The power of CDPs: building customer trust and loyalty in retail

The power of CDPs: building customer trust and loyalty in retail

This article is contributed. See the original author and article here.

Truly engaged, always connected

The events of 2020 have left a lasting impact on the retail industry and retailers are fueling rapid innovation with development and rollout of new technologies. The global pandemic has shifted how customers buy, as well as renewed recognition of the critical value of technology to customers. Convenience, flexibility, and personalization will continue to dominate customer choices. The retailers who continue to thrive will be those that let customers engage on their terms while simultaneously connecting with customers in more meaningful ways.

Retailers today are collecting data from every customer interactionfrom websites and apps to helpdesk chats and support calls, to physical store visits. But is all the data really being utilized and what is the impact on customer relationships? The ability to deliver a personalized customer experience relies heavily on a retailer’s customer understanding. This is where customer data platforms (CDP) can help retailers gain a holistic view of customers, deepen relationships, and build ongoing trust with the customers who are vital to their bottom line.

Read additional details about how Microsoft Dynamics 365 is reimagining retail in our recent blog, “NRF 2021: enabling retailers to reimagine the road ahead with Microsoft Business Applications.”

Customers demand and respond to personalized experiences

Customers today expect personalization from the organizations they interact with. According to Forrester, 80 percent of U.S. online users feel comfortable sharing some personal information with retailers in order to personalize their experience. Every customer is unique and has a unique path to purchase, and personalization helps retailers guide customers on the right path based on their needs and behaviors. CDPs provide the crucial foundation for enabling personalized customer interactions by bringing together transactional, behavioral, and demographic data from across channels to create multidimensional customer profiles. They enable activation on realtime insights across the customer journey and on destinations including analytics, marketing, advertising, and engagement platforms.

Customers reward businesses they trust

While virtually every interaction is being tracked, nearly 67 percent of customers have little to no understanding about how their data is being used by companies, according to Microsoft research in partnership with iProspect. This is an opportunity for retailers by showing transparency and showcasing the value they can provide in exchange for dataorganizations can ultimately earn customers’ trust and loyalty.

How it’s done

A number of organizations have found unique ways to combine deep customer understanding with innovative experiences to achieve growth and set themselves apart from the competition. One such organization is Chipotle Mexican Grill, a chain of more than 2,700 restaurants with multiple sources of customer data including a loyalty program, point-of-sale data, a customer care center, and digital platforms. They turned to Microsoft Dynamics 365 Customer Insights to unify data and better understand their customers.

Getting personal, at scale

Chipotle has millions of customers each year across its thousands of locations, but with Dynamics 365 Customer Insights the company has a deep understanding of individual customer preferences. They now know whether customers typically order for lunch or dinner, what their favorite meals are and which channel they use to make their purchase. These insights have allowed Chipotle to target customers with promotions and messages that appeal to them.

Using the map, match, and merge logic at the heart of Dynamics 365 Customer Insights, Chipotle can standardize and reconcile conflicting data and then set up business rules and act on them. The result is unified profiles with detailed views of each guest. Chipotle also uses Dynamics 365 Customer Insights to grow its customer base by converting more guests into loyalty program members. Using rich demographic data, they were able to gain insights on guests who made purchases but weren’t members of their loyalty program, which added up to 30 percent more unified customer profiles.

“Every customer is different. Customer Insights allows us to understand each customer’s differences and market to them as a unique individual.”Sashi Kommineni, Director of Enterprise Analytics, Chipotle Mexican Grill

The ability to personalize has been particularly important during the COVID-19 pandemic, as many customers have become hesitant to visit restaurants. Dynamics 36 Customer Insights helped Chipotle understand customer concerns and provide appropriate messaging, such as information about delivery and pick-up options. Though this highly specific targeting, Chipotle was able to increase conversations and use of these services.

Take the next step

By leveraging customer data to provide elevated, personalized experiences, retailers can build lasting relationships with customers, increase brand trust, and grow customer loyalty.

Dynamics 365 Customer Insights is a secure and flexible customer data platform with built-in AI to unify customer data and generate insights that power personalized experiences. Using prebuilt connectors, the solution brings together first- and third-party data sources including interactions with the web, mobile apps, and connected products. Dynamics 365 Customer Insights proactively identifies segments and generates predictive insights such as churn rates, lifetime value, and recommended products. Real-time integration with business applications and business processes ensure that marketing, sales, and service efforts are tailored for each customer. Brands see results faster with Dynamics 365 Customer Insights, an intuitive and ready-to-go customer data platform that requires minimal training and IT assistance.

Take a guided tour to see how your organization can use Dynamics 365 Customer Insights to unlock insights and drive personalized customer experiences, and learn more about our Microsoft Dynamics 365 Retail offerings.

The post The power of CDPs: building customer trust and loyalty in retail appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

How to use tagging effectively (Part 3)

How to use tagging effectively (Part 3)

This article is contributed. See the original author and article here.

Welcome to the third and final blog post in our series on how to use tagging effectively in Microsoft Defender for Endpoint. We hope you’ve enjoyed this series and look forward to your feedback on this topic and what you’d like to see in the future.


Tagging using the API


Microsoft Defender for Endpoint APIs allow you to do many things through scripting to both query and change elements within your Microsoft Defender for Endpoint instance.  As part of this blog on tagging we wanted cover how you can use scripting to apply tags to machines directly using an API.


Within Advanced Hunting you can create a custom detection that runs the query on a regular basis to generate an alert.  You can also enable response actions as a result of this detection to affect the machines contained in the results:


Tag2Picture1.png


You will notice however that tagging the resultant machines is not one of the options available.  Instead, it is possible to take the advanced hunting query and use it as an input to the script that applies the tag through the API.


Setting up API access


Before you can use PowerShell to query against the API you need to set up the API application in Azure.


In the Azure Active Directory section of https://portal.azure.com you need to click on new App Registration and create a new app:


Tag2Picture2.png


Once you have completed this part you will be presented with the following screen:


Tag2Picture3.png


Take a note of the Application ID and the Directory ID, you will need these for your script.  Then click on “View API permissions”.  It is here that you define how the API can be accessed.



