Cyber Security News

DeepSeek is Now Available With Microsoft Azure AI Foundry

Microsoft has officially added DeepSeek R1, an advanced AI model, to its Azure AI Foundry and GitHub Model Catalog.

This move places DeepSeek R1 among a curated selection of over 1,800 AI models, spanning open-source, task-specific, and industry-focused solutions.

Businesses can now access this cutting-edge model on a trusted, scalable, and enterprise-ready platform, ensuring adherence to service-level agreements (SLAs), security protocols, and responsible AI guidelines.

Backed by Microsoft’s proven innovation and reliability, DeepSeek R1 is set to enable seamless AI integration for enterprises.

Transformative AI Development with Azure AI Foundry

The launch of DeepSeek R1 empowers developers and enterprises to accelerate AI adoption.

The model’s key strength lies in offering businesses powerful and cost-efficient access to advanced AI reasoning, minimizing the need for extensive infrastructure investments.

Azure AI Foundry simplifies experimentation and deployment by offering developers the tools to quickly evaluate and benchmark models like DeepSeek R1.

With built-in model evaluation features, users can test outputs, compare performance metrics, and scale their AI applications seamlessly.

Microsoft’s vision for Azure AI Foundry is clear: to unite the world’s leading AI models on one platform, fostering innovation and unlocking global opportunities for enterprises.

Microsoft emphasizes its commitment to enabling customers to build production-ready AI applications while maintaining the highest standards of safety and ethical responsibility.

DeepSeek R1 has undergone comprehensive security evaluations, including red teaming and automated behavior assessments, ensuring it meets stringent safety requirements.

Azure AI Foundry integrates Azure AI Content Safety by default, offering content filtering capabilities. Additionally, the Safety Evaluation System allows enterprises to test their applications for potential risks before deployment.

These safeguards make Azure AI Foundry a reliable, secure, and compliant platform, allowing businesses to adopt AI solutions confidently.

Interested users can begin with DeepSeek R1 in just a few steps:

  1. Sign Up for Azure AI Foundry: Create an Azure account if you don’t have one.
  2. Access the Model Catalog: Search for “DeepSeek R1” in the Azure AI Foundry catalog or on GitHub.
  3. Deploy the Model: Open the model card, deploy DeepSeek R1, and obtain the inference API and key.
  4. Test and Experiment: Use the deployment playground to explore prompts or integrate the API and key into your projects.

With its inclusion in Azure AI Foundry, DeepSeek R1 promises to revolutionize AI application development, allowing enterprises worldwide to innovate faster and more securely.

Collect Threat Intelligence with TI Lookup to improve your company’s security - Get 50 Free Request

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that Google…

7 minutes ago

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in a…

8 minutes ago

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based Security…

40 minutes ago

Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector

A sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the United…

42 minutes ago

Microsoft Removing DES Encryption from Windows 11 24H2 and Windows Server 2025″

Microsoft has announced the removal of the Data Encryption Standard (DES) encryption algorithm from Kerberos…

46 minutes ago

Researchers Unveil APT28’s Advanced HTA Trojan Obfuscation Tactics

Security researchers have uncovered sophisticated obfuscation techniques employed by APT28, a Russian-linked advanced persistent threat…

48 minutes ago