Microsoft announces cloud 9sin innovation to simplify security, compliance, and identity
Microsoft announces cloud innovation to simplify security, compliance, and identity
2020 will be remembered as a year of historic transformation. The pandemic has changed the way businesses operate and people work. One thing that has not changed is our basic human nature and the need to feel safe. Being safe and feeling safe is what allows us to do more, create more, and have trust in the technology that connects us all.
It’s no wonder, then, that cyber-security is so important right now. Digital security is about people—it’s about empowering defenders to defend and protect employees, data, work, and personal safety. It’s about making people and organizations resilient in an environment of unexpected change, like widespread remote work. Nearly overnight, organizations worldwide have had to enable remote workforces, support rapidly evolving business requirements, and steer to the next normal without knowing what that normal would be.
All of this takes place against a backdrop of advanced threats and adversaries. For example, Microsoft threat intelligence teams recently exposed cyberattackstargeting people and organizations involved in the upcoming U.S. presidential election including unsuccessful attacks on people associated with both presidential campaigns from a variety of foreign activity groups known to Microsoft as Strontium, Zirconium, and Phosphorus.
For those responsible for securing their organization’s digital infrastructure, this has all come on top of what they were already navigating—levels of complexity that often translate into barriers for companies, their people, and the customers they serve. That’s why we’re so passionate about reimagining security, identity, and compliance. We hold a differentiated view among our peers that security should not only encompass all critical aspects of security—including cybersecurity, identity, and compliance – but that these components should be tightly integrated, and built right into the products and platforms that businesses are already using, so that managing safe access, securing data, meeting regulatory requirements and protecting against threats is seamless.
Poor security posture is often rooted in complexity. Security teams have historically struggled to keep up with threats and signals across a patchwork of poorly integrated solutions that fail to cover the breadth of workloads, clouds, and devices that businesses run on. Fortunately, the cloud has given rise to a new generation of modern security tools that simplify the defender experience by combining signals and automating responses to catch threats that would otherwise go unchecked. The most important emerging tools are Extended Detection and Response (XDR) and cloud-native Security Information & Event Management (SIEM). Most vendors only offer one or the other.
Microsoft offers a unique approach that empowers security professionals with both cloud-native SIEM and XDR tools from a single vendor. This brings a new level of integration that gives defenders the best of both worlds—an end to end visibility across all of their resources and intelligent alerts built with a deep understanding of individual resources, enhanced with human and machine intelligence.
Today we are making the following announcements to simplify the defender experience with modern and integrated capabilities:
Microsoft Defender offers the broadest resource coverage of any XDR in the industry, spanning identities, endpoints, cloud apps, email and docs, infrastructure, and cloud platforms.
Microsoft Defender uses powerful workflows and AI to correlate alerts across attack vectors, provide an end-to-end view of the attack, and automatically heal affected assets.
In addition to bringing our XDR together under Microsoft Defender, we are also announcing new Defender capabilities:
Microsoft Defender for Endpoint is now available for all major platforms, with the general availability of protection for Android devices and a preview for iOS.
Azure Defender has a new unified dashboard experience within Azure Security Center that gives you visibility into your alerts and which resources are currently monitored.
Azure Defender has new protections for SQL on-premises, Azure Kubernetes, Azure Key Vault, and IoT.
Azure Defender for IoT now protects industrial IoT, Operational Technology (OT), and building management systems (BMS) with the integration of CyberX’s agentless capabilities for securing unmanaged devices acquired in June.
Our cross-domain detection and response capabilities from Microsoft Defender are deeply integrated with our cloud-native SIEM, Azure Sentinel, reducing complexity and increasing visibility so that defenders see what matters when it matters. In Azure Sentinel we are announcing:
Improvements to threat intelligence management and new integrations with threat intelligence partners, including the ability to search, add, and track threat indicators, perform TI look-ups, and enrichments as well as creating watchlists for hunting threats—so you can catch more threats, faster.
User and entity behavior analytics that help SecOps detect unknown threats and anomalous behavior of compromised users and insider threats. New insights are unlocked with user and entity behavior profiles that leverage machine learning and Microsoft’s security research.
To help Microsoft 365 E5 customers modernize faster, we are offering promotional pricing that will save the typical 3,500 seat deployment $1,500 per month—for a limited time, beginning in November 2020.