  1. Select “Add a permission”

  2. Click “APIs my organization uses”

  3. Type “Windows” into the search box and then select the “WindowsDefenderATP” API


Tag2Picture4.png


When accessing the API, it is possible to use either user permissions or application permissions.  Using application permissions means that it doesn’t matter who is logged in to run the script and instead utilises the client secret to authenticate against the application.


For the purposes of what we are enabling we need specific permissions set.  We are running an Advance Hunting query so we need the “AdvanceQuery.Read.All” permission and we are also applying a tag to the machine so we need the “Machine.ReadWrite.All”


 


Tag2Picture5.png


If you are using this scripting method for other actions, i.e. isolating a machine, then you would need to apply the appropriate permissions.


The final stage of the application registration is to create the client secret that will be used for authenticating.


In the app properties, click onto “Certificates & secrets” and create a new secret:


Tag2Picture6.png


Then take note of the client secret that is created as you will need this alongside your Application ID and Directory ID for your script:


Tag2Picture7.png


Now that you have your application created you can use PowerShell scripting to query against it and then write a tag back on the devices in the results.


 


Using an Advanced Hunting query for your tagging criteria


Advanced Hunting in Microsoft Defender for Endpoint is a powerful query tool that allows you to create complex queries based upon the telemetry that is gathered from the managed endpoints.  When writing these queries, it is possible to enable them as a custom detection, meaning they run at a regular interval and can apply actions against any device presented in the results.  However, there are only certain actions that can be applied against these devices and tagging isn’t one of them:


Tag2Picture8.png


 


Therefore, if you want to tag a device based upon a query then you need to utilise the API.  Let’s say for example if you want to tag all devices in a certain subnet, the first step is to create the Advanced Hunting script:


 


DeviceNetworkInfo


| mvexpand parse_json(IPAddresses)


//| Subnet=IPAddresses.SubnetPrefix


| where IPAddresses contains “192.168.254” and IPAddresses.SubnetPrefix contains “24”


| summarize by DeviceId


| project DeviceId


 


Obviously, you can use pretty much any Advanced Hunting query in this test file, but it does need to return DeviceID in the results in order for it to be used in the next step.


Run the script first in the portal just to verify it is finding the correct data for you then copy the query into a text file to use as input to your API script.


The script below takes the query text file and then applies a tag of “DataCenter” against the DeviceIDs that are found by the query:


 


#Script to take a file containing an Advanced Hunting query and then apply a tag to the DeviceID shown in the results


 


#Replace ‘XXXXXXXXXXXXXXXXXXXX’ with the appropriate IDs relevant to your tenant/application (quotes required)


$tenantId = ‘ XXXXXXXXXXXXXXXXXXXX’


$appId = ‘XXXXXXXXXXXXXXXXXXXX’


$appSecret = ‘ XXXXXXXXXXXXXXXXXXXX’


 


$resourceAppIdUri = ‘https://api.securitycenter.windows.com


$oAuthUri = “https://login.windows.net/$TenantId/oauth2/token


$body = [Ordered] @{


    resource = “$resourceAppIdUri”


    client_id = “$appId”


    client_secret = “$appSecret”


    grant_type = ‘client_credentials’


}


$response = Invoke-RestMethod -Method Post -Uri $oAuthUri -Body $body -ErrorAction Stop


$aadToken = $response.access_token


 


$query = [IO.File]::ReadAllText(“c:tempQuery3.txt”); # Replace with the path to your file


 


$url = “https://api.securitycenter.windows.com/api/advancedqueries/run


$headers = @{


    ‘Content-Type’ = ‘application/json’


    Accept = ‘application/json’


    Authorization = “Bearer $aadToken”


}


$body2 = ConvertTo-Json -InputObject @{ ‘Query’ = $query }


$webResponse = Invoke-WebRequest -Method Post -Uri $url -Headers $headers -Body $body2 -ErrorAction Stop


$response2 =  $webResponse | ConvertFrom-Json


$results = $response2.Results


$machine = $results.DeviceId


 


#Take the results from the query and parse through them to apply a tag to each DeviceID


 


Foreach ($machine in $machine)


{


#Comment sleep statement out if only planning to modify a small number of devices


 


Start-Sleep -Seconds 3


 


$url = “https://api.securitycenter.windows.com/api/machines/” +$machine+ “/tags”


$headers = @{


    ‘Content-Type’ = ‘application/json’


    Accept = ‘application/json’


    Authorization = “Bearer $aadToken”


}


$tag= @{


  ‘Value’ = ‘Datacenter’


  ‘Action’ = ‘Add’


}


 


#Output


$body3 = ConvertTo-Json -InputObject $tag


 


$webResponse = Invoke-WebRequest -Method Post -Uri $url -Headers $headers -Body $body3 -ErrorAction Stop


}


 


We have used the “add” action in this script, but you could just as easily delete tags through this method as well (assuming they haven’t been set via the registry). Simply replace ‘Add’ with ‘Remove’.


The other thing to watch out for is API limits. Due to resource constraints, we limit the amount of API calls that can be made to 100 per minute and 1500 per hour.  To avoid this, a sleep value has been applied to the script to put a pause in after each API call. Obviously, this can be removed to speed things up if the number of machines you are modifying does not hit this limit.


 


I have talked to you in this part of the blog about how to use scripting against the API, but there is also a great article by Tomer Brand talking about how to achieve this using Microsoft Flow (or Power Automate as it is now), where the same concepts can also be applied to Logic Apps.


 


We hope you’ve gotten value from this blog series on how to use tags effectively in Microsoft Defender for Endpoint. Make sure to check out Part 1 and Part 2 in the series. We welcome your feedback and questions and look forward to hearing from you.


 


Steve Newby (@steve_newby) and Miriam Wiesner (@miriamxyra)


Program Managers @ Microsoft Defender for Endpoint Product Group


(Credit also to Thorsten Henking for some of the API scripting input)


 


 

All you need to know about automatic email forwarding in Exchange Online

All you need to know about automatic email forwarding in Exchange Online

This article is contributed. See the original author and article here.

