Skip to content

Enterprise Mobility + Security

Introducing Azure Advanced Threat Protection

The nature and requirements of security have changed as the frequency and severity of cyber attacks have grown dramatically. With the increase in sophistication and velocity of these attacks, current IT security tools provide limited protection when user credentials, either on-premises or in the cloud, are compromised. And when there is an incident, responding to...

Read more


On-demand webinar: Identity-driven unified endpoint management with EMS

This post is authored by Vladimir Petrosyan, Sr. Product Marketing Manager. Microsoft Enterprise Mobility + Security (EMS) provides an identity-driven unified endpoint management (UEM) solution that offers a holistic approach to solve mobility and security challenges as organizations go through their digital transformation. Watch this free webinar to see how EMS can help you manage...

Read more


EMS and Pradeo integration ensures risk free devices access company resources

This post is authored by Mayunk Jain, Senior Product Marketing Manager, Microsoft 365 Security.  Microsoft and Pradeo are delighted to announce the integration between Microsoft Enterprise Mobility + Security (EMS), available as part of the Microsoft 365 modern workplace, and Pradeo Security solution. Pradeo mobile security expertise provides organizations with an advanced, automated and adaptive management...

Read more


Protect multiple cloud app instances using Microsoft Cloud App Security

This post is authored by Arbel Zinger, Program Managers, Microsoft Cloud App Security. Several organizations use multi instances of the same cloud applications for different business reasons. As a security professional, you need to have visibility into each of these instances and have the option to control each one. We’re happy to announce that Microsoft...

Read more


Cloud App Security Threat Protection just got better

As we have conversations with Security Operations (SecOps) teams, we’re seeing a notable shift in the approach to threat detection and protection: moving from a technology-driven, product-focused approach to a use-case driven approach. These teams define their pain points carefully and invest in solutions that address these key needs. As we all know, the more...

Read more


6 steps to building a holistic security strategy

Today’s business and IT leaders have quite a balancing act on their hands when it comes to security. Between managing a wide universe of devices and applications, the need for innovation and agility, and an ever-evolving landscape of threats, companies need a holistic approach to security. You need a multi-faceted security approach that helps protect...

Read more


Microsoft 365: A complete, secure solution that brings together Office 365 and EMS

In this era of digital transformation, companies are reimagining how technology can help their people collaborate, communicate, and innovate more effectively. Through specific solutions, using IT resources differently, and optimizing processes, companies can achieve the essential flexibility and efficiency to transform the way they work and create more value for their customers. However, successful digital...

Read more


Microsoft Cloud App Security integrates with third party Data Loss Prevention solutions

This post is authored by Arbel Zinger and Alon Yardeni, Program Managers, Microsoft Cloud App Security. Today we would like to explain how Microsoft Cloud App Security integrates with third party Data Loss Prevention (DLP) solutions – Symantec Data Loss Prevention and Forcepoint DLP. This extends your current DLP engine’s ability to manage sensitive data...

Read more

EMS_lifestyle 7

Automatically apply labels to sensitive files in cloud apps

At Microsoft Ignite 2017, we shared the upcoming new integration between Azure Information Protection and Microsoft Cloud App Security for providing enhanced data protection in the cloud apps and we received very positive feedback from our customers and partners regarding this key capability. Today, we are excited to announce this new feature is now in...

Read more

Detecting remote code execution with Microsoft Advanced Threat Analytics

We know that attackers can often use legitimate tools to take malicious actions. Recent incidents have been perpetrated using a known technique called Remote Code Execution (RCE) to spread malware inside a target network. This technique can be executed using legitimate tools such as WMIC and/or PSExec. Attackers prefer to use RCE instead of Remote...

Read more