"]Quantive StrategyAI Gold (UK): Quantive StrategyAI is an AI-powered tool that helps businesses plan, execute, and adapt their strategies quickly. It provides real-time insights, digital collaboration tools, and flexible executive dashboards to track business KPIs and goals. This offer is available in the United Kingdom.[/td]
[/TR]
[TR]
[td width="15%"]-605887a6d009.ad0aa0b5-ed1a-4116-9f2f-7b0b5cba2a22.png[/td] [td width="85%"]Red Hat Enterprise Linux 8.10 with Trusted Launch: Red Hat Enterprise Linux includes built-in security features like SELinux and mandatory access controls. Configured by Ntegral, this Trusted Launch virtual machine helps protect against advanced attacks.[/td]
[/TR]
[TR]
[td width="15%"]-472f0120db18.4e42eb90-73d8-4e5b-b8f2-4f1007f7e850.png[/td] [td width="85%"]Redgate Flyway Enterprise: Flyway Enterprise simplifies and accelerates database delivery with automation, object-level version control, and flexible deployment options. It supports multiple database platforms and integrates with common CI and release tools.[/td]
[/TR]
[TR]
[td width="15%"]-008312d96be2.5e4d1bae-c63c-486b-8a95-030c93b44326.png[/td] [td width="85%"]Redgate Monitor Enterprise: Redgate Monitor enhances productivity and efficiency, simplifies collaboration, and boosts skills portability. It ensures operational continuity, reduces security risks, ensures compliance, and saves time on manual database tasks.[/td]
[/TR]
[TR]
[td width="15%"]-94126ef831f4.58858f8a-e874-4af4-b89d-fa14a45392d3.png[/td] [td width="85%"]Redgate Test Data Manager: Redgate Test Data Manager streamlines the data provisioning workflow, enabling developers and testers to self-serve dedicated, compliant copies of production environments within seconds. It automates the delivery of high-quality test data as part of your CI/CD pipeline, and simplifies data security with automated data discovery, classification, and masking practices.[/td]
[/TR]
[TR]
[td width="15%"]-5be5c5304544.7d01564d-9131-48c8-8428-4551c3babfe0.png[/td] [td width="85%"]RH-CCP Compliant Red Hat Enterprise Linux 7 (RHEL 7): Foundation Security offers a preconfigured RHEL 7 virtual machine image with numerous security controls to meet the requirements of the Red Hat Common Criteria Profile. Foundation provides ongoing support to address security concerns and compliance queries.[/td]
[/TR]
[TR]
[td width="15%"]-cc95b491411b.cbdf71d7-dd72-4816-bca0-e6726439a69a.png[/td] [td width="85%"]RH CCP-Compliant Red Hat Enterprise Linux 8 (RHEL 8)[/td]: Foundation Security offers a preconfigured RHEL 8 virtual machine image with numerous security controls to meet the requirements of the Red Hat Common Criteria Profile. Foundation provides ongoing support to address security concerns and compliance queries.
[/TR]
[TR]
[td width="15%"]-7d5d538b90d4.5a8daa2b-5705-4f85-b1a9-d1491b81bd85.png[/td] [td width="85%"]Rocky Linux 9.4 Generation 2 VM: Rinne Labs offers a lightweight and secure Rocky Linux 9.4 image built from the official ISO with only essential packages for optimal performance. The image is updated with the latest security patches and updates, making it ideal for rapid deployment of web applications, efficient development and testing environments, stable and secure server infrastructure, data analytics, and machine learning.[/td]
[/TR]
[TR]
[td width="15%"]-ba163a6a87ba.0d6a8756-5d77-45f8-81e0-efce5db73257.png[/td] [td width="85%"]Rocky Linux 8.10 on Arm64 Architecture: Rocky Linux is a premier Linux distribution for enterprise cloud environments, offering additional security and compliance. Ntegral has packaged this image to work out of the box.[/td]
[/TR]
[TR]
[td width="15%"]-8389f57e02ed.09a3addc-cd88-46a5-81ba-3b9a86bcf4c6.png[/td] [td width="85%"]Smart RDM Data-Driven Decision Support System for Manufacturing: This Smart RDM offer delivers a decision support system that provides real-time insights and action recommendations for manufacturing processes. It analyzes past execution history and data analytics to suggest the best performing solution scenarios. The system also allows for what-if scenarios and digital twin modeling to test multiple scenarios in a safe environment.[/td]
[/TR]
[TR]
[td width="15%"]-444f1a14e2d0.f0017f5a-ec1a-4c6d-aeb9-cf4b11f44d7f.png[/td] [td width="85%"]Smart RDM Energy Efficiency Management for Manufacturing: ConnectPoint helps you optimize energy consumption in manufacturing processes through real-time data insights, predictive analytics, and a decision support system. Via this offer, you can use Smart RDM to calculate energy costs, sets alarms for abnormal consumption, and maximizes the use of renewable sources.[/td]
