{"id":69828,"date":"2017-09-13T14:00:28","date_gmt":"2017-09-13T21:00:28","guid":{"rendered":"http:\/\/blogs.microsoft.com\/microsoftsecure\/?p=69828"},"modified":"2023-05-15T22:57:20","modified_gmt":"2023-05-16T05:57:20","slug":"3-key-tenets-to-help-with-security-management","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/09\/13\/3-key-tenets-to-help-with-security-management\/","title":{"rendered":"3 key tenets to help with security management"},"content":{"rendered":"
<\/a><\/p>\n This post is authored by\u00a0Berk Veral, Director, Product Marketing, Enterprise Cybersecurity Group.<\/em><\/p>\n Across industries, as attack methods have become more sophisticated and complex, organizations have been responding by deploying more security solutions, which in turn has tremendously increased the complexity of security management.<\/p>\n Today, organizations must manage distributed resources across many environments, and given the constantly evolving threats, this means there are more attack surfaces that need to be protected.<\/p>\n In some cases, an organization may end up having multiple point solutions even within a single workload to address specific security concerns. However, managing a growing number of individual security controls becomes a true nightmare. You lose visibility into the security state of that workload, let alone the security of the entire organization.<\/p>\n Managing a high number of point solutions and vendors, coupled with the increasing \u2018noise\u2019 caused by diverse datasets with varying levels of fidelity, adds to the complexity of security management. It becomes harder to gain optimal insight into end points and results in even less visibility into the security posture of your entire network.<\/p>\n Often, these point solutions don\u2019t share any information as they are not integrated, which leads to the most dangerous of your challenges: ineffective responses to threats that grow both in number and sophistication.<\/p>\n More solutions to deploy and more vendors to manage, with less insight and ineffective threat response, ultimately manifests\u00a0in higher costs of security for CISOs as well.<\/p>\n In today\u2019s connected, technology-driven world, where digital transformation is the only way to survive for any organization, an efficient security management practice becomes the cornerstone of any long-term strategy of CISOs, regardless of their industry.<\/p>\n Whether your assets are deployed in the cloud, on-premises, or\u00a0across a hybrid environment, your organization\u2019s security has 4 core components for you to manage and secure:<\/p>\n And across these 4 core components, an effective security management solution should provide 3\u00a0key tenets – visibility, control, and guidance<\/strong>:<\/p>\n An effective security management solution is not about a single console. It is about integration where it counts, but with the freedom of specialized tools for different functions.<\/p>\n Microsoft helps you consolidate from a plethora of specialized functions and tools to just a few. Our offerings provide functionality to ensure specialized security teams have the flexibility and freedom to manage the unique needs of specific areas such as identity<\/a>, devices<\/a>, apps<\/a> or infrastructure<\/a>. However, the key that makes Microsoft security management consoles much more effective is the vast intelligence<\/a> that is built into our solutions, which helps your organization maintain a consistent and robust security posture.<\/p>\n Microsoft has a unique perspective as we face the same adversaries our customers do, but because of the scale of technology we build and operate, we capture a massive amount of security related-signal:<\/p>\n We build this intelligence into our products and services – harnessing the power of machine learning, processing trillions of pieces of data, from billions of devices, we enable our customers to detect relevant threats faster and prioritize response. Our security management solutions are built to work for you. This shared intelligence is leveraged by management consoles across identity, devices, apps, data, and infrastructure – helping security admins and operation center teams to get important insights optimized for their workloads.<\/p>\n The key for a CISO\u2019s success in managing security is not about a single console across everything, but consolidation wherever it makes sense. This gives CISOs the best of all capabilities and allows them the flexibility when they need it.<\/strong><\/p>\n With single vendor management, built-in controls that come with Microsoft solutions, and unmatched intelligence, Microsoft becomes your trusted partner in achieving intelligent security management.<\/p>\n","protected":false},"excerpt":{"rendered":" This post is authored by\u00a0Berk Veral, Director, Product Marketing, Enterprise Cybersecurity Group. Across industries, as attack methods have become more sophisticated and complex, organizations have been responding by deploying more security solutions, which in turn has tremendously increased the complexity of security management. Today, organizations must manage distributed resources across many environments, and given the […]<\/p>\n","protected":false},"author":49,"featured_media":70423,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3683],"products":[3690,3691,3692],"threat-intelligence":[],"tags":[3809],"coauthors":[1916],"class_list":["post-69828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-security-management","products-microsoft-defender","products-microsoft-defender-for-cloud","products-microsoft-defender-for-cloud-apps","tag-security-strategies"],"yoast_head":"\nHow can CISOs efficiently manage security?<\/h2>\n
\n
\n
Vendor consolidation & intelligence is key<\/h2>\n
\n