List of Microsoft Azure Firewall Customers
Redmond, 98052-6399, WA,
United States
Since 2010, our global team of researchers has been studying Microsoft Azure Firewall customers around the world, aggregating massive amounts of data points that form the basis of our forecast assumptions and perhaps the rise and fall of certain vendors and their products on a quarterly basis.
Each quarter our research team identifies companies that have purchased Microsoft Azure Firewall for Web Application Firewalls (WAF) from public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources, including the customer size, industry, location, implementation status, partner involvement, LOB Key Stakeholders and related IT decision-makers contact details.
Companies using Microsoft Azure Firewall for Web Application Firewalls (WAF) include: Dematic, a United States based Professional Services organisation with 11200 employees and revenues of $4.55 billion, Pacífico Seguros, a Peru based Insurance organisation with 5000 employees and revenues of $135.0 million, Transact Campus, a United States based Professional Services organisation with 500 employees and revenues of $56.0 million and many others.
Contact us if you need a completed and verified list of companies using Microsoft Azure Firewall, including the breakdown by industry (21 Verticals), Geography (Region, Country, State, City), Company Size (Revenue, Employees, Asset) and related IT Decision Makers, Key Stakeholders, business and technology executives responsible for the software purchases.
The Microsoft Azure Firewall customer wins are being incorporated in our Enterprise Applications Buyer Insight and Technographics Customer Database which has over 100 data fields that detail company usage of software systems and their digital transformation initiatives. Apps Run The World wants to become your No. 1 technographic data source!
Apply Filters For Customers
| Logo | Customer | Industry | Empl. | Revenue | Country | Vendor | Application | Category | When | SI | Insight | Insight Source |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
Dematic | Professional Services | 11200 | $4.6B | United States | Microsoft | Microsoft Azure Firewall | Web Application Firewalls (WAF) | 2022 | Quisitive | In 2022, Dematic deployed Microsoft Azure Firewall together with Azure Front Door and Azure Web Application Firewall to protect customer-facing supply-chain and automation services. The rollout was delivered for US and global operations with Quisitive as the implementation partner. The implementation layered Microsoft Azure Firewall into a Web Application Firewalls (WAF) architecture and enabled intrusion detection and prevention system capabilities and TLS inspection for advanced threat protection. Configuration emphasized cloud-native scaling and high availability patterns to sustain application delivery and to help meet 99.99% SLA targets. Security telemetry was centralized and integrated with Defender for Cloud to consolidate alerts, logging, and policy management across Azure Front Door, Azure Web Application Firewall, and Microsoft Azure Firewall. Operational coverage focused on instrumented monitoring, protection of application delivery pathways, and aligning security operations to support supply-chain and automation business functions. | |
|
|
Pacífico Seguros | Insurance | 5000 | $135M | Peru | Microsoft | Microsoft Azure Firewall | Web Application Firewalls (WAF) | 2023 | TC1 Labs Peru | In 2023, Pacífico Seguros deployed Microsoft Azure Firewall as part of a unified Microsoft security stack delivered with TC1 Labs Peru, integrating the deployment into a regional security program led by security and IT teams in Peru and across Latin America. The implementation centered on protecting insurance applications and customer data by aligning network and application layer controls under a Zero Trust and XDR operating model. The technical configuration combined Azure Front Door, Azure Web Application Firewall, and Microsoft Azure Firewall to provide edge routing, application layer protection, and centralized network filtering. The Azure Web Application Firewall was implemented in the Web Application Firewalls (WAF) category to enforce OWASP aligned rules, application-layer bot and injection protections, and centralized policy management while Azure Firewall provided stateful network controls and threat filtering. Telemetry and incident management were consolidated into Microsoft Sentinel and Defender for Cloud, creating a single SOC ingestion and detection pipeline that linked WAF events, firewall logs, and cloud defender telemetry. Operational coverage explicitly included regional security operations and IT teams, extending protection to insurance application estates and customer data flows across Pacífico Seguros regional sites. Governance changes emphasized Zero Trust principles and an XDR posture, standardizing escalation workflows and SOC triage procedures under the new telemetry fabric. The program reduced low-latency security incidents by 95 percent and cut triage and response time by about 40 percent, while consolidating detection and response into Sentinel and Defender for Cloud. | |
|
|
Transact Campus | Professional Services | 500 | $56M | United States | Microsoft | Microsoft Azure Firewall | Web Application Firewalls (WAF) | 2023 | n/a | In 2023, Transact Campus implemented Microsoft Azure Firewall alongside Azure Web Application Firewall on Azure Application Gateway in the United States, leveraging Web Application Firewalls (WAF) capabilities to protect its campus payment and commerce products. The initiative migrated Web Application Firewall functionality from a third party WAF into Azure Web Application Firewall on Azure Application Gateway while adding Microsoft Azure Firewall for network level protection of payment and finance workloads. The deployment configured per product WAFs to provide stronger isolation between commerce services and to support independent release pipelines for product teams. Microsoft Azure Firewall was provisioned to enforce network segmentation and to provide a consistent control plane for perimeter filtering, while Azure Web Application Firewall on Application Gateway delivered application layer rule sets, centralized logging, and threat protection profiles. Operational integration focused on Azure native logging and monitoring, routing WAF and firewall telemetry into Azure monitoring stacks for security operations and product engineering visibility. The implementation was scoped to payment and commerce products in the US region and affected security, engineering, and finance operations by consolidating application layer protection and centralized network controls. Governance shifted toward per product isolation and Azure native observability, which increased release velocity and improved operational scalability while reducing costs. The architecture emphasizes Azure platform alignment, with application gateway based WAFs for product level isolation and Microsoft Azure Firewall for campus wide network defense and auditing of payment related traffic. |
Buyer Intent: Companies Evaluating Microsoft Azure Firewall
Discover Software Buyers actively Evaluating Enterprise Applications
| Logo | Company | Industry | Employees | Revenue | Country | Evaluated | ||
|---|---|---|---|---|---|---|---|---|
| No data found | ||||||||