ASOS, a leading online fashion retailer, is using Azure Sentinel to detect attacks even while their security team is working remotely during the pandemic.
“With everything running through Azure Sentinel, we’ve reduced the time spent on case management and resolution of alerts by approximately 50 percent.” said Stuart Gregg, Cyber Security Operations Lead, ASOS.
In addition to the XDR and SIEM news, we are enhancing security posture management in Azure Security Center with support for multi-cloud. Now you can see all your Azure, AWS, and GCP security posture in a unified experience within Azure Security Center. Learn more about today’s Azure security announcements here.
Our compliance cloud solutions help customers more easily navigate today’s biggest risks, from managing data or finding insider threats to dealing with legal issues or even addressing standards and regulations. We’ve listened to customers and invested heavily in a set of solutions to help them modernize and keep pace with the evolving and complex compliance and risk management challenges they face.
One of our key investment areas is the set of Data Loss Prevention products in Microsoft 365. We recently announced the public preview of Microsoft Endpoint Data Loss Prevention (DLP), which means customers can now identify and protect data on devices. Today, we are announcing the public preview of integration between Microsoft Cloud App Security and Microsoft Information Protection, which extends Microsoft’s data loss prevention (DLP) policy enforcement framework to third-party cloud apps—such as Dropbox, Box, Google Drive, Webex, and more—for a consistent and seamless compliance experience
Customers struggle to keep up with the constantly changing regulations around data protection. To help ease this challenge, we are excited to announce the general availability of Compliance Manager to help businesses simplify compliance and reduce risk by translating complex regulatory requirements to specific controls and through compliance score, get a quantifiable measure of compliance.
Customers like Frost Bank have found that tracking their compliance score makes compliance easier.
“Compliance is a really interesting field. Typically, you have somebody with a legal background, a risk background, or a security background, but very little technical background. And so trying to translate a regulation so that it fits within a technical environment is very difficult. With Compliance Manager, it actually allowed a lot of the tech talk to be translated for the side, the business side, but it also allowed a lot of the business side to be translated to the tech side. For us, it made the conversation very simple and it made the process almost seamless,” said Edward Contreras, CISO, EVP, Frost Bank.
The power of modern cloud-based identity protection
Nothing has done more to simplify the security challenges of remote work during the pandemic than modern identity solutions and Zero Trust architectures. A July 2020 Microsoft poll found that 94 percent of business leaders have already embarked on a Zero Trust journey. Identity is central to simplifying security today and shaping the next generation of the modern security infrastructure.
Microsoft is pushing the frontier of identity through the introduction of a decentralized model built on open standards to help balance the power between individuals and organizations in ways that enhance digital trust while protecting the privacy and reducing the risk of losing personal data.
Today we are announcing a decentralized identity pilot together with the MilGears educational program of the US Department of Defense and Trident at AIU, which helps military veterans and service members enroll in higher education and jumpstart their civilian career.
This technology will significantly reduce the time and effort it takes for veterans to verify their service records and transcripts with universities and employers. It will also help veterans maintain control of their information.
The simplest way to manage identities and embark on a Zero Trust journey today is with Azure Active Directory (AD)—Microsoft’s cloud identity service, trusted by over 200 thousand organizations. They choose Azure AD for industry-leading security and seamless user experience.
No company or industry is immune to attack and everyone deserves modern protection. The Little Potato Company is a family-owned business with 400 employees headquartered in Alberta, Canada that uses Conditional Access as a critical component in its Zero Trust security strategy. The Little Potato Company recently saw the value of Zero Trust security firsthand when a user’s credentials were compromised and used to attempt to access corporate data. Luckily, the company had deployed Azure AD and Conditional Access, which quickly identified and blocked the login attempts from multiple locations and an unfamiliar operating system.
What you can do today
Security is a journey, and we believe in progress over perfection. The key is that every step you take in the process makes your organization safer and simpler. In fact, it makes all of us safer as we work together to stop malicious activity from causing harm and to protect data and privacy in a modern, connected world.
Here are four things you can do today to make your organization safer and more resilient:
2020 is marking a moment in time that none of us could have imagined; a moment that has amplified the need for a resilient response to unexpected change, and a moment in which digital safety is paramount to productivity and the peace of mind we all need to be at our best. We’re inspired by the way customers are using technology to turn obstacles into innovation, to turn ideas into solutions, and to embrace today’s challenges as an opportunity to build a better, safer world for all. That’s why we at Microsoft are reimagining security, identity, and compliance—to empower all people and organizations to thrive.
