Azure Identity and Security
-
Enhancing VPN performance at Microsoft
[Editor’s note: This content was written to highlight a particular event or moment in time. Although that moment has passed, we’re republishing it here so you can see what our thinking and experience was like at the time.] Modern workers…
-
Moving to next-generation SIEM at Microsoft with Microsoft Sentinel
[Editor’s note: This content was written to highlight a particular event or moment in time. Although that moment has passed, we’re republishing it here so you can see what our thinking and experience was like at the time.] Our internal…
-
Using a Zero Trust strategy to secure Microsoft’s network during remote work
[Editor’s note: This content was written to highlight a particular event or moment in time. Although that moment has passed, we’re republishing it here so you can see what our thinking and experience was like at the time.] Microsoft’s cloud-first…
-
Verifying device health at Microsoft with Zero Trust
Here at Microsoft, we’re using our Zero Trust security model to help us transform the way we verify device health across all devices that access company resources. Zero Trust supplies an integrated security philosophy and end-to-end strategy that informs how…
-
Implementing a Zero Trust security model at Microsoft
At Microsoft, our shift to a Zero Trust security model more than five years ago has helped us navigate many challenges. The increasing prevalence of cloud-based services, mobile computing, internet of things (IoT), and bring your own device (BYOD) in…
-
Transforming Microsoft’s enterprise network with next-generation connectivity
Next-generation connectivity is enabling us to transform our internal enterprise network here at Microsoft. Deploying a more agile, secure, and effective network environment across Microsoft is empowering our employees to thrive in our new hybrid world. This article describes how…
-
Managing user identities and secure access at Microsoft
[Editor’s note: This content was written to highlight a particular event or moment in time. Although that moment has passed, we’re republishing it here so you can see what our thinking and experience was like at the time.] Managing identities…
-
Sharing how Microsoft now secures its network with a Zero Trust model
Editor’s note: We’ve republished this blog with a new companion video. Safeguarding corporate resources is a high priority for any business, but how does Microsoft protect a network perimeter that extends to thousands of global endpoints accessing corporate data and…
-
Microsoft’s digital security team answers your Top 10 questions on Zero Trust
Our internal digital security team at Microsoft spends a fair amount of time talking to enterprise customers who face similar challenges when it comes to managing and securing a globally complex enterprise using a Zero Trust security model. While every…
-
Providing modern data transfer and storage service at Microsoft with Microsoft Azure
Companies all over the world have launched their cloud adoption journey. While some are just starting, others are further along the path and are now researching the best options for moving their largest, most complex workflows to the cloud. It…
-
Using Azure Multi-Factor Authentication at Microsoft to enhance security
To address the increasing security risk of phishing emails and fake web pages that are designed to harvest user names and passwords, Microsoft Digital Employee Experience (MDEE) accelerated the adoption of Microsoft Azure Multi-Factor Authentication for all users at Microsoft.…
-
How Microsoft used SQL Azure and Azure Service Fabric to rebuild a key internal app
When Raja Narayan took over supporting the Payee Management Application that Microsoft Finance uses to onboard new suppliers and partners, the experience was broken. “Our application’s infrastructure was on-premises,” Narayan says. “It was a big, old-school architecture monolith and, although…