We realize that many customers have genuine business requirements to configure automatic email forwarding. On the other hand, email forwarding may lead to data leakage. For example, if we have a compromised account, the attacker might create a forwarding rule for a particular mailbox, and the user might be unaware that their mail is being forwarded. This is a very common tactic used when accounts are compromised.


It is therefore important for administrators to know all mailboxes that have forwarding enabled and where the mail is been forwarded to. We have various insights and alerts that help administrators monitor such activities, but prevention is always better than the cure. In this blog post, we thought to revisit (and update) various auto forward controls, how they work together and how they can help you achieve a requirement of allowing automatic forwarding for users who really need this feature.


Various ways to set up forwarding


Before discussing how to control automatic forwarding, let’s review a few different ways in which automatic forwarding can be setup:



  • A forwarding rule can be setup within the Rules wizard in Outlook on the desktop. User can set this Automatic forwarding from Outlook > File > Manage Rules and Alerts. Using Outlook on the web, this can be done using Inbox rules.

  • Using Outlook on the web (OWA) the user can also set the ForwardingSmtpAddress parameter on the mailbox. This option is available via Settings > Mail > Forwarding.

  • Users can also set auto forward using Power Automate (used to be called Microsoft Flow).

  • Administrators can configure forwarding from the properties of the mailbox from Exchange Admin Center. This option is available under “Manage Mail flow settings” in classic EAC, or user properties in the preview version of EAC. Configuring automatic forwarding from the properties of the mailbox will populate the ForwardingAddress parameter on the mailbox.

  • Administrators can also configure forwarding from Microsoft 365 Admin Center. Configuring forwarding from Microsoft 365 Admin Center will set the ForwardingSmtpAddress parameter on the mailbox (but will show if ForwardingAddress is populated).


Controlling automatic forwarding


Administrators have several methods to prevent and regulate automatic forwarding of emails outside the organization:


External email forward control using Outbound spam filter policy


Recently released, this feature is available in Security & Compliance portal under Outbound spam filter policy (to get the exact portal page, go here). As you see in the following screenshot, there are three possible options. The default configuration is “Automatic system-controlled.” Other options are Off and On. “Off” means auto forward is disabled and “On” means auto forward is enabled.


ForwardingRevisited01.jpg


Note: If you see the option is set as “Automatic system-controlled”, most probably you have not configured the setting at all. For tenants where the setting is left at “Automatic system-controlled”, as we continue to move the service toward being more secure by default, this setting will be enforced and behave as “Off” (forwarding disabled). This enforcement process has started in phases and very soon, all tenants will get this setting enforced. Therefore, “Automatic system-controlled” will behave as “Off” and automatic forwarding will not work. Our recommendation is that all customers should configure the policy as appropriate for their organization and enable external auto forwarding only for the users who really need it (by leaving the default policy in disabled state, creating a different policy that allows forwarding and then assigning it to specific mailboxes only). If for your tenant, “Automatic system-controlled” still does not block email forwarding, you should make this change as soon as possible (as soon, it will).


Advantages of this method:



  • It blocks all types of auto forwarding including ForwardingAddress and ForwardingSmtpAddress mailbox parameters.

  • Blocks redirect rules configured using Outlook.

  • A NDR is sent back to the mailbox that configured auto forwarding to external user if the policy is set to block automatic forwarding for that mailbox. The NDR will contain the following diagnostic information:


Remote Server returned ‘550 5.7.520 Access denied, Your organization does not allow external forwarding. Please contact your administrator for further assistance. AS(7550)’


 



  • Easier to configure and administrators can selectively allow/block external auto forwarding for a few or all mailboxes.


Disadvantages of this method:



  • Forwarding using Power Automate (Flow) is not covered as of now. To block external forwarding which is setup using Power Automate, follow the steps mentioned in our Email exfiltration controls for connectors article.


Block automatic forwarding using Remote Domains


This option is available under the Mail flow tab in the new Exchange Admin Center preview:


ForwardingRevisited02.jpg


ForwardingRevisited03.jpg


Advantages of this method:



  • This setting can block auto forward rules configured using Outlook inbox rules as well as Outlook on the web options (ForwardingSmtpAddress parameter)


Disadvantages of this method:



  • Does not block forwarding set from the properties of the mailbox by the administrator using EAC (ForwardingAddress parameter)

  • This blocks auto forward to the specific remote domain. There is no granular control – cannot allow forwarding for certain users, and block for others.

  • The user is not notified that their auto forwarded message is dropped, no rejection (NDR) is sent.


Block auto forward using a transport rule


You can create a transport rule from Exchange Admin Center > Mail Flow > Rules to block automatic forward:


ForwardingRevisited04.jpg


Advantages of this method:



  • Allows granular control on conditions and actions.

  • Admins have the option to send rejection message (NDR).


Disadvantages of this method:



  • Matches auto forward messages based on message class (IPM.note.forward). The Outlook web app forwarding (ForwardingSmtpAddress) or forwarding set by the admins on the properties of the mailbox (ForwardingAddress) have normal message class (IPM.Note), so transport rules won’t block them.

  • Difficult to manage at times when too many transport rules are configured.


Hiding auto forward options using Role Based Access Control (RBAC) RBAC


While this is not really a method of blocking forwarding, it is related in a way that it can help remove forwarding options from users if they are using Outlook on the web.


Advantages of this method:



  • In OWA, users simply do not see the option to setup forwarding in their mail options


Disadvantages of this method:



  • Does not remove the option in Outlook desktop.

  • Any forwarding that was already configured will continue to work.


Overview


If you want to quickly compare various methods, you can refer to the following table:


 
















































Automatic forwarding option



Remote domain



Transport rule



Outbound spam filter policy



Block Outlook forwarding using inbox rules 



Yes



Yes



Yes



Block OWA forwarding setting (ForwardingSmtpAddress)



Yes



No



Yes



Block forwarding set by the admin using EAC (ForwardingAddress)



No



No



Yes



Block forwarding using Power Automate / Flow



No



No



No



Does the sender get NDR when auto forward is blocked?



No



Yes



Yes



Customization and granular control



No



Yes



Yes



What happens if auto forward is controlled in multiple places mentioned above?


