Microsoft Defender for Identity (formerly Azure Advanced Threat Protection, also known as Azure ATP) is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. Defender for Identity enables SecOp analysts and security professionals struggling to detectContinue reading "What’s new in Microsoft Defender for Identity!"
The Best of Microsoft Compliance Solutions at Ignite March 2021!
This will be your guide to the best things about Microsoft Compliance Solutions at Ignite March 2021. Bookmark it. Save it. Come back to it. Share it. Reference it. Enjoy. Microsoft Ignite March 2021 may be over but that does not mean you have to stop learning about Microsoft Compliance. Earlier this year Microsoft CVPContinue reading "The Best of Microsoft Compliance Solutions at Ignite March 2021!"
Microsoft Security Services mapping!
I found this Microsoft Security services mapping for Azure Security. One of the best reasons to use Azure for your applications and services is to take advantage of its wide array of security tools and capabilities. These tools and capabilities help make it possible to create secure solutions on the secure Azure platform. Microsoft AzureContinue reading "Microsoft Security Services mapping!"
Microsoft Zero Trust Deployment Center
Microsoft has released a Zero Trust Deployment Center for our customers to mature organization's approach to security and optimize how Zero Trust is implemented. A Zero Trust approach should extend throughout the entire digital estate and serve as an integrated security philosophy and end-to-end strategy. This is done by implementing Zero Trust controls and technologiesContinue reading "Microsoft Zero Trust Deployment Center"
10 tips for enabling Zero Trust Security
Based on the principle of “never trust, always verify, Zero Trust helps secure corporate resources by eliminating unknown and unmanaged devices and limiting lateral movement. Implementing a true Zero Trust model requires that all components—user identity, device, network, and applications—be validated and proven trustworthy. Taking a layered approach to secure corporate and customer data, Microsoft’sContinue reading "10 tips for enabling Zero Trust Security"
What’s inside Microsoft Intelligent Security Graph
To be successful with threat intelligence, you must have a large diverse set of data and you have to apply it to your processes and tools. Microsoft has done both and this is how we apply it. The data that we collect from the various sources passes through a strict privacy/compliance boundary to ensure thatContinue reading "What’s inside Microsoft Intelligent Security Graph"