{"id":96543,"date":"2021-09-09T10:00:55","date_gmt":"2021-09-09T17:00:55","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=96543"},"modified":"2023-05-15T22:59:51","modified_gmt":"2023-05-16T05:59:51","slug":"combat-attacks-with-security-solutions-from-trustwave-and-microsoft","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/09\/combat-attacks-with-security-solutions-from-trustwave-and-microsoft\/","title":{"rendered":"Combat attacks with security solutions from Trustwave and Microsoft"},"content":{"rendered":"
This blog post is part of the Microsoft Intelligent\u00a0Security Association\u00a0guest blog series<\/a>.\u00a0Learn more about MISA<\/a>.<\/em><\/p>\n In 2021, cyberattacks and instances of ransomware demands against companies, agencies, and institutions have dominated the headlines. These kinds of attacks are on the rise and often have long-reaching impacts that can spill over across supply chains. In just the first half of the year, there have been several high-profile cyberattacks in the United States including Colonial Pipeline1<\/sup>, JBS (the world\u2019s largest meat supplier)2<\/sup>, the Washington, D.C. Police Department3<\/sup>, and the MTA of New York City4<\/sup>, to name a few.<\/p>\n The SolarWinds cybersecurity breach5<\/sup> opened US government networks and private companies\u2019 security systems around the world to threat actors in late 2020. This breach allowed access to confidential government data and intel before being discovered. The innovative bad actors attached their malware to a software update from SolarWinds\u2019 Orion software in March through June of 2019, which led to tens of thousands of customers\u2019 security being compromised. SolarWinds serves as an unfortunate example of how organizations around the world operate under the perpetual threat of becoming a target of a cyberattack or the victim of a cybercrime, even from a trusted partner.<\/p>\n Some believe the escalation in attacks and data breaches in the past year likely originated with new remote working environments, which exponentially increased the number of endpoints that required protection putting strain on already over-extended IT resources6<\/sup>.<\/p>\n To identify, contain, and eradicate these relentless threats properly, security operations must include effective platforms, processes, and people. With attacks on the rise and bad actors only becoming more sophisticated, security that meets the minimum is no longer effective, and organizations need to consider a more proactive approach. Microsoft Defender for Endpoint<\/a> is a holistic, cloud-delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavior-based next-generation protection, rich APIs, and unified security management.<\/p>\n Microsoft security solutions have native capability designed to work cohesively to provide integrated threat detection and response capabilities, but technology alone is not enough. The benefits derived from leveraging best-in-breed tools can mean the difference in capturing a threat or letting it linger, unnoticed in your environment indefinitely. Partnering with a Managed Detection and Response (MDR) team\/Managed Security Services Provider (MSSP) who is a trusted Microsoft technology partner can help you operationalize these transformations and derive the most value from your existing technology investments.<\/p>\n Trustwave removes the complexity<\/a> and burden of threat detection and response with an entire portfolio of cybersecurity solutions that work with existing Microsoft investments to fight cybercrime, protect data, and reduce risk. Knowing what to look for in your security partners is crucial, especially among the noise of an industry saturated with providers claiming to be the \u201cbest.\u201d Search for partners that can offer:<\/p>\n With organizations facing overwhelmed security teams and resource limitations, finding the time and staff to properly protect their environments\u2014on-premises, in the cloud, or a hybrid of both\u2014is a constant challenge. Implementing proactive endpoint detection and response (EDR) and MDR solutions can relieve your teams, prevent breaches, and appease your stakeholders. For real examples of how effective the EDR plus MDR combination can be when aligned to create a layered security posture, view Trustwave’s case study on the GoldenSpy malware<\/a> or view their industry accolades<\/a> showcasing the industry expertise their teams have worked to earn for the safety of organizations like yours.<\/p>\n To learn more about the Microsoft Intelligent Security Association (MISA),\u00a0visit our website<\/a>\u00a0where you can learn about the MISA program, product integrations, and find MISA members. Visit the\u00a0video playlist<\/a>\u00a0to learn about the strength of member\u00a0integrations\u00a0with Microsoft products.<\/p>\n To learn more about Microsoft Security solutions,\u00a0visit our\u00a0website<\/a>.\u00a0Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n 1<\/sup>Colonial Pipeline Attack Spotlights the Importance of Ransomware Preparedness<\/a>, Trustwave, 11 May 2021.<\/p>\n 2<\/sup>JBS: Cyber-attack hits world’s largest meat supplier<\/a>, BBC News, 02 June 2021.<\/p>\n 3<\/sup>D.C. Police Department Data Is Leaked in a Cyberattack<\/a>, The New York Times, 27 April 2021.<\/p>\n 4<\/sup>MTA breached by hackers with reported ties to China<\/a>, Kevin Duggan, MSN, 03 June 2021.<\/p>\nTake a proactive approach to your security<\/h2>\n
\n
Learn more<\/h2>\n
\n