Microsoft’s 4 principles for an effective security operations center
Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.
Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.
In the next post of our series, we provide tips on choosing technology to help a security operations center (SOC) be more responsive, effective, and collaborative.
Our goal has remained the same since we first launched Microsoft Azure Sentinel in February: empower security operations teams to help enhance the security posture of our customers. Today, we take the next step in that journey by making Azure Sentinel generally available.
Learn about the latest enhancements to Microsoft Threat Protection, the premier solution for securing the modern workplace across identities, endpoints, user data, apps, and infrastructure.
Learn about new Microsoft Threat Protection capabilities now in public preview.
Read why Ovum believes Microsoft 365 and Azure can protect enterprises who use multiple cloud providers.
Learn about the Microsoft APIs, services, and communities you can develop to build connected security products and services.
Learn how compound detection can help you apply the law of data gravity and correlate insights across your security platforms.
Learn how Microsoft’s latest security product releases and solutions showcased at RSA are helping security professionals do more, better.
We recommend a layered approach for device control security, which incorporates multiple avenues of protection, including each of the above.
Several weeks ago, the Windows Defender Advanced Threat Protection (Windows Defender ATP) team uncovered a new cyberattack that targeted several high-profile organizations in the energy and food and beverage sectors in Asia.
In this post we address the question: “How do we make data gravity a reality in the security operations center (SOC) while we are under increased and constant pressure from motivated threat actors?