imageKeep pace with rapidly evolving customer expectations by adopting a strong data culture. In this e-book, you’ll learn how to empower your organization with a fully developed data culture that adds value at every level by allowing:

  • Every individual to securely access what they need, when and where they need it, seamlessly on their preferred device.
  • Every team to easily collaborate across data sets and discovers impactful insights that free information from isolation.
  • Every organization to stay protected with a security infrastructure to support anytime, anywhere access.

Get the eBook here:

imageIn the commissioned study The Total Economic ImpactTM of Zero Trust solutions from Microsoft, Forrester Consulting reports that adoption of Microsoft solutions to implement a Zero Trust security strategy delivers:

  • A three-year 92 percent return on investment (ROI) with a payback period of fewer than six months. 
  • A 50 percent lower chance of a data breach.
  • Numerous efficiency gains of 50 percent or higher across security processes.

Learn more:

  • Read our Zero Trust position paper for key insights, an example of a comprehensive security architecture, and a maturity model to help accelerate your adoption.

To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity for the latest news and updates on cybersecurity.

imageThe Microsoft Learning Campus for Unified Support customers provides live presentations from Unified Support Customer Engineers.

If you are a named contact for your organization’s Unified Support contract, log into https://mslearningcampus.com/pages/ms-learningcampus and you’ll be able to register for upcoming Webcasts & Tech Talks, only available to Unified Support customers.

Here’s a few coming up soon:

Microsoft Tech Talks – Azure Well-Architected Framework series:

Are you using your seMTT Cropped - sticker-jpgcurity tooling effectively?

The old mentality of deploying security tooling and hoping that its default configuration provides enough protection is not only dangerous but misses on the benefits of next-generation tooling.

In today’s world of fast-evolving security threats, knowing how to optimize security tooling is a critical skill that most security teams must learn and implement to stay one step ahead of the wave of ever-changing attacks.

Join Samuel Soto, Chitresh Pandit, and Suprapat Dechanansub, experienced security consultants from the Microsoft Compromise Recovery Security Practice, as they discuss the ins and out of fine-tuning Microsoft Defender for Endpoint to protect your high-value assets.

Posted by: kurtsh | February 26, 2022

NEWS: Microsoft Security Insider

imageToday, we are announcing Microsoft Security Insider: one destination where you can find Microsoft’s unique perspective on trending issues across the threat landscape.

This site will host research, insights, and intelligence produced by our team in order to keep you informed on the latest security topics.

  • Threat Watch
  • Behind the scenes
  • Perspectives
    • CISO Insider
    • IoT Signals Report
    • Microsoft Digital Defense Report
  • Security Podcasts:
    • Developing Influential Security Leaders
    • Inside Microsoft’s Security Response Center
  • Microsoft Security Blogs

Explore the new Security Insider site today!

Posted by: kurtsh | February 26, 2022

DOWNLOAD: Security baseline for Microsoft Edge v98

We are pleased to announce the enterprise-ready release of the security baseline for Microsoft Edge version 98!

We have reviewed the settings in Microsoft Edge version 98 and updated our guidance with the addition of one setting. We’re also highlighting another new setting we would like you to consider testing, and one new setting you should consider based on your support needs. A new Microsoft Edge security baseline package was just released to the Download Center. You can download the version 98 package from the Security Compliance Toolkit.

Microsoft Edge version 98 introduced 10 new computer settings and 10 new user settings. We have included a spreadsheet listing the new settings in the release to make it easier for you to find them.

As a friendly reminder, all available settings for Microsoft Edge are documented here, and all available settings for Microsoft Edge Update are documented here.

Please continue to give us feedback through the Security Baseline Community.

Read the full announcement here:

Implementing a Zero Trust security strategy is a significant undertaking that requires in-depth planning, cross-company collaboration, and resources. Organizations need solutions that simplify and accelerate the adoption of Zero Trust by offering flexibility, integration, and a meaningful return on investment.

imageIn the commissioned study The Total Economic ImpactTM of Zero Trust solutions from Microsoft, Forrester Consulting reports that adoption of Microsoft solutions to implement a Zero Trust security strategy delivers:

  • A three-year 92 percent return on investment (ROI) with a payback period of fewer than six months. 
  • A 50 percent lower chance of a data breach.
  • Numerous efficiency gains of 50 percent or higher across security processes.

Read the announcement & download the full report here:

Posted by: kurtsh | February 16, 2022

INFO: Harden your Azure AD Connect Server

imageWe recommend that you harden your Azure AD Connect server to decrease the security attack surface for this critical component of your IT environment.

Following these recommendations will help to mitigate some security risks to your organization.

Posted by: kurtsh | February 16, 2022

DOWNLOAD: Power BI Adoption Roadmap

PowerBIAdoptionRoadmapLooking for a comprehensive guide on how to address all considerations of adoption of Power BI in your organization?

The goal of this series of articles is to provide a roadmap. The roadmap presents a series of strategic and tactical considerations and action items that directly lead to successful Power BI adoption, and help build a data culture in your organization.

Advancing adoption and cultivating a data culture is about more than implementing technology features. Technology can assist an organization in making the greatest impact, but a healthy data culture involves a lot of considerations across the spectrum of people, processes, and technology.

Use the Power BI Implementation Planning guide online to compliment the Power BI adoption roadmpa.

Read the roadmap here:

Posted by: kurtsh | February 15, 2022

EVENT: North America HoloLens Industry Summit

imageCalling all Mixed Reality folks and HoloLens power users! In fact, join us even if you’re just interested in dipping your toes into the world of mixed reality.

Register for the upcoming Microsoft HoloLens Industry Summit 2.0 on Jan 26 starting at 8am PT.

Coming Microsoft HoloLens Industry Forums:

  • Manufacturing – March 30, 2022
  • Education – April 20, 2022
  • Healthcare – June 7, 2022

« Newer Posts - Older Posts »

Categories