{"id":69940,"date":"2017-09-25T06:00:54","date_gmt":"2017-09-25T13:00:54","guid":{"rendered":"http:\/\/blogs.microsoft.com\/microsoftsecure\/?p=69940"},"modified":"2023-05-15T23:10:06","modified_gmt":"2023-05-16T06:10:06","slug":"stepping-up-protection-with-intelligent-security","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/09\/25\/stepping-up-protection-with-intelligent-security\/","title":{"rendered":"Stepping up protection with intelligent security"},"content":{"rendered":"
<\/p>\n
With digital transformation, technology becomes increasingly central to every business and organization. This makes ensuring cybersecurity increasingly important. And, as employees increase their use of mobile devices and cloud-based apps, protecting their work requires a new approach for IT. With 80% of employees admitting to the use of non-approved cloud apps for work, ensuring data protection cannot be left to employees to manage.<\/p>\n
To address these needs, Microsoft continues to take a multi-faceted approach to providing built-in security capabilities. These span areas across:<\/p>\n
The Microsoft security tools continuously improve with insight from the Microsoft Intelligent Security Graph, which serves as the connective tissue across Microsoft security solutions. Today at Ignite<\/a>, we are announcing new integrations, expanded capabilities, and partnerships toward addressing the complex areas of cybersecurity for all organizations.<\/p>\n The vast majority of security breaches continue to trace back to weak or stolen passwords. Because it\u2019s proving to work, attackers are increasing their focus on stealing passwords to access corporate systems. The latest Microsoft Security Intelligence Report<\/a> shows a 300 percent increase in user account attacks. To address this growing issue, it is essential to focus on securing identities and access. Our cloud-based approach is through broadly implemented conditional access.<\/p>\n Conditional access enables you to control who has access to your organization\u2019s resources based on a combination of risk factors, such as user account activity, physical location, and the trustworthiness of the device. Azure Active Directory<\/a> analyzes these factors and applies continuous cybersecurity threat intelligence, powered by Microsoft\u2019s Intelligent Security Graph. This insight provides real-time risk assessment, and triggers the appropriate authentication requirements needed for accessing apps and data. Today, we are expanding conditional access capabilities by integrating with Microsoft Cloud App Security, Azure Information Protection, and our partners in the ecosystem:<\/p>\n Employees are using more SaaS apps, creating more data, and working across multiple devices. While this has enabled people to do more, it has also increased the risk of data loss \u2013 it is estimated that 58% of workers have accidentally shared sensitive data with the wrong person.<\/p>\n Microsoft\u2019s Information Protection solutions help you detect, classify, protect and monitor your data \u2013 regardless of where it is stored or shared. Today, we\u2019re announcing several new investments in the integration across our information protection solutions \u2013 helping provide more comprehensive protection across the data lifecycle.<\/p>\n A key part of this vision is to provide a more consistent and integrated classification, labeling and protection approach across our information protection technologies, enabling persistent protection of your data \u2013 everywhere. Microsoft Cloud App Security natively integrates with Azure Information Protection to classify and label files that reside in cloud applications.<\/p>\n Finally, we are announcing the general availability of improvements to Office 365 message encryption<\/a>, which makes it easier to share protected emails with anybody \u2013 inside or outside of your organization. Recipients can view protected Office 365 emails on a variety of devices, using common email clients or even consumer email services such as Gmail and Outlook.com.<\/p>\n Regulated organizations have additional needs to demonstrate compliance, and we\u2019re investing in tools to help achieve those goals.<\/p>\n Customer Key can help regulated customers meet their security compliance obligations by providing added control and management of encryption keys. To learn more, check out this video example<\/a> of how Customer Key works in SharePoint Online.<\/p>\n Beyond just security compliance, achieving organizational compliance is a complex challenge. It\u2019s hard to stay up-to-date with all the regulations that matter to your organization, and to define and implement controls with limited in-house capability. We\u2019re pleased to introduce the upcoming preview of Compliance Manager, which enables you to manage your compliance posture from one place and stay up-to-date on evolving data protection regulations. Compliance Manager enables real-time risk assessment with one intelligent score reflecting your compliance posture against data protection regulations when using Microsoft cloud services. It also provides recommended actions and step-by-step guidance to help you improve your compliance posture.<\/p>\n On average breaches exist for over 90 days in a customer\u2019s environment before they are detected. In response, many organizations are moving to an assume breach posture. We continue to invest in tools that help detect attacks sooner and then remediate. But, we know it\u2019s also important to continue investing in pre-breach attack prevention tools.<\/p>\n Today, we are announcing several new capabilities to further improve our anti-phishing capabilities in Office 365 Advanced Threat Protection<\/a>, with a focus on mitigating content phishing, domain spoofing, and impersonation campaigns. Office 365 Advanced Threat Protection is also expanded to help secure SharePoint Online, OneDrive for business, and Teams. In Office 365 Threat Intelligence, we have introduced threat insights and tracking to help with detection and remediation. In Windows, we are adding Windows Defender Application Control, which is powered by the Microsoft Intelligent Security Graph to make it less likely that malicious code can run on the endpoint.<\/p>\n On the post-breach detection side, we are announcing the limited preview of a brand-new service \u2013 Azure Advanced Threat Protection for users \u2013 that brings our on-premises identity threat detection capabilities to the cloud and integrates them with the Microsoft Intelligent Security Graph. Powered by the graph, our Advanced Threat Protection products have a unified view of security event data so your security operations analysts can investigate an incident from endpoint to end-user to e-mail. Finally, as previously announced earlier in the month, Windows Defender Advanced Threat Protection<\/a> is integrating Hexadite’s AI technology to automatically investigate new alerts, determine the complexity of a threat, and take the necessary actions to remediate it.<\/p>\n Protecting resources across distributed infrastructure against evolving cyberthreats demands a new approach to security management \u2013 a solution that provides comprehensive visibility, consistent controls and actionable intelligence and guidance.<\/p>\n We are announcing<\/a> today that Azure Security Center<\/a>, which helps customers protect workloads running in Azure against cybersecurity threats, can now also be used to secure workloads running on-premises and in other private and public clouds. Azure Security Center reduces management complexity by delivering visibility and control over workloads across clouds, enables adaptive threat prevention to reduce your exposure to threats, and provides intelligent detection to help you keep pace with rapidly evolving cyberattacks.<\/p>\n Azure Security Center also has new capabilities to enable central management of security policies, better detect and defend against advanced threats, and streamline investigation of threats for your hybrid workloads. Read the Azure blog<\/a> to learn more about these and other new features.<\/p>\n We have made it easier than ever to get end-to-end security solutions up and running. FastTrack for Microsoft 365 now provides deployment services for key security scenarios, giving you the resources, tools, and support you need from Microsoft engineers.<\/p>\n FastTrack for Microsoft 365 can work with you directly, work with your existing partner, or help you get matched with a trusted Microsoft partner to deploy comprehensive security solutions. And the best part is this isn\u2019t a one-time benefit. It is a repeatable resource that you can use to ensure you have the help and resources you need.<\/p>\nProtect at the front door<\/h2>\n
\n
Protect your data anywhere<\/h2>\n
Achieve your data security compliance objectives<\/h2>\n
Detect and recover from attacks<\/h2>\n
Security management<\/h2>\n
Getting started<\/h2>\n