Enterprise Mobility and Security Blog

EMS_Security2

Cloud App Security new remediation feature

Require users to sign in again in case of suspicious behavior Real-time remediation for security threats is a key challenge for companies, where attackers can move quickly to access critical data. Cloud App Security team is excited to introduce a new feature for threat protection through integration with Azure Active Directory: when a suspicious user...

Continue reading

EMS_Cloud_3

Update on new Cloud App Security discovery, investigation, and threat detection features

We believe in continuous innovation to bring you deeper visibility, better data control, and strong threat protection for your cloud apps. The Cloud App Security team provides frequent releases and continuously updates and enhances our solution. Today, we would like to share enhancements in discovery, investigation, and threat detection features with our recent release: Automatically...

Continue reading

EMS_Cloud_9

Cloud App Security discovery enhancements

Visibility is the first step to protection: if you cannot see it, you cannot prevent it. Cloud App Security Shadow IT discovery capabilities help you to gain deeper visibility into your cloud environment by discovering more than 15K cloud apps used by your employees in your organization. We’re excited to show you two key enhancements...

Continue reading

How Microsoft EMS can support you in your journey to EU GDPR compliance – Part 5

Protecting data at the device and app level with Microsoft Intune Over the past month, the Enterprise Mobility + Security (EMS) team has been blogging about Microsoft’s broad commitment to making sure our products and services comply with the GDPR and making sure that you – our customers – understand how our technologies can assist...

Continue reading

EMS_STB13_Chris_02

How Microsoft EMS can support you in your journey to EU GDPR compliance – part 4

How to gain visibility and control of data in cloud apps This post is authored by Rue Limones, Senior Program Manager, Cloud App Security Engineering Team. Checking in: Your Journey to GDPR Compliance In the whitepaper “Beginning Your GDPR Journey,” we introduce five key use case scenarios that are relevant to GDPR compliance where Microsoft...

Continue reading

The unbelievably diverse array of devices managed by our customers

Something I have come to really appreciate as we’ve built Intune and watched its usage scale to millions of devices is the unbelievably broad and diverse types of hardware our customers have to manage. To put this challenge in perspective, check out the chart below. In this chart, you can see the diversity of devices...

Continue reading

ems-hybrid-cloud_webinars_square

How to simulate and detect attacks with the Advanced Threat Analytics Playbook

One of the biggest pieces of feedback the Advanced Threat Analytics (ATA) team has received is a request for a clear, easy way to simulate attacks and see how ATA detects them. So that’s exactly what we did. We’ve written a playbook that contains: A step-by-step guide to simulating different techniques used in real-world advanced attack...

Continue reading

Eliminating plaintext passwords with Microsoft Advanced Threat Analytics using LDAP

I may be stating the obvious, but it’s incredibly important to identify applications, servers, and sensitive accounts that should be using encryption. What we find all too frequently, however, is that passwords are being sent in plaintext in most enterprises. Here’s what you need to know about identifying these vulnerabilities and, more importantly, how to...

Continue reading