{"id":2262,"date":"2017-02-28T10:13:31","date_gmt":"2017-02-28T18:13:31","guid":{"rendered":""},"modified":"2023-07-19T11:38:13","modified_gmt":"2023-07-19T18:38:13","slug":"get-ahead-of-cyber-attacks-with-enterprise-mobility-security","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/","title":{"rendered":"Get ahead of cyber attacks with Enterprise Mobility + Security"},"content":{"rendered":"<table>\n<tbody>\n<tr>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The transition to mobility and the cloud has made employee interactions with other users, devices, apps, and data increasingly more complex. This has generated new blind spots for IT. At the same time, the sophistication of attack vectors continues to increase. Microsoft Enterprise Mobility + Security offers a holistic, identity-driven security approach with innovative technologies to address the sophisticated challenges of a new attack landscape. We show how our technologies help you first protect at the  &#8220;front door&#8221;, protect your data from user mistakes and detect attacks before they cause damage.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The transition to mobility and the cloud has made employee interactions with other users, devices, apps, and data increasingly more complex.<\/p>\n","protected":false},"author":843,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1515],"post_tag":[],"content-type":[1483],"coauthors":[4309],"class_list":["post-2262","post","type-post","status-publish","format-standard","hentry","category-government","content-type-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Get ahead of cyber attacks with Enterprise Mobility + Security - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Get ahead of cyber attacks with Enterprise Mobility + Security - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"The transition to mobility and the cloud has made employee interactions with other users, devices, apps, and data increasingly more complex.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-28T18:13:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-19T18:38:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/01\/cropped-microsoft_logo_element.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Industry Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Industry Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"&lt;1 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/author\/microsoft-industry-team\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Industry Team\"}],\"headline\":\"Get ahead of cyber attacks with Enterprise Mobility + Security\",\"datePublished\":\"2017-02-28T18:13:31+00:00\",\"dateModified\":\"2023-07-19T18:38:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/\"},\"wordCount\":99,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\"},\"articleSection\":[\"Government\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/\",\"name\":\"Get ahead of cyber attacks with Enterprise Mobility + Security - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website\"},\"datePublished\":\"2017-02-28T18:13:31+00:00\",\"dateModified\":\"2023-07-19T18:38:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Get ahead of cyber attacks with Enterprise Mobility + Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Get ahead of cyber attacks with Enterprise Mobility + Security - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/","og_locale":"en_US","og_type":"article","og_title":"Get ahead of cyber attacks with Enterprise Mobility + Security - Microsoft Industry Blogs","og_description":"The transition to mobility and the cloud has made employee interactions with other users, devices, apps, and data increasingly more complex.","og_url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2017-02-28T18:13:31+00:00","article_modified_time":"2023-07-19T18:38:13+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/01\/cropped-microsoft_logo_element.png","type":"image\/png"}],"author":"Microsoft Industry Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Industry Team","Est. reading time":"<1 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/author\/microsoft-industry-team\/","@type":"Person","@name":"Microsoft Industry Team"}],"headline":"Get ahead of cyber attacks with Enterprise Mobility + Security","datePublished":"2017-02-28T18:13:31+00:00","dateModified":"2023-07-19T18:38:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/"},"wordCount":99,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization"},"articleSection":["Government"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/","name":"Get ahead of cyber attacks with Enterprise Mobility + Security - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website"},"datePublished":"2017-02-28T18:13:31+00:00","dateModified":"2023-07-19T18:38:13+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2017\/02\/28\/get-ahead-of-cyber-attacks-with-enterprise-mobility-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Get ahead of cyber attacks with Enterprise Mobility + Security"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/2262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/users\/843"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=2262"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/2262\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=2262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=2262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=2262"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=2262"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=2262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}