Some software vendors, particularly that one in Redmond, have specific licensing fees for when their software is used (or sold) in a hosted environment.
Other software works on ways to transform applications while minimizing risks like compliance or dependence on the software by a remote department, then put it in a cloud environment, untied to any particular server if that is appropriate. (This stage is where the Microsoft part comes in.) Afterward, there is a security assessment, checking software for security attacks in real time.
By looking at what the software does in its intended environment (usually Windows) FireEye can determine if it is malicious or not and then allow it through or block it.