{"id":607,"date":"2017-03-02T04:55:42","date_gmt":"2017-03-02T12:55:42","guid":{"rendered":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/industry\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/"},"modified":"2017-03-02T04:55:42","modified_gmt":"2017-03-02T12:55:42","slug":"cybersecurity-for-the-most-challenging-requirements","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/","title":{"rendered":"Cybersecurity for the most challenging requirements"},"content":{"rendered":"

I\u2019ve spent the past 10 years working with Microsoft clients in the defense and intelligence communities\u2014both in the United States and worldwide. Cybersecurity is arguably the No. 1 priority for these customers because of what\u2019s at stake: compromises to national security, military operations, and classified and sensitive information.<\/p>\n

The cybersecurity challenge is pervasive and escalating as countries increasingly rely on information technology as part of their critical infrastructure. I enjoy meeting with those responsible for protecting their public safety and national security assets, whether it be a country\u2019s military or civilian branches, intelligence officials, law enforcement agencies or other organizations. Here\u2019s a synopsis of what we typically discuss.<\/p>\n

Cybersecurity landscape<\/h2>\n

Security in a cloud-first, mobile-first world calls for a new approach. Data is accessed, used and shared on premise and in the cloud, erasing traditional security boundaries. When approaching this challenging cybersecurity landscape and the digital transformation needed to protect national security and defense assets from evolving threats, Microsoft leverages our comprehensive platform, unique intelligence and partnerships. We help customers achieve a balance of security and end-user empowerment, with effective security controls across identity, device, data and apps, and infrastructure. Our approach protects an organization\u2019s data against unauthorized access, detects attacks and breaches, and helps the responsible IT team respond and adapt to prevent future attacks.<\/p>\n

The Microsoft protect-detect-respond model is built on our expertise and experience of:<\/p>\n