The evolution of Microsoft Threat Protection, RSA edition part 1
Learn about the top feature updates for Microsoft Threat Protection announced at the RSA conference in San Francisco.
Learn about the top feature updates for Microsoft Threat Protection announced at the RSA conference in San Francisco.
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 6. Manage mobile apps,” you’ll learn how to complete your Unified Endpoint Management (UEM) strategy using Intune Mobile Application Management (MAM).
Learn how Microsoft’s latest security product releases and solutions showcased at RSA are helping security professionals do more, better.
Learn about the latest enhancements to Microsoft Threat Protection, the premier solution for securing the modern workplace across identities, endpoints, user data, apps, and infrastructure.
“Not another portal, not another password!” —Learn how lululemon implemented Azure AD for cloud Identity and Access Management, simplifying user access without reducing business flexibility.
Microsoft Defender ATP, Microsoft’s endpoint protection platform, addresses this challenge by integrating with Azure Information Protection, Microsoft’s data classification, labeling, and protection solution.
Learn about the top feature updates for Microsoft Threat Protection in January.
Microsoft jumped to the Challenger position in the Gartner’s 2018 Magic Quadrant for CASB and solidified its Leadership position in KuppingerCole’s 2018 Leadership Compass in the same product category.
The Center for Internet Security’s (CIS) Microsoft 365 Foundations Benchmark provides prescriptive guidance for establishing a secure baseline configuration for Microsoft 365.
Recent research on email journaling—an often used testing methodology—shows it can lead to misinterpreted results.