One question we encounter frequently is, how all these techniques work together? What if auto forward is blocked in one of the above methods but allowed in another? For example, auto forward is blocked by a remote domain setting or a transport rule but allowed in Outbound spam filter policy; what happens? The answer to that is that a restriction in one place will restrict auto forward for all.


For example:



  • Automatic forwarding is On (allowed) in the Outbound spam filter policy.

  • Automatic forwarding is disabled for the remote domain.


Will the automatically forwarded message be blocked by the remote domain? Yes, remote domain would block automatic forward as would an Exchange transport rule.


Depending on what you want to achieve, you can use combination of above features. There’s no one size fits all option. You can implement all four options if you really want, depending on your requirement. For example, the remote domain option controls the recipient domain and comes handy if you want to restrict auto forwarding for all except a few external domains. Outbound spam filter policies on the other hand can control the sender. If you want to allow external auto forwarding for only a few mailboxes (users with genuine business requirements to configure automatic forwarding) and block external auto forwarding for everyone else, Outbound spam filter policy is most preferred. Or you can use combination of these two options if you want to allow auto forwarding only for few mailboxes and to only a few external domains. Here is another example which is slightly more complex:


Let’s say you have the following requirements:



  • By default, automatic forwarding should be blocked.

  • Automatic forwarding to an external domain contoso.com should be allowed for all users.

  • Allow users Jack and Jill to also be able to forward to northwindtraders.com, but no one else.


There are multiple methods to achieve this, the following is one such solution:



  • Keep the new external forwarding control under Outbound spam filter policy setting to “On”.

  • Disable automatic forward for default * domain in remote domain setting.

  • Create a new remote domain for contoso.com and northwindtraders.com and allow automatic forward for these remote domains.

  • Create a transport rule to block auto forward from all to northwindtraders.com but put an exception for users Jack and Jill.

  • As transport rule will not block forwarding set using Outlook on the web (ForwardingSMTPAddress parameter) you can use RBAC rule to stop users from creating auto forward setting from OWA.


But wait, there is more!


To protect you further from attackers if a user mailbox is compromised (and for whom external automatic forward could be enabled without their knowledge), a new Email Forward Alert Policy has been released recently which is available under Alert Policies of our Security & Compliance portal. It is called “Suspicious Email Forwarding Activity.” This new alert will track all “forwarding scenarios” and detects when a user has automated the sending of messages external to the organization​. Once we find any suspicious activity, we will alert the tenant administrator once per day as long as the user continues to forward to that external recipient​. This policy has a Medium severity setting. Although it is rare, an alert generated by this policy may be an anomaly. Administrators should always check to confirm whether the user account is compromised. A screenshot of the policy:


ForwardingRevisited05.jpg


A sample alert sent to the administrator:


ForwardingRevisited06.jpg


That’s it for now! Hope you find this helpful. I also want to take a moment to thank Mike Brown, Nino Bilic for reviewing this.


Arindam Thokder

“Making risk less risky” ? – The Intrazone podcast

“Making risk less risky” ? – The Intrazone podcast

This article is contributed. See the original author and article here.

“When you store your data in the Microsoft Cloud, achieving compliance becomes a shared responsibility between you and Microsoft.” [tweet]
Martina Grom, co-founder of atwork and Microsoft MVP/RD.


 


What risks await without a compliance plan in place, or the tools to implement it, or the trust of partners, vendors, and employees? In one word: many. You can make risk less risky for your organization. By managing the who and what of data access, with awareness and adherence to policy, you forge a path with fewer risky business outcomes.


 


In this episode, Chris and I talk with Martina Grom (Co-founder, atwork and Microsoft MVP/RD) and Christophe Fiessinger (Principal program manager, Microsoft) about the role compliance plays in regards to information and communication governance. We dig into compliance strategy, technology like Microsoft 365 Compliance Manager, DLP, sharing, and more – with a nice dose of proven tips and tricks from two subject matter experts who know how to navigate the risky waters of security, governance, and keeping your information safe.


 


By tuning in, may you move your compliance score up many, many points.


 


Listen to podcast below at your own (minimized) risk:


 


https://html5-player.libsyn.com/embed/episode/id/17520329/height/90/theme/custom/thumbnail/yes/direction/backward/render-playlist/no/custom-color/247bc1/


 


Subscribe to The Intrazone podcast! And listen to episode 60 now + show links and more below.


 


Intrazone guests and co-hosts – clockwise, starting on the left: Christophe Fiessinger (principal program manager | Microsoft) [guest], Chris McNulty (director | Microsoft) [co-host], Martina Grom (co-founder atwork and Microsoft MVP/RD [guest], and little Mark Kashman (senior product manager | Microsoft) [co-host].Intrazone guests and co-hosts – clockwise, starting on the left: Christophe Fiessinger (principal program manager | Microsoft) [guest], Chris McNulty (director | Microsoft) [co-host], Martina Grom (co-founder atwork and Microsoft MVP/RD [guest], and little Mark Kashman (senior product manager | Microsoft) [co-host].


Links to important on-demand recordings and articles mentioned in this episode:  



 


Subscribe today!


Listen to the show! If you like what you hear, we’d love for you to Subscribe, Rate and Review it on iTunes or wherever you get your podcasts.


 


Be sure to visit our show page to hear all the episodes, access the show notes, and get bonus content. And stay connected to the SharePoint community blog where we’ll share more information per episode, guest insights, and take any questions from our listeners and SharePoint users (TheIntrazone@microsoft.com). We, too, welcome your ideas for future episodes topics and segments. Keep the discussion going in comments below; we’re hear to listen and grow.


 


Subscribe to The Intrazone podcast! And listen to episode 60 now.


 


Thanks for listening!


The SharePoint teams want you to unleash your magic, creativity, and productivity – and be compliant about it all. And we will do this, together, one compliance score point at a time.



The Intrazone links



+ Listen to other Microsoft podcasts at aka.ms/microsoft/podcasts.


