{"id":623,"date":"2017-03-27T14:47:10","date_gmt":"2017-03-27T18:47:10","guid":{"rendered":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/industry\/2017\/03\/27\/how-security-transparency-is-key-to-trust\/"},"modified":"2017-03-27T14:47:10","modified_gmt":"2017-03-27T18:47:10","slug":"how-security-transparency-is-key-to-trust","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2017\/03\/27\/how-security-transparency-is-key-to-trust\/","title":{"rendered":"How Security Transparency is Key to Trust"},"content":{"rendered":"
Being transparent may be perceived by some organizations as difficult, especially when highlighting a security breach. At Microsoft, our commitment to transparency means holding ourselves accountable to our customers, partners and all stakeholders. Key to this commitment is sharing both successes and failures.<\/p>\n
Demonstrating and implementing security practices to protect the data and processes of our employees and customers is essential to our success. Trust begins with understanding, and understanding requires transparency.<\/p>\n
Microsoft\u2019s unique visibility into the growing threat landscape comes from our hyper-scaled cloud footprint of more than 200 cloud services, 100+ datacenters, millions of devices, and over a billion customers across the globe. Our investment in security professionals is focused on secure development as well as protect, detect and respond functions.<\/p>\n
As such, we are committed to protecting the computing environment used by both our customers and employees to ensure the resiliency of our cloud infrastructure and services, products and devices. Our Microsoft Premier Support Global Incident Response and Recovery teams are available to rapidly engage during a targeted attack.<\/p>\n
Challenges faced by our customers during incident response and recovery are both technical and non-technical, and as such we\u2019ve recently compiled an Incident Response Reference Guide to provide comprehensive incident management guidance. It is designed to help you prepare for and meet critical needs during a major cybersecurity incident, as well as to avoid common errors. It provides you with our experience and lessons learned in the form of:<\/p>\n
This guidance is designed to enable you to prepare for a crisis by reducing risk to your organization, and to better manage a crisis regardless of whether or not you have made prior preparations.<\/p>\n
Microsoft spends over a billion dollars of R&D annually in building security into our mainstream products. There are trillions of data points coming in from billions of end points and the ability to understand, gain insight and action that data is what makes the difference. We share this data with our customers and our partners to collectively secure our environment.<\/p>\n
To learn from over a decade of experience helping our customers recover from major security incidents, download the Incident Response Reference Guide<\/a>.<\/p>\n Listen Now to the Accelerate PodCast \u2013 special Security episodes on \u00a0\u201cCompliance and Risk<\/a>\u201d and \u201cSecurity and Culture<\/a>\u201d.<\/p>\n","protected":false},"excerpt":{"rendered":" Being transparent may be perceived by some organizations as difficult, especially when highlighting a security breach. At Microsoft, our commitment to…<\/p>\n","protected":false},"author":72,"featured_media":1423,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"categories":[],"post_tag":[213],"content-type":[],"coauthors":[146],"class_list":["post-623","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-horizontal"],"yoast_head":"\n