Microsoft announces cloud 9sin innovation to simplify security, compliance, and identity
Microsoft announces cloud innovation to simplify security, compliance, and identity
2020 will be remembered as a year of historic transformation. The pandemic has changed the way businesses operate and people work. One thing that has not changed is our basic human nature and the need to feel safe. Being safe and feeling safe is what allows us to do more, create more, and have trust in the technology that connects us all.
It’s no wonder, then, that cyber-security is so important right now. Digital security is about people—it’s about empowering defenders to defend and protect employees, data, work, and personal safety. It’s about making people and organizations resilient in an environment of unexpected change, like widespread remote work. Nearly overnight, organizations worldwide have had to enable remote workforces, support rapidly evolving business requirements, and steer to the next normal without knowing what that normal would be.
All of this takes place against a backdrop of advanced threats and adversaries. For example, Microsoft threat intelligence teams recently exposed cyberattackstargeting people and organizations involved in the upcoming U.S. presidential election including unsuccessful attacks on people associated with both presidential campaigns from a variety of foreign activity groups known to Microsoft as Strontium, Zirconium, and Phosphorus.
For those responsible for securing their organization’s digital infrastructure, this has all come on top of what they were already navigating—levels of complexity that often translate into barriers for companies, their people, and the customers they serve. That’s why we’re so passionate about reimagining security, identity, and compliance. We hold a differentiated view among our peers that security should not only encompass all critical aspects of security—including cybersecurity, identity, and compliance – but that these components should be tightly integrated, and built right into the products and platforms that businesses are already using, so that managing safe access, securing data, meeting regulatory requirements and protecting against threats is seamless.
Poor security posture is often rooted in complexity. Security teams have historically struggled to keep up with threats and signals across a patchwork of poorly integrated solutions that fail to cover the breadth of workloads, clouds, and devices that businesses run on. Fortunately, the cloud has given rise to a new generation of modern security tools that simplify the defender experience by combining signals and automating responses to catch threats that would otherwise go unchecked. The most important emerging tools are Extended Detection and Response (XDR) and cloud-native Security Information & Event Management (SIEM). Most vendors only offer one or the other.
Microsoft offers a unique approach that empowers security professionals with both cloud-native SIEM and XDR tools from a single vendor. This brings a new level of integration that gives defenders the best of both worlds—an end to end visibility across all of their resources and intelligent alerts built with a deep understanding of individual resources, enhanced with human and machine intelligence.
Today we are making the following announcements to simplify the defender experience with modern and integrated capabilities:
Microsoft Defender offers the broadest resource coverage of any XDR in the industry, spanning identities, endpoints, cloud apps, email and docs, infrastructure, and cloud platforms.
Microsoft Defender uses powerful workflows and AI to correlate alerts across attack vectors, provide an end-to-end view of the attack, and automatically heal affected assets.
In addition to bringing our XDR together under Microsoft Defender, we are also announcing new Defender capabilities:
Microsoft Defender for Endpoint is now available for all major platforms, with the general availability of protection for Android devices and a preview for iOS.
Azure Defender has a new unified dashboard experience within Azure Security Center that gives you visibility into your alerts and which resources are currently monitored.
Azure Defender has new protections for SQL on-premises, Azure Kubernetes, Azure Key Vault, and IoT.
Azure Defender for IoT now protects industrial IoT, Operational Technology (OT), and building management systems (BMS) with the integration of CyberX’s agentless capabilities for securing unmanaged devices acquired in June.
Our cross-domain detection and response capabilities from Microsoft Defender are deeply integrated with our cloud-native SIEM, Azure Sentinel, reducing complexity and increasing visibility so that defenders see what matters when it matters. In Azure Sentinel we are announcing:
Improvements to threat intelligence management and new integrations with threat intelligence partners, including the ability to search, add, and track threat indicators, perform TI look-ups, and enrichments as well as creating watchlists for hunting threats—so you can catch more threats, faster.
User and entity behavior analytics that help SecOps detect unknown threats and anomalous behavior of compromised users and insider threats. New insights are unlocked with user and entity behavior profiles that leverage machine learning and Microsoft’s security research.
To help Microsoft 365 E5 customers modernize faster, we are offering promotional pricing that will save the typical 3,500 seat deployment $1,500 per month—for a limited time, beginning in November 2020.