 


Left to right [The Intrazone co-hosts]: Chris McNulty, director (SharePoint, #ProjectCortex – Microsoft) and Mark Kashman, senior product manager (SharePoint – Microsoft).Left to right [The Intrazone co-hosts]: Chris McNulty, director (SharePoint, #ProjectCortex – Microsoft) and Mark Kashman, senior product manager (SharePoint – Microsoft).


The Intrazone, a show about the Microsoft 365 intelligent intranet (https://aka.ms/TheIntrazone)The Intrazone, a show about the Microsoft 365 intelligent intranet (https://aka.ms/TheIntrazone)

Azure Marketplace new offers – Volume 108

Azure Marketplace new offers – Volume 108

This article is contributed. See the original author and article here.











We continue to expand the Azure Marketplace ecosystem. For this volume, 95 new offers successfully met the onboarding criteria and went live. See details of the new offers below:













































































































































































































































































































































































































Applications



Aceso Virtual Health.png



Aceso Virtual Health: Maintain close relationships with your patients remotely. These telehealth services, ranging from primary to mental health, cover areas with service delivery shortages or when you need to deliver care remotely.



AD Certificate Services on Windows Server 2016.png



AD Certificate Services on Windows Server 2016: This pre-configured image by Tidal Media provides Azure Active Directory certificate services on Windows Server 2016. Azure AD certificate services allow you to build public key infrastructure and provide public key cryptography.



AD Certificate Services on Windows Server 2019.png



AD Certificate Services on Windows Server 2019: This pre-configured image by Tidal Media provides Azure Active Directory certificate services on Windows Server 2019. Azure AD certificate services provide a database that manages information about network resources and application-specific data.



Altia-ABM - Insight.png



Altia-ABM: Insight: This end-to-end criminal investigation management software was designed by the Altia-ABM Group to solve crimes. It can be used in any jurisdiction and for any type of investigation.



Altia-ABM - Pegasus.png



Altia-ABM: Pegasus: This software has been developed by the Altia-ABM Group for law enforcement agencies to manage covert and undercover operations, intelligence, surveillance, informant management, and protected persons.



Altia-ABM - Smartcase.png



Altia-ABM: Smartcase: This is a modern incident and investigations software solution by the Altia-ABM Group to meet your investigation needs. It drives common working practices and has built-in analytical tools that are ready to use straight out of the box.



Android Archiver.png



Android Archiver: Use this connector by TeleMessage to import text messages, voice calls, and call logs from Android cell phones and archive them in Microsoft 365.



ApertureDB - Visual Data Management Made Easy.png



ApertureDB: Visual Data Management Made Easy: This high-performance database by ApertureData manages visual data for data science applications. ApertureDB stores and manages images, videos, and associated metadata.



Architectural Style Recognition API.png



Architectural Style Recognition API: ArtemTecta recognizes the architectural style of a building from an input photo, whether it is Classical, Neoclassical, Gothic, Renaissance, Baroque, Rococo, Art Nouveau, Art Deco, Modern, or Postmodern.



Azure Deploy by Macquarie Cloud Services.png



Azure Deploy by Macquarie Cloud Services: Deploy SD-WAN with Macquarie Cloud Services to maximize Microsoft Azure. They offer a turnkey Virtual Edge deployment to establish secure, private tunnels between your sites and Azure.



Azure Discover by Macquarie Cloud Services.png



Azure Discover by Macquarie Cloud Services: Assess your application and datacenter for cloud readiness with Macquarie Cloud Services. Identify early adoption scenarios, including Windows, Linux, and SQL Server. Analyze dependencies across VMware, Microsoft Hyper-V, and physical servers.



Azure subscription documentation.png



Azure Subscription Documentation: XTRATEGUS helps document your Microsoft Azure resources. Through subscription access, they generate a complete document containing the features of your Azure subscription. This offer is only available in Brazilian Portuguese.



BCM node-installer azure image.png



BCM Node-Installer Azure Image: Bright Cluster Manager is an application built on top of Linux distributions. Bright Computing offers this node installer to provision and perform cluster extension cloud bursting of a Bright Cluster Manager to Microsoft Azure.



Chief Returns Officer.png



Chief Returns Officer: Accelerated e-commerce growth is driving higher product return rates. Blending big data analytics with powerful AI tools, Chief Returns Officer is a SaaS platform that reduces product returns.



Classify360.png



Classify360: This data governance and rapid classification platform by Congruity360 enables intelligent data migration to Microsoft Azure via automated compliance workflows, repeatable classification processes, and defensible policies.



Codeless Test Automation for MS Dynamics and more.png



ACCELQ Codeless Test Automation for MS Dynamics and more: ACCELQ is a codeless AI-based test automation and agile test management platform, tightly integrated with Microsoft Dynamics 365 and other Microsoft platforms to accelerate and improve the quality of your releases.



Counter-Strike - Source Game Server on Ubuntu 18.04.png



Counter-Strike: Source Game Server on Ubuntu 18.04: This pre-configured image by Tidal Media provides a Counter-Strike: Source game server on Ubuntu 18.04. Counter-Strike: Source is a first-person shooter video game.



Cyberdefense.png



Cyberdefense: Companies are under continuous digital threats. Reduce your business risk with this cybersecurity solution by MNEMO to address threats, risks, and vulnerabilities. This app is available only in Spanish.



Datometry Hyper-Q for Azure Synapse Analytics.png



Datometry Hyper-Q for Azure Synapse Analytics: Run existing Teradata applications natively on Azure Synapse Analytics. Datometry Hyper-Q is a virtualization platform that lets enterprises move from Teradata to Azure Synapse with minimal effort.



Digital Humans.png



Digital Humans: Dimension’s volumetric production studios are elevating and shaping the future of virtual entertainment. Dimension’s Digital Humans platform creates believable, emotional, and exciting human performance captures as volumetric holograms.



Docker Advanced Engine on Ubuntu 18.04 LTS.png



Docker Advanced Engine on Ubuntu 18.04 LTS: This pre-configured image by Tidal Media provides Docker Advanced Engine on Ubuntu 18.04 LTS. Docker is a software platform that allows you to build, test, and deploy applications quickly.



