Identity and access management
Identity and access management ensures that the right people, machines, and software components get access to the right resources at the right time. Explore strategies and solutions that will help you secure access for all your employees, devices, and services
Filtered by
Clear All- Identity and access management
- Microsoft Defender
- Microsoft Defender for Cloud
Refine results
Topic
Products and services
Publish date
-
Discover the top multicloud security risks across DevOps, runtime environments, identity and access, and data in this new report from Microsoft. -
Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement
Microsoft security researchers recently identified an attack where attackers attempted to move laterally to a cloud environment through a SQL Server instance. -
Connect with Microsoft Security experts at the 2022 Gartner Identity & Access Management Summit
Microsoft speakers at Gartner Identity & Access Management Summit focus on permissions management, infrastructure attacks, and moving to cloud-based identity. -
Detecting malicious key extractions by compromised identities for Azure Cosmos DB
Azure Cosmos DB is a fully managed NoSQL cloud database service for modern app development. -
Prevent and detect more identity-based attacks with Azure Active Directory
Security controls built into Azure Active Directory can reduce your risk of compromise. -
4 identity partnerships to help drive better security
Microsoft identity engineering has expanded product partnerships to help customers transform digitally with Azure AD-integrated solutions. -
Voice of the Customer: Azure AD helps lululemon enable productivity and security all at once for its employees
“Not another portal, not another password!” —Learn how lululemon implemented Azure AD for cloud Identity and Access Management, simplifying user access without reducing business flexibility. -
The evolution of Microsoft Threat Protection, January update
Learn about the top feature updates for Microsoft Threat Protection in January. -
The evolution of Microsoft Threat Protection, December update
Last month, we shared updates on capabilities for securing identities, endpoints, user data, and cloud apps. -
CISO series: Strengthen your organizational immune system with cybersecurity hygiene
Cybersecurity hygiene is about maintaining cyberhealth by developing and implementing a set of tools, policies, and practices to increase your organization’s resiliency in the face of attacks and exploits. -
The evolution of Microsoft Threat Protection, November update
Learn about the latest enhancements to Microsoft Threat Protection, the premier solution for securing the modern workplace across identities, endpoints, user data, apps, and infrastructure.