{"id":597628,"date":"2021-12-09T11:52:30","date_gmt":"2021-12-09T10:52:30","guid":{"rendered":"https:\/\/pulse.microsoft.com\/?p=597628"},"modified":"2021-12-09T11:52:32","modified_gmt":"2021-12-09T10:52:32","slug":"fa1-unlock-the-tech-secure-your-business-from-anywhere","status":"publish","type":"post","link":"https:\/\/pulse.microsoft.com\/en-ie\/transform-en-ie\/na\/fa1-unlock-the-tech-secure-your-business-from-anywhere\/","title":{"rendered":"Unlock The Tech: Secure Your Business From Anywhere"},"content":{"rendered":"<p>Today I&#8217;m going to breakdown the second track in the Unlock The Tech series,\u00a0<a href=\"http:\/\/xn--unlock%20the%20tech%20smb%20series%20%20secure%20your%20business%20from%20anywhere-ly16c:%20Main%20Page%20%E2%80%93%20Ireland%20Cloud%20Champion\/\" target=\"_blank\" rel=\"nofollow noopener\">Secure Your Business From Anywhere<\/a>\u00a0and try to pick out all the\u00a0<strong>MUST KNOWS!<\/strong>\u00a0from each session. So let&#8217;s get into everything Microsoft Security..<\/p>\n<h3>Day 1: Identity and Access<\/h3>\n<p><u>Did you know in the past year we&#8217;ve seen a 300% increase in identity attacks<\/u>? making Cloud Endpoint Technical Specialist, Damien Sweeney&#8217;s session\u00a0<strong>SO!\u00a0<\/strong>relevant right now.<\/p>\n<p><a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/#overview\" target=\"_blank\" rel=\"nofollow noopener\">Azure Active Directory<\/a>\u00a0is the hero product in this session &#8211;<strong>\u00a0a universal identity platform that helps you manage and secure all of your apps and users<\/strong>. Azure AD operates at a truly global scale, currently there are over\u00a0<strong>300K<\/strong>\u00a0organizations using Azure AD with over\u00a0<strong>425M<\/strong>\u00a0monthly active users and 30B+ daily authentication requests!!<\/p>\n<p><strong>So why are so many people putting their trust into Azure Active Directory?<\/strong><\/p>\n<ul>\n<li><u>Secure Adaptive Access<\/u><strong>\u00a0<\/strong>to resources and data using strong identification and risk based adaptive access.<\/li>\n<li><u>Seamless User Experiences<\/u>\u00a0providing an simple and quick sign in experience to increase user productivity<\/li>\n<li><u>Unified Identity Management<\/u>, manage all your identities and access to all your applications in a central location whether they are on cloud or on premise, this improves visibility and control.<\/li>\n<li><u>Simply Access Governance<\/u>, control access to apps and data for all users and admin effectively. As well as automated identity governance to ensure only authorized users have access.<\/li>\n<\/ul>\n<p>Find out more here:\u00a0<a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/#overview\" target=\"_blank\" rel=\"nofollow noopener\">Azure Active Directory | Microsoft Azure<\/a><\/p>\n<h3>Day 2: Information Protection<\/h3>\n<p>On Day 2, Darryn O&#8217;brien Security, Compliance &amp; Identity Specialist informs us that:<\/p>\n<ul>\n<li><strong>&gt;80%<\/strong>\u00a0of\u00a0<u>corporate data is not classified, protected or governed<\/u><\/li>\n<li><strong>88%<\/strong>\u00a0of organizations\u00a0<u>no longer have confidence to detect and prevent loss of sensitive data<\/u><\/li>\n<\/ul>\n<p><strong>I think we can all agree that these figures are unsettling!<\/strong>\u00a0In Microsoft our north star for our Information Protection and Governance solution is built around being able to provide you with a rich set of capabilities to:<\/p>\n<ol>\n<li><strong>Know\u00a0<\/strong>your data (Multiple classification methods)- think\u00a0<strong>Built In, Flexible, Organised:\u00a0<\/strong>Microsoft provide you with\u00a0<u>100+ data classification methods<\/u>\u00a0that you can use straight out of the box to get started. The solution also enables the of<u>\u00a0use regex, keywords, and exact data matches for data identification<\/u>. Further, there are a variety\u00a0<u>sensitive types available that are mapped to different industry regulations<\/u>. Think of this as the first step,<\/li>\n<\/ol>\n<ul>\n<li>The second is\u00a0<strong>Trainable Classifiers\u00a0<\/strong>(leveraging machine learning to automatically classify unique data) &#8211; think\u00a0<strong>Built-in, Build-Your-Own, Integrated:<\/strong><\/li>\n<\/ul>\n<ol>\n<li><strong>Protect\u00a0<\/strong>your data (Customize protection policies based on data sensitivity)<\/li>\n<li><strong>Prevent\u00a0<\/strong>data loss<\/li>\n<li><strong>&amp; Govern<\/strong>\u00a0your data<\/li>\n<\/ol>\n<p><u>across your devices, on-premises, and multi-cloud data locations from Microsoft and third parties.