Docker Engine Advanced on Ubuntu 20.04 LTS.png



Docker Engine Advanced on Ubuntu 20.04 LTS: This pre-configured image by Tidal Media provides Docker Engine Advanced on Ubuntu 20.04 LTS. Docker is a software platform that allows you to build, test, and deploy applications quickly.



Enabling Studio - Website chat leveraging Teams.png



Enabling Studio – Website chat leveraging Teams: Enabling Technologies developed this website chat to power real-time communications via Microsoft Teams. Build communication workflows that align with your business processes without having to engage software developers.



Enterprise Number Archiver.png



Enterprise Number Archiver: Use this TeleMessage connector in the Microsoft 365 compliance center to import and archive messages, chats, voice call recordings, and logs. It provides employees with a business number associated with an app on their phone.



Expense Once.png



Expense Once: This cloud-based solution automates, streamlines, and controls the expense management process, ranging from receipt submission to staff reimbursement.



EYE-SYNC.png



EYE-SYNC: Developed by SyncThink, this is a non-invasive eye-tracking system to identify functional impairments of the visual or vestibular systems with modified virtual reality or augmented reality goggles.



Flood Detection API.png



Flood Detection API: Detecting flooded areas in a photo using artificial intelligence, the Flooderizer API is especially useful for mall security cameras, parking lots, buildings, and agriculture.



FraudAi.png



FraudAi: Developed by Electrifai, this medical fraud, waste, and abuse prevention app utilizes artificial intelligence and machine learning. FraudAi will flag potential instances of medically unnecessary procedures and coding abnormalities.



Furniture Category Recognition API.png



Furniture Category Recognition API: Targeting furniture e-commerce companies, manufacturers, distributors, and retailers, the FurnishRec app recognizes the most common furniture categories, such as sofa beds or office chairs.



Genesys Cloud Contact Center for Dynamics 365.png



Genesys Cloud Contact Center for Dynamics 365: Appxconnect provides native integration between Genesys Cloud and Microsoft Dynamics 365. Business users get the best of the award-winning contact center solution from Genesys and Microsoft Dynamics 365 to fully manage customer engagement.



Hypersonix.png



Hypersonix: This is an AI-powered intelligent enterprise platform for retail, restaurant, hospitality, and manufacturing enterprises. It incorporates a full array of descriptive, diagnostic, predictive, and prescriptive intelligence.



Icy Road Detection API.png



Icy Road Detection API: IcyRoadDet is intended for software development in the automotive, travel, and transportation industries. This app detects icy roads from a photo using artificial intelligence and cloud infrastructure.



Id-Gate (eng).png



Id-Gate (eng): LLC RecFaces offers this app for safe city systems, airports, banks, industrial enterprises, and retail business centers. Cameras and scanners capture the biometric data of the incoming person to verify access rights.



Intelligent Insights for Healthcare on DDP.png



Intelligent Insights for Healthcare on DDP: Wipro’s healthcare apps provide insights into predictive maintenance for medical devices, detect adverse drug effects and fraudulent claims, forecast demand for medical equipment, and identify cross-sell/up-sell opportunities.



Intelligent Insights for Manufacturing on DDP.png



Intelligent Insights for Manufacturing on DDP: Powered by Wipro’s Azure-based Data Discovery Platform, Wipro’s intelligent manufacturing apps deliver end-to-end process view, real time monitoring, asset management, proactive failure diagnosis, and fraud identification.



Intelligent Insights for Retail on DDP.png



Intelligent Insights for Retail on DDP: Providing store performance analytics, Wipro’s retail apps help identify store sections where customers spend the most time in and advise on better use of retail space, advertising channels, and proactive selling.



Kamvo EPM.png



Kamvo EPM: Connecting strategy with execution, Kamvo by Resemble Systems is a flexible, scalable, end-to-end enterprise project management (EPM) solution for portfolio and project execution.



Komutel.png



Komutel: Komutel’s Komand is a command center to facilitate and improve inbound and outbound call handling. Integrate Komand with Microsoft Teams or Microsoft Azure tenants in your environment to unify networks, data, and communications.



Markdown Price Optimization Solution.png



Markdown Price Optimization Solution: Churchill’s solution helps manage the lifecycle of each item in a category by identifying markdown candidates and price options, then recommending the optimum combination of price discounts and time periods.



MetalLB Helm Chart.png



MetalLB Helm Chart: This pre-configured container image from Bitnami provides MetalLB Helm Chart. MetalLB is a load balancer implementation for bare metal Kubernetes clusters, using standard routing protocols.



mindzie.png



mindzie: This solution uses information already collected in Microsoft Dynamics 365 and identifies areas for improvement, such as procure-to-pay, accounts payable, order entries, or sales opportunities.



OfficeWatch XT Digital Workplace Analytics.png



OfficeWatch XT Digital Workplace Analytics: XT is an omnichannel analytics and notification platform designed by Metropolis to help managers efficiently measure, monitor, track, and account for communications within their respective divisions.



OneVu Citizen Account.png



OneVu Citizen Account: This citizen engagement platform by IEG4 enables the digital transformation of council services by providing a self-serve portal for citizens to communicate with back-office departments.



OTRS - Ticket Request System Server on CentOS 7.8.png



OTRS – Ticket Request System Server on CentOS 7.8: This pre-configured image by Tidal Media provides the OTRS ticket request server on CentOS 7.8. OTRS is a modern, flexible ticket and process management system for service management professionals.



OTRS - Ticket Request System Server on Debian 10.png



OTRS – Ticket Request System Server on Debian 10: This pre-configured image by Tidal Media provides the OTRS ticket request server on Debian 10. OTRS is a modern, flexible ticket and process management system for service management professionals.



Painting Style Recognition API.png



Painting Style Recognition API: PaintinGen recognizes the most popular painting styles, including Impressionism, Expressionism, Abstract, graffiti, or Surrealism. It was developed by SC DE VIS SOFTWARE for history of art professionals, students, and art patrons.



Pixel Mobile Clinical Uploader.png



Pixel Mobile Clinical Uploader: This app by Medialogix provides an easy-to-use mobile interface for clinical photography. Use cases include disease and wound management, treatment planning, time-critical theater photography, and ambulance.



