Skip to content

Microsoft Secure

Data classification and protection now available for structured data in SQL

Data classification and protection now available for structured data in SQL

This post is authored by Gilad Mittelman, Senior Program Manager, SQL Data Security.  Data privacy and data security have become one of the most prominent topics in organizations in almost every industry across the globe. New regulations that formalize requirements are emerging around these topics and compel organizations to comply. The upcoming EU Global Data...

Read more

Microsoft Graph Security API proof of concept integration using PowerBI

Partnerships power the future of better security

This post is authored by Jeremy Dallman, Principal Program Manager.   Our goal in building the Microsoft Graph Security API is to enable customers to share insights and take action across security solutions to improve protection and speed response. By creating a connected security ecosystem, Microsoft and partners can enable developers to simplify integration and...

Read more

Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past

Have you always wished you could have mobile application management (MAM) on Windows? Now you can! Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection for work files and data to prevent accidental data leakage. With 600 million active Windows 10 devices, corporate customers...

Read more

Securing the modern workplace with Microsoft 365 threat protection – part 2

This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security.  Protecting the modern workplace against Ransomware Last week, we shared the roots of Microsoft 365 threat protection. This week, we want to share how Microsoft 365 threat protection services work together to help organizations protect themselves. Figure 1 is a graphical...

Read more

EMS_business scenario planning 1

First things first: Envisioning your security deployment

This blog post is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 Security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog Accelerate your security deployment with FastTrack for Microsoft 365....

Read more

Tapping the intelligent cloud to make security better and easier

There has been a distinct shift in my conversations with customers over the last year. Most have gone from asking ‘can we still keep our assets secure as we adopt cloud services?,’ to declaring, ‘we are adopting cloud services in order to improve our security posture.’ The driving factor is generally a realization that a...

Read more

EMS_business scenario planning 1

Accelerate your security deployment with FastTrack for Microsoft 365

This blog is part of a series that responds to common questions we receive from customers about Microsoft 365 Security and Enterprise Mobility + Security. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. In part one of this series, we outlined Tips for getting started on your...

Read more

How Office 365 protects your organization from modern phishing campaigns

This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security.  We often allude to the benefits of having an integrated threat protection stack in Office 365. Today we wanted to take the opportunity to walk you through how the combined features and services in the Office 365 threat management stack help...

Read more

EMS_business scenario planning 1

Tips for getting started on your security deployment

This blog is part of a series that responds to common questions we receive from customers about how to most effectively deploy Microsoft 365 Security.  In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. This past year, we’ve been listening to our customers’ questions about how to...

Read more

Fast moving car trail in city at night

How public-private partnerships can combat cyber adversaries

For several years now, policymakers and practitioners from governments, CERTs, and the security industry have been speaking about the importance of public-private partnerships as an essential part of combating cyber threats. It is impossible to attend a security conference without a keynote presenter talking about it. In fact, these conferences increasingly include sessions or entire...

Read more