Sunday, February 9, 2025
HomeCyber Security NewsDeepSeek is Now Available With Microsoft Azure AI Foundry

DeepSeek is Now Available With Microsoft Azure AI Foundry

Published on

SIEM as a Service

Follow Us on Google News

Microsoft has officially added DeepSeek R1, an advanced AI model, to its Azure AI Foundry and GitHub Model Catalog.

This move places DeepSeek R1 among a curated selection of over 1,800 AI models, spanning open-source, task-specific, and industry-focused solutions.

Businesses can now access this cutting-edge model on a trusted, scalable, and enterprise-ready platform, ensuring adherence to service-level agreements (SLAs), security protocols, and responsible AI guidelines.

Backed by Microsoft’s proven innovation and reliability, DeepSeek R1 is set to enable seamless AI integration for enterprises.

Transformative AI Development with Azure AI Foundry

The launch of DeepSeek R1 empowers developers and enterprises to accelerate AI adoption.

The model’s key strength lies in offering businesses powerful and cost-efficient access to advanced AI reasoning, minimizing the need for extensive infrastructure investments.

Azure AI Foundry simplifies experimentation and deployment by offering developers the tools to quickly evaluate and benchmark models like DeepSeek R1.

With built-in model evaluation features, users can test outputs, compare performance metrics, and scale their AI applications seamlessly.

Microsoft’s vision for Azure AI Foundry is clear: to unite the world’s leading AI models on one platform, fostering innovation and unlocking global opportunities for enterprises.

Microsoft emphasizes its commitment to enabling customers to build production-ready AI applications while maintaining the highest standards of safety and ethical responsibility.

DeepSeek R1 has undergone comprehensive security evaluations, including red teaming and automated behavior assessments, ensuring it meets stringent safety requirements.

Azure AI Foundry integrates Azure AI Content Safety by default, offering content filtering capabilities. Additionally, the Safety Evaluation System allows enterprises to test their applications for potential risks before deployment.

These safeguards make Azure AI Foundry a reliable, secure, and compliant platform, allowing businesses to adopt AI solutions confidently.

Interested users can begin with DeepSeek R1 in just a few steps:

  1. Sign Up for Azure AI Foundry: Create an Azure account if you don’t have one.
  2. Access the Model Catalog: Search for “DeepSeek R1” in the Azure AI Foundry catalog or on GitHub.
  3. Deploy the Model: Open the model card, deploy DeepSeek R1, and obtain the inference API and key.
  4. Test and Experiment: Use the deployment playground to explore prompts or integrate the API and key into your projects.

With its inclusion in Azure AI Foundry, DeepSeek R1 promises to revolutionize AI application development, allowing enterprises worldwide to innovate faster and more securely.

Collect Threat Intelligence with TI Lookup to improve your company’s security - Get 50 Free Request

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...