Search Microsoft.com
Explore
"Concord Security"
Concord: Learning Network Configuration Contracts - microsoft.com
We develop a tool Concord to learn contracts automati-cally from example network configurations. By checking these learned contracts against new or changed...
Microsoft Entra Plans and Pricing | Microsoft Security
Explore Microsoft Entra, offering a range of identity and network access management products. See which license, plan, and price work for your business.
Microsoft Trust Center Overview | Microsoft Trust Center
Microsoft Trust Center products are built with data security in mind. We handle your data securely and in compliance with privacy and legal requirements.
Security intelligence updates for Microsoft Defender Antivirus and ...
Microsoft continually updates security intelligence in antimalware products to cover the latest threats and to constantly tweak detection logic, enhancing...
Networking Research Group - Microsoft Research: Publications
The Networking Research Group focuses on basic and applied research in all areas related to networked systems, mobile computing, sensing, and Internet of...
Cybersecurity for small and medium business | Microsoft Security
Protect your small business with enterprise-grade cybersecurity and comprehensive collaboration tools. Choose the pricing and plan that fits your needs.
Microsoft Defender Threat Intelligence | Microsoft Security
Discover Microsoft Defender Threat Intelligence—powerful threat intelligence software for cyber threat protection and threat solutions for your organization.
Microsoft Security Response Center Blog
At Microsoft Security Response Center (MSRC), we celebrate the diverse paths that bring researchers to our community. Brad Schlintz’s story is one of...
Microsoft Defender—Cybersecurity Solutions | Microsoft Security
Explore Microsoft Defender, powerful cybersecurity software and solutions for individuals and businesses, backed by advanced Microsoft threat protection.
5 ways to secure identity and access for 2024 | Microsoft Security Blog
To confidently secure identity and access at your organization, here are five areas Microsoft recommends prioritizing in the new year.
AI-Powered Security Operations | Microsoft Security
Protect your multicloud, multiplatform environment with AI-powered unified SecOps from Microsoft Security. Anticipate cyberthreats and prevent cyberattacks.
Microsoft Defender for Endpoint | Microsoft Security
Microsoft Defender for Office 365 is a collaborative security solution that helps secure your email and Microsoft Teams environments with advanced...
Microsoft 365 Roadmap
The Microsoft 365 Roadmap lists updates that are currently planned for applicable subscribers. Check here for more information on the status of new features...
What Is FIDO2? | Microsoft Security
FIDO2 strengthens security and protects individuals and organizations from cybercrimes by using phishing-resistant cryptographic credentials to validate...
Teams turns 2, delivers new experiences for the intelligent workplace
While the cars speed along the racetrack, race engineers, mechanical experts, and strategists take their positions in the Team Operations Center in Concord...
Zero Trust Security and Strategy | Microsoft Security
Protect against modern threats with a Zero Trust security strategy powered by AI. Discover Zero Trust security and strategy today with Microsoft Security.
Microsoft Defender for Business | Microsoft Security
Learn about Microsoft Defender for Business, a device security solution built to help protect small businesses against cybersecurity threats.
Microsoft Security Copilot pricing
Explore Microsoft Security Copilot pricing. Detect threats and empower defenders to respond quickly with AI-driven insights across your security stack.
What Is Vulnerability Management? | Microsoft Security
Learn how risk-based vulnerability management helps you discover, prioritize, and remediate operating system and application threats and vulnerabilities.
What is data loss prevention (DLP)? | Microsoft Security
Data loss prevention (DLP) is a security solution that identifies and helps prevent unsafe or inappropriate sharing, transfer, or use of sensitive data.
Can't find what you're looking for?
Search tips
- Make sure all words are spelled correctly.
- Try different keywords.
- Search the web with Bing