ASOS, a leading online fashion retailer, is using Azure Sentinel to detect attacks even while their security team is working remotely during the pandemic.
“With everything running through Azure Sentinel, we’ve reduced the time spent on case management and resolution of alerts by approximately 50 percent.” said Stuart Gregg, Cyber Security Operations Lead, ASOS.
In addition to the XDR and SIEM news, we are enhancing security posture management in Azure Security Center with support for multi-cloud. Now you can see all your Azure, AWS, and GCP security posture in a unified experience within Azure Security Center. Learn more about today’s Azure security announcements here.
Our compliance cloud solutions help customers more easily navigate today’s biggest risks, from managing data or finding insider threats to dealing with legal issues or even addressing standards and regulations. We’ve listened to customers and invested heavily in a set of solutions to help them modernize and keep pace with the evolving and complex compliance and risk management challenges they face.
One of our key investment areas is the set of Data Loss Prevention products in Microsoft 365. We recently announced the public preview of Microsoft Endpoint Data Loss Prevention (DLP), which means customers can now identify and protect data on devices. Today, we are announcing the public preview of integration between Microsoft Cloud App Security and Microsoft Information Protection, which extends Microsoft’s data loss prevention (DLP) policy enforcement framework to third-party cloud apps—such as Dropbox, Box, Google Drive, Webex, and more—for a consistent and seamless compliance experience
Customers struggle to keep up with the constantly changing regulations around data protection. To help ease this challenge, we are excited to announce the general availability of Compliance Manager to help businesses simplify compliance and reduce risk by translating complex regulatory requirements to specific controls and through compliance score, get a quantifiable measure of compliance.
Customers like Frost Bank have found that tracking their compliance score makes compliance easier.
“Compliance is a really interesting field. Typically, you have somebody with a legal background, a risk background, or a security background, but very little technical background. And so trying to translate a regulation so that it fits within a technical environment is very difficult. With Compliance Manager, it actually allowed a lot of the tech talk to be translated for the side, the business side, but it also allowed a lot of the business side to be translated to the tech side. For us, it made the conversation very simple and it made the process almost seamless,” said Edward Contreras, CISO, EVP, Frost Bank.
The power of modern cloud-based identity protection
Nothing has done more to simplify the security challenges of remote work during the pandemic than modern identity solutions and Zero Trust architectures. A July 2020 Microsoft poll found that 94 percent of business leaders have already embarked on a Zero Trust journey. Identity is central to simplifying security today and shaping the next generation of the modern security infrastructure.
Microsoft is pushing the frontier of identity through the introduction of a decentralized model built on open standards to help balance the power between individuals and organizations in ways that enhance digital trust while protecting the privacy and reducing the risk of losing personal data.
Today we are announcing a decentralized identity pilot together with the MilGears educational program of the US Department of Defense and Trident at AIU, which helps military veterans and service members enroll in higher education and jumpstart their civilian career.
This technology will significantly reduce the time and effort it takes for veterans to verify their service records and transcripts with universities and employers. It will also help veterans maintain control of their information.
The simplest way to manage identities and embark on a Zero Trust journey today is with Azure Active Directory (AD)—Microsoft’s cloud identity service, trusted by over 200 thousand organizations. They choose Azure AD for industry-leading security and seamless user experience.
No company or industry is immune to attack and everyone deserves modern protection. The Little Potato Company is a family-owned business with 400 employees headquartered in Alberta, Canada that uses Conditional Access as a critical component in its Zero Trust security strategy. The Little Potato Company recently saw the value of Zero Trust security firsthand when a user’s credentials were compromised and used to attempt to access corporate data. Luckily, the company had deployed Azure AD and Conditional Access, which quickly identified and blocked the login attempts from multiple locations and an unfamiliar operating system.
What you can do today
Security is a journey, and we believe in progress over perfection. The key is that every step you take in the process makes your organization safer and simpler. In fact, it makes all of us safer as we work together to stop malicious activity from causing harm and to protect data and privacy in a modern, connected world.
Here are four things you can do today to make your organization safer and more resilient:
2020 is marking a moment in time that none of us could have imagined; a moment that has amplified the need for a resilient response to unexpected change, and a moment in which digital safety is paramount to productivity and the peace of mind we all need to be at our best. We’re inspired by the way customers are using technology to turn obstacles into innovation, to turn ideas into solutions, and to embrace today’s challenges as an opportunity to build a better, safer world for all. That’s why we at Microsoft are reimagining security, identity, and compliance—to empower all people and organizations to thrive.
