Microsoft Intros Threat Protection Bundle

At Microsoft's Ignite event this week, the company unveiled Microsoft Threat Protection, a bundle of security solutions for enterprises.

The product doesn't contain any new security solutions, and that's a deliberate strategy taken by Microsoft, according to Adam Hall, director of security product marketing at Microsoft, during a Tuesday Ignite session. The idea behind Microsoft Threat Protection is to provide optimal security with minimal complexity for enterprises.

Hall said that organizations should be operating in a world where you assume a security breach has occurred and assume that you've been attacked. Moreover, anything can serve as an attack vector, from smartphones to laptops to Internet of Things (IoT) sensors. Microsoft's approach is to stay one step ahead by correlating collected security information, namely "6.5 trillion signals per day," which is done using Microsoft Graph information collected from consumers and businesses using Microsoft products. Microsoft additionally uses the expertise of "3,500+ in-house security specialists" to analyze threats, according to the company's announcement.

Microsoft Threat Protection includes multiple security solutions that Microsoft also sells separately, but they are all tied together through the Microsoft 365 Security Center, a single dashboard that provides a graphical overview of alerts, top threats, and the devices and accounts that could be at risk. The dashboard also includes Office 365 Secure Score, a service that shows Azure services being used, along with an overall assessment of an organization's security state. There are also e-mail and phishing protections displayed in the dashboard.

There are five broad categories of security protections addressed by the Microsoft Threat Protection product. The list below, which comes from Microsoft's announcement, illustrates the security services included in the product:

During the Ignite session, speakers also typically mentioned that Attack Simulator is part of the solution. It's a tool that lets IT pros send phishing e-mails to end users to check their susceptibilities to those avenues of attack.

Microsoft's announcement promised that "customers who leverage all the services in Microsoft Threat Protection will enjoy a fully integrated, end-to-end solution, securing their enterprise, across the entire attack surface."

Additional information can be found on the Microsoft Secure blog.

About the Author

Kurt Mackie is senior news producer for 1105 Media's Converge360 group.

Featured

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education.

  • three glowing stacks of tech-themed icons

    Research: LLMs Need a Translation Layer to Launch Complex Cyber Attacks

    While large language models have been touted for their potential in cybersecurity, they are still far from executing real-world cyber attacks — unless given help from a new kind of abstraction layer, according to researchers at Carnegie Mellon University and Anthropic.

  • Hand holding a stylus over a tablet with futuristic risk management icons

    Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

    Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.

  • magnifying glass revealing the letters AI

    New Tool Tracks Unauthorized AI Usage Across Organizations

    DevOps platform provider JFrog is taking aim at a growing challenge for enterprises: users deploying AI tools without IT approval.