Zero Trust
Todayโs organizations need a security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid workplace, and protects people, devices, apps, and data wherever theyโre located. Stay up to date on the latest strategies, insights, and solutions built on Zero Trust principles.
Refine results
Topic
Products and services
Publish date
-
In this agentic era, security must be woven into, and around, every layer of the AI estate. -
Microsoft Security success stories: Why integrated security is the foundation of AI transformation
Discover how Ford, Icertis, and TriNet modernized security with Microsoft—embedding Zero Trust, automating defenses, and enabling secure AI innovation at scale. -
Four priorities for AI-powered identity and network access security in 2026
Discover four key identity and access priorities for the new year to strengthen your organization’s identity security baseline. -
Improving IT efficiency with Microsoft Security Copilot in Microsoft Intune and Microsoft Entra
Announcing the general availability of Microsoft Security Copilot capabilities for IT with Microsoft Intune and Microsoft Entra, offering AI-powered efficiency and enhanced security for your operations. -
Forrester names Microsoft a Leader in the 2025 Zero Trust Platforms Wave™ report
Employing a Zero Trust strategy is an effective way to modernize security infrastructure to protect against ever evolving security challenges. -
Explore new Microsoft Entra capabilities at Gartner® Identity & Access Management Summit 2024
Join Microsoft Security at Gartner Identity & Access Management Summit 2024 to explore identity and network access innovations and connect with experts. -
Microsoft Ignite: Sessions and demos to improve your security strategy
Join us at Microsoft Ignite 2024 for sessions, keynotes, and networking aimed at giving you tools and strategies to put security first in your organization. -
The four stages of creating a trust fabric with identity and network security
The trust fabric journey has four stages of maturity for organizations working to evaluate, improve, and evolve their identity and network access security posture. -
3 new ways the Microsoft Intune Suite offers security, simplification, and savings
The main components of the Microsoft Intune Suite are now generally available. -
Why endpoint management is key to securing an AI-powered future
With the coming wave of AI, this is precisely the time for organizations to prepare for the future. -
Microsoft Defender Experts for Hunting proactively hunts threats
Microsoft Defender Experts for Hunting is now generally available.