Pollution Index by Seabin Project.png



Pollution Index by Seabin Project: Developed by Seabin to provide measurable impact on pollution in the world’s oceans, the platform has the capacity to monitor the world’s waterways and inform governing bodies to fill pollution knowledge gaps.



PowerExcel - SaaS for Planning.png



PowerExcel – SaaS for Planning: This Microsoft Azure-hosted SaaS solution brings together the best of Microsoft Power BI, SQL Server, and Microsoft Excel. The platform seamlessly marries data between the relational and Excel worlds and provides Power BI visibility.



Regular Price Elasticity Modul.png



Regular Price Elasticity Module: Set the right price for each item. Churchill’s Regular Price Elasticity software uses artificial intelligence and machine learning technologies to measure the impact of regular price changes on consumer demand.



Remote device access.png



Remote Device Access: M&M Software’s solution allows you to access IoT devices’ servers from the cloud through the firewall. The firewall does not need configuration. This solution is available only in German.



Road Accidents Detection API.png



Road Accidents Detection API: Accidentor detects road accidents in a photo using artificial intelligence and the power of the cloud. The recognized road accidents have a confidence score, a timestamp, an identifier, and a tag name.



ROGER365.io.png



ROGER365.io: Empower your business to become customer-led and customer-connected with the help of the Ask Roger! team. Link Microsoft Teams to web chat, WhatsApp, Microsoft Dynamics 365, and AI to optimally engage with your customer.



ScaleOut Digital Twin Streaming Service.png



ScaleOut Digital Twin Streaming Service: Real-time digital twins model real-time behavior of individual data sources. ScaleOut’s twins are designed to run alongside your Microsoft Azure applications that process streaming data.



Sectigo Private CA.png



Sectigo Private CA: Many enterprise cloud applications are tightly integrated with Microsoft Azure Key Vault, which, however, cannot issue certain certificates. With Sectigo, you can manage large inventories of certificates.



Seidor BannaAnalytics.png



Seidor BannaAnalytics: This analytics app built on Microsoft Power BI gives you control over your Microsoft cloud service costs, consumption, and security levels. The application is provided by Seidor for free to its customers.



Skybox Vulnerability Control.png



Skybox Vulnerability Control: Skybox analyzes vulnerabilities in the complete context of your attack surface. By integrating with Microsoft Defender Advanced Threat Protection (ATP), formerly Azure ATP, Skybox gains access to an even broader range of data that enhances its vulnerability assessments.



SlideX Solutions.png



SlideX Solutions: SlideX offers web and mobile applications for residential and commercial ticketless valet parking, automated fee payments, space monitoring, garage administration, visitor management, and on-demand car services.



SQL Server Health Check.png



SQL Server Health Check: ALESON ITC offers managed services to optimize database servers, especially those that were migrated from an on-premises environment to Microsoft Azure, including Azure Virtual Machines, Azure SQL Database, and Azure SQL Managed Instance. This service is available in English and Spanish.



Student Integrity.png



Student Integrity: With the sudden move to remote learning, students may find it easier to cheat on assignments. The app by Analytikus helps detect plagiarism through cognitive analytics and machine learning.



Teams Connect for Education.png



Teams Connect for Education: Identity Experts’ solution automates Microsoft Teams lifecycle management, taking a feed directly from the student records system. It is provided as a fully supported service with UK-based support to universities and colleges.



TIMEA the chat bot.png



TIMEA the chat bot: Reduce more than 40 percent of the time spent on repetitive tasks with this personal chatbot assistant from TotalSoft. This friendly interface responds to questions routinely addressed to HR departments. This app is available in English and Romanian.



ToolsGroup Service Optimizer 99+ (SO99+).png



ToolsGroup Service Optimizer 99+ (SO99+): This service-driven supply chain planning software automates and optimizes supply chain planning tasks to meet target service levels with demand analytics and self-learning AI technology.



Traffic Lights Detection API.png



Traffic Lights Detection API: The tLightsDet app detects  lit traffic lights on input photos and localizes them by generating a probability score. It is recommended for apps developed for smart cities, drivers, pilots, navigators, automotive, and transportation.



UpKeep SaaS.png



UpKeep SaaS: Designed for small to midsize companies, UpKeep offers core maintenance functionality, such as preventive maintenance, asset, inventory, and work order management.



Verizon Network Archiver.png



Verizon Network Archiver: Get a copy of employee text messages in Microsoft 365. Use the TeleMessage connector in the Microsoft 365 compliance center to import and archive SMS/MMS data from the Verizon network.



Vibe.fyi.png



Vibe.fyi: Vibe is helping to transform the way multi-location organizations influence their workforce. Reach wired, non-wired, and remote workers via digital signage, screensavers, web browsers, and mobile devices.



Virusfree.png



Virusfree: This email security cloud service by Excello accurately and effectively protects your mailbox from the full range of cyberthreats. You will get reliable antispam, antivirus, attachment protection, and email encryption.



Wavefront Helm Chart.png



Wavefront Helm Chart: This pre-configured container image from Bitnami provides Wavefront as a Helm chart. Wavefront is a high-performance streaming analytics platform for monitoring and optimizing your environment and applications.



WhatsApp Archiver.png



WhatsApp Archiver: Use the TeleMessage connector in the Microsoft 365 compliance center to import and archive WhatsApp calls, chats, attachments, files, and deleted messages.



Windows Virtual Desktop - Cloud Sandbox.png



Windows Virtual Desktop – Cloud Sandbox: This ready-to-use Windows Virtual Desktop (WVD) environment showcases the core capabilities and use cases for IT managers who want to learn, evaluate, and experience WVD before starting with production deployments. 



WInsights – Insights to Win.png



WInsights – Insights to Win: This solution by WinWire Technologies uses Microsoft Azure data and AI services to transform data into actionable insights to help organizations monetize critical data assets, drive growth, and accelerate time to market.



Zeus Eye.png



Zeus Eye: Enable your leadership team to make effective decisions with this powerful analytics tool by Mozanta Technologies. Zeus Eye acts as a data source for your organization to analyze the performance of your disparate systems.