<\/u><\/p>\n<h3>Day 3: Threat Management<\/h3>\n<p>My\u00a0<u>key takeaway<\/u>\u00a0for Security Specialist, Vanessa Carcedo&#8217;s sessions is:\u00a0<strong>Not everything behind the corporate firewall is safe!<\/strong><\/p>\n<p><u>We no longer except to access corporate resources solely from the office or on company owned devices<\/u>. Organisations now find themselves responsible for protecting a criss-crossing web of technology&#8217;s, many of which they do not own or manage. As these company&#8217;s digital footprints increase\u00a0<em>(so many different devices, user groups and SO much corporate data!)\u00a0<\/em>it is becoming abundantly clear that\u00a0<strong>traditional perimeter based security models can&#8217;t keep up with the sophistication of today&#8217;s threats<\/strong>, neither can they provide the stability and controls they need to secure today&#8217;s highly distributed and hyper-mobile environments.<\/p>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-right\"><img decoding=\"async\" class=\"lazy-loaded\" src=\"https:\/\/media-exp1.licdn.com\/dms\/image\/C4E12AQEjex8Z-OJ9LA\/article-inline_image-shrink_1000_1488\/0\/1637776141237?e=1644451200&amp;v=beta&amp;t=fIH57Et5B8cifjAuaMgUIKc2Wi4rw-mCHLqTCSHC7eE\" alt=\"No alt text provided for this image\" data-media-urn=\"\" \/><\/div>\n<p>Which brought Vanessa onto\u00a0<a href=\"https:\/\/www.microsoft.com\/en-ie\/security\/business\/threat-protection\/microsoft-365-defender\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft Defender<\/a>\u00a0, this helps defend against today&#8217;s increasingly complex and sophisticated attacks, empowering organizations&#8217; defenders by\u00a0<u>putting the right tools and intelligence in the hands of the right people<\/u>.<\/p>\n<p><strong>So how does it work?<\/strong><\/p>\n<p>Microsoft 365 Defender, part of Microsoft\u2019s XDR solution, leverages the Microsoft 365 security portfolio to automatically analyze threat data across domains, building a complete picture of each attack in a single dashboard. With this breadth and depth of clarity defenders can now focus on critical threats and hunt for sophisticated breaches, trusting that the powerful automation in Microsoft 365 Defender detects and stops attacks anywhere in the kill chain and returns the organization to a secure state.<\/p>\n<p>Find out more from Microsoft Security CVP Rob Lefferts:\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=klGmsu3LK4M&amp;feature=emb_title\" target=\"_blank\" rel=\"noopener\">Microsoft Defender | Extended Detection and Response (XDR) | Microsoft Ignite 2020 &#8211; YouTube<\/a><\/p>\n<p>And just don&#8217;t take our word for it&#8230;<\/p>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-full-width\"><img decoding=\"async\" class=\"lazy-loaded\" src=\"https:\/\/media-exp1.licdn.com\/dms\/image\/C4E12AQEkSKIuyASmjg\/article-inline_image-shrink_1500_2232\/0\/1637776273404?e=1644451200&amp;v=beta&amp;t=o5yM6pnMZls2eaWOIsxoX1nHtfxp1CiU8s8BCUIAFV8\" alt=\"No alt text provided for this image\" data-media-urn=\"\" \/><\/div>\n<h3>Day 4: Endpoint Manager<\/h3>\n<p>The final session of the week was delivered by Cloud Endpoint Technical Specialist, Damien Sweeney.