[/TR]
[TR]
[td width="15%"]-868d3694b6c1.f3f04afd-eac3-43a8-997d-8e360e849360.png[/td] [td width="85%"]Standard System Security Compliant Red Hat Enterprise Linux 7 (RHEL 7): Foundation Security offers this RHEL 7 virtual machine image that incorporates industry-standard practices for system security. The preconfigured image reduces the complexity and time required for security implementation and is regularly updated to address evolving threats.[/td]
[/TR]
[TR]
[td width="15%"]-7cf9fcaa1145.c46a88c2-f419-491d-a787-b5366dce2354.png[/td] [td width="85%"]Standard System Security-Compliant Red Hat Enterprise Linux 8 (RHEL 8)[/td]: Foundation Security offers this RHEL 8 virtual machine image with preconfigured security controls to establish a secure environment based on industry-standard practices. The image is regularly updated to address evolving threats and incorporates the latest security best practices.
[/TR]
[TR]
[td width="15%"]-030d7e4abdd9.ff9bac1b-a04f-4be3-a7b8-e912e6ad99be.png[/td] [td width="85%"]STIG-Compliant Red Hat Enterprise Linux 8 (RHEL 8)[/td]: Foundation Security offers this RHEL 8 virtual machine image fortified with hundreds of security controls to meet Department of Defense standards. Foundation provides ongoing support to address security concerns and compliance queries.
[/TR]
[TR]
[td width="15%"]-06ada9b9a5ed.43358ec9-daad-45a3-a573-3e288a8cb874.png[/td] [td width="85%"]STIG-Compliant Red Hat Enterprise Linux 9 (RHEL 9): Foundation Security offers this RHEL 9 virtual machine image fortified with hundreds of security controls to meet Department of Defense standards. Foundation provides ongoing support to address security concerns and compliance queries.[/td]
[/TR]
[TR]
[td width="15%"]-3e985b538b05.da41fbe3-e5e4-46ff-aa26-cda1791ce290.png[/td] [td width="85%"]STIG-Compliant Rocky Linux 8: Foundation Security's Rocky Linux 8 virtual machine image is preconfigured with hundreds of security controls to meet Department of Defense standards. It reduces complexity and time required for security implementation and is regularly updated to address evolving threats and compliance requirements.[/td]
[/TR]
[TR]
[td width="15%"]-866d9b25fa6e.7f007488-701a-428c-a1c2-6670b095b0ab.png[/td] [td width="85%"]STIG-Compliant Rocky Linux 9: Foundation Security offers this Rocky Linux 9 virtual machine image fortified with hundreds of security controls to meet Department of Defense standards. Foundation provides ongoing support to address security concerns and compliance queries.[/td]
[/TR]
[TR]
[td width="15%"]-20a536ecf1a1.9c3bc732-82f8-45cc-8187-2f3d4050bc47.png[/td] [td width="85%"]Sullexis Hierarchy Management Powered by LinqIQ: LinqIQ helps manage hierarchies for analytics, AI, and data management platforms. It creates and maintains hierarchies based on how businesses interact with customers, vendors, and partners. LinqIQ can be customized and connected to existing systems, with a user-friendly interface for easy adjustments. It can be implemented quickly on Microsoft Azure.[/td]
[/TR]
[TR]
[td width="15%"]-09e1b9cbc7a7.ddb94274-d56c-408c-add8-cb22946e0045.jpg[/td] [td width="85%"]Webmin Server on Oracle Linux 9: Webmin Server provides a web-based interface that simplifies system administration tasks for IT professionals. It offers a comprehensive suite of tools and features for managing Unix-like systems, including user account management, software package installation, and system monitoring. With its intuitive interface and remote access capabilities, Webmin enhances productivity and reduces errors. Tidal Media has configured this image providing Webmin on Oracle Linux 9.[/td]
[/TR]
[TR]
[td width="15%"]-d1131318ad7d.b445e098-fc47-4719-9bba-6a3b4ee7dbaa.jpg[/td] [td width="85%"]Webmin Server on Red Hat Enterprise Linux 9: Webmin Server provides a user-friendly interface for managing servers remotely. It offers powerful server management features, including user and group creation, network configuration, and database management. With Webmin, you can monitor system resources, configure firewalls, and manage configuration files to keep your server secure and performing optimally. Tidal Media has configured this image providing Webmin on Red Hat Enterprise Linux 9.[/td]
[/TR]
[TR]
[th]

