igroup Email Us     user CAMS 24/7 Portal     | 0203 697 0302 Contact Us

Microsoft Azure mitigates your risk of a Cyber Attack

With recent Cyber Security threats, like the WannaCrypt ransomware attack, many CIOs are giving thought to their own cloud data security, including platforms like Azure. We are taking a moment to examine the enterprise grade security features of Azure and how the correct security settings give CIOs true peace of mind.

Security and privacy are built right through the core architecture of the Azure cloud. Azure is continually updated by Microsoft to make it even more secure. Azure Security Centre makes Azure the only public cloud platform to offer continuous security-health monitoring.

Security Development Lifecycle (SDL) addresses security at the development phase.

Operational Security Assurance (OSA) provides a framework that ensures secure operations throughout the lifecycle of cloud-based services.

Azure Active Directory (AAD) helps ensure that only authorised users have access to data.

Multi-factor authentication (MFA) secures user identities for highly secure sign-in. MFA requires users to verify their sign-ins via mobile app, phone call, or text message.

Threat management

Microsoft continuously monitors servers, networks, and applications to detect threats. Azure’s multipronged threat-management approach uses intrusion detection, distributed denial-of-service (DDoS) attack prevention, penetration testing, behavioural analytics, anomaly detection, and machine learning to constantly strengthen its defence and reduce risks.

Azure Security Centre

Azure Security Centre gives you control over the security of your cloud assets. You can define policies for your Azure subscriptions, deploy security solutions and view the health of your Azure security.

Physical infrastructure security

Azure’s datacentres, are protected by layers of security including perimeter fencing, video cameras, security personnel and secure entrances.

Secure apps and data

Azure uses industry-standard protocols to encrypt data in transit as well as data stored in Azure Storage. Encryption includes SSL/TLS, IPsec, and AES.

BitLocker Drive Encryption can be configured on VHDs that contain sensitive information.

Access to data by Azure support personnel requires your explicit permission and is granted on a “just in time” basis that is logged and audited, then revoked after completion of the engagement.

Secure infrastructure

Azure’s infrastructure prevents unauthorised transfer of information in a multitenant architecture, using virtual local area network (VLAN) isolation, access control lists (ACLs), load balancers, and IP filters, along with traffic flow policies; network address translation (NAT) separates internal network traffic from external traffic.

Azure implements packet-filtering firewalls on all host and guest Virtual Machines by default.

Data security features

  • Data stored in Azure can be encrypted.
  • Storage Account Keys, Shared Access Signatures, management certificates, and other keys are unique to each Azure tenant.
  • You can use Azure Rights Management Services (RMS) for file- and data-level encryption and to prevent unintentional or deliberate leakage of data by authorised users.


It takes expertise to setup Microsoft Azure security features correctly. To gain full confidence in your data stored in the cloud, please call us on 0203 697 0302 for a health check and tune up of your Azure security settings.


Featured articles

Cloud technology has become a critical aspect of modern businesses. If you don’t have sufficient Azure support in place for your cloud deployments, you’re leaving it open to serious risk.

In this article, we explore the options available for cloud support, compare their pros and cons, and help you understand what the best choice is for your business.

If you’ve invested in a Microsoft Azure cloud infrastructure, you could be part of a ‘cloud solution provider’ (CSP) agreement with your partner without even realising it. But a CSP is a proven driver of risk, over-spending, and a range of other challenges. In this article, we explore what a CSP is and provide advice to help you avoid this common pitfall.

Budgeting for an Azure deployment is an entirely different concept to traditional IT systems, and those differences cause significant challenges for many organisations.

In this article, we’ll break down the key issues with Azure cost management, provide advice for controlling your spending, and offer suggestions to increase the return on your cloud investment.

Read the article now

Companies we have helped

Click a logo to read the case study

Request a call back

Work with a human 

You're not going to get voicemail or a menu. Your email isn't going into the electronic abyss never to be seen again. We will be in touch within one working day. 

“Your client-centered approach, diligence, professionalism and technical acumen is second to none."

"Considering where we were before, igroup provides a five-star and superior value-for-money service - thank you so much. Your services are highly valued, and we look forward to a very long-term relationship.”

Keith Bero
Commercial Director at Doddle Learn

“The igroup culture of approachable professionalism has been a great match with my team."

"Also, their ‘can do’ attitude with a pragmatic approach to problems has enabled us to move our product roadmap forward.”

Dan Frost
Managing Director at Adaptive

"Moving our Azure resources over to igroup was our main initial concern, but their skill and regular communication ensured the process went smoothly."

"Unlike other companies we've spoken to, we felt unrushed and that they fully understood our business specific concerns."

Tom Gullen
Founder, Scirra Ltd

igroup had the knowledge and expertise we needed and they were able to demonstrate how they would support our development team quickly and efficiently through their cloud management solution, CAMS.”

“Working with igroup has helped us to ensure that as we grow our infrastructure is supported fully and can deliver the results our customers expect.“

Steve Stringer
Software Architect at Oak Software