Consulting services



2 day workshop - Azure modernization.png



2-Day workshop – Azure modernization: 848 will deliver a two-day workshop to review your existing hosted and on-premises services, then create a high-level report with recommendations to migrate to IaaS, PaaS and SaaS solutions on Microsoft Azure.



Azure Foundations 2-Days Assessment.png



Azure Foundations 2-Day Assessment: This assessment from FyrSoft helps customers understand their cloud maturity and provide steps to digitally transform. This is a consultative assessment to help the customer evaluate their options and capabilities.



Azure Readiness 5 day Assessment.png



Azure Readiness 5-Day Assessment: Superadmins’ 5-day Azure Readiness Assessment is dedicated to analyzing your on-premises workload and providing a recommendation report on how you can easily and quickly migrate to Microsoft Azure.



Azure subscription documentation.png



Azure Subscription Documentation: XTRATEGUS helps document your Microsoft Azure resources. Through subscription access, they generate a complete document containing the features of your Azure subscription. This offer is only available in Brazilian Portuguese.



Brillio Rapid App Modernization - 1-Day Workshop.png



Brillio Rapid App Modernization: 1-Day Workshop: Through sharing of case studies and interaction with your peers, you will walk away with a firm understanding of how to develop your strategy for transforming your existing legacy ecosystem.



Cloud Migration Assessment - 6-Week Assessment.png



Cloud Migration Assessment: 6-Week Assessment: The DataArt team of experts offers an assessment of an end-to-end migration to Microsoft Azure that will help deliver cost optimization. The assessment includes an estimate for the migration effort.



Cloud Migration - 6-Week Implementation.png



Cloud Migration: 6-Week Implementation: The DataArt team of experts offers an implementation of an end-to-end migration to Microsoft Azure that will help deliver cost optimization. The implementation includes a resources evaluation and cost estimate report.



DIA START2AI Use Case Discovery 2 day workshop.png



DIA START2AI Use Case Discovery 2-Day workshop: This interactive workshop from Savaco uncovers business questions that can be supported by artificial intelligence. The output is a value-feasibility matrix and a hands-on Azure data and AI experience.



Hadoop to Azure DataServices - 10 Wk Implementation.png



Hadoop to Azure DataServices: 10-Week Implementation: Motifworks accelerators can help you migrate your big data workload and deliver ROI. Create more productive development, optimize cost, increase time to market, innovate freely, and democratize data insights.



Identity & Access Management As A Service.png



Identity & Access Management As A Service: This is a managed service offering from Phakamo Tech for organizations with a minimum of 500 users that require consistent governance, risk, and compliance management.



Infrastructure Migration 1-Day Workshop.png



Infrastructure Migration 1-Day Workshop: FyrSoft invites you to an interactive exploration of how to migrate existing infrastructure to the cloud. The workshop covers everything from whiteboarding migration strategies to hands-on experiences with migration tools.



Insight Cloud Care for Azure - 12-mo Implementation.png



Insight Cloud Care for Azure: 12-Month Implementation: Insight offers managed cloud services to take advantage of the speed, scalability, and cost savings possible on Microsoft Azure. Its cloud management portal provides self-service access.



Microsoft Azure Security - 2-Week Assessment.png



Microsoft Azure Security: 2-Week Assessment: This infrastructure review and testing activity from DataArt includes checking Azure environment security settings and controls, examining the environment to reveal any security gaps and issues, and more.



OpenFOAM on Azure - 2-HR Briefing.png



OpenFOAM on Azure: 10-Week Proof of Concept: Find out how OpenFOAM on Azure will harmonize with CAE workflows and what virtual product development in the cloud can do for your engineers. This proof of concept includes the professional services of GNS Systems.



OpenFOAM on Azure - 2-HR Briefing.png



OpenFOAM on Azure: 2-Hour Briefing: This briefing from GNS Systems will help you to understand the value of your virtual product development in the cloud and shows you the advantages of OpenFOAM on Azure.



OpenFOAM on Azure - 3 Days Workshop.png



OpenFOAM on Azure: 3-Day Workshop: Learn how OpenFOAM on Azure harmonizes with your CAE workflows and what virtual product development in the cloud can do for your engineers. The goal of this GNS Systems workshop is a statement of work (SOW) with recommended next steps.



Quickbooks on Azure - 5 Day Implementation.png



Quickbooks on Azure: 5-Day Implementation: CloudIBN combines the robustness of Microsoft Azure and the simplicity of Quickbooks and offers migration services to shift Quickbooks to Azure seamlessly.



SELA Group Managed Services.png



SELA Group Managed Services: Sela offers a complete service of your cloud in PaaS or Microsoft Azure infrastructures, network management, big data solutions, and utilization of your Azure solution.



SQL Server Migration - 10-Day Implementation.png



SQL Server Migration: 10-Day Implementation: In 10 days, Seepath will execute on the SQL migration plan developed as part of its SQL Server Migration Assessment. At the end of the implementation your database workloads will be running on Microsoft Azure.



Virtual Desktop 365 - 2-Week Implementation.png



Virtual Desktop 365: 2-Week Implementation: Access Windows 10 desktop and apps from anywhere, on any device. Adopt a modern solution to secure remote work with Windows Virtual Desktop along with new capabilities that make deployment easier.



Windows Virtual Desktop - 2 Week POC.png



Windows Virtual Desktop – 2-Week Proof of Concept: Exelegent’s proof of concept for Windows Virtual Desktop includes one shared pool for five users, and a dedicated pool with two virtual machines. A Windows 10 multi-session also is included.



Windows Virtual Desktop (WVD) in a Day Workshop.png



Windows Virtual Desktop (WVD) in a Day Workshop: This Windows Virtual Desktop Workshop from FyrSoft provides you with the knowledge and skills to accelerate design and implementation. The workshop covers deployment options and more.



Windows Virtual Desktop Proof of Concept 10 day.png



Windows Virtual Desktop 10-Day Proof of Concept: This proof of concept from itnetX helps accelerate the deployment of applications and workplaces. Leverage Azure to ease access to key business applications and data secure, and more.