Go further with workshops, proofs of concept, and implementations

[/th]
[/TR]
[TR]
[td width="15%"]-ab91573476ff.46579bec-360d-4d67-a6eb-f4576d2160f5.png[/td] [td width="85%"]AltaML AI: 8-Week Proof of Concept: AltaML's engagement includes ideation, feasibility assessment, and AI/ML model experimentation using Microsoft Azure AI. AltaML efficiently de-risks the ML process, hastens ROI realization, and supports informed decisions for full-scale deployment.[/td]
[/TR]
[TR]
[td width="15%"]-070c76ca05a8.154ab233-1de3-45ac-acca-cebb80acb6e3.png[/td] [td width="85%"]Application Modernization and Migration to Azure: Implementation: Click2Cloud offers migration and modernization services, evaluating existing custom applications and providing detailed information on migration costs to Microsoft Azure.[/td]
[/TR]
[TR]
[td width="15%"]-ab28bb59ec61.a3565ac2-61f3-48f1-858e-a6fd91662648.png[/td] [td width="85%"]Database Migration to Azure: Implementation: Click2Cloud's Database Migration Service helps you migrate, innovate, and modernize data using AI on Microsoft Azure. The solution ensures a seamless, efficient transition, eliminating physical infrastructure and end-of-life software issues. Key deliverables include a business value assessment report and proof of concept.[/td]
[/TR]
[TR]
[td width="15%"]-8a6f95bf6e40.a682a187-373c-4a67-a782-708f90a4823e.png[/td] [td width="85%"]Migrate Legacy Data to Azure: 4-Week Proof of Concept: T-Systems Managed Application Retirement Services (M.A.R.S.) is a consultancy-to-cloud capability for sunsetting legacy applications. It enables the transfer of data to a single platform, eliminating business and security risks, and reducing overall costs.[/td]
[/TR]
[TR]
[td width="15%"]-f3551bfcab47.00cd52a3-a9d2-48cf-8251-637c911ee716.png[/td] [td width="85%"]Rackspace Managed XDR Powered by Microsoft Sentinel: Rackspace Managed XDR, built on Microsoft Sentinel, offers advanced threat detection capabilities, certified security analysts, and AI-assisted remediation for detection and response to cybersecurity threats across your digital estate. It integrates with over 300 security technologies and log sources, conducts proactive threat hunts, and speeds up containment and eradication of threats through cloud-native security orchestration and automated response.[/td]
[/TR]
[TR]
[td width="15%"]-3e473301bb48.f9bb3073-6677-4e75-a559-2e439863fa44.png[/td] [td width="85%"]Unisys Cloud Transformation: Implementation: Unisys Cloud Transformation offers a secure and phased approach to Azure migrations and modernization. Unisys begins with workshops to gather information about your business case and technical requirements. Experts design and build Azure target environments to host your applications.[/td]
[/TR]
[TR]
[th]