Follow us on twitter (ajuede.com) or on Instagram (ajuedeman) for details of the global situation presently.
Like our page on facebook @ Info4everybody Last Wednesday, we published the success story from Dr. Vladimir Zelenko, a board-certified family practitioner in New York, after he successfully treated 350 coronavirus patients with 100 percent success using a cocktail of drugs: hydroxychloroquine, in combination with azithromycin (Z-Pak), an antibiotic to treat secondary infections, and zinc sulfate. Dr. Zelenko said he saw the symptom of shortness of breath resolved within four to six hours after treatment. Do you know that the ancient Egypt were civilized by architects from the (500,000 - 4000 BC) Nsukka Civiliation? Now, Dr. Zelenko provides updates on the treatment after he successfully treated 699 COVID-19 patients in New York. In an exclusive interview with former New York Mayor, Rudy Giuliani, Dr. Vladmir Zelenko shares the results of his latest study, which showed that out of his 699 patients treated, zero patients died, zero patients intubated, and four ho
THE AKAN Copied from the book, Reality as Myth by Onyeji Nnaji . The influence of the Akan on their content nations lies on their population and commonwealth of their brother nations. The Akan are one of the largest ethnic groups in West Africa. Their population is scattered across West Africa and beyond. Among this huge population of the Akan, the Ghanaians are more popular, perhaps because of the political influence of the Ashanti Empire in the area. Not much is heard or known about other Akan settlements like the Akwamu, the Akyem , the Akuapem, the Denkyira, the Abron, the Aowin, the Ahanta, the Anyi, the Baoule, the Chokosi, the Fante, the Kwahu, the Sefwi, the Ahafo, the Assin, the Evalue, the Wassa the Adjukru, the Akye, the Alladian, the Attie,the M'Bato, the Abidji, the Avikam,the Avatime the Ebrie,
Copied from the Book; " Reality as Myth " by Onyeji Nnaji The beauty of the discovering of the Radar Rivers and their channels is that it disproves the western hegemonic claim of the Euphrates valley being the position of the birth of the great river, all the points that opposed their claims notwithstanding. Even God himself was very perfect in His creation by placing them in their positions, hierarchically, according to their birth. The first river that flowed located the Havilah land where there are good quality gold, bdellium and fine onyx stones. Pison was the oldest of the rivers and it flowed through the land of the southern Africa. The second river flowed northward to Ethiopia. It was when Africa had been overtaken by virtue of her proximity to the Great Water that other parts of the world began to encounter the remaining river; remarkable with Hiddekel. Subscribe to ajuede.com to be updated on our posts on dailies. The major problem tow
Copied from the book, Reality as Myths by Onyeji Nnaji T he world of the Bantu travellers shows the walls of the migration that recorded the highest population among the African settlement. Originating from the largest population among the four races that settled in the east before time, all Bantu travellers were pygmies; for that was the nature of the Umudiala, the generation that gave birth to them. Bantu migration was rated the third earliest migration of the Negro race from the east. In this regard, all their movement had involved great population of people compared to the number of people involved in the two earlier populations that gave birth to Ethiopia, Nubia and Egypt: the Walker Traveller, and the Race of Anu. Bantu population as we have identified in the third chapter above outweighs the rest of the population of the ancient fathers that founded many of the nations of antiquity mentioned earlier. Discussing them in beat will pose a little challenge since
STRICTLY FOR COUPLES … You will know that the man is the head while you are his neck. As such, you direct his focus and make him fixative Our series include the following : * Show him what he looks out for from other women * Teach him like he knows nothing * Learn to play naked games with your husband * Learn to package yourself * Learn to work on your husband M y neighbour had v owed never to let any girl survive as a salesgirl in my shop. This thing has happened for over three times. Each time we brought a new salesgirl, the girl would stay for two or three months; and suddenly she would end her contract with us. In all these, my husband did not know. So, being that the girls usually stole money and other items, the reason for their departure became genuine, thus: they ran away to avoid being punished for their actions. But behind this, the underlying truth is that the girls had been embarrassed by my neighbour who would warn them to leave her loosed husband. Re
