{"id":92885,"date":"2021-03-02T06:00:18","date_gmt":"2021-03-02T14:00:18","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=92885"},"modified":"2023-08-10T14:07:44","modified_gmt":"2023-08-10T21:07:44","slug":"4-ways-microsoft-is-delivering-security-for-all-in-a-zero-trust-world","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/03\/02\/4-ways-microsoft-is-delivering-security-for-all-in-a-zero-trust-world\/","title":{"rendered":"4 ways Microsoft is delivering security for all in a Zero Trust world"},"content":{"rendered":"
If there\u2019s one thing the dawning of 2021 has shown, it\u2019s that security isn\u2019t getting any easier. Recent high-profile breach activity has underscored the growing sophistication of today\u2019s threat actors and the complexity of managing business risk in an increasingly connected world. It\u2019s a struggle for organizations of every size and for the public and private sector alike. As we move into this next phase of digital transformation, with technology increasingly woven into our most basic human activities, the questions that we as security defenders must ask ourselves are these: How do we help people to have confidence in the security of their devices, their data, and their actions online? How do we protect people, so they have peace of mind and are empowered to innovate and grow their future? How do we foster trust in a Zero Trust<\/a> world?<\/p>\n As defenders ourselves, we are passionate proponents of a Zero Trust mindset, encompassing all types of threats\u2014both outside in and inside out. We believe the right approach is to address security, compliance, identity, and device management as an interdependent whole and to extend protection to all data, devices, identities, platforms, and clouds\u2014whether those things are from Microsoft or not.<\/p>\n You may have heard us talk about our commitment to security for all, and that\u2019s at the heart of it. We are deeply inspired to empower people everywhere to do the important work of defending their communities and their organizations in an ever-evolving threat landscape.<\/p>\n With that approach in mind, today I\u2019m excited to share several additional innovations across four key areas with you\u2014identity, security, compliance, and skilling\u2014to give you the holistic security protection you need to meet today\u2019s most challenging security demands.<\/p>\n Adopting a Zero Trust strategy is a journey. Every single step you take will make you more secure. In today\u2019s world, with disappearing corporate network perimeters, identity is your first line of defense. While your Zero Trust journey will be unique, if you are wondering where to start, our recommendation is to start with a strong cloud identity foundation. The most fundamental steps like strong authentication, protecting user credentials, and protecting devices are the most essential.<\/p>\n Today we are announcing new ways that Azure Active Directory<\/a> (Azure AD), the cloud identity solution of choice for more than 425 million users, can help you on your Zero Trust journey:<\/p>\n Learn more about our Azure AD announcements in today\u2019s blog post by Joy Chik<\/a>.<\/p>\n In today\u2019s landscape, your security approach should start with the key Zero Trust principle of assume breach. But too often, complexity and fragmentation stand in the way. It is our commitment to helping you solve this, as we build security for all, delivered from the cloud.<\/p>\n This begins with integrated solutions that let you focus on what matters and deliver visibility across all your platforms and all your clouds. Some vendors deliver endpoint or email protection, while others deliver Security Information and Event Management (SIEM) tools, and integrating those pieces together can be a time-consuming challenge. Microsoft takes a holistic approach that combines best-of-breed SIEM and extended detection and response (XDR) tools built from the ground up in the cloud to improve your posture, protection, and response. This gives you the best-of-breed combined with the best-of-integration so you don\u2019t have to compromise.<\/p>\n Today we are making the following announcements to simplify the experience for defenders with modern and integrated capabilities:<\/p>\n Learn more about our threat protection announcements in today\u2019s blog post by Rob Lefferts and Eric Doerr<\/a>. Learn more about our Secured-core announcements in today\u2019s blog post by David Weston<\/a>. You can also learn more about new security features in Microsoft Teams in today\u2019s blog post by Jared Spataro<\/a>.<\/p>\n Today\u2019s announcements continue, and strengthen, our commitment to deliver best-of-breed protection, detection, and response for all clouds and all platforms with solutions like Defender for Endpoint\u2014a leader in the Gartner Magic Quadrant, available for Android, iOS, macOS, Linux, and Windows; and Azure Sentinel\u2014which looks across your multi-cloud environments, including AWS, Google Cloud Platform, Salesforce service cloud, VMware, and Cisco Umbrella.<\/p>\n At Microsoft, we think of Zero Trust as not only the practice of protecting against outside-in<\/em> threats, but also protecting from the inside out<\/em>. For us, addressing the area of compliance includes managing risks related to data.<\/p>\n And that isn\u2019t just the data stored in the Microsoft cloud, but across the breadth of clouds and platforms you use. We\u2019ve invested in creating that inside-out protection by extending our capabilities to third parties to help you reduce risk across your entire digital estate.<\/p>\n Today we are announcing these new innovations in compliance:<\/p>\n Learn more about our compliance announcements in today\u2019s blog post by Alym Rayani<\/a>.<\/p>\n We know that many of you continue to struggle to fill the security skills gap with an estimated shortfall of 3.5 million security professionals by 2021. That\u2019s why we strive to ensure you have the skilling and learning resources you need to keep up in our world of complex cybersecurity attacks. We are excited to announce two different ways Microsoft is supporting skilling cybersecurity professionals.<\/p>\n First, Microsoft has four new security, compliance, and identity certifications tailored to your roles and needs, regardless of where you are in your skilling journey. To learn more about these new certifications, please visit our resource page for Microsoft Certifications<\/a>.<\/p>\n We also recognize that the world we live in is complex but growing your skills shouldn\u2019t be. The Microsoft Security Technical Content Library<\/a> will help you find content relevant to your needs. Use it to access content based on your own needs today.<\/p>\n You can also learn more on today\u2019s Tech Community blog post<\/a>.<\/p>\n We at Microsoft Security are committed to helping build a safer world for all. Every day, we are inspired by the work of our defenders and we are focused on delivering innovations, expertise, and resources that tip the scale in favor of defenders everywhere because the work you do matters. Security is a team sport, and we\u2019re all in this together.<\/p>\n To learn more about Microsoft Security solutions, visit our website<\/a>.\u00a0Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" Today we\u2019re excited to share with you several new innovations across four key areas\u2014identity, security, compliance, and skilling\u2014to give you the holistic security protection you need to meet today\u2019s most challenging security demands. <\/p>\n","protected":false},"author":96,"featured_media":92938,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3683,3689],"products":[3690,3695,3702,3703],"threat-intelligence":[],"tags":[3813],"coauthors":[2400],"class_list":["post-92885","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-security-management","topic-zero-trust","products-microsoft-defender","products-microsoft-defender-for-office-365","products-microsoft-entra","products-microsoft-entra-id","tag-solorigate"],"yoast_head":"\n1. Identity: The starting point of a Zero Trust approach<\/h2>\n
\n
2. Security: Simplifying the \u201cassume breach\u201d toolset<\/h2>\n
\n
3. Compliance: Protection from the inside out<\/h2>\n
\n
4. Skilling: Power your future through security skilling<\/h2>\n
\n
Security for all<\/h2>\n