Contact our partners

[/th]
[/TR]
[TR]
[td width="85%"]ACSC Essential Eight-Compliant Red Hat Enterprise Linux 9 (RHEL 9)[/td]
[/TR]
[TR]
[td width="85%"]Airflow[/td]
[/TR]
[TR]
[td width="85%"]AnalytiQ360[/td]
[/TR]
[TR]
[td width="85%"]App and Infrastructure: 3-Day Assessment[/td]
[/TR]
[TR]
[td width="85%"]Apptividad OnBoarding[/td]
[/TR]
[TR]
[td width="85%"]Beatchurn[/td]
[/TR]
[TR]
[td width="85%"]BreachRisk Copilot for Security[/td]
[/TR]
[TR]
[td width="85%"]CA Gatekeeper[/td]
[/TR]
[TR]
[td width="85%"]CheKup[/td]
[/TR]
[TR]
[td width="85%"]ClamAV on Ubuntu[/td]
[/TR]
[TR]
[td width="85%"]CMMC Compliance Accelerator[/td]
[/TR]
[TR]
[td width="85%"]Cognizant - Oracle Dataases to Oracle Database@Azure: Migration[/td]
[/TR]
[TR]
[td width="85%"]Connected Customer Trial[/td]
[/TR]
[TR]
[td width="85%"]Copilot for Microsoft 365: 1-Week Assessment[/td]
[/TR]
[TR]
[td width="85%"]DashMagiq[/td]
[/TR]
[TR]
[td width="85%"]Desk Reservation App[/td]
[/TR]
[TR]
[td width="85%"]Fedora 40 - Gen 2[/td]
[/TR]
[TR]
[td width="85%"]GravityZone Small Business Security[/td]
[/TR]
[TR]
[td width="85%"]hCaptcha Enterprise[/td]
[/TR]
[TR]
[td width="85%"]HCLTech Cloud Security Foundation (CsaaS) for Azure[/td]
[/TR]
[TR]
[td width="85%"]Imperium Co-Managed Service for Microsoft Dynamics 365 (SaaS)[/td]
[/TR]
[TR]
[td width="85%"]Imperium Co-Managed Service for Microsoft Fabric (SaaS)[/td]
[/TR]
[TR]
[td width="85%"]Infisical Secured and Supported by HOSSTED[/td]
[/TR]
[TR]
[td width="85%"]Infoblox NIOS 9.0.4 for DDI[/td]
[/TR]
[TR]
[td width="85%"]IPerf[/td]
[/TR]
[TR]
[td width="85%"]Kelvin Autonomous Operations Software[/td]
[/TR]
[TR]
[td width="85%"]Konverso Virtual Agent[/td]
[/TR]
[TR]
[td width="85%"]Linux Stream 9 Minimal with iPerf3 Server[/td]
[/TR]
[TR]
[td width="85%"]Linux Stream 9 with iPerf3 Server[/td]
[/TR]
[TR]
[td width="85%"]Managed Service Provider (MSP) for Azure[/td]
[/TR]
[TR]
[td width="85%"]Matomo[/td]
[/TR]
[TR]
[td width="85%"]Metric Insights BI Portal - Virtual Machine Image[/td]
[/TR]
[TR]
[td width="85%"]MongoDB[/td]
[/TR]
[TR]
[td width="85%"]MongoDB on Linux Stream 9[/td]
[/TR]
[TR]
[td width="85%"]Octave Immersive Data Service: 2- 3-Week Assessment[/td]
[/TR]
[TR]
[td width="85%"]PacketFabric Network Solutions[/td]
[/TR]
[TR]
[td width="85%"]PositivityTech Financial Services Industry Benchmark Platform[/td]
[/TR]
[TR]
[td width="85%"]ReductStore Server[/td]
[/TR]
[TR]
[td width="85%"]Rocky 8.10 Generation 2 with Support by Rinne Labs[/td]
[/TR]
[TR]
[td width="85%"]Rocky 8.6 Generation 2 with Support by Rinne Labs[/td]
[/TR]
[TR]
[td width="85%"]Rocky Linux 8.10 Generation 2 with Support by Rinne Labs[/td]
[/TR]
[TR]
[td width="85%"]Rocky Linux 8.6 Generation 2 with Support by Rinne Labs[/td]
[/TR]
[TR]
[td width="85%"]Senseye Predictive Maintenance[/td]
[/TR]
[TR]
[td width="85%"]Shapelets Data Apps[/td]
[/TR]
[TR]
[td width="85%"]SPICA[/td]
[/TR]
[TR]
[td width="85%"]STIG-Compliant Red Hat Enterprise Linux 7 (RHEL 7)[/td]
[/TR]
[TR]
[td width="85%"]Taberna.ai[/td]
[/TR]
[TR]
[td width="85%"]Talk to Data (T2D)[/td]
[/TR]
[TR]
[td width="85%"]WebApp Developer Virtual Box[/td]
[/TR]
[TR]
[td width="85%"]XAMPP[/td]
[/TR]
[TR]
[td width="85%"]XENA VISION - Smart City Active Surveillance[/td]
[/TR]
[TR]
[td width="85%"]Yobi Signal as a Service: Data Enrichment[/td]
[/TR]
[TR]
[td width="85%"]ZingWorks Distribution Requirement Planning[/td]
[/TR]



This content was generated by Microsoft Azure OpenAI and then revised by human editors.

Continue reading...
 
Back
Top