<\/p>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-right\"><img decoding=\"async\" class=\"lazy-loaded\" src=\"https:\/\/media-exp1.licdn.com\/dms\/image\/C4E12AQF4UkhJseXG0A\/article-inline_image-shrink_1000_1488\/0\/1638270425776?e=1644451200&amp;v=beta&amp;t=k8yN-FrsBkEae_1QNNbmE79XDOOXGkuwKbgqtctesg4\" alt=\"No alt text provided for this image\" data-media-urn=\"\" \/><\/div>\n<p>Throughout this track, all of the speakers have provided us with one clear consistent message\u00a0<u>&#8220;Technology needs are evolving in the Modern Workplace&#8221;<\/u>\u00a0&gt;&gt;&gt;&gt;&gt;&gt;&gt;<\/p>\n<p><strong>The old ways just simply are no longer sufficient,\u00a0<\/strong>we need to start thinking about IT differently &#8211;<\/p>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-full-width\"><img decoding=\"async\" class=\"lazy-loaded\" src=\"https:\/\/media-exp1.licdn.com\/dms\/image\/C4E12AQF9jS3KL6OFPA\/article-inline_image-shrink_1000_1488\/0\/1638272413681?e=1644451200&amp;v=beta&amp;t=egYmW_p1jlGpimjwbOxTB8OcZ48B3aW4DTSTJgGYchE\" alt=\"No alt text provided for this image\" data-media-urn=\"\" \/><\/div>\n<p>..And\u00a0<a href=\"https:\/\/www.microsoft.com\/en-ie\/security\/business\/microsoft-endpoint-manager\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft Endpoint Manager<\/a>\u00a0is Microsoft&#8217;s vision on how to address these problems in the Modern World &#8211;<strong>\u00a0a cloud-enabled transformative platform for unified and secure endpoint management<\/strong>, that enables you to:<\/p>\n<ul>\n<li>support a\u00a0<u>diverse mobile environment\u00a0<\/u>and manage IOS Android, Windows &amp; Mac OS devices securely<\/li>\n<li>keep devices and apps are\u00a0<u>compliant with the security controls<\/u>\u00a0and environments that you have in your organisation<\/li>\n<li>to create policies to\u00a0<u>keep data safe on company owned<\/u>\u00a0<strong>and<\/strong>\u00a0<u>personally owned devices<\/u><\/li>\n<\/ul>\n<p>All on a single unified solution!<\/p>\n<p><strong>My key takeaways are, Microsoft Endpoint Manager is the:<\/strong><\/p>\n<ul>\n<li><strong>Most Complete &#8211;\u00a0<\/strong>Microsoft Endpoint Manager delivers the most complete management of modern workplace,<\/li>\n<li><strong>Most Secure &#8211;\u00a0<\/strong>it provides extensive cloud powered insights and policy-driven actions for the most secure protection of your data,<\/li>\n<li><strong>&amp; Fastest time to value &#8211;\u00a0<\/strong>it removes barriers to productivity on any personal and company-owned devices without compromising security.<\/li>\n<\/ul>\n<p>&#8230;And that&#8217;s a wrap for week 2!<\/p>\n<p>You may or may not have joined us for our Modern Work &amp; Security: Unlock the Tech Series but fear not, you can catch all the recordings from the Secure Your Business From Anywhere track here &#8211;\u00a0<a href=\"https:\/\/www.cloudchampion.ie\/c\/unlock-the-tech-smb-series-secure-your-business-from-anywhere-main-page\/\" target=\"_blank\" rel=\"nofollow noopener\">Unlock the Tech SMB Series \u2013 Secure Your Business From Anywhere: Main Page \u2013 Ireland Cloud Champion<\/a><\/p>\n<p>If you want to talk Modern Work &amp; Security please reach out any time to myself @ leenglis@microsoft.com and I&#8217;ll be happy to help! ? &amp; Stay tuned for next weeks breakdown of our Modernize Communications track.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today I&#8217;m going to breakdown the second track in the Unlock The Tech series,\u00a0Secure Your Business From Anywhere\u00a0and try to pick out all the\u00a0MUST KNOWS!\u00a0from each session. So let&#8217;s get into everything Microsoft Security.. Day 1: Identity and Access Did you know in the past year we&#8217;ve seen a 300% increase in identity attacks? making [&hellip;]<\/p>\n","protected":false},"author":665,"featured_media":597679,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"class_list":["post-597628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-none-en-ie","specials-transform-en-ie","stories-business-optimization-en-ie","stories-how-can-i-optimize-and-improve-my-business","businessPriorities-modern-workplace-en-ie"],"_links":{"self":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts\/597628"}],"collection":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/comments?post=597628"}],"version-history":[{"count":2,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts\/597628\/revisions"}],"predecessor-version":[{"id":597727,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts\/597628\/revisions\/597727"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/media\/597679"}],"wp:attachment":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/media?parent=597628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/categories?post=597628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}