Follow us on twitter (ajuede.com) or on Instagram (ajuedeman) for details of the global situation presently.
Last Wednesday, we published the success story from Dr. Vladimir Zelenko, a board-certified family practitioner in New York, after he successfully treated 350 coronavirus patients with 100 percent success using a cocktail of drugs:
hydroxychloroquine, in combination with azithromycin (Z-Pak), an antibiotic to treat secondary infections, and zinc sulfate. Dr. Zelenko said he saw the symptom of shortness of breath resolved within four to six hours after treatment. Do you know that the ancient Egypt were civilized by architects from the (500,000 - 4000 BC) Nsukka Civiliation? Now, Dr. Zelenko provides updates on the treatment after he successfully treated 699 COVID-19 patients in New York. In an exclusive interview with former New York Mayor, Rudy Giuliani, Dr. Vladmir Zelenko shares the results of his latest study, which showed that out of his 699 patients treated, zero patients died, zero patients intubated, and four hospitalizations.
AKANCopied from the book, Reality as Myth by Onyeji Nnaji. The influence of the
Akan on their content nations lies on their population and commonwealth of
their brother nations. The Akan are one of the largest ethnic groups in West
Africa. Their population is scattered across West Africa and beyond. Among this
huge population of the Akan, the Ghanaians are more popular, perhaps because of
the political influence of the Ashanti Empire in the area. Not much is heard or
known about other Akan settlements like the Akwamu, the Akyem , the Akuapem,
the Denkyira, the Abron, the Aowin, the Ahanta, the Anyi, the Baoule, the
Chokosi, the Fante, the Kwahu, the Sefwi, the Ahafo, the Assin, the Evalue, the
Wassa the Adjukru, the Akye, the Alladian, the Attie,the M'Bato, the Abidji,
the Avikam,the Avatime the Ebrie, the Ehotile, the Nzema, the Abbe, the Aboure,
the Coromantins, the Ndyuka people and other peoples of Côte d'Ivoire. Every Akan nation adopts the image…
from the Book; "Reality as Myth"
by Onyeji Nnaji
of the discovering of the Radar Rivers and their channels is that it disproves
the western hegemonic claim of the Euphrates valley being the position of the
birth of the great river, all the points that opposed their claims
notwithstanding. Even God himself was very perfect in His creation by placing
them in their positions, hierarchically, according to their birth. The first
river that flowed located the Havilah land where there are good quality gold,
bdellium and fine onyx stones. Pison was the oldest of the rivers and it flowed
through the land of the southern Africa. The second river flowed northward to
Ethiopia. It was when Africa had been overtaken by virtue of her proximity to
the Great Water that other parts of the world began to encounter the remaining
river; remarkable with Hiddekel.
Subscribe to ajuede.com to be updated on our posts on dailies.
The major problem towards deciphering the original plac…
Copied from the book, Reality as Myths by Onyeji NnajiThe world of the Bantu travellers shows the walls of the
migration that recorded the highest population among the African settlement.