T he name Nkalaha is a coinage which stands for a people occupying a geographical land and regional setting in the eastern part of Nigeria. It is a coinage which attempts to explain the direction of movement and adventure of the men who founded the community in the 15th century AD. According to oral sources and some documentation about this community, some of these men were believed to have traveled from Ida, old Benue state of Nigeria to inhabit the land. These men had traveled on different days to locate the place. Onojah who originally founded the land was said to have been in a deep search for a place of safety as he was besieged by a fate that appeared to make him somewhat incompatible with his own people. Nkalaha is one of the communities that make up Ishielu Local Government Area of Ebonyi State. Nkalaha occupied the northern part of Ishielu Local Government Area. She is located through the zip 135.031.000. The community sits on 923.768km 2 . She shares boundaries
The Mystery of Number, “Five” in the Igbo Cosmology. From: Aspects of the Ancient African Metaphysics; Chapter: Seven; Topic: Igbo Geometries and the Metaphysics of Numbers. Author: Onyeji Nnaji. I n the Igbo cosmology, the word Isee is a definite symbolic word as revealed through the Igbo language and culture. A human being has five fingers, five toes. The hands and feet are fundamentals to the survival in life as they are necessary in ensuring that man moves to places where he gets food and grapples on the food to sustain his life. To this view, the rhetoric that binds vocatives in the form of incantation (anchoring on the heart-lock: four ) and the concomitant reprisal in the manner of affirmation that holds the human life bind to his original spiritual person, therefore defining existence and essences are unified by the corresponding echo: Isee!!!!! Therefore it stands that anytime a prayer is said in the Igbo land, the attendants who would want the fulfillment of the
INTRODUCTION One thing that made Udi remarkable is the indubitable legacy adopted in commemoration of the legendry fighter, Uto at Nsude. It was one of the greatest contributions of the descendants of Agbaja to the survival of Nsukka civilization of memory. Uto held from Oshie. Uto dies of small pox after a mercenary battle he was hired to fight in the ancient Benin. His body was buried in the evil forest as the tradition demanded. Although he lived no longer, the stepped pyramids above were adopted to commemorate the lasting peace he brought to the entire Oshie and Udi nation of people. Another remarkable thing about Udi is the fertility of the land. This has contributed widely in sustaining the inhabitants and provided a name for the inhabitants in the manner of Abakaliki, Umudike, Ogbaru, Igboariam, Ohaji, Uzouwani, etc., especially in Amofia-Agu, Affa. Udi is a land of great rivers and springs: Adaada, Ajali, Oji, Aria, Nvenu, Ngene Evu, Iyi Ububo, etc. as was the situ
There are four generations…, and the fourth generation, which is the most exalted, is kingless and perfect. These people will enter the holy place of their Father and they will reside in rest … They are kings. They are the immortal within the mortal ( The Nag Hammadi, 219 ) Also read Nsukka Civilization: The Peopling of Ancient Nsukka One of the African homes that colonialism has completely deformed beyond certain level of recognition is Nsukka. Colonialism apart, the most affecting factor to the survival of the meaning which the rich cultural enclave, Nsukka, carries will best be blamed on postcolonial political structure. The biggest harm all these have against Nsukka as a people is that they rubbed her of the meaning of her name; their place of origin; how their fathers managed to come into their present abodes and who their ancestors were. A profound understanding of the excerpt above will open the door towards deciphering the meaning and origin of the people call
by Onyeji Nnaji Eha-Amufu road newly constructed by Governor Ifeanyi Ugwuanyi of Enugu state in 2019 A part from the strategic location of the Federal College of Education, one central reason remarkable about Eha-Amufu is her central position and her boundary situation. Eha-Amufu stands at the centre of many communities; as a result she has served as the gateway to different communities. She is bounded to Nkalaha, Agala, Ikem, Umuero and other communities, including Obeagu (pronounced Ubegu). Aside from that, Eha-Amufu embodies the route that traces the way to the northern part of Nigeria for travellers travelling from Ebonyi axis. Eha-Amufu also forms the remarkable boundary community between Enugu State and Ebonyi State. This situation makes Eha-Amufu very strategic in the discussion of the road and rivers across Ebonyi and Enugu. In the era when transportation on rail was the order of the day, the most popular then ‘Express Train and la