Microsoft Intros Threat Protection Bundle

At Microsoft's Ignite event this week, the company unveiled Microsoft Threat Protection, a bundle of security solutions for enterprises.

The product doesn't contain any new security solutions, and that's a deliberate strategy taken by Microsoft, according to Adam Hall, director of security product marketing at Microsoft, during a Tuesday Ignite session. The idea behind Microsoft Threat Protection is to provide optimal security with minimal complexity for enterprises.

Hall said that organizations should be operating in a world where you assume a security breach has occurred and assume that you've been attacked. Moreover, anything can serve as an attack vector, from smartphones to laptops to Internet of Things (IoT) sensors. Microsoft's approach is to stay one step ahead by correlating collected security information, namely "6.5 trillion signals per day," which is done using Microsoft Graph information collected from consumers and businesses using Microsoft products. Microsoft additionally uses the expertise of "3,500+ in-house security specialists" to analyze threats, according to the company's announcement.

Microsoft Threat Protection includes multiple security solutions that Microsoft also sells separately, but they are all tied together through the Microsoft 365 Security Center, a single dashboard that provides a graphical overview of alerts, top threats, and the devices and accounts that could be at risk. The dashboard also includes Office 365 Secure Score, a service that shows Azure services being used, along with an overall assessment of an organization's security state. There are also e-mail and phishing protections displayed in the dashboard.

There are five broad categories of security protections addressed by the Microsoft Threat Protection product. The list below, which comes from Microsoft's announcement, illustrates the security services included in the product:

During the Ignite session, speakers also typically mentioned that Attack Simulator is part of the solution. It's a tool that lets IT pros send phishing e-mails to end users to check their susceptibilities to those avenues of attack.

Microsoft's announcement promised that "customers who leverage all the services in Microsoft Threat Protection will enjoy a fully integrated, end-to-end solution, securing their enterprise, across the entire attack surface."

Additional information can be found on the Microsoft Secure blog.

About the Author

Kurt Mackie is senior news producer for 1105 Media's Converge360 group.

Featured

  • hooded figure types on a laptop, with abstract manifesto-like posters taped to the wall behind them

    Hacktivism Is a Growing Threat to Higher Education

    In recent years, colleges and universities have faced an evolving array of cybersecurity challenges. But one threat is showing signs of becoming both more frequent and more politically charged: hacktivism.

  • Hand holding a stylus over a tablet with futuristic risk management icons

    Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

    Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.

  • digital book with circuit patterns

    Turnitin and ACUE Partner on AI Training for Educators

    Turnitin is teaming up with the Association of College and University Educators to create a series of courses on AI and academic integrity designed to help faculty navigate the responsible use of AI in learning and assessment.

  • student with headphones engaged in virtual learning

    Virtual Learning that Works: 4 Ways to Build Real Engagement

    As colleges and universities expand online offerings, the goal now is clear: Build environments where students actively participate, not passively attend.