Originating from the largest population among the four races that settled in
the east before time, all Bantu travellers were pygmies; for that was the
nature of the Umudiala, the
generation that gave birth to them. Bantu migration was rated the third
earliest migration of the Negro race from the east. In this regard, all their
movement had involved great population of people compared to the number of
people involved in the two earlier populations that gave birth to Ethiopia,
Nubia and Egypt: the Walker Traveller, and the
Race of Anu. Bantu population as we have identified in the third chapter
above outweighs the rest of the population of the ancient fathers that founded
many of the nations of antiquity mentioned earlier. Discussing them in beat
will pose a little challenge since their migration condi…
My neighbour had vowed never to let any girl
survive as a salesgirl in my shop. This thing has happened for over three
times. Each time we brought a new salesgirl, the girl would stay for two or
three months; and suddenly she would end her contract with us. In all these, my
husband did not know. So, being that the girls usually stole money and other
items, the reason for their departure became genuine, thus: they ran away to
avoid being punished for their actions. But behind this, the underling truth is
that the girls had been embarrassed by my neighbour who would warn them to leave
her loosed husband. Recently, the woman threatened to f…
The name Nkalaha is a
coinage which stands for a people occupying a geographical land and regional
setting in the eastern part of Nigeria. It is a coinage which attempts to
explain the direction of movement and adventure of the men who founded the
community in the 15th century AD. According to oral sources and some
documentation about this community, some of these men were believed to have
traveled from Ida, old Benue state of Nigeria to inhabit the land. These men
had traveled on different days to locate the place. Onojah who originally
founded the land was said to have been in a deep search for a place of safety
as he was besieged by a fate that appeared to make him somewhat incompatible
with his own people. Nkalaha
is one of the communities that make up Ishielu Local Government Area of Ebonyi
State. Nkalaha occupied the northern part of Ishielu Local Government Area. She
is located through the zip 135.031.000. The community sits on 923.768km2. She shares boundaries with neighbourin…
The Mystery of
Number, “Five” in the Igbo Cosmology.From: Aspects
of the Ancient African Metaphysics;Chapter: Seven;Topic: Igbo
Geometries and the Metaphysics of Numbers.Author: Onyeji
Nnaji. In the Igbo
cosmology, the word Isee is a definite symbolic word as revealed through
the Igbo language and culture. A human being has five fingers, five toes. The
hands and feet are fundamentals to the survival in life as they are necessary
in ensuring that man moves to places where he gets food and grapples on the
food to sustain his life. To this view, the rhetoric that binds vocatives in
the form of incantation (anchoring on the heart-lock: four) and the
concomitant reprisal in the manner of affirmation that holds the human life
bind to his original spiritual person, therefore defining existence and
essences are unified by the corresponding echo: Isee!!!!! Therefore
it stands that anytime a prayer is said in the Igbo land, the attendants who would
want the fulfillment of the prayer unanimously …
INTRODUCTION One thing that made Udi remarkable is the indubitable
legacy adopted in commemoration of the legendry fighter, Uto at Nsude. It was one
of the greatest contributions of the descendants of Agbaja to the survival of
Nsukka civilization of memory. Uto held from Oshie. Uto dies of small pox after
a mercenary battle he was hired to fight in the ancient Benin. His body was buried
in the evil forest as the tradition demanded. Although he lived no longer, the
stepped pyramids above were adopted to commemorate the lasting peace he brought
to the entire Oshie and Udi nation of people. Another remarkable thing about Udi is the
fertility of the land. This has contributed widely in sustaining the
inhabitants and provided a name for the inhabitants in the manner of Abakaliki,
Umudike, Ogbaru, Igboariam, Ohaji, Uzouwani, etc., especially in Amofia-Agu,
Affa. Udi is a land of great rivers and springs: Adaada, Ajali, Oji, Aria,
Nvenu, Ngene Evu, Iyi Ububo, etc. as was the situation every…
There are four generations…, and the fourth generation, which is the most exalted, is kingless and perfect. These people will enter the holy place of their Father and they will reside in rest … They are kings. They are the immortal within the mortal (The Nag Hammadi, 219)
Also read Nsukka Civilization: The Peopling of Ancient Nsukka One of the African homes that colonialism has completely deformed beyond certain level of recognition is Nsukka. Colonialism apart, the most affecting factor to the survival of the meaning which the rich cultural enclave, Nsukka, carries will best be blamed on postcolonial political structure. The biggest harm all these have against Nsukka as a people is that they rubbed her of the meaning of her name; their place of origin; how their fathers managed to come into their present abodes and who their ancestors were. A profound understanding of the excerpt above will open the door towards deciphering the meaning and origin of the people called Nsukka. Geographica…
by Onyeji Nnaji Eha-Amufu
road newly constructed by Governor Ifeanyi Ugwuanyi of Enugu state in 2019 Apart from the strategic location of the
Federal College of Education, one central reason remarkable about Eha-Amufu is
her central position and her boundary situation. Eha-Amufu stands at the centre
of many communities; as a result she has served as the gateway to different
communities. She is bounded to Nkalaha, Agala, Ikem, Umuero and other
communities, including Obeagu (pronounced Ubegu). Aside from that, Eha-Amufu embodies
the route that traces the way to the northern part of Nigeria for travellers
travelling from Ebonyi axis. Eha-Amufu also forms the remarkable boundary
community between Enugu State and Ebonyi State. This situation makes Eha-Amufu
very strategic in the discussion of the road and rivers across Ebonyi and
In the era when transportation on rail was
the order of the day, the most popular then ‘Express Train and later Diesel
Train’ and also the ‘local goods train’…