Site icon TheWindowsUpdate.com

Microsoft’s End-to-End Security Commitments to Our Customers

This post has been republished via RSS; it originally appeared at: New blog articles in Microsoft Tech Community.

 

October is my favorite time of year, between the change of season, Major League Baseball playoffs, and with football underway.  It’s also National Cybersecurity Awareness Month, though with so many cyberattacks and incidents in the news, one month of dedicated focus hardly seems sufficient. For that reason, we will continue to invest heavily in SCI management technologies that work across, not just your Microsoft investments, but that also extends to your third-party technology systems. 

 

I’ll start with interoperability.  Your environment will no doubt remain hybrid, with multiple providers mutually committed to supporting your digital transformation efforts.  Of all the   made at IGNITE, two are most indicative of our commitment to deliver world-class security technologies in conjunction with other market partners, in increasingly critical segments:

 

 

Other updates coming out of IGNITE include a rebranding of sort of our threat protection portfolio:  Microsoft Defender is a combined set of offerings, combining Microsoft 365 Defender and Azure Defender, protecting and responding to threats across an attacker kill chain, from identities to endpoints, applications, email, infrastructure and cloud.  Thinking left to right, through an attacker lifecycle, this is how our “Microsoft Defender” suite works:

 

 

Here’s a view:

Figure 1: Illustration of Microsoft Defender protection across attack kill chain 

 

 

Microsoft continues to update and consolidate this suite of offerings to help you centralize and automate more of your security operations, taking advantage of the scale and cost benefits that Cloud can bring.  We will continue to integrate our technologies internally and will continue to partner with others around the security community, to protect our customers.  One final example, an important resource for partners and customers alike, is this GitHub repository for security operations defenders.  Start here to find log analysis queries, sample data sets, SDKs, scripts, connectors, and other resources to accelerate your work.  More importantly, use this as an opportunity to join a community of practice , a network of defenders who are working across industries and geographies to protect users, systems, and data. 

 

This being National Cybersecurity Awareness month, I’ll close with a link to a blog that I recently published, with advice on how to accelerate your cybersecurity career and make immediate impact by using default security tools.  We and many other security providers remain committed to defending our users and the ecosystem, but we humans, the 8th OSI layer, implement these technologies and solutions.  The more we can “move left” and build basic hygiene tools INTO what we deliver and help you implement, the more secure and productive we will be.

 

 

 

 

 

Exit mobile version